ACRONYMS, FILE FORMATS, & COMMANDS STUDY DECK Flashcards

1
Q

diskmgmt.msc

A

Disk Management
Console related to initializing, partitioning, and formatting disk drives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

dfrgui.exe

A

Defragment and Optimize Drives tool
Fragmentation occurs when a data file is not saved to contiguous sectors on an HDD and reduces performance. The defragmenter mitigates this and can also perform optimization operations for SSDs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

cleanmgr.exe

A

Disk Clean-up
Windows utility for removing temporary files to reclaim disk space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

tasksch.msc

A

Task Scheduler
Enables execution of an action (such as running a program or a script) automatically at a pre-set time or in response to some sort of trigger.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

lusrmgr.msc

A

Local Users and Groups
Console for creating and managing user and group accounts with the authentication and permissions scope of the local system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

certmgr.msc

A

Certificate Manager console
Console related to managing digital certificates for the current user and trusted root certification authority certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

gpedit.msc

A

Group Policy Editor
Console related to configuring detailed user and system registry settings via policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

regedit.exe

A

Registry Editor
Tool for making direct edits to the registry database, such as adding or modifying keys or values. The Registry Editor can be used to make backups of the registry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

MMC

A

Microsoft Management Console
Utility allowing Windows administrative tools to be added as snap-ins to a single interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

eventvwr.msc

A

Event Viewer
Windows console related to viewing and exporting events in the Windows logging file format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

msinfo32.exe

A

System Information
Utility that provides a report of the PC’s hardware and software configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

taskmgr.exe

A

Task Manager
Windows utility used to monitor and manage process execution, resource utilization, user sessions, startup settings, and service configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

services.msc

A

Services
Windows machines run services to provide functions; for example, Plug-and-Play, the print spooler, DHCP client, and so on. These services can be viewed, configured, and started/stopped via the Services console. You can also configure which services run at startup using msconfig. You can view background services (as well as applications) using the Processes tab in Task Manager.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

resmon.exe

A

Resource Monitor
Console for live monitoring of resource utilization data for the CPU and GPU, system memory, disk/file system, and network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

perfmon.msc

A

Performance Monitor
Console for reporting and recording resource utilization via counter data for object instances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

msconfig.exe

A

System Configuration Utility
Utility for configuring Windows startup settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

cmd.exe

A

Basic shell interpreter for Windows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

rmdir

A

Command-line tool for deleting directories. The /s switch enables the deletion of non-empty directories.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

md command

A

Command-line tool for creating directories.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

move command

A

Command-line tool for moving files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

copy command

A

Command-line tool for copying files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

robocopy command

A

Command-line file copy utility recommended for use over the older xcopy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

xcopy command

A

Command-line directory and file copy utility offering improved functionality compared to the basic copy command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

diskpart

A

Command-line utility used to configure disk partitions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

format command

A

Command-line utility for creating a file system on a partition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

X:

A

Command-line utility used to select the working drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

chkdsk

A

Command-line tool that verifies the integrity of a disk’s file system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

shutdown command

A

Command-line tool for shutting down or restarting the computer. The command is supported by Windows and Linux, though with different syntax.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

System File Checker

A

Command-line utility that checks the integrity of system and device driver files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

winver command

A

Command-line tool for reporting Windows version information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

NTFS

A

New Technology File System
64-bit default file system for Windows, with file-by-file compression and RAID support as well as advanced file attribute management tools, encryption, and disk quotas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

APFS

A

Apple File System
Default file system for macOS-based computers and laptops.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

EOL

A

End of Life
Product life-cycle phase where mainstream vendor support is no longer available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

OEM

A

Original Equipment Manufacturer
In PC terms, companies that sell Windows co-branded under their own logo. OEM Windows licenses are valid only on the system that the software was installed on, and the OEM must provide support.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

RDP

A

Remote Desktop Protocol
Application protocol for operating remote connections to a host using a graphical interface. The protocol sends screen data from the remote host to the client and transfers mouse and keyboard input from the client to the remote host. It uses TCP port 3389.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

HCL

A

Hardware Compatibility List
*Before installing an OS, check that your PC parts are compatible. Incompatible parts may stop the installation or not work properly.**

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

PXE

A

Preboot eXecution Environment
Feature of a network adapter that allows the computer to boot by contacting a suitably configured server over the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

MBR

A

Master Boot Record
A sector on a storage device that stores information about partitions and the OS boot loader.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

GPT

A

Globally Unique Identifier(GUID) Partition Pable
Modern disk partitioning system allowing large numbers of partitions and very large partition sizes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

