How can we help?

You can also find more resources in our Help Center.

Study sets matching "computer certification ceh"

Study sets
Classes
Users

Study sets matching "computer certification ceh"

10 terms
CEH (Certified Ethical Hacker) Certification Questions
Hacker is a person who illegally break…
In order to compromise or to hack a sy…
Defense-in-depth is a security strateg…
Penetration testing is a method of act…
Individuals with extraordinary computing skills, resorting to…
Reconnaissance
True
Black Box pen testing
Hacker is a person who illegally break…
Individuals with extraordinary computing skills, resorting to…
In order to compromise or to hack a sy…
Reconnaissance
26 terms
Computers and Certification
computer service and repair field
Computer salespeople
Corporate trainers
IT consultant
(Preventive maintenance... Component installation... Repair service…
possess a general understanding of computers and a specific k…
teach employees how to use software, design and develop syste…
provides computer services to his or her clients
computer service and repair field
(Preventive maintenance... Component installation... Repair service…
Computer salespeople
possess a general understanding of computers and a specific k…
6 terms
computer science teaching certification
selection sort
bubble sort
insertion sort
merge sort
nested loop to select the best value for a position
nested loop to compare with neighboring elements
nested loop to insert each element into its proper position
divide and conquer recursive approach
selection sort
nested loop to select the best value for a position
bubble sort
nested loop to compare with neighboring elements
22 terms
computer careers and certification - 15
-general business and government organ…
IT department
-management... -system development and pr…
management
job opportunities in computer industry generally available in…
employees who work together as a team to meet info requiremen…
jobs listed in general business and gov't organizations and t…
IT dept jobs: ... chief info officer (CIO)/chief tech officer (C…
-general business and government organ…
job opportunities in computer industry generally available in…
IT department
employees who work together as a team to meet info requiremen…
57 terms
Computer Applications Certification Exam
Modifier Keys
Editing Keys
undo icon
redo icon
Control and Shift
up down right left arrow keys
arrow shape that points left
faces right
Modifier Keys
Control and Shift
Editing Keys
up down right left arrow keys
45 terms
Computer Hardware~IC3 Certification
Access time
Adapter card
Aspect ratio
Audio input
The average number of milliseconds (ms) it takes a computer t…
Like an expansion card, a circuit board that can be plugged i…
On a monitor, the ratio of the width to the height. (Mod1-145)
Sound entered into a computer, including speech, sound effect…
Access time
The average number of milliseconds (ms) it takes a computer t…
Adapter card
Like an expansion card, a circuit board that can be plugged i…
45 terms
IC3 Certification: Computer Fundamentals
Input
Processing
Storage
Output
The data that is entered into a computer.
The manipulation of data by a microprocessor or embedded proc…
In computing, any device in which (or on which) information i…
The computer generated information that is displayed to the u…
Input
The data that is entered into a computer.
Processing
The manipulation of data by a microprocessor or embedded proc…
20 terms
Computer Certification Ch 2&3
anti-static bag
anti-static
assertive communication
integrity
Always place an expansion card or other computer part into a(…
A few screwdrivers and an_____ wrist strap should be in your…
An effective use of _______ means clearly stating a problem w…
Accomplished computer techs should treat anything said to the…
anti-static bag
Always place an expansion card or other computer part into a(…
anti-static
A few screwdrivers and an_____ wrist strap should be in your…
26 terms
Computer Maintenance 1stCertificate
A switch on a Ethernet network reduces…
Mesh~Best fault tolerance~
Which network topology offers the best…
The FE80 prefix identifies the address…
Collisions~Ethernet uses the carrier sense multiple access wi…
Offers the best fault tolerance because each host directly is…
Mesh
Link-local
A switch on a Ethernet network reduces…
Collisions~Ethernet uses the carrier sense multiple access wi…
Mesh~Best fault tolerance~
Offers the best fault tolerance because each host directly is…
19 terms
Computer repair A+ Certification 2
Examples of Linux
Kernel
Shell
Thread
Redhead, UBUNTu
Kernel mode, Interacts with hardware
User mode, Interacts with Software
Each process CPU is aware of, SINGLE task that is part of lar…
Examples of Linux
Redhead, UBUNTu
Kernel
Kernel mode, Interacts with hardware
98 terms
Computer Fundamentals - IC3 GS3 Certification Examination
CPU - Central Processing Unit
Client-Server Networks
Communication
Dial-Up
The _______________ is an integrated circuit chip (IC) that c…
