INFO Midterm 1

0.0(0)
studied byStudied by 7 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/68

Last updated 1:52 PM on 7/24/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

69 Terms

1
New cards

What is the function of PCIe slots?

Connect expansion cards like GPUs


2
New cards

What is another name for an RJ45 port used for a wired network connection?

Ethernet

3
New cards

What does POST stand for in the boot process?

Power On Self Test


4
New cards

Which of the following is the correct order during system startup?

BIOS POST Boot loader OS

5
New cards

What does CMOS store?

System settings like date, time, and boot order

6
New cards

What is the role of the BIOS during startup?

Run POST and locate the boot device


7
New cards

What is the main function of the CPU in a computer?

Perform calculations and run programs


8
New cards

What is the purpose of RAM in a computer?

Store temporary data for active processes


9
New cards

What is the main purpose of a GPU?

Render graphics


10
New cards

What differentiates a GPU from a CPU?

GPUs specialize in lots of parallel processing for visual output

11
New cards

What does an operating system (OS) primarily do?

Manage and allocate hardware and software resources


12
New cards

What is the role of the kernel in an OS?

Directly manage hardware resources


13
New cards

What does a driver do in a computing system?

Translates between the OS and hardware devices


14
New cards

Which scenario best illustrates the role of a driver?

Printer driver converts document into hardware-specific command

15
New cards

What is a common misconception?

The web and the internet are the same thing


16
New cards

What phrase is used to help define the term "Internet"?

International Network

17
New cards

What is a good analogy for data packets on the internet?

Postcards

18
New cards

What is the function of an IP address?

Uniquely identify a device on a network


19
New cards

What service translates domain names like "google.com" into IP addresses?

DNS

20
New cards

What extra security feature does HTTPS provide over HTTP?

Encrypted communication

21
New cards

What risk is highlighted when using HTTP instead of HTTPS?

Data packet sniffing of unencrypted www info in transit on a network

22
New cards

What does cybersecurity primarily aim to protect?

Networks, devices, and data from unauthorized access

23
New cards

What is a core principle of data privacy?

Entities must control access to their data

 (NOT Data must be made public
)

24
New cards

Which of the following best defines "Security" in computing?

Having controls in place to limit unauthorized data access

25
New cards

How does privacy relate to security?

Privacy is the goal; security is the method


26
New cards

Which of the following is an example of encoding?

Transforming data to hexadecimal format


27
New cards

What distinguishes encryption from encoding?

Encryption hides keys


28
New cards

What distinguishes encryption from hashing?

Encryption can be reversed


29
New cards

What is a hash most often used for?

Uniquely identifying data without knowing the original

30
New cards

In cybersecurity, what does the 'C' in C.I.A. stand for?

Confidentiality

31
New cards

Which principle ensures data hasn’t been changed unexpectedly?

Integrity

32
New cards

Which of the following supports the Availability principle?

Real time access to systems and data


33
New cards

What does "Least Privilege" mean?

Users only get access needed for their tasks

34
New cards

What is "Implicit Deny"?

Denying all users by default unless specifically allowed


35
New cards

What’s one way to ensure integrity in communications?

Use digital signatures to prove sender/receiver are who they say they are

36
New cards

What is Information Assurance (IA)?

Measures to ensure CIA of information

37
New cards

Which of the following is NOT part of the CIA Triad but is part of IA?

Non-repudiation

38
New cards

"Something you know" refers to which type of authentication?

Password

39
New cards

What does non-repudiation ensure?

That senders and receivers can’t deny sending/receiving


40
New cards

What is the main purpose of CVE identifiers?

Uniquely identify vulnerabilities

41
New cards

What is an attack vector?

The method used to breach systems

42
New cards

Which attack sends generic messages to many recipients?

Phishing

43
New cards

What distinguishes spear-phishing from phishing?

It targets specific individuals


44
New cards

What is spoofing?

Faking identity in digital communication

45
New cards

What does DNS spoofing do?

Redirects you to a fake website, even if you type in the correct URL

46
New cards

What is a common tool used in MitM attacks?

Wireshark

47
New cards

What’s a key feature of a DoS attack? (NOT DDoS.)

One computer floods a system

48
New cards

What defines a botnet?

Network of infected machines


49
New cards

What does a keylogger do?

Logs all keystrokes

50
New cards

What is the primary difference between a virus and a worm?

Worms self propagate without user action


51
New cards

What is a zero-day exploit?

An unknown flaw used before a fix exists

52
New cards

What does XSS do?

Injects malicious code into legitimate websites


53
New cards

What does XSS stand for?

Cross Site Scripting


54
New cards

What does SQL Injection target?

Databases

55
New cards

What is a buffer overflow?

Writing more data than memory can hold


56
New cards

What is a Pass-the-Hash attack?

Using stolen hashed credentials

57
New cards

What is the purpose of a rainbow table?

Listing hashes of passwords using precomputed data


58
New cards

What is session replay?

Capturing and replaying user actions


59
New cards

What is brute force password cracking?

Guessing passwords by trying every combination

60
New cards

What’s a hybrid attack?

Dictionary attack plus symbols and numbers

61
New cards

What is the primary function of a switch in a network?

Forwards data only to the intended recipient device within the same network


62
New cards

Which device is responsible for providing access to the internet by translating digital signals to analog and vice versa?

Modem

63
New cards

What does a router do in a home or office network?

Routes traffic between networks and assigns IP addresses

64
New cards

A gateway is best described as:

A device that connects two different protocols or networks

65
New cards

In a typical home setup, which device usually has built-in switch, router, and modem functionalities?

All in one wireless router/modem

66
New cards

Which device uses MAC addresses to forward data?

Switch

67
New cards

If your ISP provides a public IP address, which device in your home network receives it directly (unless bridged)?

Modem

68
New cards

You need to connect 10 computers in a local office so they can share files. Which device should you use?

Switch

69
New cards

Which of the following devices can function as a firewall or perform NAT (Network Address Translation)?

Router

Explore top flashcards

Set 1 (Fall Comp 1)
Updated 905d ago
flashcards Flashcards (25)
B1.1 Lipids
Updated 868d ago
flashcards Flashcards (32)
Ekologija
Updated 445d ago
flashcards Flashcards (104)
MGMT 105 Final
Updated 1173d ago
flashcards Flashcards (228)
Microbio Exam 5
Updated 803d ago
flashcards Flashcards (321)
Genetics
Updated 1045d ago
flashcards Flashcards (23)
Set 1 (Fall Comp 1)
Updated 905d ago
flashcards Flashcards (25)
B1.1 Lipids
Updated 868d ago
flashcards Flashcards (32)
Ekologija
Updated 445d ago
flashcards Flashcards (104)
MGMT 105 Final
Updated 1173d ago
flashcards Flashcards (228)
Microbio Exam 5
Updated 803d ago
flashcards Flashcards (321)
Genetics
Updated 1045d ago
flashcards Flashcards (23)