Study sets matching "computer certification ceh"

Study sets
Classes
Users

Study sets matching "computer certification ceh"

10 terms
CEH (Certified Ethical Hacker) Certification Questions
Hacker is a person who illegally break…
In order to compromise or to hack a sy…
Defense-in-depth is a security strateg…
Penetration testing is a method of act…
Individuals with extraordinary computing skills, resorting to…
Reconnaissance
True
Black Box pen testing
Hacker is a person who illegally break…
Individuals with extraordinary computing skills, resorting to…
In order to compromise or to hack a sy…
Reconnaissance
Computers and Certification
computer service and repair field
Computer salespeople
Corporate trainers
IT consultant
(Preventive maintenance... Component installation... Repair service…
possess a general understanding of computers and a specific k…
teach employees how to use software, design and develop syste…
provides computer services to his or her clients
computer service and repair field
(Preventive maintenance... Component installation... Repair service…
Computer salespeople
possess a general understanding of computers and a specific k…
6 terms
computer science teaching certification
selection sort
bubble sort
insertion sort
merge sort
nested loop to select the best value for a position
nested loop to compare with neighboring elements
nested loop to insert each element into its proper position
divide and conquer recursive approach
selection sort
nested loop to select the best value for a position
bubble sort
nested loop to compare with neighboring elements
22 terms
computer careers and certification - 15
-general business and government organ…
IT department
-management... -system development and pr…
management
job opportunities in computer industry generally available in…
employees who work together as a team to meet info requiremen…
jobs listed in general business and gov't organizations and t…
IT dept jobs: ... chief info officer (CIO)/chief tech officer (C…
-general business and government organ…
job opportunities in computer industry generally available in…
IT department
employees who work together as a team to meet info requiremen…
Computer Certification Training
A+ Certification training
Networking certification Training
Windows 7 certification training
CCNA certification training
...
...
...
...
A+ Certification training
...
Networking certification Training
...
20 terms
Computer Certification Ch 2&3
anti-static bag
anti-static
assertive communication
integrity
Always place an expansion card or other computer part into a(…
A few screwdrivers and an_____ wrist strap should be in your…
An effective use of _______ means clearly stating a problem w…
Accomplished computer techs should treat anything said to the…
anti-static bag
Always place an expansion card or other computer part into a(…
anti-static
A few screwdrivers and an_____ wrist strap should be in your…
57 terms
Computer Applications Certification Exam
Modifier Keys
Editing Keys
undo icon
redo icon
Control and Shift
up down right left arrow keys
arrow shape that points left
faces right
Modifier Keys
Control and Shift
Editing Keys
up down right left arrow keys
45 terms
IC3 Certification: Computer Fundamentals
Input
Processing
Storage
Output
The data that is entered into a computer.
The manipulation of data by a microprocessor or embedded proc…
In computing, any device in which (or on which) information i…
The computer generated information that is displayed to the u…
Input
The data that is entered into a computer.
Processing
The manipulation of data by a microprocessor or embedded proc…
45 terms
Computer Hardware~IC3 Certification
Access time
Adapter card
Aspect ratio
Audio input
The average number of milliseconds (ms) it takes a computer t…
Like an expansion card, a circuit board that can be plugged i…
On a monitor, the ratio of the width to the height. (Mod1-145)
Sound entered into a computer, including speech, sound effect…
Access time
The average number of milliseconds (ms) it takes a computer t…
Adapter card
Like an expansion card, a circuit board that can be plugged i…
19 terms
Computer repair A+ Certification 2
Examples of Linux
Kernel
Shell
Thread
Redhead, UBUNTu
Kernel mode, Interacts with hardware
User mode, Interacts with Software
Each process CPU is aware of, SINGLE task that is part of lar…
Examples of Linux
Redhead, UBUNTu
Kernel
Kernel mode, Interacts with hardware
41 terms
Internet and Computing Core Certification
What is a Computer? (definition)
Hardware vs Software (difference and e…
Name the main parts of a computer.
What is CPU? (definition and acronym)
...
Hardware is a physical device, something that one is able to…
Motherboard - circuit board that houses the CPU and Memory... C…
A central processing unit (CPU) is the part within a computer…
What is a Computer? (definition)
...
