new Flashcards

1
Q

What is form factor?

A

the physical size and shape of a piece of computer hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

troubleshooting process

A

Identify the problem.
Establish a theory of probable cause.
Test the theory to determine the cause.
Establish a plan of action to resolve the problem and implement the solution.
Verify full system functionality and, if applicable, implement preventive measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Differentiate between RISC and CISC as used in CPU architecture.

A

RISC emphasizes efficiency in cycles per instruction and CISC emphasizes efficiency in instructions per program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

3 examples of intermediary network devices

A

switches and wireless access points (network access)
routers (internetworking)
firewalls (security).
Examples of host devices include computers, personal devices, thin clients, and multi-function devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is MAC address in full

A

media access control address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Differentiate between open source and closed source software

A

open- usually available for free and can be accessed and changed by anyone
closed- usually sold to end users and can only be accessed and changed by licensed vendors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How to protect against social engineering

A
security awareness training
Phishing simulations
Setting up protocols that would require data crosschecks
Prevent Scam Emails Using Gateways
Implementing password management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name 5 advantages of server virtualization

A
Reduced Hardware Costs. 
Faster Server Provisioning and Deployment. 
Greatly Improved Disaster Recovery. 
Increased Productivity. 
Energy Cost Savings.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

social engineering techniques

A

Baiting- piquing interest
Scareware- fictitious threats
Phishing- pretending

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Differentiate between adware and ransomware

A

Ransomware is a form of malware designed to block access from system until a ransom fee is paid. while adware -software that automatically displays or downloads advertising material such as banners or pop-ups when a user is online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

an example of a hypervisor

A

VMware and Hyper-V

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is a data centre

A

a large group of networked computer servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Discuss any two advantages of file extensions

A

help Windows, or other operating systems you’re using, determine which program to use to open those types of files.
tell your computer what icon to use for the file,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Differentiate between an update and an upgrade as used in operating systems.

A

Basically, think of an upgrade as a less frequent, more drastic change to the software you are currently using. A software update, on the other hand, can be more frequent, fix little bugs or make small tweaks, and is often used to repair the product.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Discuss two factors to consider before upgrading an operating system

A

vendor support

compatibility with current applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Differentiate between 64-bit operating system architecture and 32-bit operating system
architectures

A

Computers with 32-bit processors are older, slower, and less secure, while a 64-bit processor is newer, faster, and more secure
2^32 memory addresses and 2^64 memory addresser

17
Q

Discuss two advantages of a command line interface (CLI) operating system over a
graphical user interface (GUI) operating system.

A

Requires less memory and can be a lot faster

18
Q

Discuss 2 advantages of IPv6 over IPv4

A

More Efficient Routing

significantly larger number of nodes