AP Networking Unit 1 Flashcards

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/143

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

144 Terms

1
New cards

What command would you use to list hidden files in linux?

ls -a

2
New cards

Which is a correct statement given about the Linux and Windows filesystem?

A linux filesystem begins with the absolute path of "/" while Windows begins a drive letter

3
New cards

Which of the following best describes the role of the root directory in a computer's file system?

It is the top-level directory from which all other directories branch.

4
New cards

How does the hierarchical structure of a file system help users and operating systems manage data efficiently?

It organizes files into directories and subdirectories, allowing logical grouping and easier navigation

5
New cards

Evaluate the usage of rmdir on a directory containing two files with the extensions of .exe and .dat inside of it.

Only an error is returned and the directory isn't deleted.

6
New cards

How would you print the first 10 lines of what's inside miscellaneous.txt in the directory?

head miscellaneous.txt

7
New cards

In order to perform a command with sudo, what does the CLI ask you for?

Administrator password to verify user before command

8
New cards

Differentiate the "less" command from the "cat" command.

"less" displays the contents of the file page-by-page while "cat" outputs all of the contents

9
New cards

How does the configuration of standard security features contribute to the security within a system?

The configuration of standard security features increases the level of security

10
New cards

What are software vulnerabilities?

Holes or weaknesses in software application code that can disrupt operations or damage data

11
New cards

Which of the following are examples of habits one can take to improve the level of security of their system?

All of the above are correct

12
New cards

An organization was recently affected by software vulnerabilities. How can the organization reduce the risk of further software vulnerabilities?

Ensure all their software is up-to-date|Roll back software to previous versions

13
New cards

How many characters in MINIMUM should be in a password?

13

14
New cards

Which of the following best describes authentication?

Authentication is the process of verifying a user's identity.

15
New cards

Should you use your birthday as a password?

No, birthdays are easily guessable information.

16
New cards

Which of the following passwords would be considered the weakest according to strong password guidelines?

ILoveCats123

17
New cards

Which activity is specifically listed as a use for computer systems by an Individual?

Managing personal finance and social activities

18
New cards

Which set of three concepts represents the core goals that cybersecurity seeks to ensure for data and systems?

Confidentiality, Integrity, and Availability

19
New cards

When a security breach leads to the loss of intellectual property or trade secrets for an Organization, which type of consequence is this most directly related to?

Loss of financial viability and competitive edge

20
New cards

The use of computer systems by Governments to provide services like healthcare and the use by Organizations to store proprietary information both share the common need to manage and protect what general category of information?

Sensitive and/or proprietary data

21
New cards

A file system has a logical structure where data is stored as files in an organized manner. Where are they stored?

A Directory

22
New cards

While using the CLI (Command Line Interface), when the command "cd /" is used, what is it doing?

Opening into the root directory

23
New cards

What is the difference between a GUI (Graphical User Interface) and a CLI (Command Line Interface)?

A GUI uses images and icons for users to intuitively navigate the machine. A CLI is text-based advanced administration.

24
New cards

On a company device, an employee, Nick Beyer, has prohibited media files in their Picture Directory. The operating system the machine uses is Windows. What file path would you take to the Picture Directory?

C:\Users\NickBeyer\Pictures

25
New cards

Which of the following is the most effective way to defend against phishing attacks?

Educating users to recognize common phishing traits and verify requests through other channels

26
New cards

Which of the following is NOT a common delivery method for social engineering attacks?

Software patch updates

27
New cards

What is the main goal of a social engineering attack?

To manipulate people into revealing sensitive information or performing unsafe actions

28
New cards

An attacker tries to gain unauthorized access to a building by closely following an employee through the door without the employee knowing. The attacker does not ask for permission. What is this tactic called?

Tailgating

29
New cards

What is a common software-related cause of slow device performance?

Too many background processes running

30
New cards

What tool can be used in Windows to check for high CPU or memory usage?

Task Manager

31
New cards

A user reports their laptop is running slowly and becomes unresponsive after opening several applications. What is the most appropriate first step to troubleshoot this issue?

Check system resource usage in Task Manager

32
New cards

A desktop computer frequently shuts down unexpectedly and feels hot to the touch. Which of the following is the most likely cause of the issue?

Overheating due to poor ventilation

33
New cards

What is the primary purpose of a UPS?

