ACRONYMS, FILE FORMATS, & COMMANDS STUDY DECK Flashcards

1
Q

diskmgmt.msc

A

Disk Management
Console related to initializing, partitioning, and formatting disk drives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

dfrgui.exe

A

Defragment and Optimize Drives tool
Fragmentation occurs when a data file is not saved to contiguous sectors on an HDD and reduces performance. The defragmenter mitigates this and can also perform optimization operations for SSDs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

cleanmgr.exe

A

Disk Clean-up
Windows utility for removing temporary files to reclaim disk space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

tasksch.msc

A

Task Scheduler
Enables execution of an action (such as running a program or a script) automatically at a pre-set time or in response to some sort of trigger.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

lusrmgr.msc

A

Local Users and Groups Manager
Console for creating and managing user and group accounts with the authentication and permissions scope of the local system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

certmgr.msc

A

Certificate Manager console
Console related to managing digital certificates for the current user and trusted root certification authority certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

gpedit.msc

A

Group Policy Editor
Console related to configuring detailed user and system registry settings via policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

regedit.exe

A

Registry Editor
Tool for making direct edits to the registry database, such as adding or modifying keys or values. The Registry Editor can be used to make backups of the registry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

MMC

A

Microsoft Management Console
Utility allowing Windows administrative tools to be added as snap-ins to a single interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

eventvwr.msc

A

Event Viewer
Windows console related to viewing and exporting events in the Windows logging file format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

msinfo32.exe

A

System Information
Utility that provides a report of the PC’s hardware and software configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

taskmgr.exe

A

Task Manager
Windows utility used to monitor and manage process execution, resource utilization, user sessions, startup settings, and service configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

services.msc

A

Services
Windows machines run services to provide functions; for example, Plug-and-Play, the print spooler, DHCP client, and so on. These services can be viewed, configured, and started/stopped via the Services console. You can also configure which services run at startup using msconfig. You can view background services (as well as applications) using the Processes tab in Task Manager.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

resmon.exe

A

Resource Monitor
Console for live monitoring of resource utilization data for the CPU and GPU, system memory, disk/file system, and network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

perfmon.msc

A

Performance Monitor
Console for reporting and recording resource utilization via counter data for object instances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Utility for configuring Windows startup settings.

A

msconfig.exe
Microsoft System Configuration Utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

cmd.exe

A

Basic shell interpreter for Windows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

rmdir

A

Command-line tool for deleting directories. The /s switch enables the deletion of non-empty directories.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

md command

A

Command-line tool for creating directories.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Command-line tool for moving files.

A

move command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Command-line tool for copying files.

A

copy command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Command-line file copy utility recommended for use over the older xcopy.

A

robocopy command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Command-line directory and file copy utility offering improved functionality compared to the basic copy command.

A

xcopy command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Command-line utility used to configure disk partitions.

A

diskpart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Command-line utility for creating a file system on a partition.

A

format command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Command-line utility used to select the working drive.

A

X:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Command-line tool that verifies the integrity of a disk’s file system.

A

chkdsk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Command-line tool for shutting down or restarting the computer. The command is supported by Windows and Linux, though with different syntax.

A

shutdown command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Command-line utility that checks the integrity of system and device driver files.

A

System File Checker
sfc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Command-line tool for reporting Windows version information.

A

winver command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

NTFS

A

New Technology File System
64-bit default file system for Windows, with file-by-file compression and RAID support as well as advanced file attribute management tools, encryption, and disk quotas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

APFS

A

Apple File System
Default file system for macOS-based computers and laptops.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

EOL

A

End of Life
Product life-cycle phase where mainstream vendor support is no longer available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

RDP

A

Remote Desktop Protocol
Application protocol for operating remote connections to a host using a graphical interface. The protocol sends screen data from the remote host to the client and transfers mouse and keyboard input from the client to the remote host. It uses TCP port 3389.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

HCL

A

Hardware Compatibility List
Before installing an OS, check that your PC parts are compatible. Incompatible parts may stop the installation or not work properly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

PXE

A

Preboot eXecution Environment
Feature of a network adapter that allows the computer to boot by contacting a suitably configured server over the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

MBR

A

Master Boot Record
A sector on a storage device that stores information about partitions and the OS boot loader.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

GPT

A

Globally Unique Identifier(GUID) Partition Table
Modern disk partitioning system allowing large numbers of partitions and very large partition sizes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

WinRE

A

Windows Recovery Environment
A Windows tool that adds a command shell to a recovery partition to fix boot problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

