ITF+ Assessment

Ace your homework & exams now with Quizwiz!

Which of the following is an example of a compressed file format?

zip Files are compressed to reduce the file size to make it faster to send over a network. Compressed files are often called zip files or zip folders, and could have file extensions like: zip, tar, rar, or 7z. Executable files contain program code and typically have a .exe file extension. Rich text file (rtf) format is a generic file format used for sharing documents between word processing applications. Images can be saved with a Portable Network Graphics (png) format, which is a full-color format that supports transparency. Its purpose is to replace the GIF file type.

Which of these is a NOT a "generation" of cellular Internet services?

ARP The Address Resolution Protocol (ARP) is the protocol that enables local address discovery to take place and uses the MAC address. GPRS/EDGE (General Packet Radio Services/Enhanced Data Rates for GSM Evolution) is a precursor to 3G (2.5G) with GPRS offering up to about 48 Kbps and EDGE about 3-4 times that. Evolved High Speed Packet Access (HSPA+) is a 3G standard developed from GSM networks. HSPA+ nominally supports download speeds up to 168 Mbps and upload speeds up to 34 Mbps. Evolution Data Optimized (EV-DO) is a main 3G standards deployed by CDMA network providers. EV-DO can support a 3.1 Mbps downlink and 1.8 Mbps uplink.

What is the term that refers to operating a device by moving it around or using a camera in the device to recognize your hand movements?

App Mobile devices use accelerometers and gyroscopes to detect when someone is moving the device. You can also use kinetics as a more advanced control mechanism. The Windows Device Manager page provides tools for verifying and configuring devices. Intel refers to its 64-bit instruction set as the EM64T or Intel 64. High-end servers would use this chip for its speed and the ability to address 128 GB or more of memory. Apps are installable programs that extend the functionality of the mobile device. A number of apps are included with mobile devices but third-party developers can also create them.

Which of these is a plain text file a website creates when you visit it?

Cookie A cookie is a plain text file created by a website when you visit it. The purpose of cookies is to store session information to personalize a website for you. A Uniform Resource Locator (URL) is the means of specifying the location of the web server and the resource on the Internet. It contains the protocol, the host location, and a file path (if necessary). A UNC (Universal Naming Convention) is composed of a double slash (\\) followed by the server name and then a single slash and the shared folder name. It allows you to find and access shared folders on a network. A donut is a deep-fried piece of dough or batter, commonly made in circular shape, and mixed with various sweeteners and flavors.

When does a new creation become "copyrighted"?

Creations are copyrighted immediately upon creation. Copyright is an automatic legal protection granted to certain types of work, indicating that the copyright holder owns the right to control the use of the work, including rights of publication, distribution, or sale. There is no need to apply for copyright or display any copyright notice in order to be protected by it. You do not have to file paperwork for a copyright, it is copyrighted automatically upon creation. Mailing something to yourself would be considered a "Poor Man's Patent" and this technique is not typically used with copyrighted works. Creating something similar would be plagiarism.

Which of these is an Availability concern?

Destruction Destruction is the loss of a service or data through any number of reasons. You might lose a data center through a fire or a person spills coffee on a server. Replay is where a host captures another host's response to some server, and replays that response in an effort to gain unauthorized access. This is an Integrity concern. Snooping is any attempt to get access to information on a host or storage device (data at-rest) that you are not authorized to view. This is a Confidentiality concern. Impersonation is a common attack where a person will attempt to figure out a password or other credentials to gain access to a host. This is an Integrity concern.

Which best defines ergonomics?

Ergonomics is the study of factors affecting the performance of people at work. Ergonomics is the study of factors affecting the performance of people at work. It is well established that a poor working environment can cause certain health problems and decrease productivity. While Ergonomics is related to repetitive tasks, it is not the process of doing repetitive tasks, but the study of those factors. Ergonomics has no relation to the mind's ability to process data in comparison to computers, it's the study of factors affecting a person's performance. Remaining active at work can be hard and impact ergonomics, however it is not the study of those factors.

Which of these is a protocol used to upload and download files between clients and servers?

FTP The FTP (File Transfer Protocol) uploads and download files between clients and servers. For example, it is widely used to update the files constituting a website from the designer's PC to the web server. Optical Character Recognition (OCR) software convert a text image into a computer-editable text document. Many scanners have this software bundled with the hardware or it can come as a separate software package. Hybrid Fiber Coax (HFC) combines a fiber optic core network with coax links to customer premises equipment. Near Field Communications (NFC) is a very short-range radio link based on Radio Frequency ID (RFID). NFC sensors and functionality are appearing in smartphones for contactless payment readers.

You have been given the task of installing a new printer for a client. The printer is NOT a plug and play device. How would you proceed?

Find and install the driver. Check first to see if it has been included with the printer. Otherwise, check the Windows Update website. If it isn't there, check the vendor's website. Windows ships with a number of common drivers, so it's possible that the one you need will already be installed. Often the driver is included on a CD with the printer, or is available online on the printer vendor's website. Drivers are typically specially designed for each device. A driver from a similar device is not likely to work for the printer you installed. Although it is possible to write your own driver, it would require sophisticated programming skills and a familiarity with the printer's technical specifications.

How is open source code used by developers?

