custom quiz Flashcards

1
Q

You are in the process of setting up access control systems for the cloud deployment of your computer graphics company. You want that access control to be specified for certain users who can work limited graphics applications, but should be prevented from accessing others. Which access control method will you need to use?

A

You will need to use compute system access control. Compute systems on a cloud include virtual machines (VMs) and applications running on the VM, and they can be assigned accessibility rights based on their usage. Access rights for a compute resource will limit the people, resources, or services that can access them. By defining security groups and access rights for each group, authorization can be defined at a very granular level for each cloud compute system resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You have been instructed to build a new computer using an existing Advanced Technology Extended (ATX) motherboard. You must purchase a computer case that will be able to hold this motherboard. What are the dimensions of the motherboard?

A

12 inches wide by 9.6 inches deep

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The dimension for micro-ATX form factor is

A

9.6 inches wide by 9.6 inches deep and is the next step up from the mini-ITX.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The dimension for mini-ATX motherboard

A

11.2 inches wide by 8.2 inches deep

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The micro-ATX motherboard has how many pci slots

A

It usually has four PCI slots and would be installed in a small form factor case.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

dimension for baby atx

A

9 inches wide by 13 inches deep
The baby AT motherboard can support a maximum of two full-length expansion cards because the processor, memory, and expansion slots are arranged parallel to each other, leaving less space for expansion slots than provided by an ATX motherboard. The AT motherboard is 12 inches wide by 13.8 inches deep. This motherboard was phased out when the ATX motherboard was introduced in 1995.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

how many pins on a power connection of mother board

A

20-24 pins some have extra 4,6 or 8 pins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ipconfig

A

Displays the TCP/IP configuration of a device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ifconfig

A

The Unix/Linux equivalent of ipconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

nbtstat

A

Displays NetBIOS information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

net

A

Windows command that manages most network activity and settings, including network shares, network print jobs, and network users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

netdom

A

Joins a computer to a Windows domain, manages computer accounts on a Windows domain, and establishes trust relationships between Windows domains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

netstat

A

Displays which ports are listening on a TCP/IP device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

nslookup

A

Queries the Domain Name System (DNS) to obtain domain name or IP address mapping or for any other specific DNS record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ping

A

Uses ICMP to test connectivity between two devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

tracert

A

Traces the path a packet traverses through a network and displays the name and IP address of every device through which the packet passes.

17
Q

You need a system to ensure that only the appropriate users are allowed to perform actions on the stored data and access the applications.

A

Authorization

18
Q

what is correctly validating the identity of the user or host requesting access. This is done through a login process where a username and password or some other authentication factor is provided before access is granted. You can add a token or biometrics to a username and password combination as well for more authentication. Web users can use cookies for authentication. After a user is validated on a website, a cookie is stored on the user’s machine, which contains an identity token that allows authorization to the user. What is this called ?

A

Authentication

19
Q

what is software patches

A

Applying the latest software patches is essential to cover known security threats inside the operating system (OS) or applications. Patches should first be validated by the administrator to ensure their correctness.

20
Q
A