Comptia

CrisperInterstellar avatar
CrisperInterstellar
·
·
Download

Start Quiz

Study Flashcards

43 Questions

Where does the Central Processing Unit (CPU) live in a computer?

On the motherboard

Which of these is a Disaster Recovery concern?

Fault tolerance

What three elements are required for a computer to perform useful tasks?

The computer, Central Processing unit (CPU), and Random Access Memory (RAM)

Why would you virtualize an environment?

To use hardware and software resources effectively, potentially to save time and money

Which of these is NOT a form of malware?

Software

Which Redundant Array of Independent Disks (RAID) has only striping with parity?

RAID 5

Which is NOT an example of a Relational Database Management Systems (RDBMS)?

Microsoft Office Excel

How does Plug-and-Play Installation work?

When a user connects a new device, Windows identifies it and attempts to install a new device driver

Which of the following would achieve only this result?

DROP

Which best defines Access Control on a computing device?

Controlling who has the ability to use the device, or information stored on the device.

Which of these is an Integrity concern?

Man-in-the-middle

Which is an example of a Human Interface Device (HID)?

A customer uses a keyboard to enter a username and password into a shopping application.

When does a new creation become 'copyrighted'?

Creations are copyrighted immediately upon creation.

How does a search engine work?

A search engine usually works by compiling a database of information about web pages.

What is used to prove a program was created by a trustworthy software publisher?

Digital certificate

USB and thumb drives are examples of which type of storage device?

Flash memory

Which of these is an Availability concern?

Destruction

Which part of the Confidentiality, Integrity, and Availability (CIA) triad deals with information storage?

Integrity

What is the physical address of a network interface called?

MAC address

Of the following, which language is typically used with markup language?

CSS

What is the principle that grants users the rights necessary to perform their job and no more?

Least privilege

What is the purpose of Task Scheduler?

Task Scheduler is used to schedule tasks to run at a specific time.

Which best defines ergonomics?

Ergonomics is the study of factors affecting the performance of people at work.

Which protocol retrieves an email message from a mail server, but leaves a copy of the message on the server?

IMAP

What is the term that refers to operating a device by moving it around or using a camera in the device to recognize your hand movements?

Kinetics

How is open source code used by developers?

It is code used by developers that they have the rights to modify without requiring permission to meet their project needs.

In the area of workplace surveillance, what is monitoring data communications and employee's behavior called?

Security assurance

In theory, it is possible to read the information in each table of a database manually. What tool can be used to view information more efficiently?

Queries

When considering application interaction, an example of programmatic access can be best defined as what?

A software application that can interact with a database either using SQL commands or using SQL commands stored as procedures in the database.

Of the following tags, which does NOT belong to Hypertext Markup Language (HTML)?

C++

What do we call an online network where each client contributes resources to the network instead of a central server?

Peer-to-Peer

Mobile devices detect the device's movement by using accelerometers and what other device?

Gyroscopes

What is the main purpose of the Power-On Self-Test (POST)?

The computer performs a Power-On Self-Test (POST) to check that the main components work and then loads the Operating System.

With which method could an attacker use sniffing?

Eavesdropping

What functionality can turn off a mobile device's Wi-Fi without shutting off the device?

Airplane mode

Which of these is a Business Continuity concern?

Fault tolerance

How can you modify your File Explorer options to allow you to view hidden files?

Use the View tab under the File Explorer Options applet.

In an application's properties, which tab is useful for troubleshooting as it will let you know whether you are running a version with the latest patches?

Details

Which best defines the throughput rate of a device at any given time?

The measurement of data transferred between computers over a network.

You have been given the task of installing a new printer for a client. The printer is NOT a plug and play device. How would you proceed?

If the printer is not a plug and play device, it does not require a driver.

Select the best example of using dual monitors with multiple windows in Extended mode:

An accountant uses both monitors side-by-side to stretch out one Excel spreadsheet so that it can be displayed in its entirety.

What would be considered a downside to producing digital products?

They are easy to copy and steal.

Which of these is a protocol used to upload and download files between clients and servers?

FTP

Study Notes

Hardware and Networks

  • Dual monitors can be used in Extended mode to increase productivity, e.g., a sales rep using a PowerPoint presentation on one monitor and facing customers on the other.
  • A NIC (Network Interface Card) is used to connect a computer to a network.
  • A downsides of producing digital products is that they are easy to copy and steal.