WinRE

A

Windows Recovery Environment
A Windows tool that adds a command shell to a recovery partition to fix boot problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

BSoD

A

Blue Screen of Death
A Microsoft error screen (also called a stop error) that shows when the system can’t recover. It’s usually caused by faulty drivers or hardware issues (like memory or disk problems). Other systems have similar error signs, like Apple’s pinwheel or Linux’s kernel panic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

NIC

A

Network Interface Card
An adapter card with Ethernet port(s) that connects devices to a network to exchange data over a link.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

IP

A

Internet Protocol
Network (Internet) layer protocol in the TCP/IP suite providing packet addressing and routing for all higher-level protocols in the suite.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

DNS

A

Domain Name System
A service that connects domain names to IP addresses on most TCP/IP networks, including the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

DHCP

A

Dynamic Host Configuration Protocol
Protocol used to automatically assign IP addressing information to hosts that have not been configured manually.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

NLA

A

Network Location Awareness
Windows feature that categorizes network profile as public or private. Each profile can have a different firewall configuration, with public network types being more restricted, by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

VPN

A

Virtual Private Network
Secure tunnel created between two endpoints connected via an unsecure transport network (typically the Internet).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

WWAN

A

Wireless Wide Area Network
*A large network that uses wireless technologies, like cellular radio data or line-of-sight microwave signals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

ipconfig command

A

Command tool used to gather information about the IP configuration of a Windows host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

ping command

A

Cross-platform command tool for testing IP packet transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

tracert command

A

Diagnostic tools that track the path a packet takes to reach its destination on a remote network. “Tracert” is used on Windows, and “traceroute” is used on Linux.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

pathping command

A

Windows utility for measuring latency and packet loss across an internetwork.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

nslookup command

A

Cross-platform command tool for querying DNS resource records.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

ACL

A

Access Control List
A set of access control entries (ACEs) that specify which users, devices, or accounts can access an object and what permissions (such as read-only or read/write) they have.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

netstat command

A

A command tool that works on various platforms to display network information, such as active connections and the routing table, on a TCP/IP-enabled machine.

40
Q

UAC

A

User Account Control
Windows feature designed to mitigate abuse of administrative accounts by requiring explicit consent to use privileges.

41
Q

SMS

A

Short Message Service
System for sending text messages between cell phones.

41
Q

MFA

A

Multifactor Authentication
a security process that requires users to provide two or more forms of identification to access an account or system. These forms typically include something you know (like a password), something you have (like a phone or security token), or something you are (like a fingerprint). This adds an extra layer of protection beyond just a password.

42
Q

TPM

A

Trusted Platform Module
A hardware component in computers that provides security by storing encryption keys, hashed passwords, and other user-platform sensitive data, helping protect against unauthorized access.

43
Q

SSO

A

Single Sign-On
Authentication technology that allows users to access multiple applications with one set of credentials, eliminating the need to log in separately to each one.

44
Q

AD

A

Active Directory
Network directory service for Microsoft Windows domain networks that facilitates authentication and authorization of user and computer accounts.

44
Q

OU

A

Organizational Unit
An OU (Organizational Unit) is a container in Active Directory used to organize and manage groups of users, computers, and other resources within a network. It helps simplify administration by grouping related items together.

45
Q

GPOs

A

Group Policy Objects
GPOs (Group Policy Objects) are settings in Active Directory that control the behavior and security of computers and users in a network. They allow administrators to apply rules and configurations across many devices and users at once.

46
Q

gpupdate

A

Command-line tools to apply and analyze group policies. Group policies are a means of configuring registry settings.

47
Q

MDM

A

Mobile Device Management
Processes and technologies for tracking, controlling, and securing the organization’s mobile infrastructure.

48
Q

pwd command

A

Linux command for showing the current directory (“Print Working Directory”).

49
Q

ls command

A

Linux command for listing file system objects.

50
Q

cat command

A

Linux command to view and combine (concatenate) files.

51
Q

find command

A

Command-line Linux tool used to search the file system.

52
Q

grep command

A

Linux command for searching and filtering input. This can be used as a file search tool when combined with ls.

53
Q

cp command

A

Command-line tool for copying files in Linux.

54
Q

mv command

A

Command-line tool for moving files in Linux.

55
Q

rm command

A

Command-line tool for delete files or directories in Linux.

56
Q

df and du commands

A

Command-line tools used to report storage usage in Linux.

57
Q

su command

A

Linux commands used to switch to another user account, typically the root (administrator) account. It allows you to execute commands with the privileges of that user. When used without specifying a user, it defaults to the root account.