Hardware vs Software (difference and e…
Hardware is a physical device, something that one is able to…
26 terms
Computer Maintenance 1stCertificate
A switch on a Ethernet network reduces…
Mesh~Best fault tolerance~
Which network topology offers the best…
The FE80 prefix identifies the address…
Collisions~Ethernet uses the carrier sense multiple access wi…
Offers the best fault tolerance because each host directly is…
Mesh
Link-local
A switch on a Ethernet network reduces…
Collisions~Ethernet uses the carrier sense multiple access wi…
Mesh~Best fault tolerance~
Offers the best fault tolerance because each host directly is…
13 terms
A+ Certification Chapter 13 Peripherals and Custom Computing
USB
USB 1.0
USB 1.1
USB 2.0
Universal Serial Bus ... Enables data transfer between the devic…
Low speed / 1.5 Mbps
Full speed / 12 Mbps / max 3 meters in length
High-speed / 480 Mbps / max 5 meters in length
USB
Universal Serial Bus ... Enables data transfer between the devic…
USB 1.0
Low speed / 1.5 Mbps
Computer Fundamentals - IC3 GS3 Certification Examination
CPU - Central Processing Unit
Client-Server Networks
Communication
Dial-Up
The _______________ is an integrated circuit chip (IC) that c…
A type of network in which a server directs the clients' requ…
Information transferred between user agents and servers on a…
A type of network connection in which data is passed through…
CPU - Central Processing Unit
The _______________ is an integrated circuit chip (IC) that c…
Client-Server Networks
A type of network in which a server directs the clients' requ…
30 terms
Computer Repair A+ Certification Chap 7.
RAM
SRAM
DRAM
DIMM
Random Access Memory; temporary memory. RAM is expandable, an…
Static Ram
Dynamic Ram
Dual Incline Memory Module; Sold today as memory modules in p…
RAM
Random Access Memory; temporary memory. RAM is expandable, an…
SRAM
Static Ram
A+ Certification Chapter 13 Peripherals and Custom Computing
USB
USB 1.0
USB 1.1
USB 2.0
Universal Serial Bus ... Enables data transfer between the devic…
Low speed / 1.5 Mbps
Full speed / 12 Mbps / max 3 meters in length
High-speed / 480 Mbps / max 5 meters in length
USB
Universal Serial Bus ... Enables data transfer between the devic…
USB 1.0
Low speed / 1.5 Mbps
98 terms
Computer Fundamentals - IC3 GS3 Certification Examination
CPU - Central Processing Unit
Client-Server Networks
Communication
Dial-Up
The _______________ is an integrated circuit chip (IC) that c…
A type of network in which a server directs the clients' requ…
Information transferred between user agents and servers on a…
A type of network connection in which data is passed through…
CPU - Central Processing Unit
The _______________ is an integrated circuit chip (IC) that c…
Client-Server Networks
A type of network in which a server directs the clients' requ…
40 terms
8.Computed Tomography Certification - Artifacts
which of the following affects the sev…
which of the following may occur if th…
a(n) __________ artifact can be create…
CT x-ray tube arcing can occur because…
all of the above
- beam hardening... - out- of -field artifact
capping, center... beam hardening algorithms attempt to correct…
- impurities in the oil outside ... - tungsten gas inside ... when…
which of the following affects the sev…
all of the above
which of the following may occur if th…
- beam hardening... - out- of -field artifact
Computer Fundamentals - IC3 GS3 Certification Examination
CPU - Central Processing Unit
Client-Server Networks
Communication
Dial-Up
The _______________ is an integrated circuit chip (IC) that c…
A type of network in which a server directs the clients' requ…
Information transferred between user agents and servers on a…
A type of network connection in which data is passed through…
CPU - Central Processing Unit
The _______________ is an integrated circuit chip (IC) that c…
Client-Server Networks
A type of network in which a server directs the clients' requ…
58 terms
Computers and Operating Systems~IC3 Certification
Account
Android
App
Application software
A collection of your applications, preferences, and other set…
An open-source operating system developed by Google and desig…
Short for "application"; a program. In Windows 8, an app is s…
System software that works in the background to manage hardwa…
Account
A collection of your applications, preferences, and other set…
Android
An open-source operating system developed by Google and desig…
98 terms
Computer Fundamentals - IC3 GS3 Certification Examination
CPU - Central Processing Unit
Client-Server Networks
Communication
Dial-Up
The _______________ is an integrated circuit chip (IC) that c…
A type of network in which a server directs the clients' requ…
Information transferred between user agents and servers on a…
A type of network connection in which data is passed through…
CPU - Central Processing Unit
The _______________ is an integrated circuit chip (IC) that c…
Client-Server Networks
A type of network in which a server directs the clients' requ…
IC3 Certification Pratice: Computing Fundamentals
What is the biggest advantage of using…
Game System
What are some features of a cellular p…
What does ROM stand for?