A type of network in which a server directs the clients' requ…
Information transferred between user agents and servers on a…
A type of network connection in which data is passed through…
CPU - Central Processing Unit
The _______________ is an integrated circuit chip (IC) that c…
Client-Server Networks
A type of network in which a server directs the clients' requ…
13 terms
A+ Certification Chapter 13 Peripherals and Custom Computing
USB
USB 1.0
USB 1.1
USB 2.0
Universal Serial Bus ... Enables data transfer between the devic…
Low speed / 1.5 Mbps
Full speed / 12 Mbps / max 3 meters in length
High-speed / 480 Mbps / max 5 meters in length
USB
Universal Serial Bus ... Enables data transfer between the devic…
USB 1.0
Low speed / 1.5 Mbps
98 terms
Computer Fundamentals - IC3 GS3 Certification Examination
CPU - Central Processing Unit
Client-Server Networks
Communication
Dial-Up
The _______________ is an integrated circuit chip (IC) that c…
A type of network in which a server directs the clients' requ…
Information transferred between user agents and servers on a…
A type of network connection in which data is passed through…
CPU - Central Processing Unit
The _______________ is an integrated circuit chip (IC) that c…
Client-Server Networks
A type of network in which a server directs the clients' requ…
40 terms
8.Computed Tomography Certification - Artifacts
which of the following affects the sev…
which of the following may occur if th…
a(n) __________ artifact can be create…
CT x-ray tube arcing can occur because…
all of the above
- beam hardening... - out- of -field artifact
capping, center... beam hardening algorithms attempt to correct…
- impurities in the oil outside ... - tungsten gas inside ... when…
which of the following affects the sev…
all of the above
which of the following may occur if th…
- beam hardening... - out- of -field artifact
30 terms
Computer Repair A+ Certification Chap 7.
RAM
SRAM
DRAM
DIMM
Random Access Memory; temporary memory. RAM is expandable, an…
Static Ram
Dynamic Ram
Dual Incline Memory Module; Sold today as memory modules in p…
RAM
Random Access Memory; temporary memory. RAM is expandable, an…
SRAM
Static Ram
58 terms
Computers and Operating Systems~IC3 Certification
Account
Android
App
Application software
A collection of your applications, preferences, and other set…
An open-source operating system developed by Google and desig…
Short for "application"; a program. In Windows 8, an app is s…
System software that works in the background to manage hardwa…
Account
A collection of your applications, preferences, and other set…
Android
An open-source operating system developed by Google and desig…
98 terms
Computer Fundamentals - IC3 GS3 Certification Examination
CPU - Central Processing Unit
Client-Server Networks
Communication
Dial-Up
The _______________ is an integrated circuit chip (IC) that c…
A type of network in which a server directs the clients' requ…
Information transferred between user agents and servers on a…
A type of network connection in which data is passed through…
CPU - Central Processing Unit
The _______________ is an integrated circuit chip (IC) that c…
Client-Server Networks
A type of network in which a server directs the clients' requ…
52 terms
IC3 Certification Pratice: Computing Fundamentals
What is the biggest advantage of using…
Game System
What are some features of a cellular p…
What does ROM stand for?
portability
Include an embedded computing chip that enables an individual…
Email, text messaging, paging
Read only memory
What is the biggest advantage of using…
portability
Game System
Include an embedded computing chip that enables an individual…
52 terms
IC3 Certification Pratice: Computing Fundamentals
What is the biggest advantage of using…
Game System
What are some features of a cellular p…
What does ROM stand for?
portability
Include an embedded computing chip that enables an individual…
Email, text messaging, paging
Read only memory
What is the biggest advantage of using…
portability
Game System
Include an embedded computing chip that enables an individual…
20 terms
IC3 Internet and Computing Core Certification Global Standard 4
Cyberbullying
censorship
Flaming
Spamming
Cyberbullying is bullying that takes place using electronic t…
blocks something from being read, heard, or seen. If you've e…
a hostile and insulting interaction between Internet users, o…
the use of electronic messaging systems to send unsolicited m…
Cyberbullying
Cyberbullying is bullying that takes place using electronic t…
censorship
blocks something from being read, heard, or seen. If you've e…
8 terms
Internet and Computing Core Certification Guide Chapter 4
How can you access the Control Panel?
If you cannot access certain commands…
What determines the date and time sett…
Why might you want to change the forma…
-From the Start menu.... -From a file management tool such as Wi…
-You do not have access rights to these commands.