57
Q

sudo

A

Linux commands allowing a user to use the root account or execute commands restricted to privileged users.

(Difference between su and sudo: su switches users entirely, while sudo grants temporary elevated privileges for specific tasks.)

58
Q

apt-get

A

One of the package management tools available in Linux for installing and updating software.

58
Q

chmod command

A

Linux command for managing file permissions; used to change the permissions of a file or directory

58
Q

chown command

A

Linux command for managing the account owner for files and directories.

59
Q

cron / crontab command

A

The command used to create, edit, or list the cron jobs for a specific user.

A cron job is typically defined in a configuration file called a “crontab” and can be scheduled to run commands, scripts, or programs at specific times (e.g., daily, weekly, monthly).

59
Q

yum

A

Package manager for installing, maintaining, inventorying, and removing software from the Red Hat family of Linux distributions.

59
Q

ps command

A

Linux command for retrieving process information.

60
Q

top command

A

Interactive Linux command for monitoring process information.

61
Q

ifconfig

A

Deprecated Linux command (now commonly used in it’s place is the ip command) used to gather information about the IP configuration of the network adapter or to configure the network adapter.

62
Q

ip comand

A

Linux command tool used to gather information about the IP configuration of the network adapter or to configure the network adapter (Newer version of the ifconfig)

62
Q

CIA triad

A

Confidentiality, Integrity, and Availability

Three principles of security control and management. Also known as the information security triad. Also referred to in reverse order as the AIC triad.

63
Q

BYOD

A

Bring Your Own Device

Security framework and tools to facilitate use of personally-owned devices to access corporate networks and data.

63
Q

DDoS

A

**Distributed Denial of Service*

An attack that uses multiple compromised hosts (a botnet) to overwhelm a service with request or response traffic.

63
Q

DoS

A

Denial of Service

Any type of physical, application, or network attack that affects the availability of a managed resource.

64
Q

XSS

A

Cross-Site Scripting

Malicious script hosted on the attacker’s site or coded in a link injected onto a trusted site designed to compromise clients browsing the trusted site, circumventing the browser’s security model of trusted zones.

64
Q

WPA

A

Wi-Fi Protected Access

Standards for authenticating and encrypting access to Wi-Fi networks.

65
Q

TKIP

A

Temporal Key Integrity Protocol

Mechanism used in the first version of WPA to improve the security of wireless encryption mechanisms, compared to the flawed WEP standard.

66
Q

AES

A

Advanced Encryption Standard

Symmetric 128-, 192-, or 256-bit block cipher used for bulk encryption in modern security standards, such as WPA2, WPA3, and TLS.

67
Q

CCMP

A

Counter Mode with Cipher Block Chaining Message Authentication Code Protocol

Encryption protocol used for wireless LANs that addresses the vulnerabilities of the WEP protocol.

68
Q

SAE

A

Simultaneous Authentication of Equals

Personal authentication mechanism for Wi-Fi networks introduced with WPA3 to address vulnerabilities in the WPA-PSK method.

69
Q

PSK

A

Pre-Shared Key

Wireless network authentication mode where a passphrase-based mechanism is used to allow group authentication to a wireless network. The passphrase is used to derive an encryption key.

70
Q

EAP

A

Extensible Authentication Protocol

Framework for negotiating authentication methods that enables systems to use hardware-based identifiers, such as fingerprint scanners or smart card readers, for authentication, and establish secure tunnels through which to submit credentials.

71
Q

AAA

A

Authentication, Authentication, and Accounting

Security concept where a centralized platform verifies subject identification, ensures the subject is assigned relevant permissions, and then logs these actions to create an audit trail.

72
Q

RADIUS

A

Remote Authentication Dial-in User Service

AAA protocol used to manage remote and wireless authentication infrastructures.

73
Q

TACACS+

A

Terminal Access Controller Access Control System Plus

It is an AAA protocol that was developed by Cisco and used by numerous third-party implementations that is used in authenticating administrative access to routers and switches.

74
Q

SSID

A

service set ID

Character string that identifies a particular wireless LAN (WLAN).

75
Q

DHCP

A

Dynamic Host Configuration Protocol

It is a network protocol used to automatically assign IP addresses and other network configuration details (like gateway and DNS server information) to devices on a network.

76
Q

UPnP

A

Universal Plug-and-Play

Protocol framework allowing network devices to autoconfigure services, such as allowing a games console to request appropriate settings from a firewall.

77
Q

DMZ

A

Demilitarized Zone

78
Q

BIOS/UEFI

A
79
Q

EFS

A

Encrypting File System

Microsoft’s file-level encryption feature available for use on NTFS.

