WEEK 4 Flashcards
Private ip are used in mainly what?
Homes or office
10.0.0.0 - 10.255.255.255 is an example of what
Private IP Address
172.16.0.0 - 172.31.255.255 is an example of what
Private IP Address
192.168.0.0 - 192.168.255.255 is an example of what
Private IP Address
Public IP Addresses are used by who
(Coffees shops and public places)
When connecting to the Internet
ISP give devices a Public IP to whoever connects
What converts IP Address to a readable name
DNS
DNS resolver steps
1st stop is at DNS recursive server
(looks for IP address)
2. Root name server
3.TDL name server
4.Domain name server
What enables web browsers and servers to exchange information, allowing you to access and view webpages
Hypertext Transfer Protocol (HTTP)
What is the secure version of HTTP
Hypertext Transfer Protocol Secure (HTTPS)
When you get your mail from a server and it goes to ur computer but is no longer on the server after u got it
(emails tied to one computer)
Post Office Protocol Version 3 (POP3)
Can access emails on your devices
(Phone, computer, laptop)
Internet Message Access Protocol (IMAP)
Handles the sending on emails
Simple Mail Transfer Protocol (SMTP)
Protocol used to transfer files from one computer to another over a network
File Transfer Protocol (FTP)
Secure way to transfer files over a network
File Transfer Protocol Secure (FTPS)
SSH File Transfer Protocol (SFTP)
802.11 wifi standards
802.11 a
802.11 b
802.11 g
802.11 n
802.11 ac
802.11 a Frequency and Throughput
Frequency 5GHz
Throughput 54Mbps
802.11 b Frequency and Throughput
Frequency 2.4GHz
Throughput 11Mbps
802.11 g Frequency and Throughput
Frequency 2.4 GHz
Throughput 54Mpbs
802.11 n Frequency and Throughput
Frequency 2.4GHz + 5GHz
Throughput 600Mbps
802.11 ac Frequency and Throughput
Frequency 5GHz
Throughput 1.7 Gbps
Which frequency can travel further but can get crowded
2.4 GHz
Which frequency have better connections over shorter distances
(Less crowded)
(Good for video streaming, file transfer, gaming)
5GHz
Dual band routers support both frequency’s
TRUE or FALE
TRUE
Electrical Magnetic Interference can cause what
Bad wifi connection
A high Signal to Voice means what?
The signal is strong compared to the voice
(Signal stronger than EMI)
A low Signal to Voice means
The signal is low compared to voice
(signal is weaker than EMI)
Which frequency can penetrate through walls better
2.4 GHz
The loss of signal strength as it travels further
Attenuation
What is a wireless network best practices
Change SSID
Change default password
A name or label for a network allowing
Wi-Fi devices to connect to it
Service Set Identifier (SSID)
When should you leave ur Wireless network Unencrypted
It’s a common setup for public Wi-Fi (library)
(Risky with lack of protection)
Captive portal when connecting to public Wi-Fi
shows you terms and conditions ,user data collection, session management
What Is the encryption for Wired Equivalent Privacy (WEP)
RC4
What Is the encryption for Wi-Fi Protected Access (WPA)
TKIP
What is the encryption for WiFi Protected Access 2 (WPA2)
AES
What is the encryption for WiFi protected Access 3 (WPA3)
SAE
What is the intermediary between hardware components of the computer and the application or software running on it
Operating System (OS)
What other features does the OS offer
Disk management
Process management/scheduling
Application management
Memory management
Device management
Access control
Think of Storage as a massive bookshelf
And the OS as the librarian that organizes all the books (hahaha)
What is a system utility that monitors in real time and control over processes and system performance
Task manager
What is a memory management that extends the available memory beyond the physical RAM
Virtual memory
When RAM and a Storage like HDD swap pages to save memory
Page swapping
What let’s you manage hardware components installed on your computer
Device Manager
What is the process of managing and regulating permissions and privileges granted to users or process attempting to interact with system resources
Access Control
Name the workstation OS
Linux
Apple macOS
Microsoft Windows
Google Chrome OS
Name the Server OS
Linux
Microsoft Windows server 2019/2022
UNIX
Name the Mobil Device OS
Apple iOS
Android
What is an embedded OS
OS designed to run on resource-constrained devices with specific functions
(Common on IoT devices & gaming consoles)
A technology that enables you to run multiple operating systems and applications on a single physical computer simultaneously
Virtualization
(Hypervisor)
Hypervisor 1 uses the hosts own OS While Hypervisor 2 does what
Uses a different OS on the host device
(Your main devices uses windows but you will run Linux on a VM)
A method of organizing and storing data on a computer or storage device. Provides a structured way to manage and access data effectively
File system
A technique used to reduce the size of a file to save storage space and enable faster data transfer
File Compression
(Zip, gzip, WinRAR, tar , iso)
The process of converting the content of a file into a secure and unreadable format using encryption algorithm
File Encryption
Access rights that determine what actions users and groups can preform within a file system
File Permissions
Feature that records changes made to the file system in a log
(Acts like a transaction history)
Journaling
Name the File System Limitations
Hard drive partition limits
File size limits
File Naming Rules
Restricted characters
Maximum characters