It is code used by developers that they have the rights to modify without requiring permission to meet their project needs. Open source means that the programming code used to design the software is freely available. Open source doesn't necessarily mean available for free (although many distributions are); it means that developers are free to make changes to the way the operating system works. Open source code may be used by developers without having to submit for approval by a vendor. They may use it as needed for their project. Open source code may have to be paid for, but this is not the case with most open source code. Open source code is not considered proprietary, and may be used by a developer to suit the needs of their project without permission.

How is data stored on a hard disk drive?

It is encoded magnetically on a platter that spins. The platters on a hard disk drive are made of glass or plastic and coated with a material that can be magnetized. They spin at very high speeds as read/write head add and retrieve data. Optical drives, including CD and DVD, are only recordable once because they include a layer of foil that is pitted to store digital data. Rewritable CDs use a layer of photosensitive dye. A laser can write data, and rewrite data by altering the dye. Solid state drives are like hard drives in that they store data magnetically. However, they are smaller and lighter, and they do not spin.

What is the purpose of BIOS?

It is the firmware that drives the bootstrapping process. Bootstrapping is necessary in order for the CPU to start processing and initialization before the operating system is loaded. One of the responsibilities of the operating system is to allocate memory and control traffic on a computer system. Data, address information, timing signals, and power are all carried by a circuit called a bus. A bus acts as the communication system that transfers data between components inside a computer, or between computers. This expression covers all related hardware components (wire, optical fiber, etc.) and software, including communication protocols. The control unit is the part of the CPU that fetches an instruction, decodes it, and decides whether to run it or to send it on to another unit for execution.

Which of these is a typical device hardening policy?

Patching Patching means upgrading OS files, driver software, and firmware to keep from exploitation by malware. It is important to keep computers and other devices configured with up to date patches and firmware. You should enable passwords on devices. All computing devices should require the user to input credentials to gain access. Disabling passwords makes the device vulnerable. Never use the default passwords as this makes it easy for outsiders to access the device, as many of these default passwords on the Internet. You would use anti-malware/anti-virus software on your devices, not install virus software.

Which of the following would NOT be defined as an input device?

Printer Input devices are used by the user to input information or data in to a computer to be processed. A printer would be considered an output device as it takes processed data and then outputs it to the user on paper. A keyboard is considered an input device as a user uses the keyboard to type or enter information into the computer to be processed. A mouse is considered an input device as it is used to input tasks and information into the computer by selecting different icons and components related to the Graphical user Interface (GUI). A biometric scanner would be considered an input device as it is used to perform a form of biometric scan from the user in order to authenticate that user and provide access to the system or environment it is implemented in. This could be a palm scan, retina scan, iris scan, fingerprint scan, or something similar to those.

Select the one UNTRUE statement in regard to system memory.

RAM is random access memory and is non-volatile storage. Random Access Memory (RAM) is volatile/temporary storage that requires a constant power source to store data. The faster access provided by memory allows programs to work more efficiently and process data more quickly. Virtual memory is really storage space on a hard disk being used as memory, which is significantly slower when compared to RAM. In order for a program to run, a copy of it must be loaded into memory along with any data required. The processing occurs in memory, and the original program is still stored safely on a non-volatile/permanent storage device.

In the area of workplace surveillance, what is monitoring data communications and employee's behavior called?

Security assurance Security assurance is monitoring data communications and employee's behavior to ensure that they do not divulge confidential information or compromise the security of the organization. Monitoring data is analyzing data communications to measure an employee's productivity. For example, a contact management system may record the frequency and duration of telephone contacts or the hours of computer use. Physical monitoring is recording employee's movement, location, and behavior within the workplace, often using CCTV and drugs/alcohol testing. Eavesdropping/wiretapping is snooping on data or telephone conversations as they pass over the network by malicious actors.

What are the two interfaces used for configuring input devices?

The Settings app and Control Panel. The Settings app is for touchscreen-enabled configuration. Many of the configuration tasks required for desktop and laptop PCs still require the Control Panel applet. A file manager or file browser is a computer program that provides a user interface to manage files and folders. The most common operations performed on files or groups of files include creating, opening, renaming, moving or copying, deleting and searching for files, as well as modifying file attributes, properties and file permissions File manager could be used to search and check for installed drivers, but the Settings app or Control Panel would be required for configuration. The vendor's website may include recommendations and instructions for using Settings or Control Panel for configuration.

What are the two important components that can be increased to improve video?

The number of pixels and the refresh speed. Number of colors and bus size. Resolution is measured by the number of horizontal and vertical pixels. Each pixel can be a different color. The higher the resolution (the more pixels and colors) and the faster the refresh speed (measured in Hertz) the better the video. Software and driver versions must always be current in order for the hardware to work. Pixels are all the same size—one byte. Increasing the number of colors will increase the number of pixels. Bus size is determined by the motherboard and it is consistent since it follows common architecture standards.

Which of the following is Task Manager commonly used for?

To end an unresponsive process that cannot be closed from the application window itself. The Task Manager utility (taskmgr) allows the user to shut down processes that are not responding. If a user is able to close an application using the "X" in the upper-right corner, then that is the typical method used. You would only use task manager to close a program if the application is "not responding". To shut down the computer, it is typically easier to select Shut down from the start menu. To launch a program in windows, you could use the search function, or look under the programs menu in order to find a missing desktop application if the shortcut was deleted from the desktop.

Which best describes an Information Technology (IT) system?

