A-L Flashcards

IT Support Certificate glossary A-L

1
Q

404 Not Found:

A

404 Not Found: An error message you might see on websites that have been moved or deleted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

802.1X:

A

802.1X: It is the IEEE standard for encapsulating EAP or Extensible Authentication Protocol traffic over the 802 networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

802.1X with EAP-TLS:

A

802.1X with EAP-TLS: Offers arguably the best security available, assuming proper and secure handling of the PKI aspects of it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AAA (authentication, authorization, accounting):

A

AAA (authentication, authorization, accounting): The services that the directory services provide to all the computers within a company or organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Abstraction:

A

Abstraction: To take a relatively complex system and simplify it for our use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Absolute path:

A

Absolute path: It is one that starts from the main directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Access Control Entries:

A

Access Control Entries: The individual access permissions per object that make up the ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Access Control List (ACL):

A

Access Control List (ACL): It is a way of defining permissions or authorizations for objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Accounting:

A

Accounting: Keeping records of what resources and services your users access or what they did when they were using your systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ACI:

A

ACI: Access Control Lists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ACK flag:

A

ACK flag: One of the TCP control flags. ACK is short for acknowledge. A value of one in this field means that the acknowledgment number field should be examined

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Acknowledgement number:

A

Acknowledgement number: The number of the next expected segment in a TCP sequence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Activation threshold:

A

Activation threshold: Triggers a pre-configured action when it is reached and will typically block the identified attack traffic for a specific amount of time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Active directory (AD):

A

Active directory (AD): The Microsoft alternative to directory services that offers customization and added features for the Windows platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Active directory users and computers (ADUC):

A

Active directory users and computers (ADUC): The client tools that are used for accessing and administering a directory server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Address bus:

A

Address bus: Connects the CPU to the MCC and sends over the location of the data, but not the data itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Address class system:

A

Address class system: A system which defines how the global IP address space is split up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Address Resolution Protocol (ARP):

A

Address Resolution Protocol (ARP): A protocol used to discover the hardware address of a node with a certain IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Ad-Hoc network:

A

Ad-Hoc network: A network configuration without supporting network infrastructure. Every device involved with the ad-hoc network communicates with every other device within range, and all nodes help pass along messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Administrator:

A

Administrator: A user that has complete control over a machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Advanced Encryption Standard (AES):

A

Advanced Encryption Standard (AES): The first and only public cipher that’s approved for use with top secret information by the United States National Security Agency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Advanced group policy management (AGPM):

A

Advanced group policy management (AGPM): A set of add-on tools from Microsoft that gives some added provision control abilities in GPMC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Adware:

A

Adware: Software that displays advertisements and collects data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Algorithm:

A

Algorithm: A series of steps that solves specific problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Alias:

A

Alias: A nickname for common commands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Analyzing logs:

A

Analyzing logs: The practice of collecting logs from different network and sometimes client devices on your network, then performing an automated analysis on them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Android

A

Android: A mobile operating system based on Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Antivirus software:

A

Antivirus software: It monitors and analyze things like new files being created or being modified on the system in order to watch for any behavior that matches a known malware signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Anycast:

A

Anycast: A technique that’s used to route traffic to different destinations depending on factors like location, congestion, or link health

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Appending flags:

A

Appending flags: A way to add the data of the file without erasing existing data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Application:

A

Application: A computer program designed for a specific use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Application layer:

A

Application layer: The layer that allows network applications to communicate in a way they understand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Application layer payload:

A

Application layer payload: The entire contents of whatever data applications want to send to each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Application policies:

A

Application policies: Defines boundaries of what applications are permitted or not, but they also help educate folks on how to use software more securely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Application software:

A

Application software: Any software created to fulfill a specific need, like a text editor, web browser, or graphics editor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

App store apps:

A

App store apps: A Package Manager that acts as a repository

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

App store repository:

A

App store repository: A app store service that also acts as a repository

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

App stores:

A

App stores: A central managed marketplace for app developers to publish and sell mobile apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

APPX:

A

APPX: An APPX is another way to package contents of a file to act like a unit of distribution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Archive:

A

Archive: An archive is comprised of one or more files that are compressed into a single file” for verb agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

A record:

A

A record: The most common resource record, used to point a certain domain name at a certain IPv4 IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

ARPANET:

A

ARPANET: The earliest version of the Internet that we see today, created by the US government project DARPA in the 1960s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

ARP table:

A

ARP table: A list of IP addresses and the MAC addresses associated with them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

ASCII:

A

ASCII: The oldest character encoding standard used is ASCII. It represents the English alphabet, digits, and punctuation marks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

ASN:

A

ASN: Autonomous System Number is a number assigned to an individual autonomous system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Assembly language:

A

Assembly language: A language that allowed computer scientists to use human readable instructions, assembled into code that the machines could understand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Asymmetric Digital Subscriber Line (ADSL):

A

Asymmetric Digital Subscriber Line (ADSL): A device that establishes data connections across phone lines and different speeds for uploading and downloading data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Asymmetric encryption:

A

Asymmetric encryption: Systems where different keys are used to encrypt and decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

ATA:

A

ATA: The most common interface that hard drives use to connect to our system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Attack:

A

Attack: An actual attempt at causing harm to a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Attack surface:

A

Attack surface: It’s the sum of all the different attack vectors in a given system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Attack vector:

A

Attack vector: Method or mechanism by which an attacker or malware gains access to a network or system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

ATX (Advanced Technology eXtended):

A

ATX (Advanced Technology eXtended): The most common form factor for motherboards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Auditing:

A

Auditing: It involves reviewing records to ensure that nothing is out of the ordinary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Authentication:

A

Authentication: A crucial application for cryptographic hash functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Authentication server (AS):

A

Authentication server (AS): It includes the user ID of the authenticating user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Authorization:

A

Authorization: It pertains to describing what the user account has access to or doesn’t have access to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Automatic allocation:

A

Automatic allocation: A range of IP addresses is set aside for assignment purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Automation:

A

Automation: It makes processes work automatically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Autoscaling:

A

Autoscaling: A system that allows the service to increase or reduce capacity as needed, while the service owner only pays for the cost of the machines that are in use at any given time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Availability:

A

Availability: Means that the information we have is readily accessible to those people that should have it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Backdoor:

A

Backdoor: A way to get into a system if the other methods to get in a system aren’t allowed, it’s a secret entryway for attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Background processes/Daemon processes:

A

Background processes/Daemon processes: Processes that run or take place in the background

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Backup and restore:

A

Backup and restore: A Microsoft offer and first party solution that has modes of operation, as a file based version where files are backed up to a zip archive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Backward compatible:

A

Backward compatible: It means older hardware works with newer hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Baiting:

A

Baiting: An attack that happens through actual physical contact, enticing a victim to do something

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Bash:

A

Bash: The language used to interact with the shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Bastion hosts or networks:

