What precaution should you take before touching internal computer components to prevent static discharge?
Ground yourself using an ESD strap
What is stored in memory?
Data and Instructions
What is an IP address used for?
Identifying devices on a network
What is it called when software is used to simulate the hardware of a physical computer?
Virtualization
What type of malware spreads automatically without user interaction?
Worm
Alexa is asked to upgrade the memory on a desktop computer. Which component is she replace expected to replace?
RAM (DIMM)
What is the name of the expansion slot where a modern video card would be inserted into your motherboard?
PCIe
What does DNS do?
Translates domain names to IP addresses
What is the difference between Type I and Type II hypervisors?
Type I runs on hardware; Type II runs on top of OS
What is phishing?
Social engineering attack pretending to be legitimate to steal info
When you build a computer from parts, you usually start by deciding on which two parts listed below?
CPU (processor) and Motherboard
What motherboard chip contains software that configures hardware settings, identifies a boot device, and initializes essential hardware before the operating system starts?
UEFI/BIOS
What does DHCP do?
Automatically assigns IP addresses on a network
Name one hypervisor system.
VirtualBox
VMWare Workstation
Hyper-V
Which protocol is secure: HTTP or HTTPS?
HTTPS
Which motherboard size is larger?
Mini-ATX or Micro-ATX
Mini-ATX
What cache level is closest to the CPU?
Level 1
What command would you use to view your IP configuration in Windows?
ipconfig
Name the three cloud service models. *aaS
Paas (platform as a service)
Saas (software as a service)
Iaas (Infrastructure as a service)
You require employees to enter a password AND a code from their phone to log in. What security strategy is this?
MFA or 2FA
What key is commonly pressed during startup to enter BIOS/UEFI settings?
Delete, or F2 (Really any of the F keys, because why not)
What component of UEFI helps prevent malware from hijacking the system during or before the operating system loads?
Secure Boot
What is the purpose of a subnet mask?
Determines network vs host portion of IP address
What command-line command should you use to check if you can reach a server on your network?
ping
Name one advantage and one limitation of biometric authentication.
1. Hard to Steal
2. Cannot be changed if compromised