-A battery-operated clock inside the computer.
-To comply with company standards.... -To comply with country st…
How can you access the Control Panel?
-From the Start menu.... -From a file management tool such as Wi…
If you cannot access certain commands…
-You do not have access rights to these commands.
20 terms
IC3 Internet and Computing Core Certification Global Standard 4
Cyberbullying
censorship
Flaming
Spamming
Cyberbullying is bullying that takes place using electronic t…
blocks something from being read, heard, or seen. If you've e…
a hostile and insulting interaction between Internet users, o…
the use of electronic messaging systems to send unsolicited m…
Cyberbullying
Cyberbullying is bullying that takes place using electronic t…
censorship
blocks something from being read, heard, or seen. If you've e…
157 terms
Certification Exam/Chapter 1 (Computers and Office Equipment
It is not necessary to remove staples…
The difference between a calculator an…
The mailing machine part of the postag…
An advanced form of answering machine…
False
True
False
False
It is not necessary to remove staples…
False
The difference between a calculator an…
True
39 terms
2.Computed Tomography Certification - CT Image Formation
_________ is the mathematical process…
MDCT capable of collecting 64 slices i…
the xray beam used in CT scanning is _…
a retrospective reconstruction, in whi…
filtered back projection... the most common mathematical process…
use filtered back projection as their method of image reconst…
attenuated by
CT raw data... a retrospective reconstruction always utilizes th…
_________ is the mathematical process…
filtered back projection... the most common mathematical process…
MDCT capable of collecting 64 slices i…
use filtered back projection as their method of image reconst…
50 terms
4.Computed Tomography Certification - Patient Handling and Safety
a blood urea nitrogen level of _______…
a 25 year old female is scheduled for…
to modify a standard CT protocol so th…
which of the following does NOT minimi…
32... normal range for BUN is 5-25mg/dl. a value greater than 30…
postpone the procedure until she is more certain of her condi…
- kVp... - mAs
decreasing the distance from the xray tube to the patient
a blood urea nitrogen level of _______…
32... normal range for BUN is 5-25mg/dl. a value greater than 30…
a 25 year old female is scheduled for…
postpone the procedure until she is more certain of her condi…
23 terms
7.Computed Tomography Certification - Anatomy Part 2
for a routine CT exam of the pelvis, w…
what is a typical start and end locati…
which of the following provides the be…
what is a reason for inserting a tampo…
no tilt is used
illiac crest through the symphysis pubis
window width = 2000, window level = 350... bone windows are to b…
helps visualize the vaginal canal
for a routine CT exam of the pelvis, w…
no tilt is used
what is a typical start and end locati…
illiac crest through the symphysis pubis
27 terms
6.Computed Tomography Certification - Anatomy - Part 1
which of the following types of contra…
in which of the following studies migh…
in order to generate a 3D shaded surfa…
which of the following is appropriate…
oral
soft tissue neck
image data
from the dorsum sella to the anterior aspect of the frontal s…
which of the following types of contra…
oral
in which of the following studies migh…
soft tissue neck
52 terms
IC3 Certification Pratice: Computing Fundamentals
What is the biggest advantage of using…
Game System
What are some features of a cellular p…
What does ROM stand for?
portability
Include an embedded computing chip that enables an individual…
Email, text messaging, paging
Read only memory
What is the biggest advantage of using…
portability
Game System
Include an embedded computing chip that enables an individual…
40 terms
3.Computed Tomography Certification - Image Quality
which of the following determinants of…
an increase in _________ will result i…
which of the following are possible re…
which of the following is FALSE about…
noise... when a CT image appears grainy or speckled it is referr…
all of them
- decreased sharpness of edges... - misleading CT numbers... parti…
- resolution is dependent on matrix size... - resolution is depe…
which of the following determinants of…
noise... when a CT image appears grainy or speckled it is referr…
an increase in _________ will result i…
all of them
52 terms
IC3 Certification Pratice: Computing Fundamentals to know
What is the biggest advantage of using…
Game System
What are some features of a cellular p…
What does ROM stand for?
