Misc Terms Flashcards
cloud
What is Data remanence?
the residual representation of digital data that remains even after attempts have been made to remove or erase it.
cloud
What is the security concern regarding Data remanence?
If the data was not properly erased from the underlying storage, it could be exposed to the other organization.
cloud
How do you protect your cloud environment from Data remanence?
All cloud-based storage drives should be encrypted by default to prevent data remanence from being read by others.
cloud
What is meant by the term Metered Services?
Metered services are pre-paid, a-la-carte, pay-per-use, or committed offerings. A metered service like a database may charge its users based on the actual usage of the service resources on an hourly or monthly basis.
cloud
What is meant by the term Resource pooling?
Resource pooling refers to the concept that allows a virtual environment to allocate memory and processing capacity for a VMs use.
cloud
What is meant by On-demand in cloud services?
On-demand refers to the fact that a consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service provider.
Interfaces
What are the attributes of PCIe (peripheral component interconnect express)?
And what type of cards and adapters is PCIe used for?
PCIe (peripheral component interconnect express) is an interface standard for connecting high-speed components. Used for GPUs, RAID cards, network adapters, Wi-Fi cards, or SSD (solid-state drive) add-on cards.
Interfaces
The types of PCIe slots available on your computer are dependent upon your motherboard. What are the PCIe designations for PCIe slots?
PCIe slot types are designated as PCIe x1, x4, x8, and x16.
Graphics connections
What type of expansion slot is utilized (almost exclusively) in todays high end graphics cards
Graphics cards almost exclusively rely on PCIe x16 expansion slots for their connectivity.
Graphics connections
What type of expansion slot was utilized for low-speed connectivity to expansion cards, but has been replaced by the faster PCIe bus.
The peripheral component interconnect (PCI) bus is used to provide low-speed connectivity to expansion cards but has been mostly replaced by the faster PCIe bus.
Graphics connections
What port utilized a parallel expansion card standard originally for attaching video cards to a computer system to assist in 3D computer graphics
(AGP)
Accelerated Graphics Port
It has been replaced with PCIe due to its faster speeds.
Memory
What type of memory is usually utilized in laptops, routers and other small form factor computing devices?
A small outline dual inline memory module (SODIMM) can be purchased in various types and sizes to fit any laptop, router, or other small form factor computing device.
For the exam, if you are ever asked about installing memory in a small form factor device or a laptop, the answer will usually be SODIMM.
Memory
What type of memory is utilized in workstations and printers due to its larger size and shape?
A dual in-line memory module (DIMM) comprises a series of dynamic random-access memory integrated circuits. A DIMM is used in workstations and printers due to its larger size and shape.
Security
PAM
Priviledged Access Management (PAM)
is the combination of tools and technology used to secure, control and monitor access to an organization’s critical information and resources. Subcategories of PAM include shared access password management, privileged session management, vendor privileged access management (VPAM) and application access management.
Privileged user accounts are significant targets for attack as they have elevated permissions, access to confidential information and the ability to change settings. If compromised, a large amount of damage could be done to organizational operations. Types of accounts that implement PAM can include emergency cybersecurity procedure, local administrative, Microsoft Active Directory, application or service, and domain administrative accounts.
Security
FDE
Full-disk encryption (FDE) is a security method for protecting sensitive data at the hardware level by encrypting all data on a disk drive. FDE automatically encrypts data and operating systems (OSes) to prevent unauthorized access.
Security
AES
AES stands for Advanced Encryption Standard. It is an encryption algorithm that was initially used by the United States government to safeguard sensitive documents. AES was designed as a replacement for the older Data Encryption Standard (DES).
Security
TPM
A Trusted Platform Module (TPM) is an international standard for a secure cryptoprocessor.
On-board Cryptographic Processor (built into CPU)
Troubleshooting Methodology
What is the first step in the CompTIA troubleshooting methodology?
(1) Identify the problem.
============================
(1) Identify the problem.
(2) Establish a theory of.
(3) Test the theory
(4) Establish plan of action and implement.
(5) Verify full system functionality.
(6) Document findings, actions, and outcomes.
Troubleshooting Methodology
What is the second step in the CompTIA troubleshooting methodology?
**(2) Establish a theory. **
============================
(1) Identify the problem.
(2) Establish a theory.
(3) Test the theory
(4) Establish plan of action and implement.
(5) Verify full system functionality.
(6) Document findings, actions, and outcomes.
Troubleshooting Methodology
What is the third step in the CompTIA troubleshooting methodology?
(3) Test the theory
============================
(1) Identify the problem.
(2) Establish a theory.
(3) Test the theory
(4) Establish plan of action and implement.
(5) Verify full system functionality.
(6) Document findings, actions, and outcomes.
Troubleshooting Methodology
What is the forth step in the CompTIA troubleshooting methodology?
(4) Establish plan of action and implement.
============================
(1) Identify the problem.
(2) Establish a theory.
(3) Test the theory
(4) Establish plan of action and implement.
(5) Verify full system functionality.
(6) Document findings, actions, and outcomes.
Troubleshooting Methodology
What is the sixth step in the CompTIA troubleshooting methodology?
(6) Document findings, actions, and outcomes.
============================
(1) Identify the problem.
(2) Establish a theory.
(3) Test the theory
(4) Establish plan of action and implement.
(5) Verify full system functionality.
(6) Document findings, actions, and outcomes.