Computer Components and Concepts Flashcards

1
Q

What are the different sizes a motherboard can take?

A

E-ATX, ATX, micro-ATX, mini-ITX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a socket?

A

A socket is the type of connector a CPU processor has. The socket must be compatible with the motherboard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a bus?

A

A physical connection between the components that connect the motherboard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain context switching.

A

A single-core processor does not perform multiple tasks simultaneously. This capability is achieved using a process called “context switching”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is RAM?

A

RAM stands for Random Access Memory. Part of the RAM is used by the OS, the rest is used by running processes. RAM is volatile.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain USB.

A

Universal Serial Bus.

USB 1 - 1.5 Mbps
USB 2 - 480 Mbps
USB 3 - 4.8 Gbps
USB 3.1 - 10 Gbps

USB-C is the one port to rule them all (power, data, video, etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain PS/2

A

Personnal System / 2. Older input peripheral interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain VGA.

A

Video Graphic Array. Older video output (the one with the 2 screws).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain DVI.

A

Digital Virtual Interface. A bit more modern than VGA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain HDMI.

A

High Definition Multimedia Interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain Display Port.

A

One of the most modern dedicated video interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain encoding.

A

Encoding is the process of taking a data from one format (eg binary) and represent it in an other format (eg ASCII). The purpose of encoding is to enable us to fit data that we need to transmit within a set of constraints that are suitable for storage or transmission medium.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How many character does ASCII has?

A

0-255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a tautology?

A

An assertion or formula which is true no matter what inputs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a contradiction?

A

An assertion or formula which is false no matter what inputs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a contingency.

A

Anything that is not a tautology or a contradiction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a file system?

A

It is like a protocol for accessing files and saving files to a physical storage media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a cluster?

A

Every storage device is broken in cluster. It is the smallest section of disk that can be used for file storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the 2 types of information a filesystem store?

A

Data and metadate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Were is the metadata stored?

A

It is stored in the index entry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Explain how a file allocation table map works.

A

A cluster points to a file allocation table entry mapping to the next cluster. For every cluster, a file allocation entry exist.

Some file system do not have file allocation table. The next cluster address is directly in the preceding cluster.
It harder to remap a file system that doesn’t have a file allocation table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Explain FAT32 file system.

A

File Allocation Table 32

Introduced with Windows 95
Uses File Allocation Table
Maximum file size of 4GB
Doesn’t support metadata (so no file permission)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Explain exFAT file system.

A

Extended File Allocation Table

Introduced in 2006
Uses File Allocation Table
Maximum file size basically unlimited
Doesn’t support metadata (so no file permission)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Explain NTFS file system.

A

New Technology File System

Windows only
Encryption support
Shadow copy support (backup)
Metadata support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Explain EXT3 file system.

A

Extended File System 3

Linux only
Introduced in 2001
Support encryption
Doesn't support shadow copy
Maximum size of 2 TB
Journaling file system (track changes to the file system)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Explain EXT4 file system.

A

Extended File System 4

Linux only
Introduced in 2008
Support encryption
Doesn't support shadow copy
Journaling file system with option to turn off for improved speed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Explain HFS+ file system.

A

Hierarchical File System Plus

Apple only
Very similar to EXT4, but for apple

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Explain APFS file system.

A

Apple File System

Duplicate files can be stored via delta

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are the 3 cloud computing models?

A

SaaS, IaaS and PaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Explain SaaS.

A

Software that is available via a third party over the internet (O365, Slack, Teams). You manage nothing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Explain IaaS.

A

Pay as you go IT infrastructure (Amazon Web Service EC2). You manage OS, middleware, Execution, Data and Application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Explain PaaS.

A

Typically for developers. Provide hardware and software to enable you to deliver an application (AWS Elastic Beanstalk). You manage Applications and Data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is a kernel?

A

The first part of the OS code that is loaded. It has complete control over the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is a process?

A

A series of actions or steps taken IOT achieve a particular end. An application can have multiple processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is an interrupt?

A

An interrupt is a signal sent to the CPU, which alerts the CPU to a task requiring its immediate attention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What are the 2 types of interrupt?

