ITF EXAM Flashcards

1
Q

Decimal

A

also referred to as base 10
express ten different numbers using a single digit in the range 0-9
values more than ten require 2 digits of decimal to express

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Binary

A

each single digit can express two values
range 0 to 1
can represent on/off states of transistors
can be referred to as base 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hexadecimal

A

16 different numbers using a single digit
range 0-F
A-F = 10-15
IPv6 and host addresses are expressed using hex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Conversion

A

byte is 8 bits
double-byte is 16 bits
Kilobyte, Megabyte, Gigabyte, Terabyte, Petabyte

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Throughput Units

A

Kbps, Mbps, Gbps, Tbps
Always base 10
how much data is transferred over a link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Integers

A

whole numbers
consumes 1 to 8 bytes of computer storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Float

A

decimal fractions
consumes 4 and 8 bytes of storage
could be whole numbers too ie: 4.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Boolean

A

special numeric data type indicating that something is either True/False with a 1 or 0
consumes a single bit of storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Char (characters)

A

single textual char
letter, symbol, number
one byte of storage
cannot perform math operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

String

A

collection of text characters
no storage limit
string length defined with data type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Unicode (Data Representation)

A

enables to handle data and express it across platforms in a uniform way
ASCII can be expressed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ASCII (Data Representation)

A

each number or character in a text file or string is represented by seven bit binary number
seven bit binary 128 different values can be expressed (0-127)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Basics of computing

A

input, processing, output, storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Input

A

command or info made availabe for computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Processing

A

retrieval, modification, manipulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Output

A

info sent out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Storage

A

used to retain digital data
SSD, CD, USB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Troubleshooting Steps

A
  1. Identify the problem
    Gather information
    Duplicate the problem, if possible
    Question users
    Identify symptoms
    Determine if anything has changed
    Approach multiple
    problems individually
  2. Research knowledge base/
    Internet, if applicable
  3. Establish a theory of probable cause
    Question the obvious
    Consider multiple approaches
    Divide and conquer
  4. Test the theory to determine the cause
    Once the theory is confirmed
    (confirmed root cause), determine
    the next steps to resolve the problem
    If the theory is not confirmed,
    establish a new theory or escalate
  5. Establish a plan of action to resolve the
    problem and identify potential effects
  6. Implement the solution or
    escalate as necessary
  7. Verify full system functionality
    and, if applicable, implement
    preventive measures
  8. Document findings/lessons
    learned, actions, and outcomes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

RJ - 11

A

Telephone Connector
4 to 6 wires

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

RJ - 45

A

Ethernet Connector
8 pin connection
most commonly connected to CAT 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Wireless Ethernet connections

A

WiFi, Bluetooth, NFC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Bluetooth

A

3 classes:
class 1, 100mW, 100meters 328ft
class 2, 2.5 mW, 10 meters, 33 feet
class 3, less than 10 meters

most Bluetooth devices use class 2 radios

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

NFC

A

Near Field Communication:

