Comptia A+ Flashcards

(81 cards)

1
Q

Port 20/21 Protocol

A

File Transfer Protocol (FTP) - transfer of data from server to client in a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Port 22 Protocol

A

Secure Shell (SSH) - is a cryptographic network protocol for operating network services securely over an unsecured network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Port 23 Protocol

A

Tel Net - a network protocol that allows a user on one computer to log into another computer that is part of the same network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Port 25 Protocol

A

Simple Mail Transfer Protocol (SMTP) - is an Internet standard communication protocol for electronic mail transmission. User-level email clients typically use SMTP only for sending messages. Outgoing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Port 53 Protocol

A

Domain Name System (DNS) - is the phone book of the internet. It’s the system that converts website domain names (hostnames) into numerical values (IP address)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Port 67/68 Protocol

A

Dynamic Host Configuration Protocol (DHCP) - is a network management protocol used on Internet Protocol (IP) networks for automatically assigning IP addresses and other communication parameters to devices connected to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Port 80 Protocol

A

Hypertext Transfer Protocol (HTTP) - is a foundational protocol used for communication on the World Wide Web. It facilitates the transfer of data between a client (such as a web browser) and a server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Port 110 Protocol

A

Post Office Protocol v3 (POP3) - is an Internet standard protocol used to retrieve emails from a remote server to a local device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Port 137 Protocol

A

NetBios Name Service (NBNS) - Makes IP Addresses, can only supply IPv4 addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Port 139 Protocol

A

NetBIOS over TCP/IP (NBT) - is a networking protocol that allows legacy computer applications relying on the NetBIOS API to be used on modern TCP/IP networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Port 143 Protocol

A

Internet Mail Access Protocol (IMAP) - is an application layer protocol that operates as a contract for receiving emails from the mail server. Has synchronization capabilities that POP3 does not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Port 161/162 Protocol

A

Simple Network Management Protocol (SNMP) - is an Internet Standard protocol used for managing and monitoring network-connected devices in IP networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Port 389 Protocol

A

Lightweight Directory Access Protocol (LDAP) - It is a vendor-neutral, industry-standard application protocol used to access and manage directory information services over an Internet Protocol (IP) network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Port 443 Protocol

A

Hypertext Transfer Protocol Secure (HTTPS) - is the secure version of HTTP, the primary protocol used to send data between a web browser and a website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Port 445 Protocol

A

Server Message Protocol (SMP) Common Internet File System (CIFS) - is a network file-sharing protocol that allows users to access files, printers, and other shared resources over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Port 3389 Protocol

A

Remote Desktop Protocol (RDP) - is a proprietary protocol developed by Microsoft that allows users to connect to another computer over a network connection and interact with its graphical interface as if they were physically present at the remote computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

802.11 is equivalent to

A

Wi-Fi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Port 465 or 587

A

This is the port for encrypted email transmissions using SMTP Secure (SMTPS) - Port 465 is also used sometimes for SMTPS. However, this is an outdated implementation and port 587 should be used if possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Port 993

A

Secure IMAP (IMAPS) - Receive email Securely through IMAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Port 995

A

is primarily used for the Post Office Protocol version 3 (POP3) with SSL/TLS encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Class A IP Adress (Tier 1 Internet)

A

1.0.0.0 - 126.255.255.255 (1-126)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Class B IP Adress (Tier 2 Internet)

A

128.0.0.0 - 191.255.255.255 (128-191)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Class C IP Adress (Tier 3 Internet)

A

192.0.0.1 - 223.255.255.255 (192-223) [Us at the bottom of the internet]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Dial-up Modem uses what connector type?