A

Bastion hosts or networks: A server used to provide access to a private network from an external network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Baud rate:

A

Baud rate: A measurement of how many bits could be passed across a phone line in a second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Binary system:

A

Binary system: The communication that a computer uses is referred to as binary system, also known as base-2 numeral system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Binary whitelisting software:

A

Binary whitelisting software: It’s a list of known good and trusted software and only things that are on the list are permitted to run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Bind:

A

Bind: It is how clients authenticate to the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Bind operation:

A

Bind operation: The operation which authenticates clients to the directory server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Biometric authentication:

A

Biometric authentication: Authentication that uses Biometric data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Biometric data:

A

Biometric data: A way of protecting your accounts and information using biometric data such as facial recognition and fingerprint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

BIOS/UEFI:

A

BIOS/UEFI: A low-level software that initializes our computer’s hardware to make sure everything is good to go

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Bios (Basic Input Output Services):

A

Bios (Basic Input Output Services): The BIOS is software that helps initialize the hardware in our computer and gets our operating system up and running

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Bit:

A

Bit: The smallest representation of data that a computer can understand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Block ciphers:

A

Block ciphers: The cipher takes data in, places that into a bucket or block of data that’s a fixed size, then encodes that entire block as one unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Block devices:

A

Block devices: A system that acts like USB drives and hard drive by transmitting data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Block storage:

A

Block storage: It improves faster handling of data because the data isn’t stored in one long piece but in blocks, so it can be accessed more quickly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Bluetooth:

A

Bluetooth: The most common short range wireless network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Boot:

A

Boot: To start up a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Bootloader:

A

Bootloader: A small program that loads the operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Border Gateway Protocol (BGP):

A

Border Gateway Protocol (BGP): A protocol by which routers share data with each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Botnet:

A

Botnet: A collection of one or more Bots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Bots:

A

Bots: Machines compromised by malware that are utilized to perform tasks centrally controlled by an attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Broadband:

A

Broadband: Any connectivity technology that isn’t dial-up Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Broadcast:

A

Broadcast: A type of Ethernet transmission, sent to every single device on a LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Broadcast address:

A

Broadcast address: A special destination used by an Ethernet broadcast composed by all Fs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Browser:

A

Browser: A user interface for displaying and interacting with web pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Brute force attacks:

A

Brute force attacks: A common password attack which consists of just continuously trying different combinations of characters and letters until one gets access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

BYOD (Bring Your Own Device):

A

BYOD (Bring Your Own Device): Refers to the practice of allowing people to use their own personal devices for work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Byte:

A

Byte: A group of 8 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

CA (Certificate authority):

A

CA (Certificate authority): It’s the entity that’s responsible for storing, issuing, and signing certificates. It’s a crucial component of the PKI system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Cable categories:

A

Cable categories: Groups of cables that are made with the same material. Most network cables used today can be split into two categories, copper and fiber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Cable modem:

A

Cable modem: A device that sits at the edge of a consumer’s network and connects it to the cable modem termination system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Cable modem termination system:

A

Cable modem termination system: Connects lots of different cable connections to an ISP’s core network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Cables:

A

Cables: Insulated wires that connect different devices to each other allowing data to be transmitted over them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Cache:

A

Cache: The assigned stored location for recently or frequently accessed data; on a mobile app it is where anything that was changed or created with that app is stored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Cache:

A

Cache: The assigned stored location for recently or frequently accessed data; on a mobile app it is where anything that was changed or created with that app is stored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Caching and recursive name servers:

A

Caching and recursive name servers: They are generally provided by an ISP or your local network, and their purpose is to store domain name lookups for a certain amount of time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Caesar cipher:

A

Caesar cipher: A substitution alphabet, where you replace characters in the alphabet with others usually by shifting or rotating the alphabet, a set of numbers or characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Carrier-Sense Multiple Access with Collision Detection (CSMA/CD):

A

Carrier-Sense Multiple Access with Collision Detection (CSMA/CD): CSMA/CD is used to determine when the communications channels are clear and when the device is free to transmit data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

CBC-MAC (Cipher block chaining message authentication codes):

A

CBC-MAC (Cipher block chaining message authentication codes): A mechanism for building MACs using block ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

CCMP (counter mode CBC-MAC protocol):

A

CCMP (counter mode CBC-MAC protocol): A mode of operation for block ciphers that allows for authenticated encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

Centralized logging:

A

Centralized logging: Parsing logs in one central location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Central management:

A

Central management: A central service that provides instructions to all of the different parts of my IT infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Central repository:

A

Central repository: It is needed to securely store and index keys and a certificate management system of some sort makes managing access to storage certificates and issuance of certificates easier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Certificate-based authentication:

A

Certificate-based authentication: It is the most secure option, but it requires more support and management overhead since every client must have a certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

Certificate fingerprints:

A

Certificate fingerprints: These are just hash digests of the whole certificate, and aren’t actually fields in the certificate itself, but are computed by clients when validating or inspecting certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Certificate Revocation List (CRL):

A

Certificate Revocation List (CRL): A means to distribute a list of certificates that are no longer valid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

Certificate Signature Algorithm:

A

Certificate Signature Algorithm: This field indicates what public key algorithm is used for the public key and what hashing algorithm is used to sign the certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

Certificate Signature Value:

A

Certificate Signature Value: The digital signature data itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Change management process:

A

Change management process: The process to notify others in the organization about the changes that you are about to make

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

Channels:

A

Channels: Individual, smaller sections of the overall frequency band used by a wireless network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

Character devices:

A

Character devices: A way to transmit data character by character like a keyboard and mouse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

Character encoding:

A

Character encoding: Is used to assign our binary values to characters so that we as humans can read them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

Charge cycle:

A

Charge cycle: One full charge and discharge of a battery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

Child directories:

A

Child directories: It is a directory housed by a parent directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

Children’s Online Privacy Protection Act (COPPA):

A

Children’s Online Privacy Protection Act (COPPA): Regulates the information we show to children under the age of 13

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

Chipset:

A

Chipset: It decides how components talk to each other on our machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

Chocolatey:

A

Chocolatey: A third party package manager for Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

Chrome OS:

A

Chrome OS: A Linux-based operating system designed by Google

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

CIA Triad:

A

CIA Triad: Confidentiality, integrity, and availability. Three key principles of a guiding model for designing information security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

CLI:

A

CLI: Command line interpreter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

Client:

A

Client: A device that receives data from a server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

Client/Server runtime subsystem:

A

Client/Server runtime subsystem: System that handles running Windows GUI and Command line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

Client certificates:

A

Client certificates: They operate very similarly to server certificates but are presented by clients and allow servers to authenticate and verify clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

Clients:

A

Clients: A device that receives data from a server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

Clock cycle:

A

Clock cycle: When you send a voltage to the clock wire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

Clock speed:

A

Clock speed: The maximum number of clock cycles that it can handle in a set in a certain time period

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

Clock wire:

A

Clock wire: When you send or receive data, it sends a voltage to that clock wire to let the CPU know it can start doing calculations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

CLOSE_WAIT:

A

CLOSE_WAIT: A connection state that indicates that the connection has been closed at the TCP layer, but that the application that opened the socket hasn’t released its hold on the socket yet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

CLOSE:

A

CLOSE: A connection state that indicates that the connection has been fully terminated, and that no further communication is possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

Closed source packages:

A

Closed source packages: A source code that does not allow public access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

Cloud computing

A

Cloud computing: The concept and technological approach of accessing data, using applications, storing files, etc. from anywhere in the world as long as you have an internet connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

CMACs (Cipher-based Message Authentication Codes):

A

CMACs (Cipher-based Message Authentication Codes): The process is similar to HMAC, but instead of using a hashing function to produce a digest, a symmetric cipher with a shared keys used to encrypt the message and the resulting output is used as the MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

CNAME:

A

CNAME: A resource record used to map one domain to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

Code signing certificates:

A

Code signing certificates: It is used for signing executable programs and allows users of these signed applications to verify the signatures and ensure that the application was not tampered with

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

Coding:

A

Coding: Translating one language to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

Collision domain:

A

Collision domain: A network segment where only one device can communicate at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

Command line:

A

Command line: A text interface program for a computer that inputs text commands and translates them to the operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

Command Line Interface (CLI):

A

Command Line Interface (CLI): A shell that uses text commands to interact with the operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

Command line mode:

A

Command line mode: When you are able to run commands while still in your current shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

Compiled programming language:

A

Compiled programming language: A language that uses human readable instructions, then sends them through a compiler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

Computer:

A

Computer: A device that stores and processes data by performing calculations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

Computer configuration:

A

Computer configuration: Contained within a Group Policy Object (GPO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

Computer file:

A

Computer file: Data that we store and a file can be anything, a word document, a picture, a song, literally anything

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

Computer management:

A

Computer management: A tool that lets you manage a local or remote computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

Computer networking:

A

Computer networking: The full scope of how computers communicate with each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

Confidentiality:

A

Confidentiality: Keeping things hidden

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

Configuration management:

A

Configuration management: The creation of rules about how things should work in your organization, such as printers, configure software, or mounting network file systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

Connectionless protocol:

A

Connectionless protocol: A data-transmission protocol that allows data to be exchanged without an established connection at the transport layer. The most common of these is known as UDP, or User Datagram Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

Connection-oriented protocol:

A

Connection-oriented protocol: A data-transmission protocol that establishes a connection at the transport layer, and uses this to ensure that all data has been properly transmitted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

Copper cable categories :

A

Copper cable categories : These categories have different physical characteristics like the number of twists in the pair of copper wires. These are defined as names like category (or cat) 5, 5e, or 6, and how quickly data can be sent across them and how resistant they are to outside interference are all related to the way the twisted pairs inside are arranged

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

Copyright:

A

Copyright: Used when creating original work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q

Correlation analysis:

A

Correlation analysis: The process of taking log data from different systems, and matching events across the systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

Counter-based tokens:

A

Counter-based tokens: They use a secret seed value along with the secret counter value that’s incremented every time a one-time password is generated on the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q

CPU:

A

CPU: Central processing unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

CPU sockets:

A

CPU sockets: A CPU socket is a series of pins that connect a CPU?s processor to the PC?s motherboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
162
Q

Cross-site scripting (XSS):

A

Cross-site scripting (XSS): A type of injection attack where the attacker can insert malicious code and target the user of the service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
163
Q

Crosstalk:

A

Crosstalk: Crosstalk is when an electrical pulse on one wire is accidentally detected on another wire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
164
Q

Cryptanalysis:

A

Cryptanalysis: Looking for hidden messages or trying to decipher coded message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
165
Q

Cryptographic hashing:

A

Cryptographic hashing: It is distinctly different from encryption because cryptographic hash functions should be one directional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
166
Q

Cryptography:

A

Cryptography: The overarching discipline that covers the practice of coding and hiding messages from third parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
167
Q

Cryptography:

A

Cryptography: The overarching discipline that covers the practice of coding and hiding messages from third parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
168
Q

Cryptology:

A

Cryptology: The study of cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
169
Q

Cryptosystem:

A

Cryptosystem: A collection of algorithms for key generation and encryption and decryption operations that comprise a cryptographic service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
170
Q

Cyclical Redundancy Check (CRC):

A

Cyclical Redundancy Check (CRC): A mathematical transformation that uses polynomial division to create a number that represents a larger set of data. It is an important concept for data integrity and is used all over computing, not just network transmissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
171
Q

DACL:

A

DACL: Directory Control Lists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
172
Q

DARPA:

A

DARPA: A US government project in the 1960s that went on to create the earliest version of the Internet that we see today

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
173
Q

Data:

A

Data: Actual content of a file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
174
Q

Databases:

A

Databases: Databases allow us to store query, filter, and manage large amounts of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
175
Q

Data binding and sealing:

A

Data binding and sealing: It involves using the secret key to derive a unique key that’s then used for encryption of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
176
Q

Data blocks:

A

Data blocks: Data that can be broken down into many pieces and written to different parts of the hard disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
177
Q

Data buffer:

A

Data buffer: A region of RAM that?s used to temporarily store data while it?s being moved around

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
178
Q

Data center:

A

Data center: A facility that stores hundreds, if not thousands of servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
179
Q

Data exfiltration

A

Data exfiltration: The unauthorized transfer of data from a computer. It’s also a very important concern when a security incident happens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
180
Q

Data handling policies:

A

Data handling policies: Should cover the details of how different data is classified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
181
Q

Data information tree:

A

Data information tree: A structure where objects will have one parent and can have one or more children that belong to the parent object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
182
Q

Datalink layer:

A

Datalink layer: The layer in which the first protocols are introduced. This layer is responsible for defining a common way of interpreting signals, so network devices can communicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
183
Q

Data offset field:

A

Data offset field: The number of the next expected segment in a TCP packet/datagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
184
Q

Data packet:

A

Data packet: An all-encompassing term that represents any single set of binary data being sent across a network link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
185
Q

Data payload section:

A

Data payload section: Has all of the data of the protocols further up the stack of a frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
186
Q

Data recovery:

A

Data recovery: Is the process of trying to restore data after an unexpected event that results in data loss or corruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
187
Q

Data sizes:

A

Data sizes: Metrics that refer to data sizes including bit, byte, kilobyte, kibibyte, and megabyte

188
Q

Data tapes:

A

Data tapes: The standard medium for archival backup data storage

189
Q

DDR SDRAM (Double Data Rate SDRAM):