Apple Pay, Enables file transfer, tap to print

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Peripheral Devices

A

USB, FireWire, Thunderbolt, Bluetooth, RF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
FireWire
IEEE1394 transfers info between digital devices audio and video 2 version -FireWire 400 (4 or 6 wire) -FireWire 800 (9 pin connector)
26
Thunderbolt
high-speed connector introduced by Apple used for high-speed storage and video supports daisy chained peripherals
27
RF
Radio Frequency mice and keyboards that don't support Bluetooth
28
Graphic Devices
VGA Analog DV1 Digitaland Analog HDMI Digital Display Port Digital Mini Display Port
29
VGA
Video Graphics Array dual conversions process can cause display issues
30
DVI
Digital Video Interface compatible with VGA computer monitors and projectors
31
HDMI
High Definition Multimedia Interface
32
File Systems
FAT32 NFTS HFS+ ext4
33
3.5 mm Mini Jack
Light Blue: Line in Lime Green: stereo headphone/speaker Pink: Microphone 5.1 and 7.1: Black: rear speaker Orange: center or subwoofer Silver: side stereo
34
S/PDIF
digital audio to HDVTs or receivers on older pcs
35
DVI
can be adapted to a VGA connector
36
SATA
Serial Advanced Technology Advancement connect ATA drives to the motherboard
37
Port Cluster
allows external devices to plug into
38
Expansion/Bus Slot
provides installation point for hardware expansion card motherboards have at least 1 and most have 3 or more
39
BIOS(Basic Input Output System)/Firmware
ROM(read-only chip) on motherboard runs programs that are essential to computer hands responsibility over to OS Firmware: software program with a set of instructions on the hardware device
40
UEFI
unified extensible firmware initiative enhanced firmware used on computers since 2014
41
CMOS
used to integrate circuits complementary metal oxide semiconductor found in: microprocessors, batteries, digital camera image sensors BIOS settings stored in the CMOS chip
42
RAM
faster than storage devices, volatile
43
CPU
handles all instructions from hardware/software 2 types of CPU: ARM(Advanced RISC Machine) processor: 32-bit, used by phones, tablets, small computers Processors that run Windows and macOS laptops, servers, workstations: 32-bit and 64-bit
44
SoC - System on a chip
combines electronic circuits of various computer components onto a single integrated chip
45
32 bit processor
32 bits of data per clock cycle
46
64 bit processor
supports 64 and 32-bit OS and apps each processor core runs like a separate processor
47
GPU
dedicated processor that performs display functions
48
NIC - Network Interface Card
also called ethernet card uses RJ-45 connector computer expansion card for connecting to a network
49
Wired Ethernet
port enables a computer to connect to any ethernet network amber lights indicate max speed signal the port can use signal lights indicate speed and connection activity a green light indicates network activity blinks on/off as Netowkr adapter sends/receives data signal lights don't go off if a working connection is not attached or if computer is turned off
50
Intellectual Property
Copyright is automatic legal protection granted to certain types of work indicating that the copyright holder owns the right to control the use of the work, including rights of publication, distribution, or sale. Trademark name/logo. An ordinary trademark is indicated by the ™ symbol. A registered trademark is indicated by ®. A patent is legal protection for some kind of invention and must be applied and registered for.
51
Data Driven Business Decision
Data capture and collection -data points can be collected from many different sources. data correlation -the information layer requires software to perform data correlation. This means analyzing the whole data set and finding connections and links between data points. meaningful reporting-to inform human decision making at the insights layer, the information identified by the analytics system must be presented in ways that humans can analyze and interpret.
52
Storage Unit of Measure
Bit - 1 or 0 Byte - 00010011 ■ KiloByte (KB)—1000 bytes (or 103 or 10*10*10 bytes). Small files are often measured in KB. ■ MegaByte (MB)—1000*1000 bytes (or 1,000,000 bytes). Many files would be measured in megabytes. ■ GigaByte (GB)—1000*1000*1000 bytes (1,000,000,000 bytes). Gigabytes are usually used to talk about disk capacity. ■ TeraByte (TB)—1000 GB (1,000,000,000,000 bytes). Some individual disk units might be 1 or 2 terabytes but these units are usually used to describe large storage networks. ■ PetaByte (PB)—1000 TB or 1015 bytes (1,000,000,000,000,000 bytes). The largest storage networks and cloud systems would have petabytes of capacity.
53
Throughput Units
■ Kbps (or Kb/s)—1000 bits per second. Older computer peripheral interfaces (or buses) and slow network links would be measured in Kbps. ■ Mbps (or Mb/s)—1,000,000 bits per second. Many internal computer interfaces have throughputs measured in Mbps. Wireless networks and residential Internet links also typically have this sort of throughput. ■ Gbps (or Gb/s)—1,000,000,000 bits per second. The latest PC bus standards and networks can support this higher level of throughput. ■ Tbps (or Tb/s)—1,000,000,000,000 bits per second. This sort of capacity is found in major telecommunications links between data centers, cities, and countries.
54
Processing Speed
