CompTIA - Core 2

5.0(1)
studied byStudied by 9 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/195

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

196 Terms

1
New cards

Ping

verifies connectivity and it can check if a user (incluing oneself) is has connectivity

2
New cards

a locally shared printer has to be __

CONNECTED TO A COMPUTER and the computer will share it on the network and different OSs will need different drivers on the device that is sharing for local share to work for them

3
New cards

The opposite of availability is __

destruction

4
New cards

The opposite of confidentiality is__

disclosure

5
New cards

What 3 Ipconfig commands will fix most basic IP issues?

/renew /release /flush dns

6
New cards

Tracert shows the

path from computer to resource and the number of hops it had to do

7
New cards

Netstat

will show you active TCP/IP connections and network protocol statistics as well as all inbound and outbound traffic on a device/host

8
New cards

copy xcopy and robocopy

copy will copy 1 or more files to another location, xcopy will do that and will allow you to copy full directory trees as well as keeping file attributes and time stamps, robo copy does all that and a ton more it allows you to copy larger amounts of date with high accuracy

9
New cards

Chkdsk will

Only scan a drive for any LOGICAL ERRORS

10
New cards

Sfc - System File Checker

Checks your windows OS SYSTEM FILES for any errors and __ will scan windows files and FIX THEM evidence of windows os errors windows file explorer not working

11
New cards

Shutdown

/s will shutdown the computer /m will let you specify which computer on a network you want to shutdown and /t will let you set a shutdown timer

12
New cards

Netuser

command will list all user accounts on a pc as well as allow you to manage all users and create or delete all usernames on a system

13
New cards

Netuse

allows you to create a network maped drive > maps a network drive

14
New cards

UNC - UNAVERSAL NAMING CONVENTION

The correct UNC path is formatted like \\server\name of shared recource

15
New cards

Winver will tell you what version of windows you are using but msinfo32 will

give you a whole overview of your system

16
New cards

Device Manager

is used for rolling back/updating drivers, if you install a driver and it only messes with programs then you can roll back the driver but if it messes with the OS then reboot using the LAST KNOWN GOOD CONFIGURATION

17
New cards

A YELLOW /_\ triangle means

there is an error (usually a communication one but sometimes a driver error

18
New cards

A RED X means

that the device is disabled for unknown reasons

19
New cards

A black down arrow means

that the device has been manually disabled

20
New cards

Going to the ports tab in printer settings under devices and printers allows you to

redirect print jobs when a printer is down it will also let you see the last working IP the printer had

21
New cards

A network printer is available

anywhere on a network

22
New cards

Under view in file explorer options, you can

Hit/enable the option to have your device show hidden files as well as hide or show extensions for file types

23
New cards

To assign A static IP address go to

The network and sharing center then hit change adapter settings then click use the following IP input

24
New cards

The difference between sleep and hibernate is

that when you put a computer into sleep mode the RAM saves any data that is up and running while with hibernate the data gets saved to the pager swap files on the HDD so sleep recovers to the desktop faster since it uses RAM and Hibernate recovers from the HDD

25
New cards

Storage spaces lets you run

mirroring striping or parodying on external drives so it basically + RAID on eternal drives

26
New cards

To rename your PC and join a domain

go to the system utility in the control panel

27
New cards

A primary partition has a

bootable OS on it while extended partitions are the space used by the primary

28
New cards

A partition is called a

logical volume or drive which is part of a hard drive that is formatted differently than the rest of the drive

29
New cards

A basic disk partition cannot leave the

physical drive, however dynamic one’s can leave and interact with other drives and dynamic disk partitions can share their partitions with other drives

30
New cards

When you add a new drive to a PC you have to __ before you can use it

right click and initialize it, then you can create new partitions on inside it (only follow the instructions and put info into the fluids that you have been given the info for otherwise leave the preset settings as is)

31
New cards

If you have an HDD drive that has a slow boot you can ___ to help its speed when booting

defrag it, disk cleanup won't help with boot speed 

32
New cards

Task manager gives you ___

a basic overview of your resource usage, resource monitor does this as well but it gives a bit more info and performance monitor AKA permon.msc, will let you select specific data containers and create logs over time

33
New cards

Flashing AKA updating the BIOS / UEFI is ___ during troubleshooting 

a last resort

34
New cards

Regedit (command registry editor) utility has binary files that are the DNA of the OS the smallest details of windows can be changed here using the