When a system processes, stores, and transfers information. An Information Technology (IT) system is one that processes, stores, and transfers information. Information can take many different forms including words, numbers, pictures, sound, or video. These can all be represented in an IT system using nothing more complicated than the binary digits one and zero. When a system is activated/engage by the user, that simply means the IT system is in use. Information Technology (IT) systems have the ability to also transfer information as well. The Transmission Control Protocol/Internet Protocol (TCP/IP) is a commonly referenced networking term. This is related to how the IT system transfers data, but IT also stores and processes data.

How does Plug-and-Play Installation work?

When a user connects a new device, Windows identifies it and attempts to install a new device driver. Windows automatically attempts to install a device driver when it identifies a plug-and-play device. It may just do the work silently, or it may display a configuration message, or prompt you to configure settings. The only time the system would ask the user to find the device driver would be if it wasn't readily available. If a CD is included with device drivers, user involvement is required, and the device doesn't fall into the plug-and-play category. The device driver is required so that the operating system knows how to interact with the device.

When troubleshooting a computer for a specific issue, what information do you need when searching the internet for possible solutions?

You should obtain the manufacturer name in order to find solutions related to your specific computer. You should obtain the computer model in order to find solutions related to your specific computer. You should obtain the computer model in order to find solutions related to your specific computer. Every model is unique in its own way, hence the differences in model numbers. Using the correct model number will help you find the most accurate solutions. Having the processor information is helpful, but troubleshooting with the model number will be more effective. Having the manufacturer name will get you close, but each model is different for a reason so the model number works best. The serial number may be helpful in determining the computer model information when diligently searching online; however, it may provide inaccurate results. Using the model number itself will give you the best results.

Of the following tags, which does NOT belong to Hypertext Markup Language (HTML)?

<h7> The <h7> tag is not a valid HTML tag. Heading tags represent heading titles of a web page. There are a total of 6 heading tags (H1- H6). The <!DOCTYPE> tag is the top-level parent element that identifies the type of document. This tag is required for an HTML page to execute properly and identify the coding standard being used as multiple variations exist. The <body> tag indicates where the main part of the content is located. The <p> tag indicates the content is a paragraph block-level element. These are typically used for general text on a webpage, and do not have any special formatting unless specified otherwise through CSS3.

Which is an example of a Human Interface Device (HID)?

A customer uses a keyboard to enter a username and password into a shopping application. Input devices, also called Human Interface Devices (HID), are used to place data into the computer and to select commands. A keyboard is a good example of an input device. A printer is a type of output device that displays information coming out of a computer system, typically in the form of a document, picture, or report. A network connection allows computers to share data with other computers and users. It is not considered an input device. Monitors are output devices designed to visually display output from a computer application.

Select the best example of using dual monitors with multiple windows in Extended mode:

A programmer writes HTML code on one monitor and tests the web page changes in a browser on the other monitor. Programmers and other people who work on computers often use dual monitors in extended mode to have two screens that display two different applications or data at the same time. The sales rep would be using the Duplicate display setting so that clients would be seeing exactly the same presentation as the sales rep. Rather than stretch out one spreadsheet, the accountant could open the same spreadsheet twice, displaying the first half on one monitor and the second half on the second monitor. The football coach is redirecting the output from the laptop to the large screen.

How does a search engine work?

A search engine usually works by compiling a database of information about web pages. A search engine is a tool to help locate web pages. A search engine may be designed to search the entire web for pages or to locate pages within a particular site. A search engine usually works by compiling a database of information about web pages. This is often done automatically by software agents called robots or spiders. A search engine does not access webpages real-time when you search. It instead searches its database of pre-compiled results. A search engine is used for searching a database, not for downloading results to your computer. That would be done by your web browser. A search engine does not cache results to your local computer. The cache for quicker access would be created by the web browser.

Programmatic access can be best defined as what?

A software application that can interact with a database either using SQL commands or using SQL commands stored as procedures in the database. Programmatic Access is when a software application uses SQL commands or uses SQL commands stored as procedures in the database to interact with the database. Most programming languages include libraries to provide default code for connecting to a database and executing queries. Administrators that use an administrative tool, such as phpMyAdmin, to connect and sign in to an RDBMS database is called direct or manual access. An application might use a database "in the background" without the user really being aware of its presence. This is known as utility access. Providing a GUI for users to select actions to perform on the database which then converts those selections to the SQL statements that will be executed describes access by using a query or report builder.

Which of these is an access control?

Accounting Accounting is the process of tracking authorized and unauthorized usage of a resource or use of rights by a subject. Destruction is the loss of a service or data through any number of reasons. You might lose a data center through a fire or a person spills coffee on a server. Integrity means that the information is stored and transferred as intended and only authorized modifications happen to the information. Snooping is any attempt to get access to information on a host or storage device (data at-rest) that you are not authorized to view.

What functionality can turn off a mobile device's Wi-Fi without shutting off the device?

Airplane mode Screen lock Forget network HPSA+ Airplane mode disables all wireless features (cellular data, Wi-Fi, GPS, and Bluetooth) to comply with airline carrier restrictions on radio-based devices. A screen lock activates whenever the power button is pressed and/or to lock when the sleep timer activates (or some time afterwards). Forget Network allows a user to remove the stored information about a wireless network from a mobile device. Evolved High Speed Packet Access (HSPA+) is a 3G standard developed from GSM networks. HSPA+ nominally supports download speeds up to 168 Mbps and upload speeds up to 34 Mbps.