A

Hardware interrupt (eg a mouse connected to the computer) and Software interrupt (handled via the kernel).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is the bootloader?

A

Program that is loaded by the BIOS when a computer is first turned on. It is responsible to load the OS. The bootloaded is saved at a known place on the hard drive, known by the BIOS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is the BIOS?

A

Basic Input Output System. Program stored on the motherboard. Initialize the hardware components and load the bootloader.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is the UEFI?

A

Unified Extensible Firmware Interface. Successor to the BIOS (load bootloader and initialize the hardware). It is more versatile and secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is virtualization?

A

Virtualization is where you create a virtual computer of virtual machine out of software that behaves like a separate computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What are the 2 types of hypervisor?

A

Type 1 : Bare Metal. Loaded without an OS.

Type 2 : Software. Runs over the host OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What are the uses of virtualization?

A

Security (Acces to tools, separation)

Development (Environments)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What does the tilde symbol mean in the linux terminal.

A

You are in the home directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What does the $ symbol means in the linux terminal?

A

You are running with account permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What does the # symbol means in the linux terminal?

A

You are running with root privilege.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is the shell?

A

The terminal is only the application, the actual program is the shell. The default path for Bash Shell is /bin/bash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What is a superuser account?

A

An account that has all root privileges. Use the command su (substitue user) command or sudo (substitue user do). Sudo config are in the sudoer file (etc).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

How do you change directory in linux?

A

Use cd.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

How do you list files in linux?

A

Use ls.

  • a show hidden files
  • A show hidden files exept . and ..
  • l uses long listing format
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

How do you print the working directory ?

A

pwd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

How do you verify your account id?

A

whoami

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Explain the root folder structure.

A

bin : store binary files. Usually system files.

boot : stores the files linux uses for the boot process.

cdrom : for the cdrom tray

dev : contain a file for every hardware on the computer.

etc : contain configuration files

home : user home directory

lib : shared library and kernel modules

lost+found : orphaned files are placed there

media : for USB and floppy disks

mnt : mounting external medias

opt : user installed program can go there

proc : every running process has an entry there

root : home folder of the root user

run : store runtime information

sbin : bin for administrative use

srv : holds data for services hosted on the system

sys : contain information about the devices on the system

tmp : temporary file. Deleted periodically and after reboot.

usr : folder for the user

var : variable size file (log file, mail directory and so on).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

explain the permission level of this file :

drwxr-xr-x 2 root root 4096 Feb 24 2020 usb_modeswitch.d

A

d - its a directory

rwx - Owner can read, write and execute

r-x - Group can read and execute

r-x Everyone else can read and execute

Owner is root

Group is root

54
Q

How would you change the owner of a file?

A

sudo chown ‘owner’ ‘file’

55
Q

How would you change the group of a file?

A

sudo chgrp ‘group’ ‘file’

56
Q

How would you add read permission to everyone?

A

chmod +r ‘file’

57
Q

How would you affect a new value to an environment variable?

A

export HOME=/tmp

58
Q

How would you print all environment variable?

A

printenv

59
Q

What is the use of the PATH environment variable?

A

The PATH environment variable holds all the path to bin command.

60
Q

How would you find the location of the ls command?

A

which ls

61
Q

How would you add a new path to your system?

A

export PATH=$PATH:’your cutom path’

62
Q

How would you perform a reverse command search?

A

CTRL+R

63
Q

How would you fully clear your history?

A

Delete .bash_history file in home

history -c

64
Q

How would you interactively display all running processes?

A

top

65
Q

How would you interrupt a process? How would you restart a process?

A

CTRL+Z, fg

66
Q

How would you clear the terminal?

A

CTRL+L or clear

67
Q

How would you copy a file?

A

cp ‘myfile’ ‘location’, to copy recursively, use -r

68
Q

How would you make a new directory?

A

mkdir ‘yourDirectory’, the -p command enable you to create multiple directory

69
Q

How would you move a file?

A

mv ‘file’ ‘location’, the -u command enable you to only update new elements.

70
Q

How would you remove a file?

