General and Misc Flashcards

1
Q

Error Correcting Code

A

Error Correcting Code (ECC) RAM is System memory (RAM) with built-in error correction security. It is more expensive than normal memory and requires motherboard support. It is typically only used in servers. It can detect and correct single bit errors. It can detect more than single-bit errors but cannot correct them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Advanced RISC Machines (ARM)

A

s a designer of CPU and chipset architectures widely used in mobiles devices. RISC stands for reduced instruction set computing. RISC uses a small number of simple instructions that can be performed as a single operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Simultaneous multithreading (SMT) / Hyperthreading

A

to do the most amount of work possible in a single clock cycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Symmetric Multiprocessing (SMT)

A

Approach in which two or more CPUs are used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Troubleshooting steps

A
  1. Identify the problem.
  2. Establish a theory.
  3. Test the theory.
  4. Establish a plan of action and implement.
  5. Verify full system functionality.
  6. Document the findings, actions, and outcomes.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Preboot Execution Environment (PXE)

A

A network standard that allows a computer to boot up and load an operating system directly from a network server instead of relying on a local hard drive. Commonly used for installing operating systems on multiple computers or troubleshooting issues without physical boot media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Secure boot

A

Prevents unauthorized processes from executing during the boot operation. Under secure boot, computer firmware is configured with cryptographic keys that can identify trusted code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Trusted Platform Module (TPM)

A

is a specification for hardware-based storage of digital certificates, cryptographic keys, and hashed passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hardware Security Module (HSM)

A

A USB thumb drive to store cryptographic material and keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Power over Ethernet (PoE)

A

means of supplying electrical power from a switch port over ordinary data cabling to a powered device such as VoIP handset, camera, or wireless access point. PoE standards: 802.3af (13W)/802.3at (25W)/802.3bt (51W-73W)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Power Injector

A

For PoE, the switch must be PoE enabled and if not we can use power injector.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Wi-Fi Analyzer

A

is a device or software that helps measure signal strength across different channels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Long-range Fixed Wireless

A

high-gain microwave antennas to establish a point-to-point wireless link over long distances. A wireless signal power has three components: transmit power(dBm), Antenna gain (dBi)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CAT Standards

A
  1. CAT 5 (100 Mbps/100BASE-TX)
  2. CAT 5e (1 Gbps/ 1000BASE-T/ Gigabit Ethernet)
  3. CAT 6 (1Gbps/ 1000BASE-T/ Gigabit Ethernet)
    CAT 6 (10 Gbps/ 10GBASE-T/ 10G Ethernet)
  4. CAT 6A (10Gbps/ 10GBASE-T/ 10G Ethernet)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How to create a loopback plug

A

Connect one wire to pin 1 and 3 and another wire to 2 and 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Network Tap

A

It intercepts the signal passing through a cable and sends them to a packet or protocol analyzer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Plenum Cable

A

Type of cable that is fire-retardant and meets other strict fire safety standards.

18
Q

Fiber Optic Categories

A
  1. Single-mode fiber: small core, long wavelength infrared signal, and supports data rates up to 10 Gbps or better.
  2. Multi-mode fiber: larger core, shorter wavelength infrared light, less expensive, and does not support high signaling speeds or long distance.
19
Q

Fiber Optic connectors

A
  1. Straight tip (ST): push & twist
  2. Subscriber Connector (SC): push/pull design
  3. Lucent Connector (LC): tabbed push/pull
20
Q

Geostationary Orbital Satellite Internet Access

A

A satellite-based Internet is a system of microwave transmissions where orbital satellite relay signals between receivers on earth and other satellites. Satellite internet connectivity is enabled through a reception antenna connected to the PC or network through a DVB-S modem.

21
Q

Low Earth Orbital Satellite Internet Access

A

LEO satellites support better bandwidth and are lower latency. The drawback is that the satellites move relative to the surface of the Earth. The dish construction uses a technology called “phased array” to connect to different satellites as they pass overhead.

22
Q

Global System for Mobile Communication (GSM)

A

3G format which allows subscribers to use SIM cards on an unlocked handset.

23
Q

TCP/IP Layers

A
  1. Application: DHCP, DNS, FTP, HTTP/HTTPS, SMB, SMTP, IMAP, POP3, SSH, RDP, Telnet, LDAP, SNMP, Syslog
  2. Transport: TCP, UDP
  3. Internet: IP
  4. Link/ Network Interface: Ethernet Wi-Fi
24
Q

Transport Layer Protocols

A
  1. Transmission Control Protocol: connection oriented, ensures packet delivery, correct order and error checking. Used in web browsing, email, FTP, etc.
  2. User Datagram Protocol: Connectionless, no guarantee of delivery, no retransmissions, good for video streaming, VoIP, DNS, and online gaming.
25
Default Gateway
IP address of a router interface that the host can use to forward packets to other networks.
26
Private Address Ranges
- 10.0.0.0 to 10.255.255.255 - 172.16.0.0 to 172.31.255.255 - 192.168.0.0 to 192.168.255.255
27
Network address Translation (NAT)
Devices on a private network cannot access the public Internet so NAT translates private IPs into public IPs.
28
Proxy Server
Intermediary between clients and the Internet in which clients send a request to proxy and proxy fetches resources.
29
Domain Name System (DNS)
It translates human-readable domain names into machine-readable IP addresses.
30
Dynamic Host Control Protocol (DHCP)
Assigns IP address, subnet mask, default gateway, and DNS server address automatically.
31
Automatic Private IP Addressing (APIPA)
When a host fails to communicate with a DHCP server, it obtains an IP address from the APIPA range of IPs. 169.254.0.1 to 169.254.255.254
32
DNS Record Types
1. A record: maps a host name to an IPv4 address. 2. AAAA record: maps a host name to an IPv6 address. 3. CNAME record: an alias for a host name 4. MX: IP address of a mail server.
33
DNS Spam Management Records
1. TXT records: free-form text in DNS/ commonly used for email verification and spam prevention/ one domain can have multiple TXT records. 2. Sender Policy Framework (SPF): uses a single TXT record and controls how to handle emails from unauthorized servers. 3. DomainKeys Identified Mail (DKIM): Uses cryptographic signatures to verify email source, and the key is stored in a TXT record. 4. Domain-Based Message Authentication, Reporting, and Conformance (DMARC): Ensures SPF and DKIM are being used efficiently.
34
Server Message Block (SMB)
Facilitates file and printer sharing on Windows network. port 445
35
Network Basic Input/Output System (NetBIOS)
Allows name addressing and session management on early Windows networks. Port 137/139
36
File Transfer Protocol
Uploading and downloading files from a network server. Port 21 and 20.
37
Simple Mail Transfer Protocol
Specifies how email is delivered from one mail domain to another. It finds the recipient SMTP server by using the domain name part of the recipient's email address. Port 25 & 587
38
Post Office Protocol 3
an application protocol that enables a client to download mail messages from a server mailbox to a client over port 110 and secure port 995.
39
Internet Message Access protocol (IMAP)
an application protocol that enables the client to access and manage email messages stored in a mailbox on a remote server.
40
Lightweight Directory Access protocol (LDAP)
used to access network directory database and query information about uses and their privileges as well as other organizational information.
41
Simple Network Management Protocol (SNMP)
Application protocol that manages and monitors network devices. Port 161 for queries and port 162 for traps.
42
System Logging Protocol (Syslog)
Collects and centralizes event logs from multiple devices. Over port 514.