To provide a backup power source during outages

34
New cards

What is one major security risk associated with IoT devices?

They usually come with insecure default settings

35
New cards

Why is it important to maintain up to date software on personal devices?

To apply the latest security patches

36
New cards

What does authentication do before allowing access to resources or data?

Establishes the identity of a user, process, or device

37
New cards

What is the main job of the CPU in a computer?

It processes data and carries out instructions.

38
New cards

What is RAM used for?

It temporarily stores data the CPU is currently using

39
New cards

How does a multicore CPU improve a computer's performance?

It allows the computer to run multiple processes simultaneously, speeding up multitasking.

40
New cards

Why is RAM considered volatile memory while storage drives are nonvolatile?

RAM needs power to keep data, while storage drives keep data even when the power is off

41
New cards

What is a CLI an abbreviation for?

Command Line Interface

42
New cards

What does a CLI do?

Lets you interact with a computer via complex text-based commands

43
New cards

How can CLI commands change computer settings?

Text-based commands allow a user to change computer settings by directly interacting with the operating system's core functionalities and configuration files

44
New cards

How does a CLI and a GUI operate differently?

A CLI solely operates via text-based commands, allowing for efficiency, at the cost of ease of use; a GUI operates via a beginner-friendly interface involving clicks, buttons, and icons, at the cost of efficiency

45
New cards

Consider the following CLI command entered by a Linux user: ls -la ~/Documents .Which of the following best describes what this command will do?

Display a detailed list of all files, including hidden ones, in the user's Documents directory

46
New cards

You are in the /home/student/projects directory. Which command would return you to the root directory?

cd /

47
New cards

On a Windows system, which of the following file paths is considered relative?

.\Downloads

48
New cards

You enter the following command in a Linux terminal:ls -a /home/user .What will this command do?

List all files and directories, including hidden ones, in /home/user|List only hidden files in the /home/user directory

49
New cards

Which of the following correctly describes an absolute file path in a Linux operating system?

A path that begins with the root directory symbol (/)

50
New cards

Which of the following best describes a phishing attack?

An attempt to get sensitive information through a fake website or email

51
New cards

A person asks to be let into a secure area by claiming they forgot their badge and are carrying heavy items. What tactic are they using?

Piggybacking

52
New cards

What is the main difference between phishing and spear phishing?

Spear phishing targets specific individuals phishing is more general|Phishing is done over the phone spear phishing is only in person

53
New cards

A small business stores customer data on desktop computers in an open office space. Recently, an unauthorized person accessed a computer after hours and viewed confidential client files. The business owner wants to implement multiple security controls to prevent this from happening again.

Implement physical access restrictions to the office and require authentication to log into devices

54
New cards

Which of the following best describes multifactor authentication?

A user must input various information types to access an account

55
New cards

What is an SSO and its function?

A Single Sign-On, which allows users to access multiple applications through a single set of credentials

56
New cards

Which of the following demonstrates an advantage and a drawback of biometric authentication?

Biometrics are difficult to impersonate, but often expensive to implement and maintain

57
New cards

Why might an organization be hesitant to use physical authenticators for their employees?

Physical authenticators may be relatively more expensive than other forms of authentication.

58
New cards

What tools can you use to monitor system resources on Windows, Mac, and Linux?

Task Manager, Activity Monitor, and top command

59
New cards

Name two common hardware problems and two common software problems

Two common hardware problems are damaged or unplugged power supply, and damaged or low Ram. Two common software problems are outdated software, and viruses or malware.

60
New cards

Why is performing a power cycle often an effective first step in troubleshooting a device?

A power cycle is an effective first step because it can reset network connections

61
New cards

How can checking system resource usage help identify the cause of slow device performance?

Checking system resources help identify the cause of slow performance because it identifies if there is high usage of CPU, memory, or disk usage

62
New cards

How is data stored and where are the locations of the data stored?

Data is stored in files. While the locations of data are stored in directories.

63
New cards

.

64
New cards

What is the purpose of a Command Line Interface (CLI)?

A (CLI) provides a faster, more customized and more efficient administration of networks and computer systems.

65
New cards

Why is a (CLI) more advanced than a (GUI)?

A (CLI) offers greater control, efficiency, and automation capabilities than a (GUI

66
New cards

What can you infer about how a Windows file system stores information?

A Windows file system would store information on various drives, each of which is represented with a drive letter

67
New cards

What can happen if your computer's RAM is low or damaged?