A

rm ‘yourFile’, -r to remove recursively

71
Q

How would you cocanetate multiple files?

A

cat

72
Q

How would you display information page by page?

A

less

73
Q

How would you search by file metadata?

A

find

74
Q

How would you search text inside a file?

A

grep, -i is case insensitive

75
Q

How would you search for a tool?

A

apropos

76
Q

How would you display the type of a file?

A

file

77
Q

How would you search for the strings inside a file?

A

strings

78
Q

How would you downlad a file from the wev?

A

wget

79
Q

How would you do a static print of all processes?

A

ps aux, if you need more information, ps auxf

80
Q

How would you kill a process?

A

kill -9 ‘PID’

81
Q

How would you update your packages?

A

sudo apt update

sudo apt upgrade

82
Q

Explain HTTP GET

A

Used to retrieve a page from a web server

83
Q

Explain HTTP HEAD

A

Used to retrieve a header only

84
Q

Explain HTTP POST

A

Used to send data to a web server. The server wont send any confirmation.

85
Q

Explain HTTP PUT

A

Used to write data at a specific location.

86
Q

Explain HTTP DELETE

A

Used to delete a resource.

87
Q

Explain 4 HTTP response code

A

200, Ok will provide you to the response
to your request

302, Found, but redirected over here as the resource has moved

404, File not found

500, Internal server error

88
Q

What is a cookie?

A

A cookie is file stored on your computer. The cookie contains your ID for a given domain and multiple account config info. Only the issuer of the domain can reclaim a cookie.

89
Q

What is a switch?

A

A switch is a device that connects a network together.

90
Q

What is a hub?

A

A hub is a signal replicator (it doesn’t break the multicast)

91
Q

What is a router?

A

A router is a device connecting multiple networks together.

92
Q

What is a NIC?

A

Network Interface Card. Used to connect a computer to a network.

93
Q

What is a MAC address?

A

Media Access Control adress. It’s the layer 2 address of your computer.

94
Q

What is an IP address?

A

Internet Protocol Address. It is your layer 3 address used for routing.

95
Q

Why would someone use a local address?

A

A local address is only unique in the LAN. To connect to the internet, one must use NAT or other traversal mechanism.

96
Q

What is the difference between TCP and UDP?

A

TCP (Transmission Control Protocol) is reliable but adds a lot of overhead. UDP (User Datagram Protocol) is non-reliable but extremely efficient.

97
Q

In IPV4, what are the 3 private IP ranges?

A
  1. 0.0.0/8
  2. 16.0.0/12
  3. 168.0.0/16
98
Q

What is the IPV4 loopback address?

A

127.0.0.1

99
Q

What is the IPV6 loopback address?

A

::1

100
Q

Explain the TCP handshake

A

A syn packet is sent. The sequence number is randomly initiated.

10.0.0.1 -> 10.0.0.10 | 63410 > 1337 [SYN] Seq = 0 Len = 0

The second computer respond with a SYN,ACK. The Ack number is simply Seq+1

10.0.0.10 -> 10.0.0.1 | 1337 > 63410 [SYN, ACK] Seq = 0, Ack = 1 Len = 0

The fist computer will fin send an ack with the sequence number incremented by 1.

10.0.0.1 -> 10.0.0.10 | 63410 > 1337 [ACK] Seq = 1 Ack = 1 Len = 0

101
Q

Explain the TCP transmission

A

The data is sent

10.0.0.1 -> 10.0.0.10 | 63410 > 1337 [PUSH, ACK} Seq = 1, Ack = 1, Len = 12 [Data = Hello World]

The receiver confirm he has received the 12 byte by incrementing the sequence number by 12.