portability
Include an embedded computing chip that enables an individual…
Email, text messaging, paging
Read only memory
What is the biggest advantage of using…
portability
Game System
Include an embedded computing chip that enables an individual…
52 terms
IC3 Certification Pratice: Computing Fundamentals
What is the biggest advantage of using…
Game System
What are some features of a cellular p…
What does ROM stand for?
portability
Include an embedded computing chip that enables an individual…
Email, text messaging, paging
Read only memory
What is the biggest advantage of using…
portability
Game System
Include an embedded computing chip that enables an individual…
20 terms
IC3 Internet and Computing Core Certification Global Standard 4
Cyberbullying
censorship
Flaming
Spamming
Cyberbullying is bullying that takes place using electronic t…
blocks something from being read, heard, or seen. If you've e…
a hostile and insulting interaction between Internet users, o…
the use of electronic messaging systems to send unsolicited m…
Cyberbullying
Cyberbullying is bullying that takes place using electronic t…
censorship
blocks something from being read, heard, or seen. If you've e…
A+ Certification 220-901 220-902 Ch 3 (The Visible Computer)
Metro UI
Charms Bar
Spaces
Ubuntu default desktop enviornment
Introduced with Windows 8. The windows 8 user interface
Windows 8 feature not included in Windows 10
Mac OSx feature that is the same as using multiple desktops
Unity
Metro UI
Introduced with Windows 8. The windows 8 user interface
Charms Bar
Windows 8 feature not included in Windows 10
20 terms
IC3 Internet and Computing Core Certification Global Standard 4
Cyberbullying
censorship
Flaming
Spamming
Cyberbullying is bullying that takes place using electronic t…
blocks something from being read, heard, or seen. If you've e…
a hostile and insulting interaction between Internet users, o…
the use of electronic messaging systems to send unsolicited m…
Cyberbullying
Cyberbullying is bullying that takes place using electronic t…
censorship
blocks something from being read, heard, or seen. If you've e…
157 terms
Certification Exam/Chapter 1 (Computers and Office Equipment
It is not necessary to remove staples…
The difference between a calculator an…
The mailing machine part of the postag…
An advanced form of answering machine…
False
True
False
False
It is not necessary to remove staples…
False
The difference between a calculator an…
True
Internet and Computing Core Certification Guide Chapter 4
How can you access the Control Panel?
If you cannot access certain commands…
What determines the date and time sett…
Why might you want to change the forma…
-From the Start menu.... -From a file management tool such as Wi…
-You do not have access rights to these commands.
-A battery-operated clock inside the computer.
-To comply with company standards.... -To comply with country st…
How can you access the Control Panel?
-From the Start menu.... -From a file management tool such as Wi…
If you cannot access certain commands…
-You do not have access rights to these commands.
23 terms
7.Computed Tomography Certification - Anatomy Part 2
for a routine CT exam of the pelvis, w…
what is a typical start and end locati…
which of the following provides the be…
what is a reason for inserting a tampo…
no tilt is used
illiac crest through the symphysis pubis
window width = 2000, window level = 350... bone windows are to b…
helps visualize the vaginal canal
for a routine CT exam of the pelvis, w…
no tilt is used
what is a typical start and end locati…
illiac crest through the symphysis pubis
27 terms
6.Computed Tomography Certification - Anatomy - Part 1
which of the following types of contra…
in which of the following studies migh…
in order to generate a 3D shaded surfa…
which of the following is appropriate…
oral
soft tissue neck
image data
from the dorsum sella to the anterior aspect of the frontal s…
which of the following types of contra…
oral
in which of the following studies migh…
soft tissue neck
40 terms
3.Computed Tomography Certification - Image Quality
which of the following determinants of…
an increase in _________ will result i…
which of the following are possible re…
which of the following is FALSE about…
noise... when a CT image appears grainy or speckled it is referr…
all of them
- decreased sharpness of edges... - misleading CT numbers... parti…
- resolution is dependent on matrix size... - resolution is depe…
which of the following determinants of…
noise... when a CT image appears grainy or speckled it is referr…
an increase in _________ will result i…
all of them
52 terms
IC3 Certification Pratice: Computing Fundamentals to know
What is the biggest advantage of using…
Game System
What are some features of a cellular p…
What does ROM stand for?