Hkeys which are folders that contain registers

35
New cards

If you need to identify which version of Windows, you have you can type the msinfo32 command into the run box to pull up system information for troubleshooting which is not to be mistaken

For msconfig which is boot options and is used to hold the startup tab that was moved to the task manager don't get baited by the test into choosing the wrong but similar answer 

36
New cards

A Windows domain is an Enterprise Network and active directory is the __

Software that manages objects and permissions on a domain 

37
New cards

A windows work group is smaller than a domain, but it's also defined as a peer-to-peer group, so basically __

a group of peers that have no rules / admins and share data they all have the same permissions work groups can be inside a domain, but they are separate

38
New cards

FAT16 is legacy FAT32 cannot exceed 4GB file size and 2TB partition size FAT16, FAT32 and xFAT all have __

Fewer optimization and customization options because they are built to manage less data, so they are good for removable media like thumb and flash drives

39
New cards

NTFS is Windows proprietary (Windows only) it also offers file-level security through__

EFS (encrypting file system) which allows a single directory to be encrypted while BitLocker encrypts the whole drive 

40
New cards

802.11b and 802.11g

B - supports a theoretical speed of up to 11 Mbps and uses 2.5 GHz

G - supports bandwidth up to 54 Mbps and uses the 2.4 GHz frequency and is backwards compatible with B

41
New cards

802.11a and 802.11ac

A - supports bandwidth up to 54 Mbps and uses 5GHz

AC - Supports up to 1GB and uses 5GHz

42
New cards

802.11n and 802.11ax

N - supports MIMO and supports up to 600 Mbps of network bandwidth and is backward compatible with all

Ax - supports 9.5 Gbps and is compatible on both 5 and 2.4 GHz

43
New cards

802.11n uses __

MIMO

44
New cards

802.11ac and 802.11ax both use

MU-MIMO

45
New cards

5GHz suffers from __

Attenuation more than 2.4 GHz

46
New cards

1, 6 and 11 are __

Non overlapping 2.4 channels

47
New cards

All odd numbers end in 1 in binary math and all__

even numbers end in 0

48
New cards

0 and 255 in the IP range are not

usable

49
New cards

A loopback IP address (Aka- local host) is a preassigned address that represents you, it is for testing connectivity to your device. It is for pinging your own device to check things like if TCP is installed correctly or if there are any errors on your machine and uses the whole

127 range eg- 127.0.0.0 to 127.255.255.255 and it is essentially your own IP address

50
New cards

Multicast is one to many communication - routers use this to update other routers on new info about other routers it uses the private IP range of address that are reserved for multicast use and it referred to as a class d address and it goes from

224.0.0.0 to 239.255.255.255

51
New cards

APIPA IP address range is

169.254.0.0 to 169.254.255.255

52
New cards

Reservations allow you to bind a MAC address to an

IP addresses

53
New cards

Exclusive range is the scope of addresses that the server ___ assign

cannot

54
New cards

Routers connect dissimilar networks however, when you are on a switch you have to be on the same network to communicate. so routers are for getting off the local LAN while switches

allow you to communicate with only the devices on your local LAN. - The default gateways have to be in the same network class as the IP address for them to have connectivity

55
New cards

PUBLIC IP ADDRESSES

Class A –

Class B –

Class C –

Class D –

PUBLIC IP ADDRESSES

Class A – 1.0.0.0 to 126.255.255.255

Class B – 128.0.0.0 to 191.255.255.255

Class C – 192.0.0.0 to 223.255.255.255

Class D – 224.0.0.0 to 239.255.255.255

56
New cards

Private non-routable ipv4 - NAT-addresses

Class A -

Class B -

Class C -

Private non-routable ipv4 - NAT-addresses

Class A is anything starting with a 10 so 10.0.0.0 to 10.255.255.255

Class B - 172.16.0.0 to 172.31.255.255

Class C - 192.168.0.0 to 192.168.255.255

57
New cards

A records maps

A mac address to an IPv4 address

58
New cards

AAAA records maps

a mac address to an IPv6 address

59
New cards

Chronological name records (Cname) records maps

abbreviations/allies of domain names to the websites

60
New cards

MX records point to the

IP of a mail server

61
New cards

TXT records includes (SPF) which is sender policy framework and it deals with

spam and it manages it as well. In essence its a list of hostnames/Ip and IPv6 addresses that mail can be sent too so no one can go sent up a spoofed mail server