BSoD

A

Blue Screen of Death
A Microsoft error screen (also called a stop error) that shows when the system can’t recover. It’s usually caused by faulty drivers or hardware issues (like memory or disk problems). Other systems have similar error signs, like Apple’s pinwheel or Linux’s kernel panic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

NIC

A

Network Interface Card
An adapter card with Ethernet port(s) that connects devices to a network to exchange data over a link.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

IP

A

Internet Protocol
Network (Internet) layer protocol in the TCP/IP suite providing packet addressing and routing for all higher-level protocols in the suite.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

DNS

A

Domain Name System
A service that connects domain names to IP addresses on most TCP/IP networks, including the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

DHCP

A

Dynamic Host Configuration Protocol
Protocol used to automatically assign IP addressing information to hosts that have not been configured manually.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

VPN

A

Virtual Private Network
Secure tunnel created between two endpoints connected via an unsecure transport network (typically the Internet).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

WWAN

A

Wireless Wide Area Network
A large network that uses wireless technologies, like cellular radio data or line-of-sight microwave signals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Command tool used to gather information about the IP configuration of a Windows host.

A

ipconfig command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Cross-platform command tool for testing IP packet transmission.

A

ping command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Diagnostic tools that track the path a packet takes to reach its destination on a remote network.

A

tracert is used on Windows
traceroute is used on Linux.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Windows utility for measuring latency and packet loss across an internetwork.

A

pathping command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Cross-platform command tool for querying DNS resource records.

A

nslookup command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

ACL

A

Access Control List
A set of access control entries (ACEs) that specify which users, devices, or accounts can access an object and what permissions (such as read-only or read/write) they have.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

A command tool that works on various platforms to display network information, such as active connections and the routing table, on a TCP/IP-enabled machine.

A

netstat command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

UAC

A

User Account Control
Windows feature designed to mitigate abuse of administrative accounts by requiring explicit consent to use privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

SMS

A

Short Message Service
System for sending text messages between cell phones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

MFA

A

Multifactor Authentication
a security process that requires users to provide two or more forms of identification to access an account or system. These forms typically include something you know (like a password), something you have (like a phone or security token), or something you are (like a fingerprint). This adds an extra layer of protection beyond just a password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

TPM

A

Trusted Platform Module
A hardware component in computers that provides security by storing encryption keys, hashed passwords, and other user-platform sensitive data, helping protect against unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

SSO

A

Single Sign-On
Authentication technology that allows users to access multiple applications with one set of credentials, eliminating the need to log in separately to each one.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

AD

A

Active Directory
Network directory service for Microsoft Windows domain networks that facilitates authentication and authorization of user and computer accounts.

42
Q

OU

A

Organizational Unit
An OU (Organizational Unit) is a container in Active Directory used to organize and manage groups of users, computers, and other resources within a network. It helps simplify administration by grouping related items together.

43
Q

GPOs

A

Group Policy Objects
GPOs (Group Policy Objects) are settings in Active Directory that control the behavior and security of computers and users in a network. They allow administrators to apply rules and configurations across many devices and users at once.

44
Q

Command-line tools to apply and analyze group policies. Group policies are a means of configuring registry settings.

A

gpupdate

45
Q

MDM

A

Mobile Device Management
Processes and technologies for tracking, controlling, and securing the organization’s mobile infrastructure.

46
Q

Linux command for showing the current directory

A

pwd command
Print Working Directory

47
Q

Linux command for listing file system objects.

A

ls command

48
Q

Linux command to view and combine (concatenate) files.

A

cat command

49
Q

Command-line Linux tool used to search the file system.

A

find command

50
Q

Linux command for searching and filtering input. This can be used as a file search tool when combined with ls.

A

grep command

51
Q

Command-line tool for copying files in Linux.

A

cp command

52
Q

Command-line tool for moving files in Linux.

A

mv command

53
Q

rm command

A

Command-line tool for delete files or directories in Linux.

54
Q

Command-line tools used to report storage usage in Linux.

A

df and du commands
Disk Free Disk Usage

55
Q

Linux command used to switch to another user account, typically the root (administrator) account. It allows you to execute commands with the privileges of that user. When used without specifying a user, it defaults to the root account.

A

su command
substitute user

55
Q

Linux command allowing a user to use the root account or execute commands restricted to privileged users.

A

sudo command
superUser Do

(Difference between su and sudo: su switches users entirely, while sudo grants temporary elevated privileges for specific tasks.)

56
Q

One of the package management tools, a command available in Linux for installing and updating software.