A

DDR SDRAM (Double Data Rate SDRAM): A type of RAM that is faster, takes up less power, and has a larger capacity than earlier SDRAM versions

190
Q

Debian(.deb):

A

Debian(.deb): A Debian package is packaged as a .deb file

191
Q

Decimal form- base 10 system:

A

Decimal form- base 10 system: In the decimal system, there are 10 possible numbers you can use ranging from zero to nine

192
Q

Decryption:

A

Decryption: The reverse process from encryption; taking the garbled output and transforming it back into the readable plain text

193
Q

Default domain control policy:

A

Default domain control policy: One of the two GPOs that are created when a new Active Directory domain has been made

194
Q

Defense in depth:

A

Defense in depth: The concept of having multiple overlapping systems of defense to protect IT systems

195
Q

Defragmentation:

A

Defragmentation: A process of taking all the files stored on a given disk and reorganizing them into neighboring locations

196
Q

Delegation:

A

Delegation: The administrative tasks that you need to perform a lot as a part of your day to day job but you don’t need to have broad access to make changes in AD

197
Q

Demarcate:

A

Demarcate: To set the boundaries of something

198
Q

Demarcation point:

A

Demarcation point: Where one network or system ends and another one begins

199
Q

Demultiplexing:

A

Demultiplexing: Taking traffic that’s all aimed at the same node and delivering it to the proper receiving service

200
Q

Denial-of-Service (DoS) attack:

A

Denial-of-Service (DoS) attack: An attack that tries to prevent access to a service for legitimate users by overwhelming the network or server

201
Q

Deployment:

A

Deployment: Hardware is set up so that the employee can do their job

202
Q

DES (Data Encryption Standard):

A

DES (Data Encryption Standard): One of the earliest encryption standards

203
Q

Desktop:

A

Desktop: The main screen where we can navigate our files, folders, and applications

204
Q

Destination MAC address

A

Destination MAC address: The hardware address of the intended recipient that immediately follows the start frame delimiter

205
Q

Destination network:

A

Destination network: The column in a routing table that contains a row for each network that the router knows about

206
Q

Destination port:

A

Destination port: The port of the service the TCP packet is intended for

207
Q

Detection measure:

A

Detection measure: The measures to alert you and your team that a disaster has occurred that can impact operations

208
Q

Deterministic:

A

Deterministic: It means that the same input value should always return the same hash value

209
Q

Device manager:

A

Device manager: A console management system for your device

210
Q

DH (Diffie-Hellman):

A

DH (Diffie-Hellman): A popular key exchange algorithm, named for its co-inventors

211
Q

DHCP:

A

DHCP: A technology that assigns an IP address automatically to a new device. It is an application layer protocol that automates the configuration process of hosts on a network

212
Q

DHCP discovery:

A

DHCP discovery: The process by which a client configured to use DHCP attempts to get network configuration information

213
Q

Dial-up:

A

Dial-up: Uses POTS for data transfer, and gets its name because the connection is established by actually dialing a phone number

214
Q

Dictionary attack:

A

Dictionary attack: A type of password attack that tries out words that are commonly used in passwords, like password, monkey, football

215
Q

Differential backup:

A

Differential backup: A backup of files that are changed, or has been created since the last full backup

216
Q

Digital divide:

A

Digital divide: The growing skills gap between people with and without digital literacy skills

217
Q

DIMM:

A

DIMM: Dual Inline Memory Module

218
Q

Directory Access Protocol (DAP):

A

Directory Access Protocol (DAP): A protocol that is included in the X.500 directory standard from 1988

219
Q

Directory Information Shadow Protocol (DISP):

A

Directory Information Shadow Protocol (DISP): A protocol that is included in the X.500 directory standard from 1988

220
Q

Directory Operational Bindings Protocol (DOBMP):

A

Directory Operational Bindings Protocol (DOBMP): A protocol that is included in the X.500 directory standard from 1988

221
Q

Directory server:

A

Directory server: The server that contains a lookup service that provides mapping between network resources and their network addresses

222
Q

Directory services:

A

Directory services: A lookup service contained in a network server that provides mapping between network resources and their network addresses

223
Q

Directory System Protocol (DSP):

A

Directory System Protocol (DSP): A protocol that is included in the X.500 directory standard from 1988

224
Q

Disaster recovery plan:

A

Disaster recovery plan: A collection of documented procedures and plans on how to react and handle an emergency or disaster scenario, from the operational perspective

225
Q

Disaster recovery testing:

A

Disaster recovery testing: A regular exercise that happens once a year or so, that has different teams, including IT support specialists, going through simulations of disaster events

226
Q

Disk Management utility:

A

Disk Management utility: Native tool for Windows that helps with managing disk space

227
Q

Disk to disk cloning:

A

Disk to disk cloning: A type of cloning that happens when you connect an external hard drive to the machine you want to clone

228
Q

Display port:

A

Display port: Port which also outputs audio and video

229
Q

Distinguished name (DN):

A

Distinguished name (DN): A unique identifier for each entry in the directory

230
Q

Distributed Denial-of-Service (DDoS) attack:

A

Distributed Denial-of-Service (DDoS) attack: A DoS attack using multiple systems

231
Q

Distribution:

A

Distribution: A version of the operating system

232
Q

Distribution group:

A

Distribution group: A group that is only designed to group accounts and contacts for email communication

233
Q

Distributions:

A

Distributions: Some common Linux distributions are Ubuntu, Debian, and Red Hat

234
Q

DNS Cache Poisoning Attack:

A

DNS Cache Poisoning Attack: It works by tricking a DNS server into accepting a fake DNS record that will point you to a compromised DNS server

235
Q

DNS records:

A

DNS records: A DNS request for the SRV records matching the domain that it’s been bound to

236
Q

DNS zones:

A

DNS zones: A portion of space in the Domain Name System (DNS) that is controlled by an authoritative name server

237
Q

Domain:

A

Domain: Used to demarcate where control moves from a top-level domain name server to an authoritative name server

238
Q

Domain admin:

A

Domain admin: The administrators of the Active Directory domain

239
Q

Domain computers:

A

Domain computers: All the computers joined to the domain except domain controllers

240
Q

Domain controllers (DC):

A

Domain controllers (DC): The service that hosts copies of the Active Directory database

241
Q

Domain local:

A

Domain local: The tool used used to assign permission to a resource

242
Q

Domain name:

A

Domain name: A website name; the part of the URL following www.