■ Megahertz (MHz)—1 million (1,000,000) cycles per second. Older PC bus interfaces and many types of network interface work at this slower signaling speed. ■ Gigahertz (GHz)—1000 million (1,000,000,000) cycles per second. Modern CPUs and bus types plus fiber optic network equipment work at these much faster speeds.
55
Installation Types
- Plug-and-play-This means that when you connect a new device, Windows identifies it and tries to install a device driver. -driver installation-There may be occasions when Plug-and-Play does not work and you need to install driver software manually before the device can be recognized. Windows ships with a number of default drivers and can also try to locate a driver in the Windows Update website. If no driver is available from there, you need to obtain one from the device vendor. The device may come with setup software or you may be able to download a driver from the vendor's website. -Other required steps- Following installation there may be other required steps to complete configuration of the device. - IP-based peripherals-Some types of devices are not connected to the computer via a peripheral port but accessed over a network. Such a device will be configured with an Internet Protocol (IP) address. - Web-based configuration steps-The device vendor will normally provide a tool to locate the device on the network and then open a web configuration page in a browser. You can use the configuration page to set device options.
56
motherboard
The motherboard is a Printed Circuit Board (PCB) with some built-in processors (the chipset), sockets and slots for upgradable components (CPU, RAM, adapter cards, disk drives), and wires (buses) to connect them together.
57
Firmware/BIOS
Low-level PC settings affecting the operation of the motherboard can be configured via the system firmware setup program. This may also be referred to as CMOS setup, BIOS setup, or UEFI setup. You can normally access the system setup program with a keystroke during the power-on (boot) process.
58
Storage
Hard Drive - based on a magnetic disk technology SSD- use a type of transistor-based memory called flash memory and are much faster than HDDs.
59
Cooling
Heatsink-passive cooling device/block of metal with fins Fan-active cooling device/requires power to run Liquid Base cooling- system of pumping water around the chassis/active cooling
60
SOHO Network(Small Office Home Office)
Can perform these functions: Switch- connect 4-8 computers in ethernet LAN Access Point-creates a wifi wireless network (WLAN) Internet router/modem-connects the wired and wireless network clients to the Internet via a WAN link.
61
Fiber Optic
faster internet service
62
Cable
The cable modem or modem/router is interfaced to the computer through an Ethernet adapter and to the cable network by a short segment of coax, terminated using an F-connector.
63
DSL
Digital Subscriber Line is a SOHO internet type that works over an ordinary telephone line. Most residential DSL services are asymmetric (ADSL), meaning that the uplink (up to about 1.4 Mbps) is slower than the downlink (up to about 24 Mbps).
64
Satellite
provide far bigger areas of coverage connections experience severe latency problems
65
Cellular
radio transmissions greater range than Wi-Fi
66
Radio Frequency
Radio Frequency (RF) is a means of provisioning a wireless local network using Wi-Fi standard equipment. While this isn't a means of Internet service provision in itself, it is a means for a client to connect to a wireless router offering Internet access.
67
LAN
Local Area Network network in a single location
68
WAN(Wide Area Network)
Networks in different geographic locations but with shared links
69
Basics of packet transmission
Network signals must be packaged in such a way that each host is able to understand them. Also, each host must have a means of recognizing the location of other hosts on the network. These functions are provided by a network protocol. A network protocol identifies each host on the network using a unique address. It also defines a packet structure. A packet is a wrapper for each data unit transmitted over the network. A packet generally consists of a header (indicating the protocol type, source address, destination address, error correction information, and so on) and a payload (the data).
70
Hard Drive: Solid State vs Spinning Disk
HDDs are based on a magnetic disk technology. SSDs use a type of transistor-based memory called flash memory and are much faster than HDDs.
71
Local Storage Types
RAM, Hard Drive, Optical, Flash Drive
72
Local Network Storage Types
NAS, File Server
73
DNS
URL to IP translation
74
IP address
logically identify each host on a network encodes two pieces of information: Network ID and host ID
75
Media Access Control (MAC) address
identifies host by the address of its network interface at the data link layer 48 bit value expressed in hex 00:60:8c:12:3a:bc or 00608c123abc 0060.8c12.3abc
76
Address Resolution Protocol (ARP)
protocol that enables this process of local address discovery to take place ARP messages onto the local network to find out which host MAC address "owns" a particular IP address
77
URL consists of:
Protocol : host location : file path http:// : storecomptia.org/itf/ : index.htm
78
HTTP and HTML
HTTP is the basis of the World Wide Web. HTTP is usually used to serve HTML web pages, which are plain text files with coded tags (HyperText Markup Language) describing how the page should be formatted.
79
POP3
the messages are usually deleted from the server when they are downloaded
