Grab Bag
Components
Applications
Security
Concepts
100

What are the three parts of the CIA triangle?

Confidentiality, Integrity, Availability

100

This connector type is common for PnP (plug and play) devices.

What is USB?

100

Most of the world's smartphones use this OS.

What is Android?

100

This security option allows users to enter a password once for access to multiple platforms.

What is SSO (Single Sign-On)?

100

The speed of a processor is measured in multiples of this unit.

What is Hertz?

200

This database programming language is used by most databases for performing searches.

What is SQL (Structured Query Language)?

200

This storage drive type is nonvolatile and does not contain moving parts.

What is an SSD (Solid State Drive)?

200

This licensing type allows anyone to use the application, or at least its basic features.

What is freeware?

200

This protection feature in Windows is designed to prevent a script or software from making unauthorized changes to the OS configuration. 

What is User Access Control (UAC)?

UAC means that the user must input their credentials or click through an authorization prompt before the configuration change can be made.

200

The first step in the troubleshooting process.

What is "Identify the Problem"?

300

This file system is used for formatting most removable drives and disks as it provides the best compatibility between different types of computers and devices.

What is FAT32?

300

This passive component draws heat away from a CPU.

What is a heat sink?

300

This OS option is an alternative to GUI. It accepts commands like ping, ipconfig, nslookup, etc.

What is Command Line Interface?

300

This type of attack overwhelms a system, using hosts that have been compromised with bot malware to launch a coordinated attack on a web server.

What is DDOS (Distributed Denial of Service)?

300

How many bits are in a kilobyte?

What is 8000?

400

This file type contains program code. It can make changes to the system, so most OS restrict the right to run these to administrator-level users.

What is an executable file?

400

This cable type offers high quality transmission of video, but it supports ONLY digital signals.

What is HDMI?

400

This file system allows disk-level as well as folder-level encryption.

What is NTFS (New Technology File System)?

400

In this security model, users get access only to what they need and no more.

What is Least Privilege?

400

Of the three notation systems discussed in the ITF course, this one can present the largest number values using the fewest digits.

What is hexadecimal?

500

These are four examples of Internet service types.

What are DSL, cable, hybrid fiber coax, FTTC, satellite, cellular?

500

This is the primary advantage of using a CPU in 64-bit mode (aside from the possibility of running 64-bit applications).

What is making more system memory available?

500
In Windows, this feature acts as a virtual folder, displaying the contents of multiple folders that may reside on different drives.

What is a library?

500

An attack that captures user information (such as a login hash) and then sends it at a later time to gain unauthorized access.

What is a replay attack?

500

A technician theorizes that a PC won't turn on due to an issue with the power supply. These are the next two steps in the troubleshooting process.

What are "Test the Theory" followed by "Establish a Plan of Action"?

M
e
n
u