portability
Include an embedded computing chip that enables an individual…
Email, text messaging, paging
Read only memory
What is the biggest advantage of using…
portability
Game System
Include an embedded computing chip that enables an individual…
39 terms
2.Computed Tomography Certification - CT Image Formation
_________ is the mathematical process…
MDCT capable of collecting 64 slices i…
the xray beam used in CT scanning is _…
a retrospective reconstruction, in whi…
filtered back projection... the most common mathematical process…
use filtered back projection as their method of image reconst…
attenuated by
CT raw data... a retrospective reconstruction always utilizes th…
_________ is the mathematical process…
filtered back projection... the most common mathematical process…
MDCT capable of collecting 64 slices i…
use filtered back projection as their method of image reconst…
50 terms
4.Computed Tomography Certification - Patient Handling and Safety
a blood urea nitrogen level of _______…
a 25 year old female is scheduled for…
to modify a standard CT protocol so th…
which of the following does NOT minimi…
32... normal range for BUN is 5-25mg/dl. a value greater than 30…
postpone the procedure until she is more certain of her condi…
- kVp... - mAs
decreasing the distance from the xray tube to the patient
a blood urea nitrogen level of _______…
32... normal range for BUN is 5-25mg/dl. a value greater than 30…
a 25 year old female is scheduled for…
postpone the procedure until she is more certain of her condi…
40 terms
1.Computed Tomography Certification - System Operation and Components
In order for an x-ray photon to be mea…
which system component converts the pr…
which of the following is NOT a functi…
which of the following is NOT a part o…
1. enter the detector chamber... 2. be absorbed by the detector…
analog-to-digital converter
reconstruction of the image from the raw data
collimator
In order for an x-ray photon to be mea…
1. enter the detector chamber... 2. be absorbed by the detector…
which system component converts the pr…
analog-to-digital converter
IC3 Certification Pratice: Computing Fundamentals
What is the biggest advantage of using…
Game System
What are some features of a cellular p…
What does ROM stand for?
portability
Include an embedded computing chip that enables an individual…
Email, text messaging, paging
Read only memory
What is the biggest advantage of using…
portability
Game System
Include an embedded computing chip that enables an individual…
33 terms
CompTIA A+ Certification Study Definitions (Letter "A" Computer Term Definitions)
A/V
AC voltage
accelerometer
access point
(AudioVideo) A combination of sound (audio)... and graphics (vid…
Alternating current used by commercial... power to transmit elec…
A chip in many mobile devices used to... detect the orientation…
Same as wireless access point.
A/V
(AudioVideo) A combination of sound (audio)... and graphics (vid…
AC voltage
Alternating current used by commercial... power to transmit elec…
22 terms
Ace certificate exam study questions and answers for computer forensic
Question 1... FTK Imager allows a user t…
Question 2... Which item is NOT containe…
Question 3... In which FTK Overview tab…
Question 4... What type of evidence can…
Correct Answer: SMART
Correct Answer: Cluster Count
Correct Answer: Documents container
Correct Answer: contents of a folder
Question 1... FTK Imager allows a user t…
Correct Answer: SMART
Question 2... Which item is NOT containe…
Correct Answer: Cluster Count
579 terms
CEH
hping2 -0
hping2 -1
hping2 -2
AES, IDEA, 3DES and DES are all
raw
ICMP
UDP
symmetric block ciphers
hping2 -0
raw
hping2 -1
ICMP
Protecting Human Research Participants Certificate - Computer Apps in Public Health
A study proposing to involve pregnant…
A "systematic investigation designed t…
45 CFR 46 requires Federal Departments…
What are the three ethical principles…
The requirements of Subparts A, B, C, and D are met.
Evaluation... Research Development... Testing
False
Respect for Persons, Beneficence, Justice
A study proposing to involve pregnant…
The requirements of Subparts A, B, C, and D are met.
A "systematic investigation designed t…
Evaluation... Research Development... Testing
31 terms
Protecting Human Research Participants Certificate - Computer Apps in Public Health
A study proposing to involve pregnant…
A "systematic investigation designed t…
45 CFR 46 requires Federal Departments…
What are the three ethical principles…
The requirements of Subparts A, B, C, and D are met.
Evaluation... Research Development... Testing
False
Respect for Persons, Beneficence, Justice
A study proposing to involve pregnant…
The requirements of Subparts A, B, C, and D are met.