243
Q

Domain Name System (DNS):

A

Domain Name System (DNS): A global and highly distributed network service that resolves strings of letters, such as a website name, into an IP address

244
Q

Domain users:

A

Domain users: A group that contains every user account in the domain

245
Q

Dotted decimal notation:

A

Dotted decimal notation: A format of using dots to separate numbers in a string, such as in an IP address

246
Q

DRAM:

A

DRAM: Dynamic Random Access Memory

247
Q

Driver:

A

Driver: Used to help our hardware devices interact with our Operating System

248
Q

Drivers:

A

Drivers: The drivers contain the instructions our CPU needs to understand external devices like keyboards, webcams, printers

249
Q

DSA (Digital Signature Algorithm):

A

DSA (Digital Signature Algorithm): It is another example of an asymmetric encryption system, though its used for signing and verifying data

250
Q

DSL:

A

DSL: Digital subscriber line was able to send much more data across the wire than traditional dial-up technologies by operating at a frequency range that didn’t interfere with normal phone calls

251
Q

DSLAM:

A

DSLAM: Digital Subscriber Line Access Multiplexers are devices that connect multiple DSL connections to a high-speed digital communications channel

252
Q

Duplex communication:

A

Duplex communication: A form of communication where information can flow in both directions across a cable

253
Q

Duration field:

A

Duration field: Specifies how long the total frame is

254
Q

DVI:

A

DVI: DVI cables generally just output video

255
Q

Dynamic allocation:

A

Dynamic allocation: A range of IP addresses is set aside for client devices and one of these IPs is issued to these devices when they request one

256
Q

Dynamic ARP inspection (DAI):

A

Dynamic ARP inspection (DAI): A feature on enterprise switches that prevents certain types of attacks

257
Q

Dynamic IP address:

A

Dynamic IP address: An IP address assigned automatically to a new device through a technology known as Dynamic Host Configuration Protocol

258
Q

Dynamic-link libraries:

A

Dynamic-link libraries: Programs that want to use functionality that the code provides can tap into it if they need to (shared libraries)

259
Q

.exe:

A

.exe: A file extension found in Windows for an executable file

260
Q

EAP-TLS:

A

EAP-TLS: One of the more common and secure EAP methods

261
Q

ECDH & ECDSA:

A

ECDH & ECDSA: Elliptic curve variants of Diffie-Hellman and DSA, respectively

262
Q

Electrostatic discharge:

A

Electrostatic discharge: Electrostatic discharge is a sudden and momentary flow of electric current between two electrically charged objects caused by contact, an electrical short or dielectric breakdown

263
Q

Eliptic curve cryptography (ECC):

A

Eliptic curve cryptography (ECC): A public key encryption system that uses the algebraic structure of elliptic curves over finite fields to generate secure keys

264
Q

Encapsulating security payload:

A

Encapsulating security payload: It’s a part of the IPsec suite of protocols, which encapsulates IP packets, providing confidentiality, integrity, and authentication of the packets

265
Q

Encryption:

A

Encryption: The act of taking a message (plaintext), and applying an operation to it (cipher), so that you receive a garbled, unreadable message as the output (ciphertext)

266
Q

Encryption algorithm:

A

Encryption algorithm: The underlying logic or process that’s used to convert the plaintext into ciphertext

267
Q

End-entity (leaf certificate):

A

End-entity (leaf certificate): A certificate that has no authority as a CA

268
Q

Enterprise admin:

A

Enterprise admin: The administrators of the Active Directory domain that has permission to make changes to the domain that affect other domains in a multi-domain forest

269
Q

Enterprise app management:

A

Enterprise app management: A management system that allows an organization to distribute custom mobile apps

270
Q

Enterprise mobility management (EMM):

A

Enterprise mobility management (EMM): A system that can create and distribute policies and MDMs

271
Q

Entropy pool:

A

Entropy pool: A source of random data to help seed random number generators

272
Q

Entry point:

A

Entry point: the act to determine the entry point to figure out how the attacker got in, or what vulnerability the malware exploited

273
Q

Environment:

A

Environment: Whatever settings or variables a child process inherits from the parent?s process

274
Q

Error detection:

A

Error detection: The ability for a protocol or program to determine that something went wrong

275
Q

Error message:

A

Error message: Helpful indicators that can point you in the right direction

276
Q

Error recovery

A

Error recovery: The ability for a protocol or program to attempt to fix an error

277
Q

Escape characters:

A

Escape characters: A concept that means that the next character after the back tick should be treated literally

278
Q

ESTABLISHED:

A

ESTABLISHED: Status indicating that the TCP connection is in working order, and both sides are free to send each other data

279
Q

Etcher.io:

A

Etcher.io: A tool you can use to load an install image onto your USB device and make it bootable

280
Q

Ethernet:

A

Ethernet: The protocol most widely used to send data across individual links

281
Q

Ethernet cable:

A

Ethernet cable: It lets you physically connect to the network through a cable

282
Q

Ethernet frame:

A

Ethernet frame: A highly structured collection of information presented in a specific order

283
Q

EtherType field:

A

EtherType field: It follows the Source MAC Address in a dataframe. It’s 16 bits long and used to describe the protocol of the contents of the frame

284
Q

Event Viewer:

A

Event Viewer: A place where all events that have been logged are stored

285
Q

Evil twin:

A

Evil twin: The premise of an evil twin attack is for you to connect to a network that is identical to yours but that is controlled by an attacker. Once connected to it, they will be able to monitor your traffic

286
Q

Executable file:

A

Executable file: A file containing instructions for a computer to execute when they?re run

287
Q

Expansion slots:

A

Expansion slots: Give us the ability to increase the functionality of our computer

288
Q

Exploit:

A

Exploit: Software that is used to take advantage of a security bug or vulnerability

289
Q

Extensible authentication protocol (EAP over LAN, or EAPOL):

A

Extensible authentication protocol (EAP over LAN, or EAPOL): A standard authentication protocol

290
Q

Exterior gateway:

A

Exterior gateway: Protocols that are used for the exchange of information between independent autonomous systems

291
Q

External Data Bus (EDB):

A

External Data Bus (EDB): It’s a row of wires that interconnect the parts of our computer

292
Q

Factory reset:

A

Factory reset: Resetting a device to the settings it came with from the factory

293
Q

Fail to ban:

A

Fail to ban: A common open source flood guard protection tool

294
Q

Fast logon optimization:

A

Fast logon optimization: The group policy engine that applies policy settings to a local machine may sacrifice the immediate application of some types of policies in order to make logon faster

295
Q

Fiber optic cable:

A

Fiber optic cable: Fiber optic cables contain individual optical fibers which are tiny tubes made of glass about the width of a human hair. Unlike copper, which uses electrical voltages, fiber cables use pulses of light to represent the ones and zeros of the underlying data

296
Q

File-based encryption:

A

File-based encryption: Guarantees confidentiality and integrity of files protected by encryption

297
Q

File compression:

A

File compression: The files and folder structures are copied and put into an archive

298
Q

File extension:

A

File extension: The appended part of a filename that tells us what type of file it is in certain operating systems

299
Q

File handling:

A

File handling: A process of storing data using a program

300
Q

File permissions:

A

File permissions: A process for setting permissions for who has access to certain files

301
Q

File record number:

A

File record number: The index of the files entry in the MFT

302
Q

File storage service:

A

File storage service: Allows to centrally store files and manage access between files and groups

303
Q

File system:

A

File system: A system used to manage files

304
Q

FIN_WAIT:

A

FIN_WAIT: A TCP socket state indicating that a FIN has been sent, but the corresponding ACK from the other end hasn’t been received yet

305
Q

FIN:

A

FIN: One of the TCP control flags. FIN is short for finish. When this flag is set to one, it means the transmitting computer doesn’t have any more data to send and the connection can be closed

306
Q

Finder:

A

Finder: The file manager for all Macs

307
Q

FIPS (Federal Information Processing Standard):

A

FIPS (Federal Information Processing Standard): The DES that was adopted as a federal standard for encrypting and securing government data

308
Q

Firewall:

A

Firewall: It is a device that blocks or allows traffic based on established rules

309
Q

Firmware:

A

Firmware: Software that’s permanently stored on a computer component

310
Q

Five layer model

A

Five layer model: A model used to explain how network devices communicate. This model has five layers that stack on top of each other: Physical, Data Link, Network, Transport, and Application

311
Q

Fixed allocation:

A

Fixed allocation: Requires a manually specified list of MAC address and the corresponding IPs

312
Q

Flag field:

A

Flag field: It is used to indicate if a datagram is allowed to be fragmented, or to indicate that the datagram has already been fragmented

313
Q

Flat file:

A

Flat file: A collection of records/information that follow a consistent format with rules around stored values. On a host computer, one use is to have a list of network address and host name pairs (a hosts file)

314
Q

Flexible single-master operations (FSMO):

A

Flexible single-master operations (FSMO): The single domain controller that has been tasked with making changes to the AD database that can only be made by one DC at a time

315
Q

Flood guards:

A

Flood guards: Provide protection against DoS or Denial of Service Attacks

316
Q

Flow label field:

A

Flow label field: 20-bit field that’s used in conjunction with the traffic class field for routers to make decisions about the quality of service level for a specific datagram

317
Q

Folders/Directories:

A

Folders/Directories: Used to organize files

318
Q

Forest:

A

Forest: The hierarchy above a domain that contains multiple domains, allowing accounts to share resources between domains that are in the same forest

319
Q

Form factor:

A

Form factor: A mathematical way to compensate for irregularities in the shape of an object by using a ratio between its volume and height

320
Q

Forward secrecy:

A

Forward secrecy: This is a property of a cryptographic system so that even in the event that the private key is compromised, the session keys are still safe

321
Q

Four-Way Handshake:

A

Four-Way Handshake: It is designed to allow an AP to confirm that the client has the correct pairwise master key in a WPA-PSK setup without disclosing the PMK

322
Q

Fragmentation:

A

Fragmentation: The process of taking a single IP datagram and splitting it up into several smaller datagrams

323
Q

Fragmentation offset field:

A

Fragmentation offset field: It contains values used by the receiving end to take all the parts of a fragmented packet and put them back together in the correct order

324
Q

Frame check sequence:

A

Frame check sequence: It is a 4-byte or 32-bit number that represents a checksum value for the entire frame

325
Q

Frame control field:

A

Frame control field: 16 bits long, it contains a number of sub-fields that are used to describe how the frame itself should be processed

326
Q

Frequency analysis:

A

Frequency analysis: The practice of studying the frequency with which letters appear in ciphertext

327
Q

Frequency band:

A

Frequency band: A certain section of the radio spectrum that’s been agreed upon to be used for certain communications

328
Q

FTP:

A

FTP: An older method used for transferring files from one computer to another, but you still see it in use today

329
Q

FTTB:

A

FTTB: Fiber to the building, fiber to the business or even fiber to the basement, since this is generally where cables to buildings physically enter. FTTB is a setup where fiber technologies are used for data delivery to an individual building

330
Q

FTTH:

A

FTTH: Fiber to the home. This is used in instances where fiber is actually run to each individual residents in a neighborhood or apartment building

331
Q

FTTN:

A

FTTN: Fiber to the neighborhood. This means that fiber technologies are used to deliver data to a single physical cabinet that serves a certain amount of the population

332
Q

FTTP:

A

FTTP: Fiber to the premises. FTTH and FTTB may both also be referred to as FTTP

333
Q

FTTX:

A

FTTX: Stands for fiber to the X, where the X can be one of many things

334
Q

Full backup:

A

Full backup: The full unmodified contents of all files to be backed up is are included in this backup mechanism whether the data was modified or not

335
Q

Full control:

A

Full control: A user or group with full control that can do anything they want to files

336
Q

Full disk encryption (FDE):

A

Full disk encryption (FDE): It is the practice of encrypting the entire drive in the system

337
Q

Full duplex:

A

Full duplex: The capacity of devices on either side of a networking link to communicate with each other at the exact same time

338
Q

Fully qualified domain name:

A

Fully qualified domain name: When you combine all the parts of a domain together

339
Q

Functional levels:

A

Functional levels: The different versions of Active Directory, a functional level that describes the features that it supports

340
Q

GIT:

A

GIT: A version control system that helps keep track of changes made to files and directories

341
Q

Global:

A

Global: The tool that is used to group accounts into a role

342
Q

Globalization:

A

Globalization: The movement that lets governments, businesses, and organizations communicate and integrate together on an international scale

343
Q

Group policy management console (GPMC):

A

Group policy management console (GPMC): The tools used for creating and viewing a group policy object

344
Q

Group policy objects (GPO):

A

Group policy objects (GPO): The ways to manage the configuration of Windows machines, referring to the objects that represent things in your network that you want to be able to reference or manage

345
Q

Group policy settings reference:

A

Group policy settings reference: A spreadsheet that details the GPO policies and preferences that are available and where to find them

346
Q

Groups:

A

Groups: A collection of users

347
Q

Group scope:

A

Group scope: The way that group definitions are replicated across domains

348
Q

GTK (Groupwise Transient Key):

A

GTK (Groupwise Transient Key): A temporal key, which is actually used to encrypt data

349
Q

GUI:

A

GUI: A graphical user interface

350
Q

GUID partition table:

A

GUID partition table: Only used if you are using UEFI booting

351
Q

Hacker:

A

Hacker: Someone who attempts to break into or exploit a system

352
Q

Half-duplex:

A

Half-duplex: It means that, while communication is possible in each direction, only one device can be communicating at a time

353
Q

Half-open attacks:

A

Half-open attacks: A way to refer to SYN floods

354
Q

Handshake:

A

Handshake: A way for two devices to ensure that they’re speaking the same protocol and will be able to understand each other

355
Q

Hard drive:

A

Hard drive: It is a long term memory component that holds all of our data, which can include music, pictures, applications

356
Q

Hard link:

A

Hard link: When created in NTFS, an entry is added to the MFT that points to the linked file record number, not the name of the file. This means the file name of the target can change and the hard link will still point to it

357
Q

Hardware:

