Comptia ITF+ Reddit Flash Cards
1 KB
1024 bytes = ____ KB
1GB
1024MB = _____GB
key-value database
A NoSQL database model that stores data as a collection of key-value pairs in which the value component is unintelligible to the DBMS
Document Database
A NoSQL database model that stores data in key-value pairs in which the value component is composed of a tag-encoded document.
32-bit only
A PC with a 32-bit CPU can run what OS's on it?
Task Manager
A Windows utility that shows programs currently running and permits you to exit nonresponsive programs when you click End Task.
Examine the running apps
A battery on a phone drains quickly and navigation apps are slow, what should be looked at first?
IMAP (Internet Message Access Protocol)
A common protocol for retrieving email messages via the Internet
SMTP (Simple Mail Transfer Protocol)
A communications protocol that enables sending email from a client to a server or between servers.
Relational Database
A database that represents data as a collection of tables in which all data relationships are represented by common values in related tables
Airplane mode
A device is unable to send/receive calls or connect to the WiFi. What is most likely causing the problem?
A security policy
A document or series of documents that clearly defines the defense mechanisms an organization will employ to keep information secure.
WPA encryption, infrastructure mode, MAC filtering
A human resources manager requests wireless APs to be set up for the office. A server will manage the wireless settings, and authorized devices should be able to access confidential records over WiFi. What mode would be set to match this config?
Botnet
A logical computer network of zombies under the control of an attacker.
Mandatory Access Control (MAC)
A means of restricting access to data based on varying degrees of security requirements for information contained in the objects and the corresponding security clearance of users or programs acting on their behalf.
MAC filtering
A method used to filter out which computers can access the wireless network; the WAP does this by consulting a list of MAC addresses that have been previously entered.
Contact the smartphone manufacturer for warranty support
A new 5G smartphone has separated the seam on one edge and is thicker at that point. What should be done first to address this?
Database Dump
A one-time logical backup of a database.
SFTP (Secure File Transfer Protocol)
A protocol available with the proprietary version of SSH that copies files between hosts securely. Like FTP, SFTP first establishes a connection with a host and then allows a remote user to browse directories, list files, and copy files. Unlike FTP, SFTP encrypts data before transmitting it.
UPnP (Universal Plug and Play)
A protocol that enables devices to dynamically add themselves to a network without the need for user intervention or configuration
FTP (File Transfer Protocol)
A protocol used to move files and folders over a network or the Internet.
Document the serial number and usernames for asset management.
A sales staff member recently left a laptop at a hotel and needs a new one immediately. After remotely wiping the old laptop, a support technician prepares to take a new laptop out of inventory to begin the deployment process. What should the technician do FIRST?
Rootkit
A set of software tools used by an attacker to hide the actions or presence of other types of malicious software.
Switch
A single variable must be tested for multiple possible values. What programming construct in "C" could do this?
Enter a product or license key
A software launches in demo mode, what needs to be done to complete activation of the software?
64-bit
A software requires 8GB of RAM to operate, what bit of OS is also required to do so?
Spyware
A type of Malware that locates and saves data from users without them knowing about it.
ipconfig /flushdns
A user is unable to browse Internet websites. A technician runs ipconfig and sees the following output: IP address............: 192.168.0.31 Subnet mask...........: 255.255.255.0 Default gateway.......: 192.168.0.254 The technician pings the gateway and gets a reply. The technician then pings an external IP address and also gets a reply. Which of the following commands would MOST likely resolve the issue?
Manufacturer Documentation
A user purchases a new desktop computer and requires assistance setting it up. What is the best reference for the user?
Replace the motherboard's CMOS battery.
A user recently reported that every few days the system clock is approximately three minutes behind. The user also received an error message on the BIOS screen. What could fix the clock issue?
The system files are corrupted
A user's Windows desktop continuously crashes during boot. A technician runs the following command in safe mode and then reboots the desktop: c:\Windows\system32> sfc /scannow Why would a technician run this command?
PII (Personally Identifiable Information)
A user's gov't ID number, birth date, and current address are considered what?
Disable file and print sharing on the laptop
A user's laptop hard drive contains sensitive information. The user often plugs the laptop into the corporate network. A sensitive file from the laptop has been found on another user's laptop. How could the user have prevented this breach?
Infrastructure Mode
A wireless configuration that uses one or more WAPs to connect wireless workstations to the cable backbone.
VPN
Allows a secure private connection over a public network, using an encrypted 'tunnel'. For example, a remote computer can securely connect to a LAN, as though it were physically connected.
NTP (Network Time Protocol)
An Internet protocol that enables synchronization of computer clock times in a network of computers by exchanging time signals.
