A-L Flashcards
IT Support Certificate glossary A-L
404 Not Found:
404 Not Found: An error message you might see on websites that have been moved or deleted
802.1X:
802.1X: It is the IEEE standard for encapsulating EAP or Extensible Authentication Protocol traffic over the 802 networks
802.1X with EAP-TLS:
802.1X with EAP-TLS: Offers arguably the best security available, assuming proper and secure handling of the PKI aspects of it
AAA (authentication, authorization, accounting):
AAA (authentication, authorization, accounting): The services that the directory services provide to all the computers within a company or organization
Abstraction:
Abstraction: To take a relatively complex system and simplify it for our use
Absolute path:
Absolute path: It is one that starts from the main directory
Access Control Entries:
Access Control Entries: The individual access permissions per object that make up the ACL
Access Control List (ACL):
Access Control List (ACL): It is a way of defining permissions or authorizations for objects
Accounting:
Accounting: Keeping records of what resources and services your users access or what they did when they were using your systems
ACI:
ACI: Access Control Lists
ACK flag:
ACK flag: One of the TCP control flags. ACK is short for acknowledge. A value of one in this field means that the acknowledgment number field should be examined
Acknowledgement number:
Acknowledgement number: The number of the next expected segment in a TCP sequence
Activation threshold:
Activation threshold: Triggers a pre-configured action when it is reached and will typically block the identified attack traffic for a specific amount of time
Active directory (AD):
Active directory (AD): The Microsoft alternative to directory services that offers customization and added features for the Windows platform
Active directory users and computers (ADUC):
Active directory users and computers (ADUC): The client tools that are used for accessing and administering a directory server
Address bus:
Address bus: Connects the CPU to the MCC and sends over the location of the data, but not the data itself
Address class system:
Address class system: A system which defines how the global IP address space is split up
Address Resolution Protocol (ARP):
Address Resolution Protocol (ARP): A protocol used to discover the hardware address of a node with a certain IP address
Ad-Hoc network:
Ad-Hoc network: A network configuration without supporting network infrastructure. Every device involved with the ad-hoc network communicates with every other device within range, and all nodes help pass along messages
Administrator:
Administrator: A user that has complete control over a machine
Advanced Encryption Standard (AES):
Advanced Encryption Standard (AES): The first and only public cipher that’s approved for use with top secret information by the United States National Security Agency
Advanced group policy management (AGPM):
Advanced group policy management (AGPM): A set of add-on tools from Microsoft that gives some added provision control abilities in GPMC
Adware:
Adware: Software that displays advertisements and collects data
Algorithm:
Algorithm: A series of steps that solves specific problems
Alias:
Alias: A nickname for common commands
Analyzing logs:
Analyzing logs: The practice of collecting logs from different network and sometimes client devices on your network, then performing an automated analysis on them
Android
Android: A mobile operating system based on Linux
Antivirus software:
Antivirus software: It monitors and analyze things like new files being created or being modified on the system in order to watch for any behavior that matches a known malware signature
Anycast:
Anycast: A technique that’s used to route traffic to different destinations depending on factors like location, congestion, or link health
Appending flags:
Appending flags: A way to add the data of the file without erasing existing data
Application:
Application: A computer program designed for a specific use
Application layer:
Application layer: The layer that allows network applications to communicate in a way they understand
Application layer payload:
Application layer payload: The entire contents of whatever data applications want to send to each other
Application policies:
Application policies: Defines boundaries of what applications are permitted or not, but they also help educate folks on how to use software more securely
Application software:
Application software: Any software created to fulfill a specific need, like a text editor, web browser, or graphics editor
App store apps:
App store apps: A Package Manager that acts as a repository
App store repository:
App store repository: A app store service that also acts as a repository
App stores:
App stores: A central managed marketplace for app developers to publish and sell mobile apps
APPX:
APPX: An APPX is another way to package contents of a file to act like a unit of distribution
Archive:
Archive: An archive is comprised of one or more files that are compressed into a single file” for verb agreement
A record:
A record: The most common resource record, used to point a certain domain name at a certain IPv4 IP address
ARPANET:
ARPANET: The earliest version of the Internet that we see today, created by the US government project DARPA in the 1960s
ARP table:
ARP table: A list of IP addresses and the MAC addresses associated with them
ASCII:
ASCII: The oldest character encoding standard used is ASCII. It represents the English alphabet, digits, and punctuation marks
ASN:
ASN: Autonomous System Number is a number assigned to an individual autonomous system
Assembly language:
Assembly language: A language that allowed computer scientists to use human readable instructions, assembled into code that the machines could understand
Asymmetric Digital Subscriber Line (ADSL):
