Core 1 Flashcards

1
Q

48 bit address which is always manifested as 12 hexadecimal characters?

A

Media Access Control (MAC) address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How are systems on a local area identified?

A

Media Access Control (MAC) address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is step 1 to the CompTIA Troubleshooting Theory?

A

Step 1: Identify the problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is step 2 to the CompTIA Troubleshooting Theory?

A

Step 2: Establish a theory of probably cause

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is step 3 to the CompTIA Troubleshooting Theory?

A

Step 3: Test the theory to determine cause

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is step 4 to the CompTIA Troubleshooting Theory?

A

Step 4: Establish a plan of action to resolve the problem and implement the solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is step 5 to the CompTIA Troubleshooting Theory?

A

Step 5: Verify full system functionality and, if applicable, implement preventive measure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is step 6 to the CompTIA Troubleshooting Theory?

A

Step 6: Document findings, actions, and outcome

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This device contains the motherboard, CPU, RAM, and hard drives.

A

System unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The system unit contains the motherboard, CPU, RAM, and hard drives and every other device is a ?

A

peripheral

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An open-air frame is called?

A

Open case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A traditional PC build is considered open or closed case?

A

Closed case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What two features is primarily used to measure the modern processor?

A

Clock speed and cores

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The clock speed of a task that is one cycle per second is called?

A

Hertz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

1 cycle per second?

a. hertz (Hz)
b. megahertz (MHz)
c. gigahertz (GHz)

A

a. hertz (Hz)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

1 million cycles per second?

a. hertz (hz)
b. megahertz (MHz)
c. gigahertz (GHz)

A

b. 1 megahertz (MHz)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

1 billion cycles per second?

a. hertz (hz)
b. megahertz (MHz)
c. gigahertz (GHz)

A

c. 1 gigahertz (GHz)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a CPU core?

A

CPU cores are multiple processors on one chip.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A CPU with only one lane is called?

A

Single-core

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A CPU with more than one core is called?

A

Multi-cores

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

CPU with 2 processors that work simultaneously in same integrated circuit?

A

Dual-core

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A chip with four independent cores that read/execute CPU instructions?

A

Quad-core

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

CPU’s that have 30, 60 or more cores with exponentially increasing clock speed and cores are called?

A

Threadripper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does ARM stand for?

A

Advanced Risk Machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

This type of chip is located in IoT devices?

A

ARM chip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are examples of IoT devices?

A

Raspberry-Pi
Arduino

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

This chip has simplified work instructions to allow for faster processing speeds?

A

ARM chips

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are the three types of chips?

A

CPU chip
ARM chip
APU chip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What does APU stand for?

A

Accelerated Processing Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

This chip is a CPU with graphics processing capabilities combined to save space.

A

APU chip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

A CPU capabilities are measured via what to main features?

A

Clock speed and cores

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What methodology do ARM chips use?

A

Reduced Instruction Set Computing (RISC) methodology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q
A

x86

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q
A

x64

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What does x86 or x64 reference?

A

The amount of data the CPU can handle at any one time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What bit is x86?

A

32 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What bit is x64?

A

64 bit

38
Q

All computing standards operate in the what power?

A

Power of 2

39
Q

The data being processed is considered?

A

Ram

40
Q

If we have a 32 bit system, what is the actual amount of data, or RAM, that it can process?

A

2^32 of bits of information.

41
Q

In the Instruction Set Architecture (ISA) x86, what applications are supported?

A

Only 32-bit applications

42
Q

In the Instruction Set Architecture (ISA) x86-64, what applications are supported?

A

32-bit and 54-bit applications

43
Q

In the Instruction Set Architecture (ISA) x64, what applications are supported?

A

Only 64-bit applications

44
Q

What is IA-32?

A

Intel Architecture 32-bit

45
Q

BIOS programming enables interaction with what and before which process takes place?

A

Interaction with the motherboard before the OS loads

46
Q

Where is BIOS stored?

A

In nonvolatile media called firmware

47
Q

These routines are built into firmware?

A

POST routines

48
Q

What utility is part of the firmware?

A

System Setup Utility

49
Q

What is the interface in which everything talks to everything else on the computer?

A

Motherboard

50
Q

When speaking in terms of programming the motherboard, why is the term firmware used instead of software?

A

Firmware means the programming is burned onto the chip versus copied onto magnetic or electronic media through software.

51
Q

This type of programming transfer is done through burning onto the chip.

A

Firmware

52
Q

This type of programming transfer is done through copying onto a magnetic or electronic media.

A

Software

53
Q

What is the purpose of the motherboard’s built in programming?

A

It is designed to allow communication between the assumed hardware of the computer.

54
Q

What is the name of the motherboards built in programming?

A

BIOS

55
Q

The total pixels across and down is called?

A

Resolution

56
Q

These monitors use liquid crystals to allow light to pass or not pass for each color in a pixel?

A

Liquid Crystal Display (LCD)

57
Q

What two types of LCD backlights are used?

A

Fluorescent or LED Lights

58
Q

Which ISA offers greater data handling, improved graphics performance, and better security?

A

x64

59
Q

Most modern hardware and software supports 64-bit systems and are backwards compatible with which system?

A

32-bit systems

60
Q

According to CompTIA, what is the longest run allowed in an horizontal run?

