IT273 fundamentals Flashcards Quizlet 4

24 September, 2024 | 12 Min Read

IT fundamentals

Upg

r

ad

e

Pr

o

fi

Terms in this set (158)

______management involves installing and updating operating system features, applications, and drivers, as well as obtaining the appropriate licenses. software
The term ___ is sometimes used to refer to as a hacker or an attacker. cracker
Computers function best in a relative humidity of 50 to 60 percent true
User___is a network security measure in which a computer user or some other network component proves its identity in order to gain access to network resources. authentication

IT fundamentals

Which backup storage solution is popular for small-to-mid-size companies that need to share network storage with dozens of employees in an efficient manner? network attached storage (NAS)
Which option is not an example of PII infromation? telephone#
A bank ATM card is a common example of Multifactor authentication. true
is any unwanted software that has the potential to damage a system, impede performance, or create a nuisance condition. malware
SSO stands for? single sign on
Avoid using the autofill feature of web browsers. true
___updates is a feature of an operating system or a software application that enables updates to be downloaded and installed automatically on a system at a scheduled time or a certain frequency. automatic
IT fundamentals
Software updates can be disabled. true
Which backup storage solution allows companies to cut cost but has major security issues? cloud solution
___protect against data loss due to disasters such as file corruption or hardware failure. backups
If you are a computer administrator, create a new administrator account other than the normal login for security purposes. true
device___is a collection of security tasks used to reduce the scope of the device’s vulnerability and attack surface. hardening
Whaling is a form of phishing that targets individuals who are known to possess a good deal of wealth. true
Dumpster diving can be prevented by properly disposing of paper and hardware. true
IT fundamentals
is a method used by attackers to send out unwanted

Bluetooth signals from mobile phones and laptops to other Bluetooth-enabled devices.
bluejacking
Which Device hardening technique prevents Bluesnarfing? disable bluetooth
Backups need to be consistently tested to verify that your data is intact and not corrupted. true
Energy Star is a U.S.

government (Department of Energy and EPA) program to help individuals and businesses increase energy usage.
false
Before disposing of equipment, you should be sure that any storage devices have been removed or wiped clean to prevent data theft. true
discharge occurs when a path is created that allows electrons to rush from a statically charged body to another with an unequal charge. electrostatic

IT fundamentals

Which backup storage solution is the most cost-effective for home users? local attached storage
Scheduled backups run the risk of corrupting data at a higher rate than real-time backups false
A UPS or generator mitigates the risk of losing external power. true
Which option is not considered to a Natural threat? cut fiber cables
Extreme temperature conditions could cause computers to malfunction or break down. true
Which option is not a Windows built-in account? root
Which option does not reduce the amount of power and energy your electronics consume? plasma screen
Which option is not used as an authentication factor? something you need

IT fundamentals

a___ hat is a hacker who discovers and exposes security flaws in applications and operating systems so that manufacturers can fix them before they become widespread problems. white
Temporary cookies are saved on the hard drive and remain there even after the browsing session ends. false
Which option is not a common tool used for preventing ESD? steeled toe boots
an internet ___ is a local storage area that holds the files saved by a web browser to decrease the time it takes to reload a web page. cache
a ___ hat is a hacker who discovers and exposes security vulnerabilities for financial gain or for some malicious purpose. black
a digital ___ is an electronic document that provides for the secure exchange of information over a network. certificate

