WEEK 4 Flashcards

1
Q

Private ip are used in mainly what?

A

Homes or office

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

10.0.0.0 - 10.255.255.255 is an example of what

A

Private IP Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

172.16.0.0 - 172.31.255.255 is an example of what

A

Private IP Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

192.168.0.0 - 192.168.255.255 is an example of what

A

Private IP Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Public IP Addresses are used by who

A

(Coffees shops and public places)

When connecting to the Internet
ISP give devices a Public IP to whoever connects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What converts IP Address to a readable name

A

DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DNS resolver steps

A

1st stop is at DNS recursive server
(looks for IP address)
2. Root name server
3.TDL name server
4.Domain name server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What enables web browsers and servers to exchange information, allowing you to access and view webpages

A

Hypertext Transfer Protocol (HTTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the secure version of HTTP

A

Hypertext Transfer Protocol Secure (HTTPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When you get your mail from a server and it goes to ur computer but is no longer on the server after u got it
(emails tied to one computer)

A

Post Office Protocol Version 3 (POP3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Can access emails on your devices
(Phone, computer, laptop)

A

Internet Message Access Protocol (IMAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Handles the sending on emails

A

Simple Mail Transfer Protocol (SMTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Protocol used to transfer files from one computer to another over a network

A

File Transfer Protocol (FTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Secure way to transfer files over a network

A

File Transfer Protocol Secure (FTPS)
SSH File Transfer Protocol (SFTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

802.11 wifi standards

A

802.11 a
802.11 b
802.11 g
802.11 n
802.11 ac

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

802.11 a Frequency and Throughput

A

Frequency 5GHz
Throughput 54Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

802.11 b Frequency and Throughput

A

Frequency 2.4GHz
Throughput 11Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

802.11 g Frequency and Throughput

A

Frequency 2.4 GHz
Throughput 54Mpbs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

802.11 n Frequency and Throughput

A

Frequency 2.4GHz + 5GHz
Throughput 600Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

802.11 ac Frequency and Throughput

A

Frequency 5GHz
Throughput 1.7 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which frequency can travel further but can get crowded

A

2.4 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which frequency have better connections over shorter distances
(Less crowded)
(Good for video streaming, file transfer, gaming)

A

5GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Dual band routers support both frequency’s
TRUE or FALE

A

TRUE

24
Q

Electrical Magnetic Interference can cause what

A

Bad wifi connection

25
Q

A high Signal to Voice means what?

A

The signal is strong compared to the voice
(Signal stronger than EMI)

26
Q

A low Signal to Voice means

A

The signal is low compared to voice
(signal is weaker than EMI)

27
Q

Which frequency can penetrate through walls better

A

2.4 GHz

28
Q

The loss of signal strength as it travels further

A

Attenuation

29
Q

What is a wireless network best practices

A

Change SSID
Change default password

30
Q

A name or label for a network allowing
Wi-Fi devices to connect to it

A

Service Set Identifier (SSID)

31
Q

When should you leave ur Wireless network Unencrypted

A

It’s a common setup for public Wi-Fi (library)
(Risky with lack of protection)

32
Q

Captive portal when connecting to public Wi-Fi

A

shows you terms and conditions ,user data collection, session management

33
Q

What Is the encryption for Wired Equivalent Privacy (WEP)

A

RC4

34
Q

What Is the encryption for Wi-Fi Protected Access (WPA)

A

TKIP

35
Q

What is the encryption for WiFi Protected Access 2 (WPA2)

A

AES

36
Q

What is the encryption for WiFi protected Access 3 (WPA3)

A

SAE

37
Q

What is the intermediary between hardware components of the computer and the application or software running on it

A

Operating System (OS)

38
Q

What other features does the OS offer

A

Disk management
Process management/scheduling
Application management
Memory management
Device management
Access control

39
Q

Think of Storage as a massive bookshelf

A

And the OS as the librarian that organizes all the books (hahaha)

40
Q

What is a system utility that monitors in real time and control over processes and system performance

A

Task manager

41
Q

What is a memory management that extends the available memory beyond the physical RAM

A

Virtual memory

42
Q

When RAM and a Storage like HDD swap pages to save memory

A

Page swapping

43
Q

What let’s you manage hardware components installed on your computer

A

Device Manager

44
Q

What is the process of managing and regulating permissions and privileges granted to users or process attempting to interact with system resources

A

Access Control

45
Q

Name the workstation OS

A

Linux
Apple macOS
Microsoft Windows
Google Chrome OS

46
Q

Name the Server OS

A

Linux
Microsoft Windows server 2019/2022
UNIX

47
Q

Name the Mobil Device OS

A

Apple iOS
Android

48
Q

What is an embedded OS

A

OS designed to run on resource-constrained devices with specific functions
(Common on IoT devices & gaming consoles)

49
Q

A technology that enables you to run multiple operating systems and applications on a single physical computer simultaneously

A

Virtualization
(Hypervisor)

50
Q

Hypervisor 1 uses the hosts own OS While Hypervisor 2 does what

A

Uses a different OS on the host device
(Your main devices uses windows but you will run Linux on a VM)

51
Q

A method of organizing and storing data on a computer or storage device. Provides a structured way to manage and access data effectively

A

File system

52
Q

A technique used to reduce the size of a file to save storage space and enable faster data transfer

A

File Compression
(Zip, gzip, WinRAR, tar , iso)

53
Q

The process of converting the content of a file into a secure and unreadable format using encryption algorithm

A

File Encryption

54
Q

Access rights that determine what actions users and groups can preform within a file system

A

File Permissions

55
Q

Feature that records changes made to the file system in a log
(Acts like a transaction history)

A

Journaling

56
Q

Name the File System Limitations

A

Hard drive partition limits
File size limits

57
Q

File Naming Rules

A

Restricted characters
Maximum characters