A

90 meters

61
Q

What is the longest Ethrenet will allow for a run?

A

100 meters with 10 meters of patch cable.

62
Q

This tool uses the speed of light to measure the length of a cable?

A

Time Domain Reflectometer (TDR)

63
Q

Patch cables use what type of wire?

A

Stranded

64
Q

What are TDRs are used to test?

A

TDRs test horizontal runs testing for breaks and continuity

65
Q

You need to update the office systems and need to wake the computers by sending a package that includes a magic packet. What is the term used?

A

Wake-on-LAN

66
Q

If waking-on-LAN, to avoid waking computers while always on LAN, what option should be included that only triggers the computer to wake when indicated?

A

Magic Packet

67
Q

What are the link lights indicating?

A

Connected light - connection to a switch
Speed light - speed switch is running
Activity light - activity occurring on network

68
Q

Which link light is steadily lit and on all the time?

A

Connected link light

69
Q

Which Link light flickers as changes occur in network?

A

Activity light

70
Q

When advising a company on configuring systems, the administrator wants to provide better information about network device status and how to monitor them in a client manual. Which of the following is the correct protocol that maintains a database containing statistics related to the activity of devices for review?

a.) IMAP
b.) DHCP
c.) SNMP
d.) POP3

A

c.) SNMP

The Simple Network Management Protocol (SNMP) is a framework for the management and monitoring of network devices. SNMP requires a Syslog agent that maintains a management information base (MIB) database. MIB holds statistics relating to the activity of the device.

71
Q

What does IMAP stand for?

A

Internet Message Access Protocol

72
Q

What does SNMP stand for?

A

Simple Network Management Protocol

73
Q

What does POP3 stand for?

A

Post Office Protocol

74
Q

What does DHCP stand for?

A

Dynamic Host Configuration Protocol

75
Q

The network administrator is configuring a network attached storage (NAS) appliance. What file sharing protocol should the administrator use to allow access to Windows, Linux, and Apple macOS clients?

a.) File Transfer Protocol (FTP)
b.) Lightweight Directory Access Protocol (LDAP)
c.) Simple Network Management Protocol (SNMP)
d.) Server Message Block (SMB)

A

d.) Server Message Block (SMB)

The Server Message Block (SMB) protocol that implements Windows File/Printer Sharing is specifically for use on local networks only. Therefore, allowing access from the internet would be a security risk.

76
Q

SNMP provides a means for devices to report operational statistics to a management server but not for?

A

File Sharing

77
Q

The Server Message Block (SMB) protocol that implements Windows File/Printer Sharing is specifically for use on _____ _____ only. Therefore, allowing access from the internet would be a security risk.

A

local networks

78
Q

A server administrator is joining a new startup business that will perform outsourced IT management for client firms. The administrator is to configure a web server to run on Linux, accept remote terminal connections from clients without using passwords, and encrypt terminal emulations. What can the administrator use to achieve this? (Select all that apply.)

a.) Secure File Transfer Protocol (SFTP)
b.) File Transfer Protocol (FTP)
c.) Secure Shell (SSH)
d.) OpenSSH

A

c.) Secure Shell (SSH)
d.) OpenSSH

79
Q

Including encrypted terminal emulations, this protocol can use SSH to achieve many other network configurations. However, it is not the principal means of obtaining a secure connection to another system.

A

Secure File Transfer Protocol (SFTP)

80
Q

An SSH server listens on which port by default but is not the principal means of obtaining a secure connection.

A

TCP/22

81
Q

The most widely used SSH is?

A

OpenSSH

82
Q

This connection is the principal means of obtaining secure remote access to UNIX and Linux servers?

A

Secure Shell (SSH)

83
Q

A top-level domain (i.e., .com) falsely represents the top of the Domain Name System (DNS) hierarchy. Why is this considered false?

a.) The name server hosting the domain is a static configuration as the primary DNS server entry in the IP configuration of local clients.

b.) The top-level domain cannot be a duplicate, but also it does not have to be a fully qualified domain name (FQDN).

c.) The name server hosting the domain resource records on the internet is configured as the only DNS server entry and recognized by a specific IP address, not the domain name.

d.) The DNS uses root servers at the hierarchy top, represented by a trailing dot at the end of a fully qualified domain name (FQDN), ensuring a unique host name.

A

d.) The DNS uses root servers at the hierarchy top, represented by a trailing dot at the end of a fully qualified domain name (FQDN), ensuring a unique host name.

84
Q

What does DNS stand for?

A

Domain Name System

85
Q

Modular memory used in laptops and mobiles devices?

A

SO-DIMM
Small Outline Dual In-Line

86
Q

If memory is not modular what does this mean in terms of being removable or upgradable?

A

The memory is likely soldered to the motherboard and the entire motherboard will need to be replaced in order to upgrade.

87
Q

What are the form factors for traditional spinning drive platters?

A

Laptops 2.5 form factor
Desktops 3.5 form factor

88
Q

What is the form factor for solid-state drives?

A

2.5 form factor

89
Q

What is the advantage of using SSD over Magnetic disk?

A

Silent
Greater speeds
Less latency
No moving parts

90
Q

What card sits on the SSD that requires no SATA data or power cables?

A

M.2

91
Q
A