Comptia ITF+ Reddit Flash Cards

¡Supera tus tareas y exámenes ahora con Quizwiz!

1 KB

1024 bytes = ____ KB

1GB

1024MB = _____GB

key-value database

A NoSQL database model that stores data as a collection of key-value pairs in which the value component is unintelligible to the DBMS

Document Database

A NoSQL database model that stores data in key-value pairs in which the value component is composed of a tag-encoded document.

32-bit only

A PC with a 32-bit CPU can run what OS's on it?

Task Manager

A Windows utility that shows programs currently running and permits you to exit nonresponsive programs when you click End Task.

Examine the running apps

A battery on a phone drains quickly and navigation apps are slow, what should be looked at first?

IMAP (Internet Message Access Protocol)

A common protocol for retrieving email messages via the Internet

SMTP (Simple Mail Transfer Protocol)

A communications protocol that enables sending email from a client to a server or between servers.

Relational Database

A database that represents data as a collection of tables in which all data relationships are represented by common values in related tables

Airplane mode

A device is unable to send/receive calls or connect to the WiFi. What is most likely causing the problem?

A security policy

A document or series of documents that clearly defines the defense mechanisms an organization will employ to keep information secure.

WPA encryption, infrastructure mode, MAC filtering

A human resources manager requests wireless APs to be set up for the office. A server will manage the wireless settings, and authorized devices should be able to access confidential records over WiFi. What mode would be set to match this config?

Botnet

A logical computer network of zombies under the control of an attacker.

Mandatory Access Control (MAC)

A means of restricting access to data based on varying degrees of security requirements for information contained in the objects and the corresponding security clearance of users or programs acting on their behalf.

MAC filtering

A method used to filter out which computers can access the wireless network; the WAP does this by consulting a list of MAC addresses that have been previously entered.

Contact the smartphone manufacturer for warranty support

A new 5G smartphone has separated the seam on one edge and is thicker at that point. What should be done first to address this?

Database Dump

A one-time logical backup of a database.

SFTP (Secure File Transfer Protocol)

A protocol available with the proprietary version of SSH that copies files between hosts securely. Like FTP, SFTP first establishes a connection with a host and then allows a remote user to browse directories, list files, and copy files. Unlike FTP, SFTP encrypts data before transmitting it.

UPnP (Universal Plug and Play)

A protocol that enables devices to dynamically add themselves to a network without the need for user intervention or configuration

FTP (File Transfer Protocol)

A protocol used to move files and folders over a network or the Internet.

Document the serial number and usernames for asset management.

A sales staff member recently left a laptop at a hotel and needs a new one immediately. After remotely wiping the old laptop, a support technician prepares to take a new laptop out of inventory to begin the deployment process. What should the technician do FIRST?

Rootkit

A set of software tools used by an attacker to hide the actions or presence of other types of malicious software.

Switch

A single variable must be tested for multiple possible values. What programming construct in "C" could do this?

Enter a product or license key

A software launches in demo mode, what needs to be done to complete activation of the software?

64-bit

A software requires 8GB of RAM to operate, what bit of OS is also required to do so?

Spyware

A type of Malware that locates and saves data from users without them knowing about it.

ipconfig /flushdns

A user is unable to browse Internet websites. A technician runs ipconfig and sees the following output: IP address............: 192.168.0.31 Subnet mask...........: 255.255.255.0 Default gateway.......: 192.168.0.254 The technician pings the gateway and gets a reply. The technician then pings an external IP address and also gets a reply. Which of the following commands would MOST likely resolve the issue?

Manufacturer Documentation

A user purchases a new desktop computer and requires assistance setting it up. What is the best reference for the user?

Replace the motherboard's CMOS battery.

A user recently reported that every few days the system clock is approximately three minutes behind. The user also received an error message on the BIOS screen. What could fix the clock issue?

The system files are corrupted

A user's Windows desktop continuously crashes during boot. A technician runs the following command in safe mode and then reboots the desktop: c:\Windows\system32> sfc /scannow Why would a technician run this command?

PII (Personally Identifiable Information)

A user's gov't ID number, birth date, and current address are considered what?

Disable file and print sharing on the laptop

A user's laptop hard drive contains sensitive information. The user often plugs the laptop into the corporate network. A sensitive file from the laptop has been found on another user's laptop. How could the user have prevented this breach?

Infrastructure Mode

A wireless configuration that uses one or more WAPs to connect wireless workstations to the cable backbone.

VPN

Allows a secure private connection over a public network, using an encrypted 'tunnel'. For example, a remote computer can securely connect to a LAN, as though it were physically connected.

NTP (Network Time Protocol)

An Internet protocol that enables synchronization of computer clock times in a network of computers by exchanging time signals.

Delete the email without clicking on the link

An email with a suspicious URL comes in. The URL text and hyperlink do not match when hovered? What do you do?