102
Q

Explain the TCP teardown

A
  1. 0.0.1 -> 10.0.0.10 | 63410 > 1337 [FIN, ACK] Seq = 13, Ack = 1, Len = 0
  2. 0.0.10 -> 10.0.0.1 | 1337 > 63410 [ACK] Seq = 1 Ack = 14 Len = 0
  3. 0.0.1 -> 10.0.0.10 | 63410 > 1337 [FIN, ACK] Seq = 1 Ack = 14 Len = 0
  4. 0.0.10 -> 10.0.0.1 | 1337 > 63410 [ACK] Seq = 14 Ack = 2 Len = 0
103
Q

What is FTP

A

File Transfer Protocol

104
Q

Explain the process of sending an email/

A
  1. Create the email and hit send
  2. Your email is transmited to your mail server (SMTP)
  3. Your mail server will resolve the domain of the recipient (DNS)
  4. Your mail server will send the email to the recipient mail server (SMTP)
  5. The incoming client will synchronize his emails (IMAP)
105
Q

Explain an SMTP mail transfer protocol.

A
Client : HELO
Server : 250 OK
Client : MAIL from ...
Server : 250 OK
Client : RCPT TO ...
Server : 250 OK
Client : RCPT TO ...
Server : 250 OK
Client : DATA
From : 
To : 
Cc : 
Date : 
Subject : 
a;lsej ;qlewkjr;lesekjf ;lakfj ;asldkfj 
.
Server : 250 OK
Client : QUIT
Server : 221 Bye
106
Q

Explain what POP3 does.

A

POP3 enable a client to pull email from a server. However, once an email is pulled, it is not on the server anymore.

107
Q

Explain what IMAP does.

A

IMAP enable email synchronization from multiple email clients.

108
Q

Explain what MAPI does.

A

It is IMAP for MAPI.

109
Q

Explain what email spoofing is.

A

When spoofing, you use a sending address that isn’t yours. SPF (Sender Policy Framework) and DKIM (Domain Key Identified Mail) are measures to counter spoofing.

110
Q

What is SPF?

A

Sender Policy Framework. In the DNS record of your domain, you put all IP adresses of server that can send email on your behalf. i.g. anyone with a gmail account could spoof a google address.

111
Q

What is DKIM?

A

Domain Key Identified Mail. A public key is in your DNS record and the server sign with a private key.

112
Q

What is DNS.

A

Domain Name Server. The DNS architecture is hierarchical. The top level domain (TLD) holds the location of authoritative domain under .com, .org, .mil, etc.

113
Q

Explain DNS caching.

A

Once a DNS address is resolved, it would be useless to query DNS again. Instead, the mapping is cached in the DNS and in the computer. Good caching in SOHO can drastically improve web speed.

114
Q

Explain the difference between forward and reverse lookups.

A

Direct : resolve IP for a domain

Reverse : resolve domain for an IP

115
Q

Explain the difference between recursive and iterative lookup.

A

Recursive lookup rely on the DNS to query subsequent servers.

The iterative method point the user to the next DNS to query.

116
Q

What is an A Record?

A

Address mapping record. Maps domain to IPV4.

117
Q

What is a AAAA Record?

A

IPV6 address mapping record. Maps domain to IPV6.

118
Q

What is CNAME Record?

A

Canonical Name Record. Creates aliases for a domain name.

119
Q

What is an MX Record?

A

Mail Exchange Record.

120
Q

What is an NX Record?

A

Points to the authoritative DNS for the domain in question.

121
Q

What is a PTR Record?

A

Pointer record. Used for reverse lookup.

122
Q

What is a TXT Record?

A

Textual data associated with a domain. used a lot for SPF and DKIM.

123
Q

What is ICMP?

A

Internet Control Message Protocol.

124
Q

What is DHCP?

A

Dynamic Host Configuration Protocol.

125
Q

What are the 7 layers of the OSI model ?

A
Layer 7 - Application
Layer 6 - Presentation
Layer 5 - Session 
Layer 4 - Transport
Layer 3 - Network
Layer 2 - Data link
Layer 1 - Physical
126
Q

In which layer of the OSI does the data exists?

A

Layer 5 to 7

127
Q

In which layer of the OSI does the segment exists?

A

Layer 4

128
Q

In which layer of the OSI does the Packet Datagram exists?

A

Layer 3

129
Q

In which layer of the OSI does the frame exists?

A

Layer 2

130
Q

What is ARP?

A

Address Resolution Protocol. Used to find the MAC address of an IP address.

131
Q

What is DoS?

A

Denial of Service.

132
Q

What is DDoS?

A

Distributed Denial of Service.