80
Q

C2 or C&C

A

Command and Control

80
Q

PII

A

Personally Identifiable Information

Data that can be used to identify or contact an individual (or in the case of identity theft, to impersonate them).

81
Q

RAT

A

Remote Access Trojan

Malware that creates a backdoor remote administration channel to allow a threat actor to access and control the infected host.

82
Q

VNC

A

Virtual Network Computing

Remote access tool and protocol. VNC is the basis of macOS screen-sharing.

83
Q

MSRA

A

Microsoft Remote Assistance

Windows remote-support feature allowing a user to invite a technical support professional to provide assistance over a network using chat. The user can also grant the support professional control over his or her desktop. Remote Assistance uses the same RDP protocol as Remote Desktop.

84
Q

SSH

A

Secure Shell

Application protocol supporting secure tunneling and remote terminal emulation and file copy. SSH runs over TCP port 22.

85
Q

UEM

A

Desktop Management or Unified Endpoint Management

Enterprise software for controlling device settings, apps, and corporate data storage on all types of fixed, mobile, and IoT computing devices.

86
Q

RMM

A

Remote monitoring and management

Category of support software designed for outsourced management of client networks by MSPs.

87
Q

EDR

A

Endpoint Detection and Response

Software agent that collects system data and logs for analysis by a monitoring system to provide early detection of threats.

88
Q

GFS

A

Grandfather-Father-Son

Media rotation scheme that labels tapes/devices used for backup jobs in generations, with the youngest generation having a shorter retention period than the oldest.

89
Q

EULA

A

End-User License Agreement

Contract governing the installation and use of software.

90
Q

DRM

A

Digital Rights Management

Copyright protection technologies for digital media. DRM solutions usually try to restrict the number of devices allowed for playback of a licensed digital file, such as a music track or ebook.

91
Q

IRP

A

Incident Response Plan

Procedures and guidelines covering appropriate priorities, actions, and responsibilities in the event of security incidents, divided into preparation, detection/analysis, containment, eradication/recovery, and post-incident stages.

92
Q

CSIRT

A

Computer Security Incident Response Team

Team with responsibility for incident response. The CSIRT must have expertise across a number of business domains (IT, HR, legal, and marketing, for instance).

93
Q

SE

A

Secure Erase

Method of sanitizing a drive using the ATA command set.

94
Q

ISE

A

Instant Secure Erase

*Media sanitization command built into HDDs and SSDs that are self-encrypting that works by erasing the encryption key, leaving remnants unrecoverable.**

95
Q

.SH

A

Extension for a Linux shell script file format. The shebang in the first line of the script identifies the shell type (Bash, for instance).

96
Q

PS command

A

PowerShell

Command shell and scripting language built on the .NET Framework that use cmdlets for Windows automation.

97
Q

.PS1

A

Extension for the PowerShell script format.

98
Q

VBScript

A

A command shell and scripting language built on the .NET Framework, which allows the administrator to automate and manage computing tasks.

99
Q

.VBS

A

Extension for the Visual Basic Script file format.

100
Q

.BAT

A

Extension for the batch file format that is used to execute a series of Windows CMD shell commands.

101
Q

.JS

A

Extension for the JavaScript file format.

102
Q

.PY

A

Extension for a script written in the Python programming language.

103
Q

API

A

Application Programming Interface

Methods exposed by a script or program that allow other scripts or programs to use it. For example, an API enables software developers to access functions of the TCP/IP network stack under a particular operating system.

104
Q

SOP

A

Standard Operating Procedure

Documentation of best practice and work instructions to use to perform a common administrative task.

105
Q

KB

A

Knowledge Base

Searchable database of product FAQs (Frequently Asked Questions), advice, and known troubleshooting issues. The Microsoft KB is found at support.microsoft.com.

106
Q

AUP

A

Acceptable Use Policy

Policy that governs employees’ use of company equipment and Internet services. ISPs may also apply AUPs to their customers.

107
Q

ESD

A

Electrostatic Discharge

Metal and plastic surfaces can allow a charge to build up. This can discharge if a potential difference is formed between the charged object and an oppositely charged conductive object. This electrical discharge can damage silicon chips and computer components if they are exposed to it.

108
Q

UPS

A

Uninterruptible Power Supply

Battery-powered device that supplies AC power that an electronic device can use in the event of power failure.

109
Q

MSDS

A

Material Safety Data Sheet

Information sheet accompanying hazardous products or substances that explains the proper procedures for handling and disposal.