Which of the following are available protocols for security purposes? (Choose all that apply.)
TLS
NetBIOS
SSL
IPSec
SSH
Which of the following services only requires a single port be opened on the firewall?
RDP
SSH
HTTP
FTP
DNS
DHCP
SNMP
SNMP uses which port by default?
161
53
22
110
139
80
–
Step 1:
A user visits a secure website (e.g. https://xyz.com%29./ The user’s web browser will use a communication protocol called Secure Sockets Layer [SSL] (or perhaps Transport Layer Security [TLS]) to connect to the website. Part of the connection involves the website sending its digital certificate to the user’s web browser. The browser will ensure that the certificate matches the website the user is on, is not expired, is endorsed by a trusted CA, etc. If any of those checks fail, the user is alerted of a problem.
If everything checks out, the web browser generates a session key (to be used with a symmetric cipher) and uses the website’s public key to encrypt and transmit the session key to the website. Communication then proceeds using the chosen symmetric encryption algorithm and session key. A bad guy watching the network traffic will not see the key because it is encrypted — and therefore the connection is considered secure.
The website’s private key is never on the user’s computer — it always remains secured on the server (the website).
If a hacker gets into a user’s computer, that computer’s security has been compromised. On most systems, this means all bets relating to security are off. You must have a trusted computing environment to ensure security.
Step 2:
As mentioned in Step 1’s answer, if there is no trusted computing environment there can be no assurance of security.
Step 3:
Same answer as Steps’1 and 2.
An OTP is useless if the system has been compromised.
See http://en.wikipedia.org/wiki/Trusted_Computing for more details
Technical Support Fundamentals
11100
11011011
00000000
10022011
00000000
256
127
1 byte
8
UTF-8 can store a character in more than one byte.
ASCII can store a character in more than one byte.
ASCII can represent emoji.
UTF-8 only uses 128 values.
Any number
255
256
2
External Data Bus
Processor
Registers
Binary
The External Data Bus
Address Bus
DBus
School Bus
Address Bus
Non-moving parts
Smaller form factor
High RPMs
Uses Disk Platters
Smaller form factor
TRUE
FALSE
~20 seconds on a USB 2.0 drive; ~2 seconds on a USB 3.0 drive
~17 seconds on a USB 2.0 drive; ~.02 seconds on a USB 3.0 drive
~ 17 seconds on a USB 2.0 drive; ~2 seconds on a USB 3.0 drive
~ 20 seconds on a USB 2.0 drive; ~.02 seconds on a USB 3.0 drive
A ROM chip is non-volatile and will keep its data in the case of a power failure. A RAM chip is volatile and will wipe its data in the case of a power failure.
A ROM chip is volatile and will wipe its data in the case of a power failure. A RAM chip is non-volatile and will keep its data in the case of a power failure.
A ROM chip stores temporary data. A RAM chip stores permanent data.
A ROM chip stores permanent data. A RAM chip stores temporary data.
A ROM chip stores permanent data. A RAM chip stores temporary data.
Installs drivers
POST
Checks what devices are connected to the computer
Initializes hardware
Checks what devices are connected to the computer
Initializes hardware
Flash drive
Hard drive
CMOS chip
RAM
UEFI has better compatiblity with newer hardware.
UEFI has become the default BIOS on new systems.
A traditional BIOS has better compatibility with newer hardware.
UEFI is meant to become the new standard for BIOS.
UEFI has become the default BIOS on new systems.
UEFI is meant to become the new standard for BIOS.
Kernel and Userspace
Users and Software
Kernel and Packages
Windows and Mac
File data
NTFS
Metadata
File system
Metadata
File system
You can have many processes running for one program.
A program is a process that is executed. A process is a program that we can run.
A program is an application that we can run. A process is a program that is executed.
A program is initially stored in RAM. A process is initially stored in the hard drive.
A program is an application that we can run. A process is a program that is executed.
Stores pages that are currently not in use by physical memory.
Allows our computer to have more memory than it physically has.
It is where we store pages that are being executed
Combination of RAM and hard drive space.
Allows our computer to have more memory than it physically has.
Combination of RAM and hard drive space.
Switches
Hubs
Routers
TCP
Hubs
Routers
255.255.255.0
1.1.1.1
54.45.43.54
345.0.24.6
1.1.1.1
54.45.43.54
TCP
UDP
IP
ICMP
Designing networks
Managing networks
Building networks
Joining professional networks
Managing networks
Building networks
Radio
Smart TV
Antenna
Telephone
Antenna
IP address
MAC address
ISP address
URL address
Address line is for the IP address only, not the domain name.