Asymmetric Digital Subscriber Line (ADSL): A device that establishes data connections across phone lines and different speeds for uploading and downloading data
Asymmetric encryption:
Asymmetric encryption: Systems where different keys are used to encrypt and decrypt
ATA:
ATA: The most common interface that hard drives use to connect to our system
Attack:
Attack: An actual attempt at causing harm to a system
Attack surface:
Attack surface: It’s the sum of all the different attack vectors in a given system
Attack vector:
Attack vector: Method or mechanism by which an attacker or malware gains access to a network or system
ATX (Advanced Technology eXtended):
ATX (Advanced Technology eXtended): The most common form factor for motherboards
Auditing:
Auditing: It involves reviewing records to ensure that nothing is out of the ordinary
Authentication:
Authentication: A crucial application for cryptographic hash functions
Authentication server (AS):
Authentication server (AS): It includes the user ID of the authenticating user
Authorization:
Authorization: It pertains to describing what the user account has access to or doesn’t have access to
Automatic allocation:
Automatic allocation: A range of IP addresses is set aside for assignment purposes
Automation:
Automation: It makes processes work automatically
Autoscaling:
Autoscaling: A system that allows the service to increase or reduce capacity as needed, while the service owner only pays for the cost of the machines that are in use at any given time
Availability:
Availability: Means that the information we have is readily accessible to those people that should have it
Backdoor:
Backdoor: A way to get into a system if the other methods to get in a system aren’t allowed, it’s a secret entryway for attackers
Background processes/Daemon processes:
Background processes/Daemon processes: Processes that run or take place in the background
Backup and restore:
Backup and restore: A Microsoft offer and first party solution that has modes of operation, as a file based version where files are backed up to a zip archive
Backward compatible:
Backward compatible: It means older hardware works with newer hardware
Baiting:
Baiting: An attack that happens through actual physical contact, enticing a victim to do something
Bash:
Bash: The language used to interact with the shell
Bastion hosts or networks:
Bastion hosts or networks: A server used to provide access to a private network from an external network
Baud rate:
Baud rate: A measurement of how many bits could be passed across a phone line in a second
Binary system:
Binary system: The communication that a computer uses is referred to as binary system, also known as base-2 numeral system
Binary whitelisting software:
Binary whitelisting software: It’s a list of known good and trusted software and only things that are on the list are permitted to run
Bind:
Bind: It is how clients authenticate to the server
Bind operation:
Bind operation: The operation which authenticates clients to the directory server
Biometric authentication:
Biometric authentication: Authentication that uses Biometric data
Biometric data:
Biometric data: A way of protecting your accounts and information using biometric data such as facial recognition and fingerprint
BIOS/UEFI:
BIOS/UEFI: A low-level software that initializes our computer’s hardware to make sure everything is good to go
Bios (Basic Input Output Services):
Bios (Basic Input Output Services): The BIOS is software that helps initialize the hardware in our computer and gets our operating system up and running
Bit:
Bit: The smallest representation of data that a computer can understand
Block ciphers:
Block ciphers: The cipher takes data in, places that into a bucket or block of data that’s a fixed size, then encodes that entire block as one unit
Block devices:
Block devices: A system that acts like USB drives and hard drive by transmitting data
Block storage:
Block storage: It improves faster handling of data because the data isn’t stored in one long piece but in blocks, so it can be accessed more quickly
Bluetooth:
Bluetooth: The most common short range wireless network
Boot:
Boot: To start up a computer
Bootloader:
Bootloader: A small program that loads the operating system
Border Gateway Protocol (BGP):
Border Gateway Protocol (BGP): A protocol by which routers share data with each other
Botnet:
Botnet: A collection of one or more Bots
Bots:
Bots: Machines compromised by malware that are utilized to perform tasks centrally controlled by an attacker
Broadband:
Broadband: Any connectivity technology that isn’t dial-up Internet
Broadcast:
Broadcast: A type of Ethernet transmission, sent to every single device on a LAN
Broadcast address:
Broadcast address: A special destination used by an Ethernet broadcast composed by all Fs
Browser:
Browser: A user interface for displaying and interacting with web pages
Brute force attacks:
Brute force attacks: A common password attack which consists of just continuously trying different combinations of characters and letters until one gets access
BYOD (Bring Your Own Device):
BYOD (Bring Your Own Device): Refers to the practice of allowing people to use their own personal devices for work
Byte:
Byte: A group of 8 bits
CA (Certificate authority):
CA (Certificate authority): It’s the entity that’s responsible for storing, issuing, and signing certificates. It’s a crucial component of the PKI system
Cable categories:
Cable categories: Groups of cables that are made with the same material. Most network cables used today can be split into two categories, copper and fiber
Cable modem:
Cable modem: A device that sits at the edge of a consumer’s network and connects it to the cable modem termination system
Cable modem termination system:
Cable modem termination system: Connects lots of different cable connections to an ISP’s core network
Cables:
Cables: Insulated wires that connect different devices to each other allowing data to be transmitted over them
Cache:
Cache: The assigned stored location for recently or frequently accessed data; on a mobile app it is where anything that was changed or created with that app is stored
Cache:
Cache: The assigned stored location for recently or frequently accessed data; on a mobile app it is where anything that was changed or created with that app is stored
Caching and recursive name servers:
Caching and recursive name servers: They are generally provided by an ISP or your local network, and their purpose is to store domain name lookups for a certain amount of time
Caesar cipher:
Caesar cipher: A substitution alphabet, where you replace characters in the alphabet with others usually by shifting or rotating the alphabet, a set of numbers or characters
Carrier-Sense Multiple Access with Collision Detection (CSMA/CD):
Carrier-Sense Multiple Access with Collision Detection (CSMA/CD): CSMA/CD is used to determine when the communications channels are clear and when the device is free to transmit data
CBC-MAC (Cipher block chaining message authentication codes):
CBC-MAC (Cipher block chaining message authentication codes): A mechanism for building MACs using block ciphers
CCMP (counter mode CBC-MAC protocol):
CCMP (counter mode CBC-MAC protocol): A mode of operation for block ciphers that allows for authenticated encryption
Centralized logging:
Centralized logging: Parsing logs in one central location
Central management:
Central management: A central service that provides instructions to all of the different parts of my IT infrastructure
Central repository:
Central repository: It is needed to securely store and index keys and a certificate management system of some sort makes managing access to storage certificates and issuance of certificates easier
Certificate-based authentication:
Certificate-based authentication: It is the most secure option, but it requires more support and management overhead since every client must have a certificate
Certificate fingerprints:
Certificate fingerprints: These are just hash digests of the whole certificate, and aren’t actually fields in the certificate itself, but are computed by clients when validating or inspecting certificates
Certificate Revocation List (CRL):
Certificate Revocation List (CRL): A means to distribute a list of certificates that are no longer valid
Certificate Signature Algorithm:
Certificate Signature Algorithm: This field indicates what public key algorithm is used for the public key and what hashing algorithm is used to sign the certificate
Certificate Signature Value:
Certificate Signature Value: The digital signature data itself
Change management process:
Change management process: The process to notify others in the organization about the changes that you are about to make
Channels:
Channels: Individual, smaller sections of the overall frequency band used by a wireless network
Character devices:
Character devices: A way to transmit data character by character like a keyboard and mouse
Character encoding:
Character encoding: Is used to assign our binary values to characters so that we as humans can read them
Charge cycle:
Charge cycle: One full charge and discharge of a battery
Child directories:
Child directories: It is a directory housed by a parent directory
Children’s Online Privacy Protection Act (COPPA):
Children’s Online Privacy Protection Act (COPPA): Regulates the information we show to children under the age of 13
Chipset:
Chipset: It decides how components talk to each other on our machine
Chocolatey:
Chocolatey: A third party package manager for Windows
Chrome OS:
Chrome OS: A Linux-based operating system designed by Google
CIA Triad:
CIA Triad: Confidentiality, integrity, and availability. Three key principles of a guiding model for designing information security policies
CLI:
CLI: Command line interpreter
Client:
Client: A device that receives data from a server
Client/Server runtime subsystem:
Client/Server runtime subsystem: System that handles running Windows GUI and Command line
Client certificates:
Client certificates: They operate very similarly to server certificates but are presented by clients and allow servers to authenticate and verify clients
Clients:
Clients: A device that receives data from a server
Clock cycle:
Clock cycle: When you send a voltage to the clock wire
Clock speed:
Clock speed: The maximum number of clock cycles that it can handle in a set in a certain time period
Clock wire:
Clock wire: When you send or receive data, it sends a voltage to that clock wire to let the CPU know it can start doing calculations
CLOSE_WAIT:
CLOSE_WAIT: A connection state that indicates that the connection has been closed at the TCP layer, but that the application that opened the socket hasn’t released its hold on the socket yet
CLOSE:
CLOSE: A connection state that indicates that the connection has been fully terminated, and that no further communication is possible
Closed source packages:
Closed source packages: A source code that does not allow public access
Cloud computing
Cloud computing: The concept and technological approach of accessing data, using applications, storing files, etc. from anywhere in the world as long as you have an internet connection
CMACs (Cipher-based Message Authentication Codes):
CMACs (Cipher-based Message Authentication Codes): The process is similar to HMAC, but instead of using a hashing function to produce a digest, a symmetric cipher with a shared keys used to encrypt the message and the resulting output is used as the MAC
CNAME:
CNAME: A resource record used to map one domain to another
Code signing certificates:
Code signing certificates: It is used for signing executable programs and allows users of these signed applications to verify the signatures and ensure that the application was not tampered with
Coding:
Coding: Translating one language to another
