WEEK 4 Flashcards

1
Q

Private ip are used in mainly what?

A

Homes or office

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

10.0.0.0 - 10.255.255.255 is an example of what

A

Private IP Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

172.16.0.0 - 172.31.255.255 is an example of what

A

Private IP Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

192.168.0.0 - 192.168.255.255 is an example of what

A

Private IP Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Public IP Addresses are used by who

A

(Coffees shops and public places)

When connecting to the Internet
ISP give devices a Public IP to whoever connects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What converts IP Address to a readable name

A

DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DNS resolver steps

A

1st stop is at DNS recursive server
(looks for IP address)
2. Root name server
3.TDL name server
4.Domain name server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What enables web browsers and servers to exchange information, allowing you to access and view webpages

A

Hypertext Transfer Protocol (HTTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the secure version of HTTP

A

Hypertext Transfer Protocol Secure (HTTPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When you get your mail from a server and it goes to ur computer but is no longer on the server after u got it
(emails tied to one computer)

A

Post Office Protocol Version 3 (POP3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Can access emails on your devices
(Phone, computer, laptop)

A

Internet Message Access Protocol (IMAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Handles the sending on emails

A

Simple Mail Transfer Protocol (SMTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Protocol used to transfer files from one computer to another over a network

A

File Transfer Protocol (FTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Secure way to transfer files over a network

A

File Transfer Protocol Secure (FTPS)
SSH File Transfer Protocol (SFTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

802.11 wifi standards

A

802.11 a
802.11 b
802.11 g
802.11 n
802.11 ac

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

802.11 a Frequency and Throughput

A

Frequency 5GHz
Throughput 54Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

802.11 b Frequency and Throughput

A

Frequency 2.4GHz
Throughput 11Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

802.11 g Frequency and Throughput

A

Frequency 2.4 GHz
Throughput 54Mpbs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

802.11 n Frequency and Throughput

A

Frequency 2.4GHz + 5GHz
Throughput 600Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

802.11 ac Frequency and Throughput

A

Frequency 5GHz
Throughput 1.7 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which frequency can travel further but can get crowded

A

2.4 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which frequency have better connections over shorter distances
(Less crowded)
(Good for video streaming, file transfer, gaming)

A

5GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Dual band routers support both frequency’s
TRUE or FALE

24
Q

Electrical Magnetic Interference can cause what

A

Bad wifi connection

25
A high Signal to Voice means what?
The signal is strong compared to the voice (Signal stronger than EMI)
26
A low Signal to Voice means
The signal is low compared to voice (signal is weaker than EMI)
27
Which frequency can penetrate through walls better
2.4 GHz
28
The loss of signal strength as it travels further
Attenuation
29
What is a wireless network best practices
Change SSID Change default password
30
A name or label for a network allowing Wi-Fi devices to connect to it
Service Set Identifier (SSID)
31
When should you leave ur Wireless network Unencrypted
It’s a common setup for public Wi-Fi (library) (Risky with lack of protection)
32
Captive portal when connecting to public Wi-Fi
shows you terms and conditions ,user data collection, session management
33
What Is the encryption for Wired Equivalent Privacy (WEP)
RC4
34
What Is the encryption for Wi-Fi Protected Access (WPA)
TKIP
35
What is the encryption for WiFi Protected Access 2 (WPA2)
AES
36
What is the encryption for WiFi protected Access 3 (WPA3)
SAE
37
What is the intermediary between hardware components of the computer and the application or software running on it
Operating System (OS)
38
What other features does the OS offer
Disk management Process management/scheduling Application management Memory management Device management Access control
39
Think of Storage as a massive bookshelf
And the OS as the librarian that organizes all the books (hahaha)
40
What is a system utility that monitors in real time and control over processes and system performance
Task manager
41
What is a memory management that extends the available memory beyond the physical RAM
Virtual memory
42
When RAM and a Storage like HDD swap pages to save memory
Page swapping
43
What let’s you manage hardware components installed on your computer
Device Manager
44
What is the process of managing and regulating permissions and privileges granted to users or process attempting to interact with system resources
Access Control
45
Name the workstation OS
Linux Apple macOS Microsoft Windows Google Chrome OS
46
Name the Server OS
Linux Microsoft Windows server 2019/2022 UNIX
47
Name the Mobil Device OS
Apple iOS Android
48
What is an embedded OS
OS designed to run on resource-constrained devices with specific functions (Common on IoT devices & gaming consoles)
49
A technology that enables you to run multiple operating systems and applications on a single physical computer simultaneously
Virtualization (Hypervisor)
50
Hypervisor 1 uses the hosts own OS While Hypervisor 2 does what
Uses a different OS on the host device (Your main devices uses windows but you will run Linux on a VM)
51
A method of organizing and storing data on a computer or storage device. Provides a structured way to manage and access data effectively
File system
52
A technique used to reduce the size of a file to save storage space and enable faster data transfer
File Compression (Zip, gzip, WinRAR, tar , iso)
53
The process of converting the content of a file into a secure and unreadable format using encryption algorithm
File Encryption
54
Access rights that determine what actions users and groups can preform within a file system
File Permissions
55
Feature that records changes made to the file system in a log (Acts like a transaction history)
Journaling
56
Name the File System Limitations
Hard drive partition limits File size limits
57
File Naming Rules
Restricted characters Maximum characters