A

RJ-45

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Telnet uses port _______ and SSH uses Port ________
23, 22
26
USB 2.0 supports three data transfer rates: ___, ___, and ___
1.5 Mbps, 12 Mbps, 480 Mbps
27
Raid 0
Striping, Fast, No data safety. If one driver dies SOL, need 2 drives. Separates pieces of a file and puts a piece in each drive.
28
Raid 1
Mirroring, Redundancy, Way slower. 2 drives minimum (can do 4). Separate program into pieces make copies of pieces each disk gets a copy.
29
Raid 5
Parity Minimum 3 drives can use more. Takes one piece of file, save to drive. Another piece different drive. Binary math the two pieces into a parity file and put on 3rd drive. Can loose one drive and still recover.
30
Raid 6
More Popular than Raid 5, can lose 2 drives. 4 drivers minimum. Creates two parity copies instead of one.
31
Raid 10
Stripping Mirrors. 4 drives minimum. Raid 1 process, but mirrored drives get same piece. Can loose one of the units in a pair and be ok.
32
Raid 0+1
4 Drives minimum. Take 2 pieces of data put on a stripped pair. Mirror it onto other stripped set.
33
A Connector on USB
The downstream connector - plugs into PC
34
B Connector on USB
Upstream. Plugged into device taking commands
35
USB C Connector
Can do upstream and downstream.
36
USB 1.0 Max Speed + Port Color
1.5 Mbps. Port White Tab
37
USB 1.1 Max Speed + Port Color
12 Mbps. Port Black Tab
38
USB 2.0 Max Speed + Port Color
480 Mbps. Port Dark Blue Tab
39
USB 3.0 Max Speed + Port Color
5 Gbps. Port Dark Blue Tab
40
USB 3.1 Gen 1 Max Speed + Port Color
5 Gbps. Charging Ports Red/Orange/Yellow
41
USB 3.1 Gen 2 Max Speed + Port Color
10 Gbps. Charging Ports Red/Orange/Yellow
42
STP Meaning
Shielded Twisted Pair RJ-45 Connector has metallic shielding all through cable
43
UTP Meaning
Unshielded Twisted Pair RJ-45 No Metalic foil. 4 twisted pairs.
44
Fiber optic cable uses
Light rather than electricity to transfer data.
45
A technician is troubleshooting an all-in-one laser printer that prints a vertical line when making copies and scans. When users print or receive faxes, the output from the printer is correct. Which of the following should the technician examine to determine the cause of the issue? Pickup Rollers, Coronoa Wire, Document Feeder, or The Drum Assembly
Drum Assembly
46
Which of the following is an advantage of using a hybrid cloud instead of a public cloud? Reduce management overhead, use cross-platform virtualization, meet data residency requirements, leverage IaaS and PaaS
meet data residency requirements
47
Which of the following servers is used to collect data and information about events from a network-connected host? DNS, Mail, Print, Syslog
Syslog
48
A technician observes slow startup times on a laptop. Which of the following is most likely causing the issue? HDD, RAM, NIC, BIOS
HDD - Hard Disk Drive
49
SaaS
Software as a Service - Providers hosts application and makes it avaliable over internet to customer. Netflix, Zoom.
50
NVMe
Non-Volatile Memory Express - M.2 Cards
51
Projector intermittent Shutdown resolution
Clean/Replace Filter
52
Which port to disable for security?
Port 22 allows people to remote in, Port 23 disabling can prevent unauthorized access to folders, Port 53 limits access to Domain Name System Services. Connor said 23 Telnet sucks never want to use it.
53
Best Connection Type for Low Infrastructure
DSL
54
Which band is best at providing wireless through a wall
2.4 Ghz band
55
Compare Radio bands for wi-fi 2.4ghz, 5, 6.
2.4 ghz band - provides a onger range, slower data transfer speeds, goes through walls 5 ghz band - Less range than 2.4 ghz, but faster data transfer speeds 6ghz band - Offers the least coverage, but superfast data transfer speeds
56
Best connection type in low infrstructure area
DSL?
57
Impact Printer not printing on all pagesq
Ink ribbon probably
58
GPU new, OS starts, Shutdown after 10 minutes
Reseat the Graphics Processing Unit (GPU), Update drivers on GPU, Change (Peripheral component interconnect express) PCIe Speed, Update BIOS
59
AAA
Authentication, Authorization, and Accounting
60
MX
Mail Exchanger
61
IP Address
a numerical label that is assigned to a device connected to a computer network that uses the Internet Protocol for communication. IP addresses serve two main functions: network interface identification, and location addressing.
62
Subnet Mask
A 32-bit number used in networking to divide an IP address into two parts: the network ID and the host ID. It determines which portion of the IP address identifies the network and which part identifies individual devices (hosts) within that network. This separation is crucial for efficient routing and network management.
63
DNS
Domain Name System - is a hierarchical and distributed naming system that translates domain names into IP addresses
64
DHCP
Dynamic Host Configuration Protocol - is a network protocol that automates the assignment of IP addresses and other network configuration parameters to devices on a network. This eliminates the need for manual configuration, making network management more efficient.
65
Gateway
is a critical network node or device that connects two distinct networks, often operating with different transmission protocols. It acts as an entry and exit point for data, ensuring seamless communication between networks that might otherwise be incompatible due to differing protocols, architectures, or technologies.
66
Sandbox
refers to the creation of an isolated and controlled environment where applications, code, or processes can be executed and tested without impacting the broader system.
67
EFS
Encrypting File System is a feature in Microsoft Windows that provides filesystem-level encryption. It allows users to encrypt individual files and folders, protecting sensitive data from unauthorized access, especially in shared environments.
68
Disk-Based Encryption for Windows
Bitlocker
69
Disk-Based Encryption for MACos
File Vault
70
TPM
Trusted Platform Module - A chip in a motherboard that has a key for unencrypting the Disk.
71
BitLocker to go
Designed for encrypting removable media. Don't need a TPM module. Will need a password.
72
VGA
Video Graphics Array - Old GPU (Graphics Processing Unit) connecter Blue trapezoid
73
DVI
Digitial Visual Interface - Came after VGA. Connects GPU to monitor
74
CCFL
Cold Cathode Fluorescent Lamp - old back lighting method for monitors
75
LCD
Liquid Crystal Display, array of pixels that make up images on a monitor
76
LED
Light-Emitting Diodes - More modern back lightning method for monitors
76
DLP
Digital Light Processing - a grid of zillions of tiny mirrors set up in a grid. popular in projectors
77
OLED
Organic LED - Rather than individual pixels an OLED used a red, green and blue light bulb. Allows for making the screens smaller. Make screens flexible
78
mini-LED
Works like OLED however mini-LED uses much smaller backlighting sources resulting in higher brightness and contrast.
79
PCI
Peripheral Component Interconnect. It is a standard interface used in computers to connect additional hardware devices, such as sound cards, network cards, and video cards, to the motherboard. PCI serves as a hardware bus that allows for the expansion of a computer's capabilities by adding internal components
80