1/90
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
Whats a Bare Metal Hypervisor [Type 1] ?
Used mostly in enterprises. Runs directly on hardware. Must install Management Console to configure.
Whats a Host OS Hypervisor [Type 2] ?
Runs on top of an existing OS. Desktop or small server.
What is Form Factor and where is it used?
Its a set of specifications that define a motherboards layout, dimensions and connection points.
The most common one being ATX.
What is the 3 components that must be present to process data?
CPU [Central Processing Unit]
RAM [Random Access Memory]
Storage [HDD/SSD]
The purpose of CMOS?
A type of integrated circuit which stores basic configuration information for the computer.
What is a Pin Grid Array (PGA)?
Allows the CPU to be inserted into the socket of the motherboard
What is Virtualization?
The creation of virtual versions of physical hardware, allowing multiple OS to run on a single physical machine.
What is a Hypervisor?
Known as the VM manager, It creates and manages VMs, it allows multiple OS to share a single hardware host.
How does Virtualization reduce costs, increase flexibility, and increase security?
Reduces IT hardware expenses-One physical machine to run multiple VMs.
Increased flexibility-Companies can add or remove VMs as needed.
Increased security- Each VM is isolated from others.
What is the battery for?
The battery maintains that CMOS settings such as the Date/Time, Boot Order, Hardware Settings, Password Info.
Liquid Cooling
Uses liquid to dissipate heat from the CPU
Passive Cooling
Silent cooling that relies on heat sinks and natural convention without fans
Active Cooling
Uses fans and other components to remove heat. Thermal paste is required.
Hybrid Cooling
Combines liquid and air cooling.
Types of memory module packaging:
SFF [Small Form Factor]
Designed to take up less space.
Types of memory module packaging:
SO-DIMM [Small Outline Dimm]
Smaller version of DIMM in desktops
Types of memory module packaging:
DIMM [Dual Inline]
Standard memory module used in desktops.
Types of memory module packaging:
DDR [Double Data Rate]
Type of memory technology
Voltage [VDC] supplied by an ATX power supply
An ATX power supply typically provides multiple voltage outputs, including +12VDC, +5VDC, and +3.3VDC, to power different components
Whats the standard power supply for a desktop or workstation?
the ATX power supply converts 120 VAC to +3.3 VDC, +5 VDC and -12 VDC.
What is the SATA [Serial Advanced Technology Attachment] and what component uses it
the standard interface for connecting storage devices like hard drives and SSDs to the motherboard.
Difference between SSD and HDD
[Solid State Drive] Non-volatile flash memory. Lighter, faster and more reliable than mechanical HDDs
[Hard Disk Drives]
Type of fixed disk internal persistent storage device.
Non-volatile storage. Connects via SATA or IDE
Chipsets and their usage.
A group of integrated circuits that manage data flow between the CPU, memory and peripherals. It determines compatibility and performance of the motherboard and connected devices.
Different printer types:
Inkjet
In which the ink is sprayed onto the paper using microscopic nozzles.
Difference printer types:
Laser
Develops an image on a drum using electrical charges to attract a special toner.
Different printer types:
Dot Matrix
A type of impact printer that uses a set of pins to strike the ribbon to create printed characters and images.
Different printer types:
Thermal
Uses a thermal print heat to fuse or transfer wax based ink onto paper.
Which OS has the largest market share?
Windows
The function of an OS
A software package that enables a PC to function by performing tasks. Basic system functions, enables hardware, software and users to communicate.
Recent LINUX distributions
Ubuntu 22.04 LTS, Fedora 39, and Debian 12
Recent Mac versions
macOS Ventura [13] and macOS Sonoma [14]
Recent Windows versions
Windows 10 but Windows 11 was released
Mobile OS
Android, iOS
Window Applets-Settings, Network, Programs etc.
Are tools and utilities built into the OS for managing settings, network connections, installed programs, and other system functions.
What is the Taskbar?
A user interface in Windows that displays open apps and system notifications.
Whats the CLI and what is it used for?
[Command Line Interface] Required for all OS, is a text based interface used to interact with the OS.
The basic CLI commands
[Theres a lot]
cls [clear screen]
dir [display content]
tree [display tree structure]
cd [change directory]
cd.. [change to root directory]]
cd\ [change up to 1 level]
cd path [change to a path]
help dir [directory cmnd help]
md [make directory]
rd [remove directory]
copy
del
move
rename
format [format a disk]
doskey [command history]
exit
How to get help for CLI commands
Command name followed with a / and a question mark ?
dir/? or help dir
Do CLI deleted files go to the Trash Bin?
They are usually permanently deleted.
Characteristics of HEX, Decimal and Binary
HEX - uses 0-9 and A-F often used in computing for memory addresses and color nodes.
Decimal- Base 10 numeral system (0-9), used in everyday counting.
Binary - uses 0 and 1 used by computers.
What are batch files used for?
A text file containing a series of CLI commands. Allow MS-DOS and Windows to write a series of commands to run in order.
Common Header File commands
@ECHO OFF
REM
How to append output to an existing file
Files can be appended using the >> symbols
ipconfig /all >>ip.txt
Differences between WAN, LAN and PAN:
WAN
WAN [Wide Area Network]-Covers a large geographic area, such as cities or countries.
Differences between WAN, LAN and PAN:
LAN
LAN [Local Area Network]-Covers a smaller area, like a single building.