A

apt-get
advanced package tool

56
Q

Linux command for managing file permissions; used to change the permissions of a file or directory

A

chmod command

56
Q

Linux command for managing the account owner for files and directories.

A

chown command

57
Q

Package manager for installing, maintaining, inventorying, and removing software from the Red Hat family of Linux distributions.

A

yum
yellowdog updater, modified

57
Q

Linux command for retrieving process information.

A

ps command
process status

57
Q

Interactive Linux command for monitoring process information.

A

top command
table of processes

58
Q

Deprecated Linux command (now commonly used in its place is the ip command) used to gather information about the IP configuration of the network adapter or to configure the network adapter.

A

ifconfig

interface configuration

59
Q

Linux command tool used to gather information about the IP configuration of the network adapter or to configure the network adapter (Newer version of the ifconfig)

A

ip command

59
Q

BYOD

A

Bring Your Own Device

Security framework and tools to facilitate use of personally-owned devices to access corporate networks and data.

59
Q

DDoS

A

Distributed Denial of Service

An attack that uses multiple compromised hosts (a botnet) to overwhelm a service with request or response traffic.

59
Q

DoS

A

Denial of Service

Any type of physical, application, or network attack that affects the availability of a managed resource.

60
Q

XSS

A

Cross-Site Scripting

Malicious script hosted on the attacker’s site or coded in a link injected onto a trusted site designed to compromise clients browsing the trusted site, circumventing the browser’s security model of trusted zones.

60
Q

WPA

A

Wi-Fi Protected Access

Standards for authenticating and encrypting access to Wi-Fi networks.

61
Q

TKIP

A

Temporal Key Integrity Protocol

Mechanism used in the first version of WPA to improve the security of wireless encryption mechanisms, compared to the flawed WEP standard.

62
Q

AES

A

Advanced Encryption Standard

Symmetric 128-, 192-, or 256-bit block cipher used for bulk encryption in modern security standards, such as WPA2, WPA3, and TLS.

63
Q

Encryption protocol used for wireless LANs that addresses the vulnerabilities of the WEP protocol.

A

Counter Mode with Cipher Block Chaining Message Authentication Code Protocol

CCMP

64
Q

Personal authentication mechanism for Wi-Fi networks introduced with WPA3 to address vulnerabilities in the WPA-PSK method.

A

Simultaneous Authentication of Equals

SAE

65
Q

PSK

A

Pre-Shared Key

Wireless network authentication mode where a passphrase-based mechanism is used to allow group authentication to a wireless network. The passphrase is used to derive an encryption key.

66
Q

EAP

A

Extensible Authentication Protocol

Framework for negotiating authentication methods that enables systems to use hardware-based identifiers, such as fingerprint scanners or smart card readers, for authentication, and establish secure tunnels through which to submit credentials.

67
Q

AAA

A

Authentication, Authorization, and Accounting

Security concept where a centralized platform verifies subject identification, ensures the subject is assigned relevant permissions, and then logs these actions to create an audit trail.

68
Q

RADIUS

A

Remote Authentication Dial-in User Service

AAA protocol used to manage remote and wireless authentication infrastructures.

69
Q

TACACS+

A

Terminal Access Controller Access Control System Plus

It is an AAA protocol that was developed by Cisco and used by numerous third-party implementations that is used in authenticating administrative access to routers and switches.

70
Q

SSID

A

service set ID

Character string that identifies a particular wireless LAN (WLAN).

71
Q

DHCP

A

Dynamic Host Configuration Protocol

It is a network protocol used to automatically assign IP addresses and other network configuration details (like gateway and DNS server information) to devices on a network.

72
Q

UPnP

A

Universal Plug-and-Play

Protocol framework allowing network devices to autoconfigure services, such as allowing a games console to request appropriate settings from a firewall.

73
Q

DMZ

A

Demilitarized Zone

74
Q

A

75
Q

EFS

A

Encrypting File System

Microsoft’s file-level encryption feature available for use on NTFS.

76
Q

C&C (C2)

A

Command and Control

76
Q

PII

A

Personally Identifiable Information

Data that can be used to identify or contact an individual (or in the case of identity theft, to impersonate them).

77
Q

RAT

A

Remote Access Trojan

Malware that creates a backdoor remote administration channel to allow a threat actor to access and control the infected host.

78
Q

VNC

A

Virtual Network Computing

Remote access tool and protocol. VNC is the basis of macOS screen-sharing.

79
Q

MSRA

A

Microsoft Remote Assistance

Windows remote-support feature allowing a user to invite a technical support professional to provide assistance over a network using chat. The user can also grant the support professional control over his or her desktop. Remote Assistance uses the same RDP protocol as Remote Desktop.