80
IMAP
supports permanent connections to a server and connecting multiple clients to the same mailbox simultaneously
81
SMTP
deliver/send messages
82
Modem
transmit frames across WAN link
83
Router
forward packets between local network and the Internet
84
Switch
connects four or eight computers together in an Ethernet LAN using RJ-45 network ports and twisted-pair cabling.
85
Access Point
creates a Wi-Fi wireless network (W LAN) between computers and mobile devices equipped with suitable adapters and also switches communications between the wired and wireless networks.
86
Firewall
can control how hosts and network applications are accessible to one another
87
SSL/TLS
SSL/TLS is closely associated with use of the HTTP application, referred to as HTTPS or HTTP Over SSL or HTTP Secure but can also be used to secure other TCP/IP application protocols. HTTPS operates over port 443 by default.
88
SSID
name for WLAN It is a good idea to change the SSID from the default to something unique to your network.
89
802.11a
5Gz
90
802.11b
2.4Gz
91
802.11g
2.4Gz
92
802.11n
2.4Gz 5Gz
93
802.11ac
5Gz new standard
94
802.11 standards
Most SOHO routers support 802.11g/n or 802.11g/n/ac. This means that you can have a mix of client devices. For example, you might have a new router that supports 802.11ac but computers and tablets with wireless adapters that only support 802.11n. You can use the access point in compatibility mode to allow these devices to connect. Compatibility modes can slow the whole network down, especially if 802.11b clients have to be supported. If possible, use newer standards only.
95
Best Practices
Change SSID Change default password Encrypted vs unencrypted
96
encrypted vs unencrypted
encryption systems consists of a cipher that scrambles the message and a key vs open authentication mode used on public AP data sent over the wireless network is unencrypted a captive portal can allow client to authenticate over HTTPS so the login is secure
97
Encryption modes:
WEP, WPA, WPA2
98
What info do you need to configure a wireless network manually?
require that the router be identified by its SSID. In addition, the encryption type and authentication information are required.
99
Operating System (OS)
interface between applications and hardware
100
workstation OS
runs traditional desktop PC or laptop
101
mobile device OS
smartphones and tablets
102
server OS
include software packages/roles simpler command line interface rather than GUI to make it more secure and reliable
103
Embedded OS
a computer or appliance designed for a very specific function In an embedded system, the embedded OS acts as firmware. It provides all the functions for interacting with the device hardware.
104
Two types of PC firmware:
Basic Input/Output System (BIOS) Unified Extensible Firmware Interface(UEFI)
105
Hypervisor (Type 1)
installed directly on computer and interacts directly with hardware
106
File Systems
NTFS = Compression, Encryption, Permissions, Journaling, Case Aware FAT32 = n/a HFS+ = Compression, Permissions, Journaling, Case Aware ext4 = Encryption, Permissions, Journaling, Case Aware
107
Disk Management
format mass storage devices and manage partitions A disk must have a t least one partition and each partition must be formatted with a file system.
108
Folders/directories
Linux > directories>in the directory path /home/andy, home is a subdirectory of the root directory and andy is a subdirectory of home. Windows > C:\WINDOWS\System32\. WINDOWS is a subfolder of the root and System32 is a subfolder of WINDOWS.
109
File Types and Extensions
The last part of the file name represents an extension which describes what type of file it is.
110
Permissions
To view, create, modify, or delete a file in a folder, you need the correct permissions on that folder
111
Processes
main unit governing a program and managing memory resources allocated to it by the OS
112
Services
Windows process that does not require user interaction and runs in the background
113
Task Scheduler
Utility that sets tasks to run at a specific time In Linux Cron is used to run tasks or scripts at a particular time
114
Pagefile
virtual memory when OS loads more data than it can fit
115
Disk Management
format mass storage and manage partitions
116
console/command line
configure an OS using typed commands
117
GUI
graphical user interface controlled via mouse, keyboard and or touchscreen
118
productivity software
applications that help users complete typical office tasks
119
web browser software
for information research, to contact customers
120
spreadsheet software
can be used for tracking and analyzing sales data Example: Microsoft Excel
121
word processing software
applications that help users write and edit documents
122
Presentation Software
enables users to create sophisticated slide shows
123
visual diagramming software
provides templates and shapes for different kinds of diagrams Example: Microsoft Visio
124
collaboration software
multiple users can work together on the same file/project
125
email client software
works in conjunction with an email server often coupled with Personal Information Manager (PIM)
126
PIM
Personal Information Manager software provides features for storing and organizing information such as contacts and calendar events.
127
online workspace
file is hosted on a network and users can sign in to access it
128
Instant Messaging Software
allows users to communicate in real time with no delay unlike with email