Collision domain:
Collision domain: A network segment where only one device can communicate at a time
Command line:
Command line: A text interface program for a computer that inputs text commands and translates them to the operating system
Command Line Interface (CLI):
Command Line Interface (CLI): A shell that uses text commands to interact with the operating system
Command line mode:
Command line mode: When you are able to run commands while still in your current shell
Compiled programming language:
Compiled programming language: A language that uses human readable instructions, then sends them through a compiler
Computer:
Computer: A device that stores and processes data by performing calculations
Computer configuration:
Computer configuration: Contained within a Group Policy Object (GPO)
Computer file:
Computer file: Data that we store and a file can be anything, a word document, a picture, a song, literally anything
Computer management:
Computer management: A tool that lets you manage a local or remote computer
Computer networking:
Computer networking: The full scope of how computers communicate with each other
Confidentiality:
Confidentiality: Keeping things hidden
Configuration management:
Configuration management: The creation of rules about how things should work in your organization, such as printers, configure software, or mounting network file systems
Connectionless protocol:
Connectionless protocol: A data-transmission protocol that allows data to be exchanged without an established connection at the transport layer. The most common of these is known as UDP, or User Datagram Protocol
Connection-oriented protocol:
Connection-oriented protocol: A data-transmission protocol that establishes a connection at the transport layer, and uses this to ensure that all data has been properly transmitted
Copper cable categories :
Copper cable categories : These categories have different physical characteristics like the number of twists in the pair of copper wires. These are defined as names like category (or cat) 5, 5e, or 6, and how quickly data can be sent across them and how resistant they are to outside interference are all related to the way the twisted pairs inside are arranged
Copyright:
Copyright: Used when creating original work
Correlation analysis:
Correlation analysis: The process of taking log data from different systems, and matching events across the systems
Counter-based tokens:
Counter-based tokens: They use a secret seed value along with the secret counter value that’s incremented every time a one-time password is generated on the device
CPU:
CPU: Central processing unit
CPU sockets:
CPU sockets: A CPU socket is a series of pins that connect a CPU?s processor to the PC?s motherboard
Cross-site scripting (XSS):
Cross-site scripting (XSS): A type of injection attack where the attacker can insert malicious code and target the user of the service
Crosstalk:
Crosstalk: Crosstalk is when an electrical pulse on one wire is accidentally detected on another wire
Cryptanalysis:
Cryptanalysis: Looking for hidden messages or trying to decipher coded message
Cryptographic hashing:
Cryptographic hashing: It is distinctly different from encryption because cryptographic hash functions should be one directional
Cryptography:
Cryptography: The overarching discipline that covers the practice of coding and hiding messages from third parties
Cryptography:
Cryptography: The overarching discipline that covers the practice of coding and hiding messages from third parties
Cryptology:
Cryptology: The study of cryptography
Cryptosystem:
Cryptosystem: A collection of algorithms for key generation and encryption and decryption operations that comprise a cryptographic service
Cyclical Redundancy Check (CRC):
Cyclical Redundancy Check (CRC): A mathematical transformation that uses polynomial division to create a number that represents a larger set of data. It is an important concept for data integrity and is used all over computing, not just network transmissions
DACL:
DACL: Directory Control Lists
DARPA:
DARPA: A US government project in the 1960s that went on to create the earliest version of the Internet that we see today
Data:
Data: Actual content of a file
Databases:
Databases: Databases allow us to store query, filter, and manage large amounts of data
Data binding and sealing:
Data binding and sealing: It involves using the secret key to derive a unique key that’s then used for encryption of data
Data blocks:
Data blocks: Data that can be broken down into many pieces and written to different parts of the hard disk
Data buffer:
Data buffer: A region of RAM that?s used to temporarily store data while it?s being moved around
Data center:
Data center: A facility that stores hundreds, if not thousands of servers
Data exfiltration
Data exfiltration: The unauthorized transfer of data from a computer. It’s also a very important concern when a security incident happens
Data handling policies:
Data handling policies: Should cover the details of how different data is classified
Data information tree:
Data information tree: A structure where objects will have one parent and can have one or more children that belong to the parent object
Datalink layer:
Datalink layer: The layer in which the first protocols are introduced. This layer is responsible for defining a common way of interpreting signals, so network devices can communicate
Data offset field:
Data offset field: The number of the next expected segment in a TCP packet/datagram
Data packet:
Data packet: An all-encompassing term that represents any single set of binary data being sent across a network link
Data payload section:
Data payload section: Has all of the data of the protocols further up the stack of a frame
Data recovery:
Data recovery: Is the process of trying to restore data after an unexpected event that results in data loss or corruption