Differences between WAN, LAN and PAN:
PAN
PAN [Personal Area Network]-A very small network, typically around an individual
IPv4 vs IPv6 addresses
IPv4 - Displayed as four 8-bit segments.[192.168.2.2]
IPv6 - Displayed as 8 segments of 4 hex digits separated by a colon [1203:BFEO:FE80:8897:8A7C:99BF:323D]
What is a physical address
An actual address in memory hardware, where data is stored.
MAC vs IP address, which is routable?
IP Address
How is a MAC address assigned to a NIC
Assigned a unique MAC address by a manufacturer.
UTP vs STP cables. How many wire parts?
[Unshielded Twisted Pair] Typically has 4 wire pairs and used in networking.
[Shielded Twisted Pair] Also has 4 but has screened cables.
Coax vs Twisted Pair vs Fiber:
Coax
Two copper conductors used for cable and internet. Losing popularity.
Coax vs Twisted Pair vs Fiber:
Twisted Pair
Consists of pairs of wires twisted together to reduce interference.
Coax vs Twisted Pair vs Fiber:
Fiber
Electrical signals on copper wire, uses light to transmit data.
What frequency is used by Wifi?
Using radio waves it starts from 2.4 GHz- 5GHz.
WAP vs Router vs Switch:
WAP
[Wireless Access Point] Provides wifi services and connections to a network. Connects wireless devices to a network.
WAP vs Router vs Switch:
Router
Uses IP addresses to decide where data packets are sent. Routes data to different networks.
WAP vs Router vs Switch:
Switch
Manages data distribution using the MAC address of devices. Acts like a hub, repeater and bridge.
What is a Gateway
Connects two different networks.
What are the application pre-installation tasks
-Review the software documentation instructions.
-Check for hardware compatibility.
-Check for OS compatibility.
-Verify the software license is valid.
-Determine if the anit-malware should be disabled.
-Determine which software options will need to be customized.
What is a FreeWare license?
Allows users to download use the software for free, typically prohibits modifications and distribution.
What is EULA?
[End User License Agreement] Legal contract between the software developer and the user, outlining the rights and limitations of using the software
What is a Single User license?
Permits one individual to use a software application on one device, often restricting installation on multiple devices
Network Installed Software
Controlled and maintained by the IT department, usually a corporate or enterprise license.
File extensions
.docx: [Word]
.xlxs [Excel]
.pptx [PowerPoint]
.mp4 [Video]
.pdf [Portable Document File]
.jpg [Image]
.png [Image]
.mp3 [Audio]
.exe [Application]
.zip [Compressed]
Utility, Business, Conferencing, Collaboration differences:
Utility
Programs that accompany the OS or are procured from a third party developer.
Utility, Business, Conferencing, Collaboration differences:
Business
Designed to increase users productivity. Used in a business setting.
Utility, Business, Conferencing, Collaboration differences:
Conferencing
Tools for virtual meetings [Zoom]
Utility, Business, Conferencing, Collaboration differences:
Collaboration
Multiple users work on a single project
[Email, Google Drive]
Characteristics of Cloud Computing
1) On-Demand Self-Service
2) Broad Network Access
3) Resource Pooling
4) Rapid Elasticity
5) Measured Service
Services of CM
SaaS [Software as a Service]
PaaS [Platform as a Service]
IaaS [Infrastructure as a Service]
What is scalability or rapid elasticity?
Scalability is the ability of a system to grow and manage increased demand.
Rapid Elasticity allows cloud resources to be released automatically.
IaaS, PaaS, SaaS, CaaS
SaaS [Software as a Service]
PaaS [Platform as a Service]
IaaS [Infrastructure as a Service]
CaaS [Container as a Service]
Public, Private, Community, Hybrid Cloud: Public
Based services are provided by third-party vendors and are available to anyone
Public, Private, Community, Hybrid Cloud: Private
Available only to users in an organization.
Public, Private, Community, Hybrid Cloud: Community
A private cloud that is shared by two or more organizations.
Public, Private, Community, Hybrid Cloud: Hybrid
A combination of of any two or more clouds.
What is typically used for identification?
Referred to as the username
What type of data is targeted by bad actors?
Personally Identifiable Information [PII]
Personal Health Information [PHI]
What is used for Biometric Authentication
Unique characteristcs such as fingerprints, face id etc.
Typical password policies
Length
Complexity
Aging
Reuse and History
How often is it recommended to change a password?
6 months or when its supicious
What is GEO fencing?
a technology that uses GPS or RFID to create virtual boundaries. It can trigger a response when a device enters or exits these predefined areas
What is the CIA triad?
Confidentiality, Integrity, and Availability
What is digital privacy?
Describes a user's data and how it is stored and maintained by a company or organization.
What does integrity mean
refers to the assurance that data is accurate, consistent, and not tampered with or altered
What US state level legislation that Addresses Digital Privacy
California Consumer Privacy Act [CCPA] and the Illinois Biometric Information Privacy Act [BIPA] Sarbanes-Oxley Act [SOX]
[FISMA]
[GLBA]
[HIPAA]
Asymmetric vs Symmetric
Asymmetric uses two keys, a public and a private.
Symmetric is a two way encryption scheme where its performed by the same key.
What is RSA
RSA (Rivest-Shamir-Adleman) is an asymmetric encryption algorithm widely used for secure data transmission
What is SHA3-384
SHA3-384 is a cryptographic hash function that produces a 384-bit hash value.
What is Misdirection?
Misdirection in cybersecurity refers to tactics used by attackers to divert attention away from their real intent, often to exploit vulnerabilities.