CompTIA Tech+ Part 3

0.0(0)
studied byStudied by 4 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/49

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

50 Terms

1
New cards

Near-Field Communication (NFC)

A standard for two-way radio communications over very short (around four inches) distances, facilitating contactless payment and similar technologies. ____ is based on RFID.

2
New cards

Network

In its most simple form, a network consists of two or more computers connected to each other by an appropriate transmission medium which allows them to share data.

3
New cards

Network Attached Storage (NAS)

Storage device enclosure with network port and an embedded OS that supports typical network file access protocols (FTP and SMB for instance).

4
New cards

Network Interface Card (NIC)

Adapter card that provides one or more Ethernet ports for connecting hosts to a network so that they can exchange data over a link. Also called a network adapter.

5
New cards

New Technology Filing System (NTFS)

64-bit default file system for Windows, with file-by-file compression and RAID support as well as advanced file attribute management tools, encryption, and disk quotas.

6
New cards

Non-Repudiation

The security goal of ensuring that the party that sent a transmission or created data remains associated with that data and cannot deny sending or creating that data.

7
New cards

Non-Volatile Memory Express (NVMe)

Internal interface for connecting flash memory devices, such as SSDs, directly to a PCI Express bus. _____ allows much higher transfer rates than SATA/AHCI.

8
New cards

Not only SQL (NoSQL)

A data masking method that allows you to switch the original data set (for example, an email or a name) with an alias or pseudonym.

9
New cards

Object-Oriented Programming (OOP)

Technique for creating robust code by defining classes of "things" in the code. The objects have attributes, methods, and properties. Code outside the object can only interface with it through its public methods and properties.

10
New cards

On-Premises

Software or services installed and managed on a customer’s computing infrastructure rather than in the cloud or hosted by a third-party provider.

11
New cards

Optical Drive

Mass storage device that supports CD, DVD, and/or Blu-ray media. Burner-type drives also support recording and rewriting.

12
New cards

Patch Management

Identifying, testing, and deploying OS and application updates. Patches are often classified as critical, security-critical, recommended, and optional.

13
New cards

PCI Express (PCIe)

Internal expansion bus that uses serial point-to-point communications between devices.

14
New cards

PCI Express (PCIe)

Each link can comprise one or more lanes (x1, x2, x4, x8, x12, x16, or x32). Each lane supports a full-duplex transfer rate of 250 MB/s (v1.0) up to about 4 GB/s (v5.0).

15
New cards

Peer-to-Peer

Administration paradigm whereby any computer device may be configured to operate as both server and client.

16
New cards

Peripheral Component Interconnect (PCI)

Legacy internal expansion bus supporting 32-bit parallel transfers working at 33 MHz.

17
New cards

Personal Area Network (PAN)

A network scope that uses close-range wireless technologies (usually based on Bluetooth or NFC) to establish communications between personal devices, such as smartphones, laptops, and printers/peripheral devices.

18
New cards

Phishing

A email-based social engineering attack in which the attacker sends email from a supposedly reputable source, such as a bank, to try to elicit private information from the victim.

19
New cards

Pin Grid Array (PGA)

CPU socket form factor used predominantly by AMD where connector pins are located on the CPU package.

20
New cards

Plug-and-Play (PnP)

A _______ system (comprising a compatible BIOS, operating system, and hardware) is self-configuring. When a hardware device is added or removed, the operating system detects the change and automatically installs the appropriate drivers.

21
New cards

Port (TCP/UDP)

In ____ and ____ applications, a unique number assigned to a particular application protocol. Server ports are typically assigned well-known or registered numbers, while client ports use dynamic or ephemeral numbering.

22
New cards

Power over Ethernet (PoE)

Specification allowing power to be supplied via switch ports and ordinary data cabling to devices such as VoIP handsets and wireless access points. Devices can draw up to about 13 W (or 25 W for PoE+).

23
New cards

Power-on Self-Test (POST)

Test routine built into PC firmware to confirm that system components are available at boot or to signal an error condition via a beep code or on-screen status message.