80
Q

SSH

A

Secure Shell

Application protocol supporting secure tunneling and remote terminal emulation and file copy. SSH runs over TCP port 22.

81
Q

UEM

A

Unified Endpoint Management

Enterprise software for controlling device settings, apps, and corporate data storage on all types of fixed, mobile, and IoT computing devices.

82
Q

RMM

A

Remote monitoring and management

Category of support software designed for outsourced management of client networks by MSPs.

83
Q

EDR

A

Endpoint Detection and Response

Software agent that collects system data and logs for analysis by a monitoring system to provide early detection of threats.

84
Q

GFS

A

Grandfather-Father-Son

Media rotation scheme that labels tapes/devices used for backup jobs in generations, with the youngest generation having a shorter retention period than the oldest.

85
Q

EULA

A

End-User License Agreement

Contract governing the installation and use of software.

86
Q

DRM

A

Digital Rights Management

Copyright protection technologies for digital media. DRM solutions usually try to restrict the number of devices allowed for playback of a licensed digital file, such as a music track or ebook.

87
Q

IRP

A

Incident Response Plan

Procedures and guidelines covering appropriate priorities, actions, and responsibilities in the event of security incidents, divided into preparation, detection/analysis, containment, eradication/recovery, and post-incident stages.

88
Q

CSIRT

A

Computer Security Incident Response Team

Team with responsibility for incident response. The CSIRT must have expertise across a number of business domains (IT, HR, legal, and marketing, for instance).

89
Q

SE

A

Secure Erase

Method of sanitizing a drive using the ATA command set.

90
Q

ISE

A

Instant Secure Erase

*Media sanitization command built into HDDs and SSDs that are self-encrypting that works by erasing the encryption key, leaving remnants unrecoverable.**

91
Q

.SH

A

Extension for a Linux shell script file format. The shebang in the first line of the script identifies the shell type (Bash, for instance).

92
Q

PS command

A

PowerShell

Command shell and scripting language built on the .NET Framework that use cmdlets for Windows automation.

93
Q

.PS1

A

Extension for the PowerShell script format.

94
Q

VBScript

A

A command shell and scripting language built on the .NET Framework, which allows the administrator to automate and manage computing tasks.

95
Q

.VBS

A

Extension for the Visual Basic Script file format.

96
Q

.BAT

A

Extension for the batch file format that is used to execute a series of Windows CMD shell commands.

97
Q

.JS

A

Extension for the JavaScript file format.

98
Q

.PY

A

Extension for a script written in the Python programming language.

99
Q

API

A

Application Programming Interface

Methods exposed by a script or program that allow other scripts or programs to use it. For example, an API enables software developers to access functions of the TCP/IP network stack under a particular operating system.

100
Q

SOP

A

Standard Operating Procedure

Documentation of best practice and work instructions to use to perform a common administrative task.

101
Q

KB

A

Knowledge Base

Searchable database of product FAQs (Frequently Asked Questions), advice, and known troubleshooting issues. The Microsoft KB is found at support.microsoft.com.

102
Q

AUP

A

Acceptable Use Policy

Policy that governs employees’ use of company equipment and Internet services. ISPs may also apply AUPs to their customers.

103
Q

ESD

A

Electrostatic Discharge

Metal and plastic surfaces can allow a charge to build up. This can discharge if a potential difference is formed between the charged object and an oppositely charged conductive object. This electrical discharge can damage silicon chips and computer components if they are exposed to it.

104
Q

UPS

A

Uninterruptible Power Supply

Battery-powered device that supplies AC power that an electronic device can use in the event of power failure.

105
Q

MSDS

A

Material Safety Data Sheet

Information sheet accompanying hazardous products or substances that explains the proper procedures for handling and disposal.

106
Q

SOHO

A

Small Office Home Office

The Windows Home edition is designed for domestic consumers and possibly small office home office (SOHO) business use

107
Q

OEM

A

Original Equipment Manufacturer

108
Q

HDD

A

Hard Disk Drive

109
Q

SSD

A

Solid-State Drive

110
Q

MBR

A

Master Boot Record

111
Q

GPT

A

GUID [globally unique identifier] Partition Table

112
Q

PBR

A

partition boot record

113
Q

CPU

A

Central Processing Unit

114
Q

POST

A

power on self-test

115
Q

UEFI

A

Unified Extensible Firmware Interface.

116
Q

rstrui.exe

A

System Restore tool

117
Q

FQDN

A

Fully Qualified Domain Name