Exam Items Flashcards

1
Q

VNC

A

Virtual Network Computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

FileVault

A

MacOS
Built-in encryption capability
Password protected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Access Control Vestibule

A

Man trap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

.vbs

A

VBScript file extension
VBScript is a programming language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

WPA3

A

Wifi Protected Access 3
Password protected wifi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RDP location

A

Settings>System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DLP

A

Data loss prevention
Detects potential data breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

WPS

A

WiFi protected setup
When enabled on router, looks for devices within range and allow them to connect without having to type in password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

BCD

A

Binary coded decimal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

WDM

A

Windows driver model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In-place installation

A

Installing a new OS or application without removing the older version and without saving any data beyond normal precautions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Clean installation

A

Installation of an OS on a computer where the hard drive is formatted and completely erased

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Sector

A

A subdivision of a storage device
Smallest addressable unit for data storage. Typically 512 bytes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Full format

A

Entire disk is overwritten with zeros or random data to ensure that the files are permanently erased and cannot be recovered

Wipe a drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hotfix

A

A quick correction to address a bug, bypassing the normal software development process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Windows 10 64 bit req.

A

1 GHz processor
2 GB of RAM
20 GB of hard disk space
DirectX 9 graphics card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Windows 10 32 bit req.

A

1 GHz processor
1 GB RAM
16 GB hard disk space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

BitLocker

A

Windows encryption technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Offline file

A

Sync Center
allows users to access files stored at another point on their network even if the network connection is not working

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Defrag tool

A

Needs 15% of hard drive space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

GFS Linux

A

Cluster file system
allows cluster of computers to use a block device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Block Device

A

Nonvolatile mass storage devices

information can be accessed in any order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

AUP

A

Acceptable use policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Flammable liquids/electrical contact

A

ABC powder extinguisher
Carbon dioxide extinguisher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

32 bit OS RAM limit

A

4GB

26
Q

Phishing

A

Tricks target into downloading malware

27
Q

Boot sector virus

A

Malware that infects a systems boot partition or the MBR of a hard disk

28
Q

TACACS

A

Terminal access controller access-control system

A network protocol

encryption and authentication of packets

29
Q

TKIP

A

Temporal key integrity protocol

Network Security protocol
Replaced WEP

30
Q

WEP

A

Wired Equivalent Privacy

Wi-Fi encryption

31
Q

GCMP

A

Galois/counter mode protection

Encryption protocol in wireless security

32
Q

RC4

A

Rivest Cipher 4

stream cipher

Encrypts messages one byte at a time

33
Q

GPT

A

GUID Partition Table

128 partitions

9.4 ZB

Part of UEFI

Replaced MBR

34
Q

MBR

A

Master Boot Record

Up to four partitions

512 bytes up to 2.2 TB

Identifies how and where the systems OS is located in order to be booted into the main storage or RAM

35
Q

NTFS

A

New technology file system

Microsoft

Superseded FAT

36
Q

Disk Controller

A

The controller circuit which enables the CPU to communicate with a disk drive

37
Q

Time Machine

A

The backup mechanism of macOS

38
Q

Public domain license

A

No restrictions on use

39
Q

Lesser General Public License

A

Doesn’t have to make the latest software available under a matching license if it isn’t a derivative of the original software

40
Q

Permissive License

A

An agreement with few requirements about how they can modify, redistribute, and use the software.

41
Q

Copyleft License

A

Reciprocal or restrictive licenses

Similar to an LGPL but has more stipulations to follow

42
Q

Proprietary license

A

Most restrictive, uses EULA,

43
Q

x64

A

Allows the CPU to process 64-bits of data per clock cycle

44
Q

x86

A

32 bit CPU, 32 bits per clock cycle

45
Q

Virus signature

A

A unique string of code that can identify a specific computer virus

46
Q

VNC

A

Virtual network computing

A graphical desktop-sharing system that uses the remote frame buffer protocol to remotely control another computer

Cloud connection

47
Q

RADIUS

A

Remote authentication dial-in user service

Networking protocol that provides centralized authentication, authorization, and accounting management for users who connect and use a network service

48
Q

MAC filtering

A

A security access control method where MAC address assigned to each network interface controller is used to determine access to the network

49
Q

SSID suppression

A

You can disable your SSID broadcast if you don’t want anyone trying to connect to your network

Your Wi-Fi won’t appear on the list of available networks

50
Q

Content filtering

A

A process that manages or screens access to specific emails or webpages

51
Q

VGA mode

A

640x480 pixels, 16 colors

For troubleshooting display-related issues

52
Q

NAT

A

Network address translation

Way to map multiple private addresses inside a local network to a public IP address

Orgs that want multiple devices to employ a single IP address and home routers

53
Q

Dictionary attack

A

Entering every word in a dictionary or word list as a password

54
Q

Password partitioning attack

A

WPA3 vulnerability

55
Q

Side-channel attack

A

Attack enabled by leakage of information from a physical cryptosystem

56
Q

Virus

A

Spread from one computer to another

57
Q

Worm

A

Replicates itself, spreads across networks exploiting security vulnerabilities

Delete files or create botnets

58
Q

Spyware

A

Steals data

59
Q

Rootkit

A

Give hackers access to and control over a target device

Hides within a computer system

Eludes conventional scans

60
Q

Bot

A

Self-replicating malware, spreads to other devices creating a network - botnet