portability
Include an embedded computing chip that enables an individual…
Email, text messaging, paging
Read only memory
What is the biggest advantage of using…
portability
Game System
Include an embedded computing chip that enables an individual…
40 terms
1.Computed Tomography Certification - System Operation and Components
In order for an x-ray photon to be mea…
which system component converts the pr…
which of the following is NOT a functi…
which of the following is NOT a part o…
1. enter the detector chamber... 2. be absorbed by the detector…
analog-to-digital converter
reconstruction of the image from the raw data
collimator
In order for an x-ray photon to be mea…
1. enter the detector chamber... 2. be absorbed by the detector…
which system component converts the pr…
analog-to-digital converter
8 terms
A+ Certification 220-901 220-902 Ch 3 (The Visible Computer)
Metro UI
Charms Bar
Spaces
Ubuntu default desktop enviornment
Introduced with Windows 8. The windows 8 user interface
Windows 8 feature not included in Windows 10
Mac OSx feature that is the same as using multiple desktops
Unity
Metro UI
Introduced with Windows 8. The windows 8 user interface
Charms Bar
Windows 8 feature not included in Windows 10
33 terms
CompTIA A+ Certification Study Definitions (Letter "A" Computer Term Definitions)
A/V
AC voltage
accelerometer
access point
(AudioVideo) A combination of sound (audio)... and graphics (vid…
Alternating current used by commercial... power to transmit elec…
A chip in many mobile devices used to... detect the orientation…
Same as wireless access point.
A/V
(AudioVideo) A combination of sound (audio)... and graphics (vid…
AC voltage
Alternating current used by commercial... power to transmit elec…
22 terms
Ace certificate exam study questions and answers for computer forensic
Question 1... FTK Imager allows a user t…
Question 2... Which item is NOT containe…
Question 3... In which FTK Overview tab…
Question 4... What type of evidence can…
Correct Answer: SMART
Correct Answer: Cluster Count
Correct Answer: Documents container
Correct Answer: contents of a folder
Question 1... FTK Imager allows a user t…
Correct Answer: SMART
Question 2... Which item is NOT containe…
Correct Answer: Cluster Count
31 terms
Protecting Human Research Participants Certificate - Computer Apps in Public Health
A study proposing to involve pregnant…
A "systematic investigation designed t…
45 CFR 46 requires Federal Departments…
What are the three ethical principles…
The requirements of Subparts A, B, C, and D are met.
Evaluation... Research Development... Testing
False
Respect for Persons, Beneficence, Justice
A study proposing to involve pregnant…
The requirements of Subparts A, B, C, and D are met.
A "systematic investigation designed t…
Evaluation... Research Development... Testing
31 terms
Protecting Human Research Participants Certificate - Computer Apps in Public Health
A study proposing to involve pregnant…
A "systematic investigation designed t…
45 CFR 46 requires Federal Departments…
What are the three ethical principles…
The requirements of Subparts A, B, C, and D are met.
Evaluation... Research Development... Testing
False
Respect for Persons, Beneficence, Justice
A study proposing to involve pregnant…
The requirements of Subparts A, B, C, and D are met.
A "systematic investigation designed t…
Evaluation... Research Development... Testing
40 terms
5.Computed Tomography Certification - IV Procedures & Contrast Agents
what should be done if extravasation i…
which of the following is the order in…
which of the following oral contrast a…
the definition of osmolality is the __…
stop the injection immediately
bolus phase, non-equilibrium phase, equilibrium phase
barium sulfate
osmolality is the concentration of molecular particles in the…
what should be done if extravasation i…
stop the injection immediately
which of the following is the order in…
bolus phase, non-equilibrium phase, equilibrium phase
579 terms
CEH
hping2 -0
hping2 -1
hping2 -2
AES, IDEA, 3DES and DES are all
raw
ICMP
UDP
symmetric block ciphers
hping2 -0
raw
hping2 -1
ICMP
55 terms
CEH Study Guide Chapter 3
Define scanning?
What are three types of scanning?
Port numbers are divided into what thr…
F T P uses what port number?
Process of locating systems that are alive and responding on…
Port scanning: determines open ports and services... Network sc…
Well-known ports: 0-1023... Registered ports: 1024-49151... Dynam…
21
Define scanning?
Process of locating systems that are alive and responding on…
What are three types of scanning?
Port scanning: determines open ports and services... Network sc…
23 terms
CEH Study Guide Chapter 10
What layers of the OSI model do 802.11…
What are the three types of 802.11 fra…
Describe 802.11 IEEE Standard>
Describe 802.11a IEEE Standard>
Layer 1 and 2
1.Management: used for notification, connection, disconnectio…
2.4GHz - up to 2Mbps - range depends on spread spectrum type
5 Ghz - up to 54Mbps - 25-75 foot range
What layers of the OSI model do 802.11…
Layer 1 and 2
What are the three types of 802.11 fra…
1.Management: used for notification, connection, disconnectio…
33 terms
CEH Study Guide Chapter 8
What are the most common types of vuln…
What is meant by website cloaking?