Operating System

  • The purpose of BIOS is to drive the bootstrapping process.
  • Enterprise Client is a type of workstation operating system best used on a business network.

Programming

  • Procedures and functions are used to create reusable segments of code.
  • OOP (Object-Oriented Programming) is a programming paradigm that represents a way of designing and organizing software systems.

Security

  • Social engineering attacks include dumpster diving, impersonation, and shoulder surfing.
  • Access control is used to control who has the ability to use a device or information stored on it.
  • Confidentiality, Integrity, and Availability (CIA) triad is a model used to ensure the security of data.
  • Authentication lockout policy is used to prevent unauthorized access to a device, e.g., locking the device for a set period after multiple failed login attempts.

Data Storage

  • exFAT is a file system that provides larger maximum file sizes than FAT and NTFS and can store file sizes up to 2TB.
  • RAM is a volatile storage device, meaning data is only stored as long as there is a power source.
  • Hard disk drives store data magnetically on a platter that spins.

Software and Applications

  • Applications (or Apps) are software programs that let users do useful things with their computer, such as create and edit documents.
  • Task Manager is commonly used to end an unresponsive process that cannot be closed from the application window itself.

Internet and Web

  • FTP is a protocol used to upload and download files between clients and servers.
  • A plug-in is a type of add-on for a web browser.
  • Attenuation is the loss of strength of a wireless signal.

File Systems and Management

  • The two interfaces used for configuring input devices are the Settings app and Control Panel.
  • A folder in a Windows file system can be identified by its path, e.g., C:\MyFiles.

Network and Communication

  • Data moves through a computer system in the following order: input, processing, output, and storage.
  • Man-in-the-middle, wiretapping, and replay are examples of Integrity concerns.

Database and Information Systems

  • A database administrator can remove a table from a database using Data Definition Language (DDL) commands, such as DROP.
  • Ergonomics is the study of factors affecting the performance of people at work.

General Computing

  • Digital certificates are used to prove a program was created by a trustworthy software publisher.
  • USB and thumb drives are examples of flash memory storage devices.
  • The physical address of a network interface is called a MAC address.
  • Task Scheduler is used to schedule tasks to run at a specific time.

Miscellaneous

  • The principle of least privilege grants users the rights necessary to perform their job and no more.
  • Kinetics is a term that refers to operating a device by moving it around or using a camera in the device to recognize hand movements.### Database Management
  • Administrators use tools like phpMyAdmin to connect and sign in to an RDBMS.
  • Applications can use a database in the background without the user's awareness.
  • GUIs provide users with a way to select actions to perform on a database, converting those selections to SQL statements.

Networking

  • A peer-to-peer (P2P) network is an online network where each client contributes resources to the network.

Hardware and Mobile Devices

  • Mobile devices detect movement using accelerometers and gyroscopes.
  • The Power-On Self-Test (POST) checks that the main components of a computer work and then loads the Operating System.
  • Airplane mode can turn off a mobile device's Wi-Fi without shutting off the device.

Security and Threats

  • Eavesdropping is a method an attacker can use to sniff data.
  • Fault tolerance is a Business Continuity concern.

File Management and Operating Systems

  • File Explorer options can be modified to allow viewing of hidden files.
  • The View tab under the File Explorer Options applet is used to modify these options.
  • The Details tab in an application's properties is useful for troubleshooting, as it shows whether a version with the latest patches is running.

Performance and Troubleshooting

  • Throughput rate measures the amount of data transferred between computers over a network.
  • Installing a non-plug-and-play printer requires finding and installing the driver.

Computer Components

  • The Central Processing Unit (CPU) lives on the motherboard.

Disaster Recovery and Planning

  • Contingency Planning is a Disaster Recovery concern.

Virtualization and Environment

  • Virtualizing an environment allows for effective use of hardware and software resources, potentially saving time and money.

Malware and Security

  • Software is not a form of malware.

Web and Internet

  • A cookie is a plain text file created by a website when a user visits it.

Storage and RAID

  • RAID 5 has only striping with parity.

Database Management Systems (RDBMS)

  • Microsoft Office Excel is not an example of a Relational Database Management System (RDBMS).

Installation and Configuration

  • Plug-and-play installation works by identifying a new device and attempting to install a new device driver.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Use Quizgecko on...
Browser
Browser