Software programs that let users do useful things with their computer, such as create and edit documents are known as what?

Applications (or Apps) Applications (or apps) are the software programs that let users do useful things with their computer, such as create and edit documents, browse websites, send email, watch videos, or play games. Operating systems (OS) are software that supports a computer's basic functions. This includes managing processes, applications, tasks, and other commonly used features. Random Access Memory (RAM) is volatile, meaning it loses its memory when the computer loses power. This is considered "quick access" memory to store data and information while it is in use. RAM is hardware, not software. Device drivers are small pieces of code that are loaded during the boot sequence of an operating system. This code, usually provided by the hardware vendor, provides access to a device, or hardware, from the OS kernel.

What do we call loss of strength of a wireless signal?

Attenuation The distance between the wireless client (station) and access point causes a loss of strength (attenuation) and particularly dense or thick material and metal may weaken or block the signal. Other radio-based devices and nearby Wi-fi networks may cause interference, where part of their signal clashes or interrupts the wireless signal. Long Term Evolution (LTE) is a converged 4G standard supported by both the GSM and CDMA network providers The 802.11b protocol is one of the many Wi-Fi wireless networking protocols. The 802.11 protocol is a common wireless networking specification.

Which of the following enable you to create segments of code that you can reuse?

Both procedures and functions. Both procedures and functions enable you to create segments of code that you will reuse. The key difference, in programming terms, between a procedure and a function is that the latter can return a value to whatever called it, whereas a procedure cannot. Procedures are able to be reused during program execution. However, functions are also able to be reused as well. Functions are able to be reused during program execution. However, procedures are also able to be reused. Both procedures and functions possess the ability to be reused during program execution.

You created a folder called MyFiles under the root in a Windows file system. How would that folder be identified?

C:\MyFiles In the Windows file management system, the root folder is always designated by a backslash after the drive letter. A folder stored in the root is listed after the backslash. Adding the word "root" assumes that there is a folder called "root" under the Windows root folder. The MyFiles folder is one more level down the hierarchy under both root folders. The Windows file system uses backslashes; whereas, UNIX systems use a forward slash to designate the root directory (folder) and as a separator in the remainder of the file path, for example: c:/Myfiles/Resumes. Without a designated drive letter, the MyFiles folder would be a subfolder of the current folder—whatever that might be.

Of the following, which language is typically used with markup language?

CSS Cascading Style Sheets (CSS) are directly associated with Hypertext Markup Language (HTML). HTML is used to structure the layout of webpages, and CSS is utilized to further control, define, modify, and style those container elements within the HTML document. C++ is considered a compiled programming language, you must transform the code to an executable binary before it can run. C# is considered a compiled programming language, you must transform the code to an executable binary before it can run. COBOL is considered a compiled programming language, you must transform the code to an executable binary before it can run.

Which best defines Access Control on a computing device?

Controlling who has the ability to use the device, or information stored on the device. Access control means that a computing device (or any information stored on the device) can only be used by an authorized person, such as its owner. Installing mantraps are great for access control into a building; however, this is unrelated to access to the information on a device. Biometric access may prevent users from entering the building; however, this does not control access on a workstation. Computer locks are great for preventing theft or unauthorized device tampering. It does not affect access control to the information on the computer.

A database administrator is looking to remove a table from a database using Data Definition Language (DDL) commands. Which of the following would achieve only this result?

DROP DROP allows you to delete a table (DROP TABLE) or database (DROP DATABASE). Obviously, this also deletes any records and data stored in the object. ALTER TABLE allows you to add, remove (drop), and modify table columns (fields), change a primary key and/or foreign key, and configure other constraints. There is also an ALTER DATABASE command, used for modifying properties of the whole database, such as its character set. CREATE can be used to add a new database on the RDBMS server (CREATE DATABASE) or to add a new table within an existing database (CREATE TABLE). The primary key and foreign key can be specified as part of the table definition. UPDATE is a Data Manipulation Language (DML) command used to change the value of one or more table columns.

Why is RAM an example of a volatile storage device?

Data stored in RAM is only stored as long as there is a power source sending constant power to the chip. Volatile storage devices require a constant electric current to store data. Powering off the computer causes the data to be lost from RAM; whereas, data on a hard drive (not volatile storage) would be retained even after the computer is unplugged. Ram chips and hard drives can both be easily removed from the motherboard. All of the components on the motherboard are enclosed inside the main cabinet of the computer, which provides protection from damage. The ability to upgrade and replace RAM is a valuable feature in terms of adding functionality to the computer—but RAM is still short-term storage.

Which of these is NOT a social engineering attack?

Denial-of-service Denial of Denial of Service (DoS) is any situation where an attacker targets the availability of a service. This is an Availability concern. Impersonation is a common attack where a person will attempt to figure out a password or other credentials to gain access to a host. Dumpster diving refers to combing through an organization's (or individual's) refuse to try to find useful documents (or even files stored on discarded removable media). Shoulder surfing refers to stealing a password or PIN, or other secure information, by watching the user type it. Despite the name, the attacker may not have to be in close proximity to the target.

In an application's properties, which tab is useful for troubleshooting as it will let you know whether you are running a version with the latest patches?