Delete the email without clicking on the link
An email with a suspicious URL comes in. The URL text and hyperlink do not match when hovered? What do you do?
HTTPS (Hypertext Transfer Protocol Secure)
An encrypted version of HTTP. It uses port 443.
Disk Space
An end user wants to install new software, and create many files. What should be considered before installing said software.
Run a memory test to verify all memory addresses can be reliably written to and read from
An engineer's workstation experiences a BSOD whenever loading very large CAD files to modify.
FTPS (File Transfer Protocol Secure)
An extension of FTP that uses SSL or TLS encrypt FTP traffic. Some implementations of FTPS use ports 989 and 990
Output
An image displayed on a monitor is what?
AGP (Accelerated Graphics Port)
An older 32/64-bit expansion slot designed by Intel specifically for video that ran at 66 MHz and yielded a throughput of at least 254 Mbps. Later versions (2×, 4×, 8×) gave substantially higher throughput.
Plug and Play
Ann, a user, connects a new mouse to a laptop, and the mouse works with no additional steps taken by Ann. What installation type does this describe?
WEP
Better than no security protocol.
NFC
Can be used for wireless payments.
Device hardening
Disabling the Bluetooth adapter on a laptop when it is not in use is an example of:
EULA
End User License Agreement is the contract between a user and a company selling software for installation on the user's computer.
Fiber
Fastest connection speed
GSM
Global System for Mobile Communications
WPA2
Highest Security and Strongest Encryption.
A router provides a path out of the LAN, such as the internet.
How is a router different from a switch?
Up to 4 GB
How much RAM can 32-bit processors access?
Clear the browser cache, cookies, and history
How to best secure PII after using a public workstation?
High-Definition Multimedia Interface (HDMI)
How would you connect to a large TV for video presentations?
Changing the default admin password
How would you increase the security level of router?
Utilize the vendor-provided app store
How would you reduce the risk of installing malicious apps on a smartphone?
Execute a backout plan
If a firewall update fails, what action would you perform?
Proxy Settings
If you connected to your internal network, what should you check if you cannot connect to web servers on the internet?
Mobility
In what way is cellular internet better than wired and WiFi connections?
ISA
Interconnection Security Agreement
Adult
Interpret the following logic: else category "Senior", else if age < 20, then category "Teen",else if age < 65, then category "Adult", else category "Senior". For data input on someone who is 20 years old, which category will they fall into?
Dumpster diving
Involves digging through trash receptacles to find computer manuals, printouts, or password lists that have been thrown away
DDR
Of Multicore, 64-bit processing, L1 cache, and DDR. What is not a CPC feature?
Resolution
On a new OS install everything is displayed in large windows and the viewing area is limited. What adjustment solve this issue.
1,048,576 bytes
One megabyte is equivalent to ..... ? (bytes)
QoS
Quality of Service: Attempts to prioritize streaming media (VOIP, video playback, etc.)
Ransomware
Software that encrypts programs and data until a ransom is paid to remove it.
Type 2 hypervisor
Software to manage virtual machines that is installed as an application in an operating system.
Type 1 hypervisor
Software to manage virtual machines that is installed before any operating system is installed.
WPA
TKIP encryption and Mid Security
The motherboard
The CPU tells ________ the clock speed it needs, and the clock chip then automatically adjusts for the CPU.
Hardware theft
The act of stealing computer equipment.
System Memory
The main storage area for programs and data when the computer is running.
Disaster Recovery
The policies and procedures that a company or organisation has in place so it can carry on with normal business after a disaster, such as a major ICT failure, a fire etc
Degaussing
The process of removing or rearranging the magnetic field of a disk in order to render the data unrecoverable
Tethering
The process of sharing an Internet connection from one mobile device to another.
HTTP (Hypertext Transfer Protocol)
The protocol used for transmitting web pages over the Internet
16 EB
The theoretical max RAM of a 64-bit processor.
Power Cable
To prevent electrical damage to a PC while working on it, what should be disconnected before work begins?
USB
Universal serial bus port - allows you to connect different pieces of equipment to the computer
Dictionary words
Use of what increases the chance of a brute force attack succeeding?
Device Manager
Utility that enables techs to examine and configure all the hardware and drivers in a Windows PC.
HDMI
Video connector with great resolution?
VoIP
Voice over Internet protocol - a phone connection through a personal computer with any type of broadband Internet connection.
Windows
What OS uses NTFS for the standard filesystem type?
Drivers
What allows for an OS to communicate with hardware components?
Bluetooth / NFC
What are 2 wireless networking technologies?