A "systematic investigation designed t…
Evaluation... Research Development... Testing
45 terms
CEH
"Layers of hacking" -> OSI
5 Stages of Attack
Type and groups of hackers
Information security CIA triad
1. Recon... 2. Scanning and Enumeration... 3. Gaining Access... 4. Mai…
• White hat hackers: good guys, ethical hackers... • Black hat h…
• Confidentiality... • Information theft... • Integrity... • Unautho…
"Layers of hacking" -> OSI
5 Stages of Attack
1. Recon... 2. Scanning and Enumeration... 3. Gaining Access... 4. Mai…
40 terms
5.Computed Tomography Certification - IV Procedures & Contrast Agents
what should be done if extravasation i…
which of the following is the order in…
which of the following oral contrast a…
the definition of osmolality is the __…
stop the injection immediately
bolus phase, non-equilibrium phase, equilibrium phase
barium sulfate
osmolality is the concentration of molecular particles in the…
what should be done if extravasation i…
stop the injection immediately
which of the following is the order in…
bolus phase, non-equilibrium phase, equilibrium phase
CEH Study Guide Chapter 3
Define scanning?
What are three types of scanning?
Port numbers are divided into what thr…
F T P uses what port number?
Process of locating systems that are alive and responding on…
Port scanning: determines open ports and services... Network sc…
Well-known ports: 0-1023... Registered ports: 1024-49151... Dynam…
21
Define scanning?
Process of locating systems that are alive and responding on…
What are three types of scanning?
Port scanning: determines open ports and services... Network sc…
CEH Study Guide Chapter 10
What layers of the OSI model do 802.11…
What are the three types of 802.11 fra…
Describe 802.11 IEEE Standard>
Describe 802.11a IEEE Standard>
Layer 1 and 2
1.Management: used for notification, connection, disconnectio…
2.4GHz - up to 2Mbps - range depends on spread spectrum type
5 Ghz - up to 54Mbps - 25-75 foot range
What layers of the OSI model do 802.11…
Layer 1 and 2
What are the three types of 802.11 fra…
1.Management: used for notification, connection, disconnectio…
CEH Study Guide Chapter 8
What are the most common types of vuln…
What is meant by website cloaking?
What is BlackWidow and what does it do?
What is the first step in attacking a…
-Misconfiguration of the Web Server software... -OS or applicat…
ability of a web server to display different types of web pag…
program used to copy all the files for a target web site.
banner grabbing: attempt to gather information about a web se…
What are the most common types of vuln…
-Misconfiguration of the Web Server software... -OS or applicat…
What is meant by website cloaking?
ability of a web server to display different types of web pag…
240 terms
CEH
Daisy Chaining
Level of security triangle
5 Stages of Attack
Black-box testing
Hackers who get away with database theft usually complete the…
Functionality... Security... Usability
1. Recon... 2. Scanning and Enumeration... 3. Gaining Access... 4. Mai…
1. Most expensive and time-consuming... 2. focuses only external…
Daisy Chaining
Hackers who get away with database theft usually complete the…
Level of security triangle
Functionality... Security... Usability
53 terms
CEH- Ports
PORT 102
PORT 1026
PORT 1080
PORT 1090
X.400. Port is used by default by Microsoft Exchange Server M…
CAP (Novell and Microsoft) Port is used by Novell GroupWise f…
SOCKS/Online Chat/Hotmail: Port used primarily by instant mes…
RealAudio port; used by Real Audio for streaming audio and vi…
PORT 102
X.400. Port is used by default by Microsoft Exchange Server M…
PORT 1026
CAP (Novell and Microsoft) Port is used by Novell GroupWise f…
CEH Study Guide Chapter 1
Hackers can be divided into three grou…
Another name for a "cracker" is:
Ethical hackers are usually security p…
The process of testing the security of…
White Hat: Good guys, ethical hackers... Black Hat: Bad guys, ma…
malicious hacker
use their hacking skills for defensive and protective purposes.
Penetration testing or pen test
Hackers can be divided into three grou…
White Hat: Good guys, ethical hackers... Black Hat: Bad guys, ma…
Another name for a "cracker" is:
malicious hacker
161 terms
CEH
Maltego
EDGAR database
Business Wire
LexisNexus
footprinting tool that can be used to determine the relations…
Date of company formation
Who runs a company
The geographical location
Maltego
footprinting tool that can be used to determine the relations…
EDGAR database
Date of company formation
1 of 10