HTTPS (Hypertext Transfer Protocol Secure)

An encrypted version of HTTP. It uses port 443.

Disk Space

An end user wants to install new software, and create many files. What should be considered before installing said software.

Run a memory test to verify all memory addresses can be reliably written to and read from

An engineer's workstation experiences a BSOD whenever loading very large CAD files to modify.

FTPS (File Transfer Protocol Secure)

An extension of FTP that uses SSL or TLS encrypt FTP traffic. Some implementations of FTPS use ports 989 and 990

Output

An image displayed on a monitor is what?

AGP (Accelerated Graphics Port)

An older 32/64-bit expansion slot designed by Intel specifically for video that ran at 66 MHz and yielded a throughput of at least 254 Mbps. Later versions (2×, 4×, 8×) gave substantially higher throughput.

Plug and Play

Ann, a user, connects a new mouse to a laptop, and the mouse works with no additional steps taken by Ann. What installation type does this describe?

WEP

Better than no security protocol.

NFC

Can be used for wireless payments.

Device hardening

Disabling the Bluetooth adapter on a laptop when it is not in use is an example of:

EULA

End User License Agreement is the contract between a user and a company selling software for installation on the user's computer.

Fiber

Fastest connection speed

GSM

Global System for Mobile Communications

WPA2

Highest Security and Strongest Encryption.

A router provides a path out of the LAN, such as the internet.

How is a router different from a switch?

Up to 4 GB

How much RAM can 32-bit processors access?

Clear the browser cache, cookies, and history

How to best secure PII after using a public workstation?

High-Definition Multimedia Interface (HDMI)

How would you connect to a large TV for video presentations?

Changing the default admin password

How would you increase the security level of router?

Utilize the vendor-provided app store

How would you reduce the risk of installing malicious apps on a smartphone?

Execute a backout plan

If a firewall update fails, what action would you perform?

Proxy Settings

If you connected to your internal network, what should you check if you cannot connect to web servers on the internet?

Mobility

In what way is cellular internet better than wired and WiFi connections?

ISA

Interconnection Security Agreement

Adult

Interpret the following logic: else category "Senior", else if age < 20, then category "Teen",else if age < 65, then category "Adult", else category "Senior". For data input on someone who is 20 years old, which category will they fall into?

Dumpster diving

Involves digging through trash receptacles to find computer manuals, printouts, or password lists that have been thrown away

DDR

Of Multicore, 64-bit processing, L1 cache, and DDR. What is not a CPC feature?

Resolution

On a new OS install everything is displayed in large windows and the viewing area is limited. What adjustment solve this issue.

1,048,576 bytes

One megabyte is equivalent to ..... ? (bytes)

QoS

Quality of Service: Attempts to prioritize streaming media (VOIP, video playback, etc.)

Ransomware

Software that encrypts programs and data until a ransom is paid to remove it.

Type 2 hypervisor

Software to manage virtual machines that is installed as an application in an operating system.

Type 1 hypervisor

Software to manage virtual machines that is installed before any operating system is installed.

WPA

TKIP encryption and Mid Security

The motherboard

The CPU tells ________ the clock speed it needs, and the clock chip then automatically adjusts for the CPU.

Hardware theft

The act of stealing computer equipment.

System Memory

The main storage area for programs and data when the computer is running.

Disaster Recovery

The policies and procedures that a company or organisation has in place so it can carry on with normal business after a disaster, such as a major ICT failure, a fire etc

Degaussing

The process of removing or rearranging the magnetic field of a disk in order to render the data unrecoverable

Tethering

The process of sharing an Internet connection from one mobile device to another.

HTTP (Hypertext Transfer Protocol)

The protocol used for transmitting web pages over the Internet

16 EB

The theoretical max RAM of a 64-bit processor.

Power Cable

To prevent electrical damage to a PC while working on it, what should be disconnected before work begins?

USB

Universal serial bus port - allows you to connect different pieces of equipment to the computer

Dictionary words

Use of what increases the chance of a brute force attack succeeding?

Device Manager

Utility that enables techs to examine and configure all the hardware and drivers in a Windows PC.

HDMI

Video connector with great resolution?

VoIP

Voice over Internet protocol - a phone connection through a personal computer with any type of broadband Internet connection.

Windows

What OS uses NTFS for the standard filesystem type?

Drivers

What allows for an OS to communicate with hardware components?

Bluetooth / NFC

What are 2 wireless networking technologies?

USB , PS/2

What are two connector types that can be used by mice and keyboards?

Thunderbolt and Mini DisplayPort

What are two identical ports?

Strong Passwords and Multifactor Authentication

What are two security requirements for logging onto a company network that would best increase security?

CDMA

What cell phone technology is the most popular in the United States?

PCIe

What connector does a GPU typically plug in too.

USB-C

What connector type can be plugged into a device both right-side up and upside down?