24
New cards

Primary Key

A field in a relational database table that uniquely identifies each record in that table.

25
New cards

Proxy Server

A server that mediates the communications between a client and another server. It can filter and often modify communications as well as provide caching services to improve performance.

26
New cards

Quantum bit

Any bit made out of a quantum system, such as an electron or a photon.

27
New cards

Random-Access Memory (RAM)

Volatile storage devices that hold computer data and program instructions while the computer is turned on. Also known as system memory.

28
New cards

Ransomware

Malware that tries to extort money from the victim by blocking normal operation of a computer and/or encrypting the victim’s files and demanding payment.

29
New cards

Read Only Memory (ROM)

A ____ chip is a special form of memory that has data written to it during the manufacturing process and thus is not amenable to alteration.

30
New cards

Redundant Array of Independent/Inexpensive Disks (RAID)

Specifications that support redundancy and fault tolerance for different configurations of multiple-device storage systems.

31
New cards

Registered-Jack Connector (RJ)

Series of jack/plug types used with twisted-pair cabling, such as __45 and __11.

32
New cards

Relational Database

Structured database in which information is stored in tables where columns represent typed data fields and rows represent records. Tables can have relationships, established by linking a unique primary key field in one table with the same value in a foreign key field in another table.

33
New cards

The overall structure of a particular database and its relations is called a ______.

______ is called a Schema.

34
New cards

Remote Desktop Protocol (RDP)

Application protocol for operating remote connections to a host using a graphical interface. The protocol sends screen data from the remote host to the client and transfers mouse and keyboard input from the client to the remote host. It uses TCP port 3389.

35
New cards

Remote Desktop Protocol (RDP) = Port _____

TCP Port 3389 = _____

36
New cards

Router

Intermediate system working at the Network layer capable of forwarding packets around logical networks of different layer 1 and layer 2 types.

37
New cards

Runtime Code

Source code that is interpreted by an intermediary runtime environment that runs the code, rather than the system executing the code directly.

38
New cards

Scalability

Property by which a computing environment is able to gracefully fulfill its ever-increasing resource needs.

39
New cards

Security Log

A target for event data related to access control, such as user authentication and privilege use. Also called an audit log.

40
New cards

Segmentation

The act of enforcing a security zone by separating a segment of the network from access by the rest of the network, also called network _________ enforcement. This could be accomplished using firewalls or VPNs or VLANs. A physically separate network or host (with no cabling or wireless links to other networks) is referred to as air-gapped.

41
New cards

Serial ATA (SATA)

The most widely used interface for hard disks on desktop and laptop computers. It uses a 7-pin data connector with one device per port. _____ drives also use a new 15-pin power connector, though adapters for the old style 4-pin Molex connectors are available. External drives are also supported via the e_____ interface.

42
New cards

The three SATA standards specifying bandwidths:

1.5 Gb/s, 3 Gb/s, and 6 Gb/s

43
New cards

Server

A _______ provides shared resources on the network and allows clients to access this information.

44
New cards

Service Set Identifier (SSID)

A character string that identifies a particular wireless LAN (WLAN).

45
New cards

Short Message Service (SMS)

System for sending text messages between cell phones.

46
New cards

Shoulder Surfing

Social engineering tactic to obtain someone's password or PIN by observing them as they type it in.

47
New cards

Single Sign-On (SSO)

Authentication technology that enables a user to authenticate once and receive authorizations for multiple services.

48
New cards

Small Form Factor Pluggable/Enhanced Small Form Factor Pluggable (SFP / SFP+)

Fiber optic transceiver module type supporting duplex 1 Gbps (____) or 10 Gbps (____+) links.

49
New cards

Small Office, Home Office (SOHO)

Category of network type and products that are used to implement small-scale LANs and off-the-shelf Internet connection types.

50
New cards

Solid State Drive (SSD)

Persistent mass-storage device implemented using flash memory.