Details The Details tab is useful for troubleshooting, as it will let you know whether you are running a version with the latest patches. The Compatibility tab can be used to run the program in a compatibility mode (for Windows 98 for instance) and adjust the display settings. The Security tab provides an admin the ability to control access to the program by allowing you to edit the permissions within the properties menu. The General tab provides you with common information regarding the program. This includes, but is not limited to the file name, date modified, program size, and program location on the hard drive.

What is used to prove a program was created by a trustworthy software publisher?

Digital certificate Windows also checks whether the program has a digital certificate proving it has been created by a trustworthy software publisher; if a certificate is not there or not valid, Windows displays another warning. Operating systems (OS) are software that supports a computer's basic functions. This includes managing processes, applications, tasks, and other commonly used features. Applications (or apps) are the software programs that let users do useful things with their computer, such as create and edit documents, browse websites, send email, watch videos, or play games. Web applications are software being executed from a web server. Clients can access the application using just a web browser.

With which method could an attacker use sniffing?

Eavesdropping Eavesdropping/wiretapping is snooping on data or telephone conversations as they pass over the network. Snooping on traffic passing over a network is also often called sniffing. Destruction is the loss of a service or data for a number of reasons. You might lose a data center through a fire, or a person might spill coffee on a server. Availability means keeping a service running so that authorized users can access and process data whenever necessary. This is part of the CIA triangle. Impersonation is a common attack where a person will attempt to figure out a password or other credentials to gain access to a host. The attacker can then hijack the authorizations allocated to the account and generally masquerade as that user.

Which of these is a Business Continuity concern?

Fault tolerance Business continuity implements fault tolerant systems that contain additional components to help avoid single points of failure so when a component fails users do not lose access to computer systems. Data recovery ensues if a system goes down data can either be restored from backup or by switching over to another system to which data has been replicated. Once verifying the integrity of the failover or restored system during disaster recovery, you can re-enable user access and start processing transactions again. The system needs monitoring to ensure the restoration works as intended. Disaster recovery plans should identify priorities for restoring particular systems first. This process needs to account for dependencies between different systems.

USB and thumb drives are examples of which type of storage device?

Flash memory USB and thumb drives are examples of flash memory devices. They are small form factor memory devices that are portable and are commonly used in digital cameras and video cameras. Hard drive devices are those devices using magnetic storage on spinning platters. All computers have a hard drive installed in them, which is used to store files for the operating system, software programs, and a user's personal files. A computer cannot function without a hard drive installed, as it requires one to function properly. Optical drives include CDs, DVDs, and Blu-ray Discs. Solid state devices are sometimes referred to as Flash memory, and were designed to replicate or supplement the function of the hard drive.

Mobile devices detect the device's movement by using accelerometers and what other device?

Gyroscopes Mobile devices use accelerometers and gyroscopes to detect movement and change the screen orientation between portrait and landscape modes. The stethoscope is an acoustic medical device for r listening to the internal sounds of an animal or human body, usually used by medical professionals. An oscilloscope is a type of electronic test instrument that allows observation of varying signal voltages by displaying them on a screen in a wave pattern. A bathyscope is an underwater viewing device used to view the underwater world often from dry land or a boat and can be an analog or digital device.

Which of these is a protocol to allow a mail client to download message from a mail server?

IMAP The Internet Message Access Protocol (IMAP) allows a mail client to download messages from a mail server. IMAP allows the user to manage messages and folders on the server. The Address Resolution Protocol (ARP) is the protocol that enables local address discovery to take place and uses the MAC address. Hypertext Transfer Protocol (HTTP) is the basis of the World Wide Web. HTTP enables clients (typically web browsers) to request resources from an HTTP server. Human Interface Devices (HID) are peripherals that enable the user to enter data and select commands. Examples are keyboard and mice.

Which of the following best represents the way data moves through a computer system?

Input, processing, output, and storage. The four functions listed represent most of the ways that data moves through a computer system: Input, Processing, Output, Storage. This can easily be remembered as IPOS. Input is how the computer receives data entered by the user through peripheral devices. Processing is when the data is written to memory and manipulated by the CPU. Output is when the processed data is shown or displayed to the user. Storage is when the data may be written to different types of storage devices. You are not able to output information that has not been input and processed yet. You cannot process information that has not been input yet. Information cannot be processed until it is input first. Remember the order is IPOS (Input, Processing, Output, Storage)

Which part of the Confidentiality, Integrity, and Availability (CIA) triad deals with information storage?

Integrity Integrity means that the information is stored and transferred as intended and only authorized modifications happen to the information. Confidentiality means that only authorized users should know the information and the information protected from intentional or accidental spillage. Accessibility refers to all people, regardless of disability type or severity of impairment, having access to computers or computing resources. Availability means that the information is accessible to those authorized to view or modify it at the time they need it. For example, a Denial of Service attack would reduce the availability of a computer resource.

What is the purpose of a NIC card?

It allows the computer to connect to network. The Network Interface Card (NIC) typically comes installed as part of the motherboard chipset. It allows the computer to join a network so that it can share files and applications with other computers. A computer must be networked with Internet access in order to stream video from a website like Amazon Prime or Netflix. Video images are sent to a display device by an application working with the graphics card to rasterize the images. If a computer's current ports are not sufficient, adapter cards added to the motherboard can provide extra ports for peripherals.

Select the one UNTRUE statement in regard to an expansion bus.