129
video conferencing software
allows users to configure virtual meeting rooms with options for voice, video and instant messaging
130
project management software
breaking a project into a number of tasks and assigning responsibilities, resources, and timescales to ensure completion of tasks
131
Accounting Software
supports financial and commercial functions
132
Database software
enables user to store, organize, retrieve information
133
Enterprise Level Database products examples:
SQL server and Oracle
134
Business Specific software
to implement specific line of business functions
135
flow chart
view sequence as a graphical flow chart to understand processess
136
compiled programming languages
must transform code to executable binary before it can run Examples: C++ C# COBOL PASCAL
137
Interpreted Programming Languages
no need to compile program it runs with the context of an interpreted which converts machine code at run time Examples include: scripting languages such as JavaScript, Perl, Python,
138
Query Languages
designed to retrieve specific records from dataset and code does not need to be compiled Example: SQL, XML
139
Assembly Languages
machine code in human readable text and specific to a hardware architecture
140
Markup Languages
not a programming language but a means of making data in a document accessible to a program Example: HTML, XML
141
Locally Installed Application Delivery Methods
local hardware dont depend on network connection
142
Local Network Hosted Application
client workstations access the application using a remote terminal or viewer does not require the host to access the internet Example: Citrix XenApp
143
Cloud Hosted Application
clients connect to the application servers over the internet clients/servers must have reliable internet connection
144
Application architecture models
One Tier - hosted on the same computer Two Tier - client(application/presentation)-server application separates Three Tier - presentation and application layers are also split N-Tier - more complex architecture example: shopping on amazon
145
caching/clearing cache
done from the browsers settings dialog or configuration page
146
private browsing
browser does not store cookies or temporary files and doesn't add pages to the history list
147
proxy settings
can be configured as a firewall and apply other types of content filtering rules configure a proxy manually by entering IP address and port number.
148
client side scripting
tends to break most websites because they depend on the functionality scripting allows can be disabled by configuring settings
149
Script Blocker
controls which websites are allowed to run scripts
150
What are the different types of licenses?
Single Use Group use/site license concurrent license open sourced vs proprietary subscription vs one time purchase product keys and serial numbers
151
software installation best practice
compatible with OS hardware meets app requirements special instructions or known issues valid agreement or license to install
152
What are the 3 types of Interpreted Languages?
Scripting Languages Scripted Languages Markup Languages
153
Organizational Techniques
pseudocode concepts flow-chart concepts / sequence
154
Logic Components
Looping and branching
155
pseudocode concepts
no particular programming language specified
156
flow chart
sequence of steps there are branches and loops
157
branching
instruction to the computer to execute a different sequence of instructions
158
looping
instruct computer to perform or repeat a task until a condition is met
159
Identifiers
Variables and Constants
160
Containers
Arrays and Vectors
161
Objects
Properties, Attributes, and Methods
162
Variables
stores temporary values
163
constants
value stored does not change
164
arrays
multi dimension container and can be used in the same manner as variables
165
vectors
single dimension array one column or one row in array
166
functions
small section of code that is reusable, performs a very specific task, allows you to feed it relevant information
167
properties
components or subtypes
168
attributes
describes properties of an object or object itself
169
methods
define procedure or what an object can do
170
What is a database used for?
create, import/input, query, reports
171
flat file system
enables you to store your information in sheets Example; Excel Spreadsheet, CSV
172
database
enforces data type, manage multiple tables and link fields, can support multiple users
173
flat file vs database
database supports multiple concurrent users, scalability, speed, variety of data
174
Records (in Database)
each row represents a separate record in the database
175
Field(in Database)
each column represents a field
176
Storage(data persistence)
a database represents a way for an app to store data persistently and securely
177
relational database
structured database where information is organized in tables
178
RDBMS
Relational Database Management Systems use Structured Query Language (SQL) to maintain and query data in the database. Examples of RDBMS: Microsoft SQL Oracle Database MySQL Microsoft Office Access
179
primary key
used to define relationship between one table and another table
180
foreign key
column in the secondary table
181
schema
definition of tables, columns, and relations
182
Constraints
imposed on the values that can be input into each field
183
semi structured databases
lacks the structure of formal database architecture but there is associated information called metadata that helps identify the data
