What are the three parts of the CIA triangle?
Confidentiality, Integrity, Availability
This connector type is common for PnP (plug and play) devices.
What is USB?
Most of the world's smartphones use this OS.
What is Android?
This security option allows users to enter a password once for access to multiple platforms.
What is SSO (Single Sign-On)?
The speed of a processor is measured in multiples of this unit.
What is Hertz?
This database programming language is used by most databases for performing searches.
What is SQL (Structured Query Language)?
This storage drive type is nonvolatile and does not contain moving parts.
What is an SSD (Solid State Drive)?
This licensing type allows anyone to use the application, or at least its basic features.
What is freeware?
This protection feature in Windows is designed to prevent a script or software from making unauthorized changes to the OS configuration.
What is User Access Control (UAC)?
UAC means that the user must input their credentials or click through an authorization prompt before the configuration change can be made.
The first step in the troubleshooting process.
What is "Identify the Problem"?
This file system is used for formatting most removable drives and disks as it provides the best compatibility between different types of computers and devices.
What is FAT32?
This passive component draws heat away from a CPU.
What is a heat sink?
This OS option is an alternative to GUI. It accepts commands like ping, ipconfig, nslookup, etc.
What is Command Line Interface?
This type of attack overwhelms a system, using hosts that have been compromised with bot malware to launch a coordinated attack on a web server.
What is DDOS (Distributed Denial of Service)?
How many bits are in a kilobyte?
What is 8000?
This file type contains program code. It can make changes to the system, so most OS restrict the right to run these to administrator-level users.
What is an executable file?
This cable type offers high quality transmission of video, but it supports ONLY digital signals.
What is HDMI?
This file system allows disk-level as well as folder-level encryption.
What is NTFS (New Technology File System)?
In this security model, users get access only to what they need and no more.
What is Least Privilege?
Of the three notation systems discussed in the ITF course, this one can present the largest number values using the fewest digits.
What is hexadecimal?
These are four examples of Internet service types.
What are DSL, cable, hybrid fiber coax, FTTC, satellite, cellular?
This is the primary advantage of using a CPU in 64-bit mode (aside from the possibility of running 64-bit applications).
What is making more system memory available?
What is a library?
An attack that captures user information (such as a login hash) and then sends it at a later time to gain unauthorized access.
What is a replay attack?
A technician theorizes that a PC won't turn on due to an issue with the power supply. These are the next two steps in the troubleshooting process.
What are "Test the Theory" followed by "Establish a Plan of Action"?