It's also referred to as the Front Side Bus (FSB) or the local bus. Its purpose is to provide the circuitry that connects the various microprocessors and other components on the motherboard. The expansion performs several functions; however, it is NOT the Front Side Bus (FSB). The FSB, or local bus, is the system bus. It provides connections between the CPU and memory; whereas, the expansion bus provides connections between the CPU and add-on components. The expansion bus carries four things: data, address information, a timing signal, and power. The expansion bus is one of the two kinds of buses in the PC. The other is the system bus. The circuitry on the motherboard—the bus—is a communication system that transfers data between components inside a computer. The expansion bus provides the circuitry that connects various components.

In terms of file systems, what benefits does exFAT provide over FAT and NTFS?

It's developed for flash drives and has some of the same extended attributes as NTFS, but with less overhead. exFAT can be used where the NTFS file system is not a feasible solution (due to data structure overhead), but require a greater file size limit than the standard FAT32 file system (i.e. 4 GiB). exFAT has been adopted by the SD Card Association as the default file system for SDXC cards larger than 32 GiB. Along with most of the features of NTFS, less overhead means faster processing for the exFAT file system, making it particularly suitable for flash drives. Maximum file sizes of up to 2TB are also available on NTFS. The 64-bit addressing scheme has been available since the introduction of NTFS. File-level security permissions, compression, and encryption are features that have already been incorporated into NTFS to make the file system more stable and secure than FAT.

What is the principle that grants users the rights necessary to perform their job and no more?

Least privilege The least privilege principle helps to reduce risk by limiting the allocation of privileges as far as possible. This means that a user gets rights necessary to perform their job and no more. Accounting is the process of tracking authorized and unauthorized usage of a resource or use of rights by a subject. Identification is the process of creating an account or ID that identifies the user or process on the computer system. Authorization is the process of determining what rights or permissions subjects should have on each resource and enforcing those rights.

What is the physical address of a network interface called?

MAC address The physical address of its network interface identifies each host. This is the hardware address or a Media Access Control (MAC) address. Every network interface has a unique MAC address. The Internet Protocol (IP) covers addressing and forwarding at a "logical" level between networks with distinct IDs (network layer). The IP address is how computers find each other on the Internet. Uniform Resource Locator (URL) is the means of specifying the location of the web server and the resource on the Internet. It contains the protocol, the host location, and a file path (if necessary). A postal address is used for traditional physical U.S. Mail, better referred to as snail mail.

The market for workstation operating systems is divided into three main sections. Which of the following is NOT one of those?

Mainframe OS The market for workstation operating systems is divided into three main sections: Enterprise Client, Network Operating System (NOS), and Home Client. Mainframe OS is not considered a main section of operating systems. One main section is enterprise clients which are designed to work as a client in business networks. Another main section is Network Operating System (NOS) or server OS which are designed to run on servers in business networks. The last main section is the home client which is designed to work on standalone or workgroup PCs and laptops in a home or small office.

Which of these is an Integrity concern?

Man-in-the-middle Man-in-the-Middle (MitM) is where a host sits between two communicating nodes, and transparently monitors, captures and relays all communication between them. Social engineering refers to means of getting users to reveal confidential information or obtaining unauthorized physical access to a resource. This is a Confidentiality concern. Wiretapping is snooping on data or telephone conversations as they pass over the network. It can be relatively easy for an attacker to "tap" a wired network or intercept unencrypted wireless transmissions. This is a Confidentiality concern. Denial of Denial of Service (DoS) is any situation where an attacker targets the availability of a service. This is an Availability concern.

Which of the following is NOT considered to be a measurement of file size?

MicroByte MicroByte is not a valid form of measurement, therefore it is incorrect. Computer memory and file sizes in Windows are measured in multiples of bits. The first multiple is the byte, which is eight bits. A double byte is 16 bits. KiloByte (KB) - 1000 bytes (or 103 or 10*10*10 bytes). Small files are often measured in KB like simple text files and icons. MegaByte (MB) - 1000*1000 bytes (or 1,000,000 bytes). Many files would be measured in megabytes. GigaByte (GB) - 1000*1000*1000 bytes (1,000,000,000 bytes). Gigabytes are usually used to talk about disk capacity.

Which is NOT an example of a Relational Database Management Systems (RDBMS)?

Microsoft Office Excel Microsoft Office Excel is a spreadsheet developed by Microsoft for Windows. It is not a Relational Database Management Systems (RDBMS). For Microsoft, their database management software is known as Microsoft Office Access. Oracle Database is an example of a multi-model Relational Database Management Systems (RDBMS) produced by Oracle Corporation. Microsoft Office Access is an example of a Relational Database Management Systems (RDBMS) owned by Microsoft as part of their Office Suite. MySQL is an example of a Relational Database Management Systems (RDBMS) that is open-source to modify as you wish.

In the context of programming languages such as JAVA, what does the acronym OOP best represent?

Object-Oriented Programming (OOP) Object-Oriented Programming (OOP) is a popular way of designing code. The idea is that creating recognizable things within the code and making them interact through defined methods makes the code easier to maintain and update. An object can have "inner" workings that other parts of the program cannot affect and "outer" or public values and things that the object can do that other parts of the program can read or ask the object to change or do. Obsolete-Object Programming (OOP) is not a valid programming term. Ordered-Operational Programming (OOP) is not a valid programming term. Outside-Object Programming (OOP) is not a valid programming term.

