CompTIA Tech+ Part 2

0.0(0)
studied byStudied by 3 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/49

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

50 Terms

1
New cards

Fragmentation occurs when ________________.

___________ occurs when a data file is not saved to contiguous sectors on an HDD and reduces performance.

2
New cards

Escape Character

A character that is used to remove the special meaning from another character so it can be interpreted literally.

3
New cards

eXtensible Markup Language (XML)

A system for structuring documents so that they are human and machine readable. Information within the document is placed within tags, which describe how information within the document is structured.

4
New cards

Factors

In authentication design, different technologies for implementing authentication, such as knowledge, ownership/token, and biometric/inherence. These are characterized as something you know/have/are.

5
New cards

Fiber Internet Connection

Internet connection type that uses a fiber link between the subscriber premises and ISP network.

6
New cards

Fiber to the premises (FTTP)

Uses a full fiber link

7
New cards

Fiber to the curb (FTTC)

Retains a short segment of copper wire between the subscriber premises and a street cabinet

8
New cards

File Transfer Protocol (FTP)

Application protocol used to transfer files between network hosts.

9
New cards

FTP = Ports ___ and ___

Ports 20 and 21 = ___

10
New cards

User Datagram Protocol (UDP)

Application protocol used to send messages to other hosts on an Internet Protocol network.

11
New cards

Flash Memory

Retains information even when power is removed, but it adds flexibility in that it can be reprogrammed with new contents quickly.

12
New cards

Flowchart

A diagram that shows the relationships of various elements in a system or process.

13
New cards

Foreign Key

A field in one database table that is linked to a field in a different table. A _____ in one table refers to the primary key in a different table.

14
New cards

Form Factor

Size and shape of a component, determining its compatibility. Is most closely associated with PC motherboard, case, and power supply designs.

15
New cards

Function

A block of code that can be reused to perform a specific task.

16
New cards

Geofencing

Security control that can enforce a virtual boundary based on real-world geography.

17
New cards

Graphical User Interface (GUI)

An environment for passing commands to a computer by using a graphical, mouse-driven interface rather than by using text-based commands.

18
New cards

Graphics Processing Unit (GPU)

Type of microprocessor used on dedicated video adapter cards or within a CPU with integrated graphics capability.

19
New cards

Hard Disk Drive (HDD)

Mass storage device that uses mechanical platters with a magnetic coating that are spun under disk heads that can read and write to locations on each platter (sectors).

20
New cards

Heat Sink

Cooling device fitted to PC components to optimize heat transfer.

21
New cards

Hexadecimal

Notational system with 16 values per digit. Values above 9 are represented by the letters A, B, C, D, E, and F. Are a compact way of referring to long byte values, such as MAC and IPv6 addresses.

22
New cards

Hot-Swappable

A device that can be added or removed without having to restart the operating system.

23
New cards

HyperText Transfer Protocol/HTTP Secure (HTTP / HTTPS)

Application protocol used to provide web content to browsers.

24
New cards

HTTP = Port ___

Port 80 = ___

25
New cards

HTTPS(ecure) provides for encrypted transfers, using ___________

___________ uses TLS and port 443

26
New cards

Image

Clone copy of an operating system installation (including installed software, settings, and user data) stored as a file on disk. VMs use ____ to store persistent data, and the technology is also used to make system backups.

27
New cards

Incremental Backup

Job type in which all selected files that have changed since the last full (whichever was most recent) are backed up.

28
New cards

Instant Messaging (IM)

Real-time text communications products that also support file exchange and remote desktop. Also called chat or chat messaging.

29
New cards

Integrity

The fundamental security goal of keeping organizational information accurate, free of errors, and without unauthorized modifications.

30
New cards

Internet Protocol (IP)

Network (Internet) layer protocol in the TCP/IP suite providing packet addressing and routing for all higher-level protocols in the suite.

31
New cards

Internet Protocol Address

Format for logical host and network addressing.

32
New cards

IPv4

A 32-bit binary address is expressed in dotted decimal notation, such as 192.168.1.1.

33
New cards

IPv6

Addresses are 128-bit expressed as hexadecimal (for example, 2001:db8::0bcd:abcd:ef12:1234).

34
New cards

Keylogger

Malicious software or hardware that can record user keystrokes.

35
New cards

Land Grid Array (LGA)

CPU socket form factor used predominantly by Intel where connector pins are located on the socket.

36
New cards

Latency

Time taken for a signal to reach the recipient, measured in milliseconds.

37
New cards

Layered Security

An approach that incorporates many different avenues of defense when securing systems and their data against attack. Also known as defense in depth.

38
New cards

Least Privilege

A basic principle of security stating that something should be allocated the minimum necessary rights, privileges, or information to perform its role.

39
New cards

Local Area Network (LAN)

Network scope restricted to a single geographic location and owned/managed by a single organization.

40
New cards

Local Connector (LC)

Small form factor push-pull fiber optic connector; available in simplex and duplex versions. Also called lucent connector.

41
New cards

Loop

In scripting and programming, control statement that executes code repeatedly based on a condition.

42
New cards

Lunchtime Attack

A malicious action that takes place when a threat actor exploits an unlocked and unattended desktop or mobile device to gain unauthorized access.

43
New cards

M.2

Hardware specification for internal adapter cards. Often used for PCIe-based SSDs.

44
New cards

Machine Code

Software that has been assembled into the binary instructions (expressed as hexadecimal) native to the processor platform. This is also known as machine language.

45
New cards

Machine Learning (ML)

A component of AI that enables a machine to develop strategies for solving a task given a labeled dataset where features have been manually identified but without further explicit instructions.

46
New cards

Media Access Control (MAC)

Hardware address that uniquely identifies each network interface at layer 2 (Data Link). A ____ address is 48 bits long with the first half representing the manufacturer's organizationally unique identifier (OUI). Also known as a client identifier.

47
New cards

Memory Card (SD)

Solid state flash memory provisioned as a peripheral device in a proprietary adapter card form factors, such as Secure Digital and microSD.

48
New cards

Metropolitan Area Network (MAN)

Network scope covers the area of a city (that is, no more than tens of kilometers).

49
New cards

Modulator/Demodulator (MODEM)

An analog or dial-up modem is used to interface a computer with the telephone network for data and fax communications, modulating digital data for transmission as an analog signal and demodulating incoming analog transmissions. Broadband ______ are used to transmit signals over telephone (DSL) or cable TV networks.

50
New cards

National Institute of Standards and Technology (NIST)

Develops computer security standards used by US federal agencies and publishes cybersecurity best practice guides and research.