There’s a problem with your Internet connection.
Web addresses must be entered in lowercase.
There’s a problem in your network’s DNS configuration.
Networks couldn’t talk to each other.
The TCP/IP protocol could only be used in universities, governments, and businesses.
There was no way to remotely access any computer.
Computers were too big and bulky for accessing the Internet.
IPv4
IPv6
IPv1
IPv2
An online car dealership that can provide complete car history using the vehicle identification number
Refrigerators that keep track of the food and notify you when to buy more
Teachers who post assignments for their students on the school website
Thermostats that turn off the air conditioning when you leave the room
Thermostats that turn off the air conditioning when you leave the room
Memory
Binary
Pages
Packets
Border Gateway Protocol
Network Address Translation
Using IPv6 addresses
Autonomous Systems
Using IPv6 addresses
The Internet is the World Wide Web.
The World Wide Web is a way to access the Internet.
The Internet is a way to access the World Wide Web.
The World Wide Web is the only way to access the Internet.
Servers
Packets
Internet users
Clients
There are less than 4.3 billion IPv4 addresses, which has already been exceeded with existing websites.
Companies waste hundreds of public IP addresses. With IPv6, they can use just one IP address.
IPv5 is an outdated protocol version with insufficient security safeguards.
Internet Protocol versions prior to version 6 haven’t achieved widespread use.
We can sell used items to people outside of our local regions.
We can travel around the world faster than we did 100 years ago.
We can attend a university from our homes.
We have instant 24-hour access to news and entertainment.
We can attend a university from our homes.
We have instant 24-hour access to news and entertainment.
Computer security is only necessary for governments and big businesses.
Computer security is everyone’s responsibility.
Computer security is the job of specialized security engineers.
Computer security does not affect the gaming industry.
Auxilary cable
Fiber optic cable
HDMI cable
Ethernet
Ethernet
TRUE
FALSE
NAT
TCP/IP
DNS
ICMP
The domain name is registered to someone else.
Domain names must end in “.com”.
You are not the legal owner of ABC Company.
Domain names must be all in lowercase.
Not a valid IP address
IPv2
IPv6
IPv4
Product selection is not as big as what’s available in physical store locations.
Someone can use your photographs in their own business and not share the profits with you.
Personal buying preferences can be tracked and used to bombard you with excessive marketing.
Confidential information like your credit card number can be stolen and used by someone else.
Confidential information like your credit card number can be stolen and used by someone else.
MAC address and IP address
ISPs and IP addresses
Username and IP addresses
Ethernet cable
URL address
ISP address
MAC address
IP address
A router utilizes network protocols to help determine where to send data packets.
A router is a set of components that makes up computer networking.
A router can only send data to another computer that’s on the same network.
A router connects devices together and helps direct network traffic.
A router connects devices together and helps direct network traffic.
The TCP/IP protocol could only be used in universities, governments, and businesses.
People around the world could not send data to one another.
Networks couldn’t talk to each other.
People could only receive the information in the form of text.
Internet Protocol
File Transfer Protocol
Transmission Control Protocol
Hyper Text Transfer Protocol
TCP
UDP
IP
ICMP
Web browser
CPU
Email client
RAM
Email client
CPU
Windows OS
BIOS
Text editor
BIOS
Interpreted languages are broken into machine instructions beforehand.
Interpreted languages are not broken into machine instructions beforehand.
Compiled languages are translated into machine instructions beforehand.
Compiled languages are not translated into machine instructions beforehand.
Compiled languages are translated into machine instructions beforehand.
run
application
apt
execute
Binary, Hardware, Operating System, Software
Hardware, Operating System, Software, User
Hardware, Windows, Software, User
Computer, Operating System, Software, User
TRUE
FALSE
Replace the CPU.
Login to the machine.
Go into the BIOS settings and change the boot settings
Wipe the computer.
Finder
File Explorer
Konqueror
Midnight Commander
cat
ls
touch
mkfile
BIOS
virtual machine
driver
kernel
TRUE
FALSE
HTTP
FTP
DHCP
TCP/IP
TRUE
FALSE
128
255
256
512
DNS
NAT
HTML
TCP/IP