Exam Items Flashcards

1
Q

VNC

A

Virtual Network Computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

FileVault

A

MacOS
Built-in encryption capability
Password protected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Access Control Vestibule

A

Man trap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

.vbs

A

VBScript file extension
VBScript is a programming language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

WPA3

A

Wifi Protected Access 3
Password protected wifi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RDP location

A

Settings>System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DLP

A

Data loss prevention
Detects potential data breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

WPS

A

WiFi protected setup
When enabled on router, looks for devices within range and allow them to connect without having to type in password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

BCD

A

Binary coded decimal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

WDM

A

Windows driver model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In-place installation

A

Installing a new OS or application without removing the older version and without saving any data beyond normal precautions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Clean installation

A

Installation of an OS on a computer where the hard drive is formatted and completely erased

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Sector

A

A subdivision of a storage device
Smallest addressable unit for data storage. Typically 512 bytes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Full format

A

Entire disk is overwritten with zeros or random data to ensure that the files are permanently erased and cannot be recovered

Wipe a drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hotfix

A

A quick correction to address a bug, bypassing the normal software development process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Windows 10 64 bit req.

A

1 GHz processor
2 GB of RAM
20 GB of hard disk space
DirectX 9 graphics card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Windows 10 32 bit req.

A

1 GHz processor
1 GB RAM
16 GB hard disk space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

BitLocker

A

Windows encryption technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Offline file

A

Sync Center
allows users to access files stored at another point on their network even if the network connection is not working

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Defrag tool

A

Needs 15% of hard drive space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

GFS Linux

A

Cluster file system
allows cluster of computers to use a block device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Block Device

A

Nonvolatile mass storage devices

information can be accessed in any order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

AUP

A

Acceptable use policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Flammable liquids/electrical contact

A

ABC powder extinguisher
Carbon dioxide extinguisher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
32 bit OS RAM limit
4GB
26
Phishing
Tricks target into downloading malware
27
Boot sector virus
Malware that infects a systems boot partition or the MBR of a hard disk
28
TACACS
Terminal access controller access-control system A network protocol encryption and authentication of packets
29
TKIP
Temporal key integrity protocol Network Security protocol Replaced WEP
30
WEP
Wired Equivalent Privacy Wi-Fi encryption
31
GCMP
Galois/counter mode protection Encryption protocol in wireless security
32
RC4
Rivest Cipher 4 stream cipher Encrypts messages one byte at a time
33
GPT
GUID Partition Table 128 partitions 9.4 ZB Part of UEFI Replaced MBR
34
MBR
Master Boot Record Up to four partitions 512 bytes up to 2.2 TB Identifies how and where the systems OS is located in order to be booted into the main storage or RAM
35
NTFS
New technology file system Microsoft Superseded FAT
36
Disk Controller
The controller circuit which enables the CPU to communicate with a disk drive
37
Time Machine
The backup mechanism of macOS
38
Public domain license
No restrictions on use
39
Lesser General Public License
Doesn’t have to make the latest software available under a matching license if it isn’t a derivative of the original software
40
Permissive License
An agreement with few requirements about how they can modify, redistribute, and use the software.
41
Copyleft License
Reciprocal or restrictive licenses Similar to an LGPL but has more stipulations to follow
42
Proprietary license
Most restrictive, uses EULA,
43
x64
Allows the CPU to process 64-bits of data per clock cycle
44
x86
32 bit CPU, 32 bits per clock cycle
45
Virus signature
A unique string of code that can identify a specific computer virus
46
VNC
Virtual network computing A graphical desktop-sharing system that uses the remote frame buffer protocol to remotely control another computer Cloud connection
47
RADIUS
Remote authentication dial-in user service Networking protocol that provides centralized authentication, authorization, and accounting management for users who connect and use a network service
48
MAC filtering
A security access control method where MAC address assigned to each network interface controller is used to determine access to the network
49
SSID suppression
You can disable your SSID broadcast if you don’t want anyone trying to connect to your network Your Wi-Fi won’t appear on the list of available networks
50
Content filtering
A process that manages or screens access to specific emails or webpages
51
VGA mode
640x480 pixels, 16 colors For troubleshooting display-related issues
52
NAT
Network address translation Way to map multiple private addresses inside a local network to a public IP address Orgs that want multiple devices to employ a single IP address and home routers
53
Dictionary attack
Entering every word in a dictionary or word list as a password
54
Password partitioning attack
WPA3 vulnerability
55
Side-channel attack
Attack enabled by leakage of information from a physical cryptosystem
56
Virus
Spread from one computer to another
57
Worm
Replicates itself, spreads across networks exploiting security vulnerabilities Delete files or create botnets
58
Spyware
Steals data
59
Rootkit
Give hackers access to and control over a target device Hides within a computer system Eludes conventional scans
60
Bot
Self-replicating malware, spreads to other devices creating a network - botnet