Where does the Central Processing Unit (CPU) live in a computer?

On the motherboard. The motherboard connects all of the computer components together. The CPU is plugged into a socket on the motherboard inside the computer. The hard disk is also a piece of hardware that is plugged into a socket on the motherboard. Unlike computers (terminals) used a few decades ago, today's computers need to process without being attached to a network. They need their own processors to do that. Components or cables that plug into the back of the computer also need to access the motherboard in order to connect with the other components on the computer.

What do we call an online network where instead of a central server; each client contributes resources to the network?

Peer-to-Peer In the Peer-to-Peer (P2P) file sharing, clients contribute a certain amount of storage space and bandwidth. Each client can then search for and download or upload files. Smartsheet allow access to word processing, spreadsheets, and presentations with just a web browser installed on the client. The FTP (File Transfer Protocol) uploads and download files between clients and servers. For example, it is widely used to update the files constituting a website from the designer's PC to the web server. Telnet is a network protocol that allows users to log onto another computer on the same network, including over the Internet.

Which of these is the name for a type of an add-on for a web browser?

Plug-in Plug-ins play some sort of content embedded in a web page, such as Flash, Silverlight, or other video/multimedia format. The plug-in can only interact with the multimedia object placed on the page so is more limited than an extension. The Universal Serial Bus (USB) has become the standard means of connecting peripheral devices to a computer. The High Definition Multimedia Interface (HDMI) is the most widely used graphical device interface. It is ubiquitous on consumer electronics, such as televisions and Blu-Ray players, as well as computer equipment. A cookie is a plain text file created by a website when you visit it. The purpose of cookies is to store session information to personalize a website for you.

Which of these is NOT a form of a multitouch gesture?

Poke Multi-touch devices support a variety of gestures but poking the screen is not one of the gestures. The multitouch gesture Tap is usually the equivalent of a main button mouse click. A variant is Tap-and-hold, which mimics the equivalent of a right-button mouse click. The multitouch gesture of Swiping typically switches between documents or apps. Some devices and software can distinguish between one-, two-, and three-finger swiping and assign different actions to each. The multitouch gesture of Sliding usually moves objects around the screen just like dragging an object with a mouse.

Which of these is a Disaster Recovery concern?

Prioritization Disaster recovery plans should identify priorities for restoring particular systems first. This process needs to account for dependencies between different systems. Business continuity plans include fault tolerant systems are those that contain additional components to help avoid single points of failure. Business continuity plans include contingency plans and resources that allow the system to be resilient to failures and unexpected outages. Business continuity plans include network redundancy including multiple network cards in servers and even redundant connections throughout the network to ensure there are no network single points of failure.

How can you modify your File Explorer options to allow you to view hidden files?

Proceed to Control Panel and use the View tab under the File Explorer Options applet. In addition to allowing the viewing of hidden files, the File Explorer Options applet provides other options to customize your File Explorer experience, for example: Show drive letters, Show status bar, and Hide known file extensions. The Properties button in the File Explorer window is designed to allow users to access the properties of a selected file or folder. Files that are hidden do not appear in the File Explorer window and are not available to select. The Security Settings in Control Panel are used to turn on security options like firewall and virus protection.

In theory, it is possible to read the information in each table of a database manually. What tool can be used to view information more efficiently?

Queries In theory, it is possible to read the information in each database table manually, but in order to view information efficiently, a query is used to extract it. A query allows the user to specify criteria to match values in one or more fields and choose which fields to display in the results so that only information of interest is selected. Creation - this step involves defining what information the database will store, where it will be hosted, and how it will be accessed by clients. A database must be created before it can be queried. Import/input - once the database has been created, it must be populated with data records. Importing information is required before a database can be queried. Storage (data persistence) - databases are often used with applications. A database represents a way for an application to store data persistently and securely. Queries are run against stored data.

Which Redundant Array of Independent Disks (RAID) has only striping with parity?

RAID 5 RAID 5 is striping with parity. At least three disks combine into a single logical drive. Data writes in stripes across all disks in the set. RAID 10 combines the mirroring of RAID 1 with the striping of RAID 0. It combines the redundancy of RAID 1 with the increased performance of RAID 0. RAID 1 is disk mirroring where each disk duplicates within the storage housing. A failure of a single disk in a mirrored pair does not cause the host to fail. RAID 6 (Striping with double parity) is similar to RAID 5, but it provides increased reliability as it stores an extra parity block.

Which of these is a Confidentiality concern, as defined in the "CIA Triad"?

Snooping Secure information has three properties, often referred to by the "CIA Triad", which stands for Confidentiality, Integrity, and Availability. Confidentiality means that information is only revealed to authorized people. This can be compromised in a number of ways including snooping, which is any attempt to get access to information on a host or storage device (data at-rest) that you are not authorized to view. Destruction is the loss of a service or data through any number of reasons. You might lose a data center through a fire or a person spills coffee on a server. This is an Availability concern. Replay is where a host captures another host's response to some server, and replays that response in an effort to gain unauthorized access. This is an Integrity concern. Impersonation is a common attack where a person will attempt to figure out a password or other credentials to gain access to a host. This is an Integrity concern.

Which of these is NOT a form of malware?