What is BlackWidow and what does it do?
What is the first step in attacking a…
-Misconfiguration of the Web Server software... -OS or applicat…
ability of a web server to display different types of web pag…
program used to copy all the files for a target web site.
banner grabbing: attempt to gather information about a web se…
What are the most common types of vuln…
-Misconfiguration of the Web Server software... -OS or applicat…
What is meant by website cloaking?
ability of a web server to display different types of web pag…
240 terms
CEH
Daisy Chaining
Level of security triangle
5 Stages of Attack
Black-box testing
Hackers who get away with database theft usually complete the…
Functionality... Security... Usability
1. Recon... 2. Scanning and Enumeration... 3. Gaining Access... 4. Mai…
1. Most expensive and time-consuming... 2. focuses only external…
Daisy Chaining
Hackers who get away with database theft usually complete the…
Level of security triangle
Functionality... Security... Usability
49 terms
CEH Study Guide Chapter 1
Hackers can be divided into three grou…
Another name for a "cracker" is:
Ethical hackers are usually security p…
The process of testing the security of…
White Hat: Good guys, ethical hackers... Black Hat: Bad guys, ma…
malicious hacker
use their hacking skills for defensive and protective purposes.
Penetration testing or pen test
Hackers can be divided into three grou…
White Hat: Good guys, ethical hackers... Black Hat: Bad guys, ma…
Another name for a "cracker" is:
malicious hacker
64 terms
CEH - Tools
Snort
Dsniff
Nikto
John the Ripper
Snort is a free and open source network intrusion prevention…
Dsniff is a set of password sniffing and network traffic anal…
Nikto is an Open Source (GPL) web server scanner which perfor…
John the Ripper is a free open source password cracking softw…
Snort
Snort is a free and open source network intrusion prevention…
Dsniff
Dsniff is a set of password sniffing and network traffic anal…
30 terms
CEH Study Guide Chapter 2
Reconnaissance
Competitive Intelligence
Passive tools used in recon
What is the EDGAR database
applies to the process of information gathering.
gathering information about competitor's products, markets, a…
SpyFu and Keyword Spy
Database of all S E C filings for public companies; can be us…
Reconnaissance
applies to the process of information gathering.
Competitive Intelligence
gathering information about competitor's products, markets, a…
161 terms
CEH
Maltego
EDGAR database
Business Wire
LexisNexus
footprinting tool that can be used to determine the relations…
Date of company formation
Who runs a company
The geographical location
Maltego
footprinting tool that can be used to determine the relations…
EDGAR database
Date of company formation
55 terms
FLASH CS6 Certification Exam Review
When you have the paint brush active a…
Benefits of having consistency in a pr…
What does an Empty Keyframe symbol loo…
A Vector graphic is ...
The brush will paint the fill of the active object on the sta…
Improves usability, allows easier maintenance, makes for shor…
vertical rectangle with an open circle at the bottom
Resolution independent or scaled to any size and printed on a…
When you have the paint brush active a…
The brush will paint the fill of the active object on the sta…
Benefits of having consistency in a pr…
Improves usability, allows easier maintenance, makes for shor…
46 terms
CompTIA A+ Certification: Expansion Bus
expansion slots
expansion bus
expansion bus crystal
AT bus
used to add expansion cards (and functionality) to the PC
slots, wires and support chips
controls expansion bus speed
legacy 16-bit external data bus
expansion slots
used to add expansion cards (and functionality) to the PC
expansion bus
slots, wires and support chips
32 terms
A+ Certification
What do you call the commands that tel…
what is the essential tool for compute…
where do you connect an antic static w…
what sort of connector does a typical…
Programming
Phillips head screwdriver
to a handy metal part of the case
RJ45
What do you call the commands that tel…
Programming
what is the essential tool for compute…
Phillips head screwdriver
143 terms
CEH dump
Covert channels
Attaching itself to the master boot re…
Explain that you cannot eliminate all…
Display passwd contents to prompt
Which of the layered approaches to security hides data in ICM…
How can a rootkit bypass Windows 7 operating system's kernel…
You are doing a pentest against an organization that has just…
What is this Shellshock bash vulnerability attempting to do o…
Covert channels
Which of the layered approaches to security hides data in ICM…
Attaching itself to the master boot re…
How can a rootkit bypass Windows 7 operating system's kernel…
1 of 10