62
New cards

(DKIM) Domain keys identified mail provides

 authentication of mail being sent and received to prevent spam, so this is the key that is used so that sending and receiving mail is possible

63
New cards

(DMARC) Domain-based message authentication reporting and conformance controls what happens

If authentication fails to prevent spam

64
New cards

RFS - Resilient file systems is the planned replacement for

NTFS and it has a built-in check disk that is always running checks for logical errors only

65
New cards

HFS/APFS is

Apple's file system 

66
New cards

ext3 and ext4

are Linux file systems

67
New cards

NTFS permissions if someone has the (modify or change) permissions, they can delete data, effective permissions occur when you have overlapping NTFS and share permissions in the event of having both NTFS and share permissions the most__

restrictive permissions apply so if you have last permissions on one then those are the only ones that you get

68
New cards

When you move or copy a file within NTFS to another partition it will inherit the new file permissions of that partition except when__

you move it to a folder within the same partition that is when it will retain the same permissions and if you are moving an NTFS file to a non-NTFS system all permissions are lost

69
New cards

The RAID with the best/max performance is

RAID 0

70
New cards

WPA introduced__

TKIP - the temporal key integrity protocol

71
New cards

Task manager allows you to choose

which programs will start upon boot 

72
New cards

Port 25 is SMTP

465 or the secure version which is 587

73
New cards

Port 143 is

IMAP and 993 is the secure version

74
New cards

MSTSC (Microsoft Terminal Service Client) =

RDP port 3389

75
New cards

WPE and WPA both use RC4 when we transferred to WPA2 we started using

AES - Advanced encryption standard

76
New cards

The Windows utility device manager should be used to  

roll back a device driver

77
New cards

The Windows utility FILE EXPLORER OPTIONS can be used to

find hidden files

78
New cards

Mac OS

Taskbar =

multi-screen view =

password manager =

file explorer =

spotlight =

multiple inputs on a touchpad =

remote disk allows you to —

Mac OS

Taskbar = dock

multi-screen view = mission control

password manager = keychain it's a standalone utility

file explorer = finder searching in the file system

spotlight = search utility

multiple inputs on a touchpad = gestures or “magic mouse”

remote disk allows you to remotely access the optical drive of another Mac PC on your network

79
New cards

ISO files =

disc image of an OS and this goes for Windows too

80
New cards

Linux permissions 

R = read =

W = write =

X = execute =

Linux permissions 

R = read = 4

W = write = 2

X = execute = 1

81
New cards

With Linux permissions there are owner, group, and world/other permissions and they all go in the same line like rwx/rwx/rwx and also 7/7/7 or if someone had only rw it'd be 6 and so on and so forth when numbered permissions are called

octal permissions and the first set of permissions is the owner permissions the second set is the group permissions, and the last set is everyone else's permissions

82
New cards

In Linux ls

lists directory content

83
New cards

In Linux man is short for

Manual and it shows you how to use a command

84
New cards

In Linux mv

is used to move a file

85
New cards

In Linux dd

will copy and convert a file

86
New cards

In Linux cp

is a basic copy

87
New cards

In Linux rm

is remove which will delete the file

88
New cards

In Linux su

is super user which turns you into the windows version of an admin as far as permissions go AKA a root user

89
New cards

In Linux sudu

allows you to do one thing as a super user

90
New cards

In Linux chmod

changes the permissions themselves

91
New cards

In Linux chown

changes the owner of the resource who has all the permissions

92
New cards

In Linux apt/get

installs and updates packages (which is a software of some kind) from a repository, which is the location data is stored in and yum+rpm does the same thing as apt/get but on the red hat distribution of Linux only

93
New cards

df shows you

disk space/info df also stands for a disc/free

94
New cards

with Linux you typically can't change a files permission unless you are the owner, so you have to use

chown and then chmod

95
New cards

On Linux there is no ipconfig there is only ifconfig and iwconfig ifconfig is the

wired version of ipconfig and iwconfig is the wireless version of ifconfig, ip changes networking settings don't get it mixed up with all the other IP commands 

96
New cards

In Linux grep searches for

a string of text like if you wanted to find where "I love you' was typed within all your notepads

97
New cards

In Linux the dig command is

used for verifying and troubleshooting DNS problems and to perform DNS lookups

98
New cards

In Linux Cat concatenate =

combining files 

99
New cards

In Linux Nano gives you

direct access to a text editor 

100
New cards

802.1x is used in

WPA2 enterprise for Port based authentication