A

Hardware: External or internal devices and equipment that help you perform major functions

358
Q

Hardware ID:

A

Hardware ID: A special string of characters assigned to hardware

359
Q

Hardware resource deficiency:

A

Hardware resource deficiency: It refers to the lack of system resources like memory, hard drive space, et cetera

360
Q

Hash collisions:

A

Hash collisions: Two different inputs mapping to the same output

361
Q

Hashing (Hash function):

A

Hashing (Hash function): A type of function or operation that takes in an arbitrary data input and maps it to an output of a fixed size, called a hash or a digest

362
Q

Having dependencies:

A

Having dependencies: A process of counting on other pieces of software to make an application work since one bit of code depends on another in order to work

363
Q

HDD (Hard disk drive):

A

HDD (Hard disk drive): Hard disk drives, or HDDs, use a spinning platter and a mechanical arm to read and write information

364
Q

HDMI:

A

HDMI: A type of cable that outputs both video and audio

365
Q

HDSL:

A

HDSL: High Bit-rate Digital Subscriber Lines. These are DSL technologies that provision speeds above 1.544 megabits per second

366
Q

Header checksum field:

A

Header checksum field: A checksum of the contents of the entire IP datagram header

367
Q

Header length field:

A

Header length field: A four bit field that declares how long the entire header is. It is almost always 20 bytes in length when dealing with IPv4

368
Q

Heatsink:

A

Heatsink: It is used to dissipate heat from our CPU

369
Q

Hexadecimal:

A

Hexadecimal: A way to represent numbers using a numerical base of 16

370
Q

HFS+/APFS:

A

HFS+/APFS: HFS+ is a journaling system developed by Apple Inc. and APFS is another but more encrypted Apple journaling system

371
Q

Hidden files:

A

Hidden files: A set of files that are not visible either to avoid alteration or simply because you don?t want someone to see them

372
Q

High value data:

A

High value data: usually includes account information, like usernames and passwords. Typically, any kind of user data is considered high value, especially if payment processing is involved

373
Q

HMAC (Keyed-Hash Message Authentication Codes):

A

HMAC (Keyed-Hash Message Authentication Codes): It uses a cryptographic hash function along with a secret key to generate a MAC

374
Q

Hop limit field:

A

Hop limit field: An 8-bit field that’s identical in purpose to the TTL field in an IPv4 header

375
Q

Host-based firewalls:

A

Host-based firewalls: Protects individual hosts from being compromised when they’re used in untrusted and potentially malicious environments

376
Q

Host file:

A

Host file: It is a flat file that contains, on each line, a network address followed by the host name it can be referred to as

377
Q

Hostname:

A

Hostname: Used to identify the computer when it needs to talk to other computers

378
Q

Hot key:

A

Hot key: A keyboard shortcut that does a particular task

379
Q

HTTPS:

A

HTTPS: Hypertext Transfer Protocol Secure is a secure version of HTTP that ensures the communication your web browser has with the website is secured through encryption.

380
Q

HTTP status code:

A

HTTP status code: The codes or numbers that indicate some sort of error or info messages that occurred when trying to access a web resource

381
Q

Hub:

A

Hub: It is a physical layer device that broadcasts data to everything computer connected to it

382
Q

Hubs:

A

Hubs: Devices that serve as a central location through which data travels through; a quick and dirty way of getting packets mirrored to your capture interface

383
Q

Hybrid cloud

A

Hybrid cloud: Used to describe situations where companies might run things like their most sensitive proprietary technologies on a private cloud or on premise while entrusting their less sensitive servers to a public cloud

384
Q

Hypervisor

A

Hypervisor: A piece of software that runs and manages virtual machines while also offering guests a virtual operating platform that’s indistinguishable from actual hardware

385
Q

I/O management:

A

I/O management: Anything that can give us input or that we can use for output of data

386
Q

I/O Streams:

A

I/O Streams: An input stream handles data flowing into and out of a program

387
Q

IANA:

A

IANA: The Internet Assigned Numbers Authority, is a non-profit organization that helps manage things like IP address allocation

388
Q

ICMP:

A

ICMP: Internet control message protocol is used by router or remote hosts to communicate error messages when network problems prevent delivery of IP packets

389
Q

ICMP payload:

A

ICMP payload: Piece of the packet which lets the recipient of the message knows which of their transmissions caused the error being reported

390
Q

Identification:

A

Identification: The idea of describing an entity uniquely

391
Q

Identification field:

A

Identification field: It is a 16-bit number that’s used to group messages together

392
Q

Impact:

A

Impact: The impact of an incident is also an important issue to consider

393
Q

Implicit deny:

A

Implicit deny: A network security concept where anything not explicitly permitted or allowed should be denied

394
Q

Import:

A

Import: Moving a backup of the test example policy to the production example policy

395
Q

Information technology

A

Information technology: The use of digital technology, like computers and the internet, to store and process data into useful information

396
Q

Infrastructure as a Service (IaaS):

A

Infrastructure as a Service (IaaS): A subset of cloud computing where a network and servers are provided for customers to run their services

397
Q

Inherit only:

A

Inherit only: A permission group that means that a DACL will be inherited, but not applied to a container

398
Q

Injection attacks:

A

Injection attacks: A common security exploit that can occur in software development and runs rampant on the web, where an attacker injects malicious code

399
Q

Inode:

A

Inode: A file structure for metadata and files

400
Q

Input/Output device:

A

Input/Output device: A device that performs input and output, including monitors, keyboards, mice, hard disk drives, speakers, bluetooth headsets, webcams, and network adapters

401
Q

Install image:

A

Install image: A downloadable operating system image used to install an operating system on a device

402
Q

Installing from source:

A

Installing from source: A process of installing from a source

403
Q

Instantiation:

A

Instantiation: The actual implementation of something defined elsewhere

404
Q

Instruction set:

A

Instruction set: A list of instructions that our CPU is able to run

405
Q

Integrity:

A

Integrity: Means keeping our data accurate and untampered with

406
Q

Interactive mode:

A

Interactive mode: When the parted tool launches you into a separate program

407
Q

Interface:

A

Interface: For a router, the port where a router connects to a network. A router gives and receives data through its interfaces. These are also used as part of the routing table

408
Q

Interior gateway:

A

Interior gateway: Interior gateway protocols are used by routers to share information within a single autonomous system

409
Q

Intermediary (subordinate) CA:

A

Intermediary (subordinate) CA: It means that the entity that this certificate was issued to can now sign other certificates

410
Q

Internet:

A

Internet: A worldwide system of interconnected networks

411
Q

Internet Corporation for Assigned Names and Numbers (ICANN):

A

Internet Corporation for Assigned Names and Numbers (ICANN): Where website names are registered

412
Q

Internet of Things (IoT):

A

Internet of Things (IoT): The concept that more and more devices are connected to the internet in a smarter fashion such as smart thermostats that turn off the air conditioner when you leave and turn it on when you come back