USB , PS/2
What are two connector types that can be used by mice and keyboards?
Thunderbolt and Mini DisplayPort
What are two identical ports?
Strong Passwords and Multifactor Authentication
What are two security requirements for logging onto a company network that would best increase security?
CDMA
What cell phone technology is the most popular in the United States?
PCIe
What connector does a GPU typically plug in too.
USB-C
What connector type can be plugged into a device both right-side up and upside down?
NFC
What feature enables paying by touching a phone to a payment system?
Indexed
What file property makes a search faster for content within files?
Tablet
What has the portability of a mobile phone and the function of a laptop or desktop?
Motherboard
What internal computer component is used to connect video, audio, and network cards?
Document
What is a .rtf an example of? (file type)
Mouse
What is a common input type to a PC?
Performs Data computation
What is a function of a CPU?
Line the cables up neatly and wrap them together with cable ties.
What is a good way to manage cables?
Cable and lock device securely attached to a solid object.
What is a good way to prevent physical theft of a laptop or workstation?
Files on a device are inaccessible
What is a hallmark of ransomware?
Smartphone
What is a mobile General-Purpose computing device? List an example.
The top-level storage location on a volume
What is a root directory?
Ability to utilize a larger amount of RAM. (>4GB)
What is an advantage of using a 64-bit OS?
Ensuring sufficient airflow
What is important to ensure a computer is within normal temperature limits?
Fan
What is responsible for preventing overheating?
USB
What is the FASTEST printer connection?
Open source operating systems can be downloaded and used by everyone, whereas commercial operating systems can only be used by companies
What is the difference between Open Source and Commercial operating systems?
Bluetooth
What is the fastest easiest way to share a single file between two modern smartphones without being on the same WiFi?
WPA2
What is the most secure encryption used in wireless networks?
WPA2
What is the most secure security option for a network?
Recycle
What is the proper way to dispose of batteries?
SRAM
What kind of RAM comprises cache?
Card Reader
What kind of drive reads CompactFlash storage?
ls (list)
What linux command would display a directory of files?
Chipset
What manages and controls the speed of a motherboard's buses?
Execute
What permission is required to run a .bat file?
Antivirus
What protects a desktop from malicious attacks? (Software)
Pin and Lock Screen
What protects against unauthorized use of a mobile phone.
Establish a plan of action
What should a technician do once a problem is tested and confirmed?
Electrostatic discharge straps
What should a technician use while installing an M.2 device in a computer?
Autofill forms
What should be disabled on browsers to protect your privacy?
Back up important folders
What should be done before running any major updates on a PC or Laptop?
Security Software
What should be installed before you download and install additional software on a new PC?
Compression
What software is used to reduce the size of a file or folder?
DRAM (Dynamic Random Access Memory)
What type of RAM is used for main system memory?
Laser
What type of printer uses a powdery substance to create images?
DROP
What will completely remove a table and its data from a relational database?
Network Attached Storage (NAS)
What would be used by many users with a common folder and high availability.
Create a backup of the HDD
When replacing a laptop's HDD with an SSD, what should you do first?
Connected to the internet
When storing a document in the cloud, a user needs to be?
License theft
When trying to activate the operating system, a user receives a notice that the software is not genuine. Which of the following security threats has occurred?
Coordinate Software Applications
Which of the following is not a function of an operating system?
Cloud file services
Which of the following resource types would be BEST suited to saving photographs from a mobile device with limited on-board storage?
Microservices
Which type of coding practice uses smaller code modules working together to support an application?
NoSQL
Which type of database does not use a rigid schema?
Making passwords harder to crack.
Why is password complexity a good practice?
To prevent unauthorized configuration changes
Why should you change the default admin password in a router configuration?
The OS is 32-bit
Why would an OS only use a max of 4GB of RAM
Turn off airplane mode
Why would headphones and internet not work on a specific device, but work fine on others?
WPS
Wi-Fi Protected Setup. A method that allows users to easily configure a wireless network, often by using only a PIN. WPS brute force attacks can discover the PIN.
Programs and Features
Windows Control Panel applet; enables uninstalling or changing program options and altering Windows features.
gpupdate
Windows command for making immediate group policy changes in an individual system.
Place a read replica in the Location Y.
You have configured a database in the headquarters office located in X. Your company has offices in major cities across Canada and the United States. Users in Y complain about slow query access to the database, while Texas users enjoy fast performance. What should you do?
LTE
a network standard that defines how high-speed cellular transmissions use broadcast radio to transmit data for mobile communications
.rar
compressed file
L2TP (Layer 2 Tunneling Protocol)
~~~~