184
non structured databases
provides no rigid information of the data Example: images, text files Word Documents, PowerPoint
185
Document Databases
example of semi structured databases rather than define tables and fields the database grows by adding documents to it. The documents can use the same structure or be different types
186
key value/pair databases
storing properties of objects without predetermining the fields used to define an object. One key/value format used widely is JavaScript Object Notation (JSON)
187
non relational databases
key/value pair database document database
188
Data Manipulation(SQL relational method)
SELECT INSERT DELETE UPDATE
189
Data Definition(SQL relational method)
CREATE ALTER DROP Permissions
190
Database Access Methods
user can run SQL commands on the database server or update or extract info using a form or app that encapsulates SQL commands as graphical controls or tools.
191
direct/manual access
Administrators might use an administrative tool, such as phpMyAdmin, to connect and sign in to an RDBMS database. Once they have connected, they can run SQL commands to create new databases on the system and interact with stored data. This can be described as direct or manual access.
192
Programmatic Access
A software app can interact with the database either using SQL commands or using SQL commands stored as procedures in the database.
193
Query/Report Builder
provides GUI for users to select actions to perform on the database and converts those selections to the SQL statements that will be executed.
194
User Interface/Utility Access
an application might use a database in the background without the user being aware
195
backups (databases)
most RDBMS provide stored procedures that invoke backup and restore commands at a database or table level.
196
database dump
copy of database or table schema along with records expressed as SQL statements
197
Ways to export/import databases?
database dump backup
198
CIA
confidentiality, integrity, availability
199
confidentiality
- Snooping - Eavesdropping - Wiretapping - Social engineering - Dumpster diving
200
Integrity concerns
- Man-in-the-middle - Replay attack - Impersonation - Unauthorized information alteration
201
Availability concerns
- Denial of service - Power outage - Hardware failure - Destruction - Service outage
202
Securing devices (mobile/workstation)
- Antivirus/Anti-malware - Host firewall - Changing default passwords - Enabling passwords - Safe browsing practices - Patching/updates
203
What are the "device use best practices"?
- Software sources - Validating legitimate sources - Researching legitimate sources - OEM websites vs. third-party websites - Removal of unwanted software - Removal of unnecessary software - Removal of malicious software
204
AAA
Authentication means proving user is who they say they are Authorization means creating barriers around resources so that only authenticated users can access Accounting means recording when and by whom a resource was accessed
205
Written policies and procedures
helps staff understand and fulfill their responsibilities and follow best practices
206
Handling of confidential information
- Passwords - Personal information - Customer information - Company confidential information
207
Authentication
- Single factor - Multifactor - Examples of factors - Password - PIN - One-time password - Software token - Hardware token - Biometrics - Specific location - Security questions - Single sign-on
208
Authorization
- Permissions - Least privilege model - Role-based access - User account types - Rule-based access - Mandatory access controls - Discretionary access controls
209
Accounting
- Logs - Tracking - Web browser history
210
Non-repudiation
- Video - Biometrics - Signature - Receipt
211
password best practices
* Password length * Password complexity * Password history * Password expiration * Password reuse across sites * Password managers * Password reset process
212
plain text vs cypher text
plain text is unencrypted cypher text is encrypted
213
Whatare the 3 places Data at rest is stored?
- File level - Disk level - Mobile device
214
Data in transit
- Email - HTTPS - VPN - Mobile application
215
fault tolerance
help protect against losing access to a computer system when components fail
216
data redundancy
combining hard disks into an array of disks to help avoid unavailability
217
RAID
Redundant Array of Independent Disks offers variety of fault tolerant solutions
218
RAID 1
disk mirroring
219
RAID 5
striping with parity
220
Fault tolerance(business continuity concept)
- Replication - Redundancy - Backup considerations - Location - Contingency plan
221
Redundancy in fault tolerance(business continuity concept)
data, network, power
222
Backup Considerations in fault tolerance(business continuity concept)
Data >file backup critical data database OS backups
223
Location in fault tolerance(business continuity concept)
- Stored locally - Cloud storage - On-site vs. off-site
224
Contingency plan in fault tolerance(business continuity concept)
allows the system to be resilient to failures and unexpected outages
225
disaster recovery(business continuity concept)
- Data restoration - Prioritization - Restoring access
226
scripting languages
types of interpreted language that can eb executed without the need to be compiled examples: Perl PHP, Python
227
drivers
tell computer how to comunicate with OS