NFC

What feature enables paying by touching a phone to a payment system?

Indexed

What file property makes a search faster for content within files?

Tablet

What has the portability of a mobile phone and the function of a laptop or desktop?

Motherboard

What internal computer component is used to connect video, audio, and network cards?

Document

What is a .rtf an example of? (file type)

Mouse

What is a common input type to a PC?

Performs Data computation

What is a function of a CPU?

Line the cables up neatly and wrap them together with cable ties.

What is a good way to manage cables?

Cable and lock device securely attached to a solid object.

What is a good way to prevent physical theft of a laptop or workstation?

Files on a device are inaccessible

What is a hallmark of ransomware?

Smartphone

What is a mobile General-Purpose computing device? List an example.

The top-level storage location on a volume

What is a root directory?

Ability to utilize a larger amount of RAM. (>4GB)

What is an advantage of using a 64-bit OS?

Ensuring sufficient airflow

What is important to ensure a computer is within normal temperature limits?

Fan

What is responsible for preventing overheating?

USB

What is the FASTEST printer connection?

Open source operating systems can be downloaded and used by everyone, whereas commercial operating systems can only be used by companies

What is the difference between Open Source and Commercial operating systems?

Bluetooth

What is the fastest easiest way to share a single file between two modern smartphones without being on the same WiFi?

WPA2

What is the most secure encryption used in wireless networks?

WPA2

What is the most secure security option for a network?

Recycle

What is the proper way to dispose of batteries?

SRAM

What kind of RAM comprises cache?

Card Reader

What kind of drive reads CompactFlash storage?

ls (list)

What linux command would display a directory of files?

Chipset

What manages and controls the speed of a motherboard's buses?

Execute

What permission is required to run a .bat file?

Antivirus

What protects a desktop from malicious attacks? (Software)

Pin and Lock Screen

What protects against unauthorized use of a mobile phone.

Establish a plan of action

What should a technician do once a problem is tested and confirmed?

Electrostatic discharge straps

What should a technician use while installing an M.2 device in a computer?

Autofill forms

What should be disabled on browsers to protect your privacy?

Back up important folders

What should be done before running any major updates on a PC or Laptop?

Security Software

What should be installed before you download and install additional software on a new PC?

Compression

What software is used to reduce the size of a file or folder?

DRAM (Dynamic Random Access Memory)

What type of RAM is used for main system memory?

Laser

What type of printer uses a powdery substance to create images?

DROP

What will completely remove a table and its data from a relational database?

Network Attached Storage (NAS)

What would be used by many users with a common folder and high availability.

Create a backup of the HDD

When replacing a laptop's HDD with an SSD, what should you do first?

Connected to the internet

When storing a document in the cloud, a user needs to be?

License theft

When trying to activate the operating system, a user receives a notice that the software is not genuine. Which of the following security threats has occurred?

Coordinate Software Applications

Which of the following is not a function of an operating system?

Cloud file services

Which of the following resource types would be BEST suited to saving photographs from a mobile device with limited on-board storage?

Microservices

Which type of coding practice uses smaller code modules working together to support an application?

NoSQL

Which type of database does not use a rigid schema?

Making passwords harder to crack.

Why is password complexity a good practice?

To prevent unauthorized configuration changes

Why should you change the default admin password in a router configuration?

The OS is 32-bit

Why would an OS only use a max of 4GB of RAM

Turn off airplane mode

Why would headphones and internet not work on a specific device, but work fine on others?

WPS

Wi-Fi Protected Setup. A method that allows users to easily configure a wireless network, often by using only a PIN. WPS brute force attacks can discover the PIN.

Programs and Features

Windows Control Panel applet; enables uninstalling or changing program options and altering Windows features.

gpupdate

Windows command for making immediate group policy changes in an individual system.

Place a read replica in the Location Y.

You have configured a database in the headquarters office located in X. Your company has offices in major cities across Canada and the United States. Users in Y complain about slow query access to the database, while Texas users enjoy fast performance. What should you do?

LTE

a network standard that defines how high-speed cellular transmissions use broadcast radio to transmit data for mobile communications

.rar

compressed file

L2TP (Layer 2 Tunneling Protocol)

~~~~


Conjuntos de estudio relacionados

Health for Living Midterm 2 - University of Iowa

View Set

Unit 3 The Civil War Years (1850-1865)

View Set

UNIT 8 Present simple vs Present continuous

View Set

Chapter 7 Project Cost Management

View Set

RIU 320 - CH 4 Instruments: Imaging Anatomy and Principle 1 (Part 2): Imaging Processor and Display

View Set

Lehne 9th Edition Chapter 48: Drugs for Heart Failure

View Set

Chapter 1-ENTR-202-Small Business: Varieties and ImpactsAssignment

View Set

Medical Microbiology Homework Questions

View Set

chapter 40. Electrical Circuits And Ohm's Law Chapter 40

View Set