IT fundamentals

Which option is not a recommended password management best practice? If you are replacing a previously created password, make sure that your new password is the same as the last one.
is the study of a person’s efficiency at the workplace as it relates to his or her health, safety, and productivity. ergonomics
Which attack is not considered a social engineering attack? ip spoofing
There are no risks associated with upgrading software. false
Setting a password to your screen saver is a security measure that allows unauthorized access to confidential information and passwords associated with your user account. false
the ___ .exe command improves disk performance by defragmenting disk space. dfrgui
Power strips alone do not provide any sort of protection against surges, outages, or any other anomalous electrical behavior. true
IT fundamentals
the ___ .exe command verifies the logical integrity of a file system. chkdsk
Which Device hardening option offers stateful inspection? softwall firewall
use the ___ mode setting to quickly disconnect a mobile device from Wi-Fi and cellular connections, disabling the ability to send and receive calls, email, and text messages. airplane
___is a wireless technology that facilitates short-range wireless communication between devices. bluetooth
Non-Windows devices such as Mac, Linux, and Androidā„¢ devices also use letters to identify different drives on which content is stored. false
NFC is most often used for inperson transactions or data exchange, What does NFC stand for? near field communication

IT fundamentals

data ___ is the process of automatically merging and updating common data that is stored on multiple devices. backup
Which option is not recommended when naming folders? Use special characters such as the backslash ( \ ), the forward slash ( / ), the vertical bar ( | ), the colon ( : ), the asterisk ( * ), the question mark ( ? ), the quotation mark ( " ), the less than ( < ), and the greater than ( > ) characters
Files are classified as___ and ___ files system and user
Microsoft’s synchronization protocol is called? exchange activesync
the ___ is a container object located on the desktop that temporarily stores deleted files. recycle bin
To select contiguous objects, select the first one and then press _ when you select the last object. shift
Which file attribute indicates a hidden file in the file management tools? Hidden (H)

als

You can compress multiple files and folders into a single compressed file. true
Which security configuration setting is not recommended for mobile devices? disable remote backup
Shortcut icons can be recognized by the arrow in the lower-left corner of the icon. true
On a mobile device, you can access email in one of two ways: web-based or clientbased. true
Deleting a shortcut deletes the item to which it is pointing. false
a ___ is a container object that can store your files in an organized manner. folder
By using Bluetooth technology, mobile devices can establish a connection through a process called pairing
A folder within a folder is called a subfolder
IT fundamentals
a ___ is s an object that stores information on a computer. It can contain user data, in the case of document files, or it can contain program code, in the case of application files. file
the ___ button allows you to see the latest changes in the folder window. refresh
The Recycle Bin stores folders and files that were deleted from removable media such as USB drives or network drives. false
___key combinations enable users to perform the same actions that are normally performed by using the mouse, but instead by using the keyboard. shortcut
Which file management system is used on Mac computers? finder
Airplane mode reduces battery life on your mobile device. false
To select everything in a container, select Ctrl + _. A

als

Shortcut keys are sometimes referred to as hot keys. true
Two folders that you should strictly avoid deleting are the___ and the ___ folders program and system
Creating new files and folders within existing folders is called___ folders nesting
Which file attribute indicates that a file has not been backed up? Archive(A)
Deleting or modifying system files has no adverse impact to their functionality. false
You can manage user access to files and folder objects on a computer by modifying their permissions. true
Which file attribute indicates that a file is used by the operating system? System (s)
file ___ is a Windows utility application that offers a single view of all the resources and information that you can explorer
access from a computer
IT fundamentals
Which option indicates a file’s type? extension
Which option is not a default Windows' folder type? sports
Screen orientation changes automatically with the position of the mobile devices. This function is possible due to advanced mobile OS technology that includes an _ and a _. accelerometer and gyroscope
___ a file is the process of reducing the size of a file. compressing
.docx identifies which application? word
Restoring a compressed file to its original size is called___ extracting
Which key combination can also create active window screen captures? ALT+PRINT+SCREEN
a ___ is a link or pointer to a program, file, or folder that is represented by a small icon. shortcut