The computer runs slowly

68
New cards

What is a common hardware problem in a computer or device?

Overheating

69
New cards

What should you do if your computer stops responding and freezes?

unplug it and plug it back in

70
New cards

What is one example of a common software problem?

Outdated software

71
New cards

Cybersecurity ensures the confidentiality, integrity, and _____ of data and Systems

Availabilty

72
New cards

A breach of security can lead to ____ Identity.

Theft

73
New cards

Why is cybersecurity important for governments?

To protect education and public safety

74
New cards

Which of the following best explains why connected devices are at risk?

They can be accessed over networks, exposing them to attacks

75
New cards

Describe what a computer system is made up of.

A computer system is made up Hardware, Software, and Data|A computer system is made up only of software and data, as hardware is not necessary for running programs.

76
New cards

Why might a computer system crash or run slowly if it does not have enough RAM?

Because insufficient RAM limits the system's ability to handle active data and operations.

77
New cards

Identify which acronym stands for CPU.

The acronym for CPU stands for Central Processing Unit.

78
New cards

How does the nonvolatile nature of storage devices like SSDs and HDDs affect the way computers save data?

It allows data to be saved permanently even when the computer is powered off.

79
New cards

What purposes do firmware serve for other types of software in a computer system?

Serves as the base for giving orders to run the system hardware/software while retaining itself a low level component on the machine itself

80
New cards

Infer which instances would be the best time to use a VM?

A VM can be used at any time, but is best applied as a honey pot, while also being a cost effective way to run multiple machines.

81
New cards

What is the difference between a BIOS and a UEFI?

Exactly the same except a UEFI is able to handle larger hard drives with a shorter boot time, with a more user friendly GUI (Graphical User Interface).

82
New cards

What is the main purpose of a driver on a computer?

To run hardware with software

83
New cards

What is the most secure method of protecting an account from a brute-force attack?

Using Multi-Factor Authentication

84
New cards

What is the least secure form of Multi-Factor Authentication?

One-time passcode through Email

85
New cards

What does MFA stand for in cybersecurity?

Multifactor Authentication

86
New cards

Which of the following is an example of biometric authentication?

Fingerprint scan

87
New cards

Why is multifactor authentication (MFA) more secure than using only a password?

It requires more than one form of identification, reducing the risk if one is compromised

88
New cards

How does Single Sign-On (SSO) improve both user convenience and security?

It allows users to access multiple services with one login, reducing stored credentials

89
New cards

Your company's IT department rolled out a secure password policy to reduce account compromises. The policy's single, clearly stated rule for employees is: do not reuse the same password across different accounts — every corporate and external account must have its own password. Which of the following employee actions complies with that rule?

Creating a different, unique password for the corporate email account and a different, unique password for the cloud storage service

90
New cards

Is having multiple different passwords for different accounts rather than the same password for each account more secure?

Yes because it prevents an adversary from using a compromised password to further access other accounts with the same password

91
New cards

Examine the following unsecure password and evaluate it with your understanding of password structure and security requirements: bigbluemonkiesarecool. Which of the following passwords would be most secure?

B1gB!u3M0nki3$@r3(00L

92
New cards

Compare the following two passwords, '34y*^K$F9a"k\[' and 'jErrygOdTfQhOf', why exactly would the first one be most secure? Note: They are both the same length.

The first one is most secure because it utilizes all complex structures, it uses uncommon special characters, numbers, different capitalizations, barely any letters, and lacks user information.

93
New cards

What does the CIA triad of data stand for?

Confidentiality, Integrity, Availability

94
New cards

Which of the following could be a severe consequence of a security breach?

Legal penalties and fines

95
New cards

Which of the following is not a severe consequence of a breach in security?

Increased customer trust

96
New cards

What is the application of the CIA triad?

To ensure the security of data through Confidentiality, Integrity, and Availability

97
New cards

What threats can be deterred using security controls?

Physical and digital threats

98
New cards

What can protect devices against failures and disconnections between nodes?

Power backups and redundancies

99
New cards

What is the difference between deterring authentication and physical and digital threats?

Authentication prevents unauthorized access and physical and digital threats protect devices from attacks or damages

100
New cards

How does security controls such as authentication and power backups help protect devices and data?

Authentication gets rid of unauthorized access, power backups prevent data loss during failures