413
Q

Internet Protocol (IP):

A

Internet Protocol (IP): The most common protocol used in the network layer

414
Q

Internet Protocol version 4 (IPv4):

A

Internet Protocol version 4 (IPv4): An address that consists of 32 bits separated into four groups

415
Q

Internet Protocol version 6 (IPv6):

A

Internet Protocol version 6 (IPv6): An address that consist of a 128 bits, four times the amount that IPv4 uses

416
Q

Internet service provider (ISP)

A

Internet service provider (ISP): A company that provides a consumer an internet connection

417
Q

Internet Service Provider (ISP):

A

Internet Service Provider (ISP): A company that provides a consumer an internet connection

418
Q

Internetwork:

A

Internetwork: A collection of networks connected together through routers - the most famous of these being the Internet

419
Q

Interpreted programming language:

A

Interpreted programming language: A language that isn’t compiled ahead of time

420
Q

Intranet:

A

Intranet: An internal network inside a company, accessible if you are on a company?s network

421
Q

Intrusion detection and intrusion protection systems (IDS/IPS):

A

Intrusion detection and intrusion protection systems (IDS/IPS): Operates by monitoring network traffic and analyzing it

422
Q

iOS:

A

iOS: A mobile operating system developed by Apple Inc.

423
Q

IP address:

A

IP address: The most common protocol used in the network layer, used to helps us route information

424
Q

IP datagram:

A

IP datagram: A highly structured series of fields that are strictly defined

425
Q

IP masquerading:

A

IP masquerading: The NAT obscures the sender’s IP address from the receiver

426
Q

IP options field:

A

IP options field: An optional field and is used to set special characteristics for datagrams primarily used for testing purposes

427
Q

IPsec (Internet Protocol security):

A

IPsec (Internet Protocol security): A VPN protocol that was designed in conjunction with IPv6

428
Q

IP source guard (IPSG):

A

IP source guard (IPSG): It can be enabled on enterprise switches along with DHCP snooping

429
Q

IPv6 tunnel:

A

IPv6 tunnel: IPv6 tunnel servers on either end of a connection take incoming IPv6 traffic and encapsulate it within traditional IPv4 datagrams

430
Q

IPv6 tunnel brokers:

A

IPv6 tunnel brokers: Companies that provide IPv6 tunneling endpoints for you, so you don’t have to introduce additional equipment to your network

431
Q

Issuer Name:

A

Issuer Name: This field contains information about the authority that signed the certificate

432
Q

IT Infrastructure:

A

IT Infrastructure: The software, the hardware, network, and services required for an organization to operate in an enterprise IT environment

433
Q

ITX (Information Technology eXtended):

A

ITX (Information Technology eXtended): A form factor for motherboards that is much smaller than ATX boards

434
Q

Kerberos:

A

Kerberos: A network authentication protocol that uses tickets to allow entities to prove their identity over potentially insecure channels to provide mutual authentication

435
Q

Kerckhoff’s principle:

A

Kerckhoff’s principle: A principle that states that a cryptosystem, or a collection of algorithms for key generation and encryption and decryption operations that comprise a cryptographic service should remain secure, even if everything about the system is known except for the key

436
Q

Kernel:

A

Kernel: The main core of an operating system that creates processes, efficiently schedules them, and manages how processes are terminated

437
Q

Kernel module:

A

Kernel module: It extends the kernel’s functionality so developers don’t have to actually touch the Linux kernel

438
Q

Key:

A

Key: A crucial component of a cipher, which introduces something unique into your cipher

439
Q

Key escrow:

A

Key escrow: Allows encryption key to be securely stored for later retrieval by an authorized party

440
Q

Key length:

A

Key length: It defines the maximum potential strength of the system

441
Q

Keylogger:

A

Keylogger: A common type of spyware that’s used to record every keystroke you make

442
Q

Key signing parties:

A

Key signing parties: Organized by people who are interested in establishing a web of trust, and participants perform the same verification and signing

443
Q

Key size:

A

Key size: It is the total number of bits or data that comprises the encryption key

444
Q

KVM Switch:

A

KVM Switch: Keyboard, video, & mouse switch that looks like a hub that you can connect multiple computers to and control using one keyboard, mouse, and monitor

445
Q

L2TP (Layer 2 Tunneling Protocol):

A

L2TP (Layer 2 Tunneling Protocol): It is typically used to support VPNs

446
Q

Land Grid Array (LGA):

A

Land Grid Array (LGA): It is a type of CPU socket that stick out of the motherboard

447
Q

LDAP data interchange format:

A

LDAP data interchange format: The tool that allows you to authenticate, add, remove users, groups, computers and so on in a directory service

448
Q

LDAP Entry:

A

LDAP Entry: A collection of information that’s used to describe something

449
Q

LDIF files:

A

LDIF files: A text file that lists attributes and values that describe something

450
Q

Library:

A

Library: A way to package a bunch of useful code that someone else wrote

451
Q

Lightning adaptor:

A

Lightning adaptor: One of the standard power, data and display connector types used in mobile devices

452
Q

Lightweight Directory Access Protocol (LDAP):

A

Lightweight Directory Access Protocol (LDAP): An open industry-standard protocol for accessing and maintaining directory services; the most popular open-source alternative to the DAP

453
Q

Line coding:

A

Line coding: Modulation used for computer networks

454
Q

Linked:

A

Linked: A GPO that all of the computers or users under a domain, site, or OU will have a policy applied

455
Q

Link-local unicast address:

A

Link-local unicast address: Allow for local network segment communications and are configured based upon a host’s MAC address

456
Q

Linux OS:

A

Linux OS: Linux is one of the largest an open source operating system used heavily in business infrastructure and in the consumer space

457
Q

Listen:

A

Listen: It means that a TCP socket is ready and listening for incoming connections

458
Q

List folder contents:

A

List folder contents: A command that will execute and list folder contents and is an alias for Read and Execute

459
Q

Load balancer:

A

Load balancer: Ensures that each VM receives a balanced number of queries

460
Q

Local Area Network (LAN):

A

Local Area Network (LAN): A single network in which multiple devices are connected

461
Q

Logging:

A

Logging: The act of creating log events

462
Q

Logic bomb:

A

Logic bomb: A type of Malware that’s intentionally installed

463
Q

Logic gates:

A

Logic gates: Allow transistors to do more complex tasks, like decide where to send electrical signals depending on logical conditions

464
Q

Log rotation:

A

Log rotation: A way for the OS to clean out log files to make room for new ones

465
Q

Logs:

A

Logs: Files that record system events on our computer

466
Q

Logs analysis systems:

A

Logs analysis systems: They are configured using user-defined rules to match interesting or atypical log entries

467
Q

Loopback address:

A

Loopback address: An IP address that always points to itself. This type of address is used to test internal pathing through the TCP/IP protocols