als

Which characteristic of a connection method describes the ability to transport a device from one physical location to another without interrupting the connection? mobility
Which characteristic of a connection method describes the actual amount of data that is transmitted over a medium in a given time? throughput
Voice data files are smaller in size when compared to text, so upgrading to a VoIP service requires lower bandwidth. false
Wired networks support higher throughput levels than wireless networks. true
A wired networks availability depends upon the health of its network devices and its cabling infrastructure. true
What is the benefit of a cloud computing infrastructure? only pay for what you use
Which characteristic of a connection method describes how safe the network is from security
IT fundamentattack? als
___software allows for one physical device, such as a server operating system, to host multiple logical operating systems. virtualization
Which protocol is most commonly associated with browser-based file sharing? HTTP
a ___ network is a group of computers that are connected together to communicate and share network resources such as files, applications, and devices. computer
Wireless connections transmit data by using radio frequency waves. true
Which is an example of local storage? an internal optic drive
Select the correct option that describes the

common"Network Operating System" component.
Software that controls network traffic and access to common network resources
You cannot configure a wireless peer-to-peer network. false

als

___ networks have the lowest bandwidth and throughput rates. cellular
The most common wireless computer networking protocol is wifi
Wired networks have the highlest level of reliability. true
Cellular networks are the most secure. false
SOHO stands for? small office home office
a ___ is a 32-bit alphanumeric string that identifies a WAP and all the devices attached to it. SSID
a ___ network is known as a mobile network. cellular
a ___ station, along with all other cell sites put together allow for communication over a very large geographic area. base
A Wireless Access Point typically broadcasts an SSID in true
plaintext

IT fundamentals
Instead of accepting the device’s default SSID, you should manually specify an SSID to more clearly identify the device. true
A major concern with cloud computing is the security of data true
Select the correct option that describes the common"Network Adapter" component. Hardware that translates data between the network and a device
file ___ is a type of file protection that disguises the data within a file or message so that the information can not be read or understood by eavesdroppers. encryption
Which method is not used for network connectivity? smoke signals
Which of the following encryption types is the most secure for the SOHO wireless router? WPA2
Wired networks are more false
mobile than cellular networks.

IT fundamentals
Wireless networks are more mobile than wired networks. true
___is specialized software that is stored on a hardware device’s read-only memory (ROM) whether or not the device is powered. firmware
Which characteristic of a connection method describes the maximum amount of data that is possible to transmit over a medium in a given time? bandwidth
Which characteristic of a connection method describes how many users or devices can be connected to the same network at one time? concurrent sessions
Wired computer networks use a technology called___ ethernet
___is the key to maintaining the availabilty of the network. resilliance
Which wireless encryption protocol is considered obsolete? Wep

als

the ____ is a metaphor for the Internet and the complexity of its infrastructure. cloud
Wired networks support the high number of concurrent connections. false
Wireless networks support connectivity to computers without wireless network adapters. flase
Which cloud service supports the transmission of media files by a provider over the Internet and viewed by the end user in real time? streaming
Cloud computing is an approach that allows companies to improve their efficiency by paying for only the resources used—much like paying for utilities. true
a ___networking device broadcasts data in the form of signals to all connected computers. hub

als

a ___ is a networking device used to send data among multiple networks that use the same protocol. router
What is a group of computer and associated devices that share the same resources within a small geographic area? LAN
Google Docs is an example of a ___ application web
Wireless connectivity devices such as a WAP or other wireless routers do not come with a default SSID. false
___ is the transmission of voice communications over IP networks, such as the Internet. VOIP
What is a network of computers that are spread across a large geographic area? WAN
Which basic SOHO router configuration option is not recommended? Do not upgrade the Wi-Fi router firmware to ensure you have the latest security patches and critical fixes

als

___ software is a program that provides specific functionality such as word processing, graphics creation, or database management. application
Which operating system is for a mobile device? Apple IOS
Which option is not a benefit from registering software? software piracy
Periods are used to separate the extension from the file name itself. true
Which collaboration software allows a user to share contacts and calendar information? Email
Which utility software detects and eliminates malicious software that resides on a computer? Anti-malware
Which productivity software is used to communicate with others? Email
Video conferencing is a type of collaboration software. true
IT fundamentals
Which function is not performed by the operating system software? preforms specific tasks
Anti-malware is an example of productivity software. false
a ___ is specialized software that controls a device attached to a computer. driver

Related posts