Software The instructions that a computer follows come from software (computer programs). The computer's Operating System (OS) establishes a basic software environment for other programs to run in. Viruses and worms are malware principally designed to spread to other computers with or without the users help. Adware is software or configuration files installed with your agreement that helps a company track what pages you visit and display personalized adverts to you. Spyware is malware installed covertly, possibly as a Trojan or because of a virus or worm infection, which tries to track everything your computer usage.

What is the purpose of Task Scheduler?

Task Scheduler is used to schedule tasks to run at a specific time. In Windows, Task Scheduler, as its name suggests, sets tasks to run at a particular time. Tasks can be run once at a future date or time or according to a recurring schedule. A "task" can be a simple application process (including switches if necessary) or a batch file or script. Task Scheduler would not be used to open a task on demand. If a user is present, it would be quicker for the user to open the application themselves. Task Scheduler is not used to close unresponsive programs, that would be Task Manager. You would not use Task Scheduler to add a calendar event to a Calendar.

What is the main purpose of the Power-On Self-Test (POST)?

The computer performs a Power-On Self-Test (POST) to check that the main components work and then loads Windows. The computer performs a Power-On Self-Test (POST) to check that the main components work and then loads Windows. If an error has occurred, the computer will emit a series of beeps to inform the user of the issue. These beeps will need to be compared again the computer's operating manual to properly identify the error that is occurring. Whether the printer powers up correctly or not is unrelated to the computers POST. The POST determines if hardware components are functional only. The POST will not generate an error based on monitor (or other peripheral device) settings. Its main purpose is to check internal computing components. The POST cannot work properly if the computer is unable to power on to begin with. The computer will not even turn on without power.

What is an authentication lockout policy?

The device locks for a set period. A lockout policy means that if encountering an incorrect passcode, the device locks for a set period. This could escalate, so the first incorrect attempt locks the device for 30 seconds, while the third locks it for 10 minutes, for instance. A remote wipe or "kill switch" means a stolen handset can be set to the factory defaults or cleared of any personal data. This is a screen lock. It activates whenever the power button is pressed and/or to lock when the sleep timer activates (or some time afterwards). This is device encryption. There is partial or full device encryption where the device protects some or all of the data.

What three elements are required for a computer to perform useful tasks?

The hardware, software, and the computer's user. A computer is a system that manipulates data according to a set of instructions. Three elements are required for a computer to perform useful tasks: hardware, software, and the computer's user. The computer, Central Processing unit (CPU), and Random Access Memory (RAM) are all considered hardware and is lacking both software and the user. Hardware, Monitor, and Printer is in reference to hardware and peripheral devices. This answer lacks the software and user. The mouse, keyboard, and Central Processing Unit (CPU) are input devices and hardware, which lacks software and the user.

Which best defines throughput rate of a device at any given time?

The measurement of data transferred between computers over a network. When data is transferred between components in the computer or between computers over a network, the throughput rate that a particular connection can sustain is measured in bits per second (bps). The measurement of information stored on an external hard drive is called the file, folder, partition, or disk size. This is measured in bytes. The power consumed by a device is measured in watts per hour, not as a throughput rate or bits per second (bps). The maximum amount of data transferred over a network is generally called a quota. Throughput is the rate at which data can transfer and be considered sustainable across a network.

What would be considered a downside to producing digital products?

They are easy to copy and steal. A digital product is one that is sold or distributed as binary computer data. Examples of digital products include software, computer games, eBooks, music tracks, streaming video, video downloads, and so on. Digital products typically have low manufacturing and distribution costs, though hosted products can have substantial infrastructure costs. The downside is that digital products are quite easy to copy and steal. Digital products are not 100% safe from pirating. Piracy is considered stealing which is a crime. They are quick to download which could be a benefit from the business perspective. Digital products can be distributed globally without comprehensive supply chains.

Why would you virtualize an environment?

To use hardware and software resources effectively, as well as potentially to save time and money. Virtualization means that multiple operating systems can be installed and run simultaneously on a single computer. A virtual platform requires at least three components: computer(s), a hypervisor (or Virtual Machine Monitor [VMM]), and guest operating systems (or Virtual Machines [VM]). To create redundancy across multiple physical workstations, it may be effective to implement a RAID solution. Virtualization is best used to consolidate hardware resources. Virtual Private Network (VPN) access does not require virtualizing an environment, although a VPN server can be hosted in a virtualized environment. Cloud storage does not require a virtualized environment; however, cloud and virtualized environments typically work well together.

Which of the following is NOT considered a best practice for installing software?

Verify the software was created in the country which you live in. You do not need to verify the software was created in the country which you live in. This has no impact on the program or its functionality. Verifying that the computer hardware meets the application's recommended system requirements is recommended in order for the application to function properly. Verify that you have a valid agreement or license to install and use the product. so that you have permission to use the program and that you have not committed piracy. Verify that the software is compatible with your operating system. If the program is not compatible, it may not install or, even if it installs, it may not function properly. It is also important to note if the software is a 32-bit or a 64-bit edition.


Related study sets

Chapter 25 Manicuring Vocabulary

View Set

#3 Exam Normal Sleep and Sleep-wake disorders

View Set

Public Speaking Final Study Guide

View Set

7th Grade Baseball Vocabulary Terms

View Set

carswell__ch 07__files and file attributes

View Set

ECON 2020 -- Macroeconomics - Chapter 18: Homework -- By Laken_2020 -- Published On: Thursday, April 15th, 2021

View Set