Chapter 9 Operational Procedures Key Terms Flashcards

1
Q

whitepaper

A

A resource that differs from other types of writing in that it focuses on a complex technical topic and tries to make it understandable to the average reader

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

acceptable use policy (AUP)

A

A company’s policy for employees pertaining to
user safety, security procedures, and computer best practices within a company. The policy is designed to keep the network safe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

change management

A

The process of preparing for changes in a network, including planning, staffing, organizing, and getting feedback from impacted stakeholders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

system image backup

A

A backup that includes everything on the drive, including the operating system (which is the system image). This backup can be used to restore a failed computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

uninterruptable power supply (UPS)

A

A power supply in which connected devices are always powered by the battery, which uses an inverter to continually convert AC power into DC power. Protects the equipment from the sometimes variable nature of AC power.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

surge protector

A

A device similar to a power strip that is installed between a grounded wall outlet and a PC or phone. If there is a surge or spike in power, the protector breaks the circuit, and the device loses power.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

grounding

A

The process of making a direct connection from a building’s electrical
service to the earth so that dangerous voltage from line surges and lightning strikes will find its way into the earth instead of injuring people, damaging equipment, or
causing a fire.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

electrostatic discharge (ESD)

A

Static electricity that discharges to something that has a different electric potential, especially metallic items like circuit boards. Casually picking up an expensive video card can possibly damage it. This damage could
cause a complete failure or could cause intermittent issues that might be difficult to troubleshoot.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

self-grounding

A

Touching a nearby metal component before touching the actual device being serviced to prevent electrostatic discharge (ESD) damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

toxic waste handling

A

Special handling of dangerous materials (such as used computer and printer components) to keep the waste from damaging the environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

cathode ray tube (CRT) display

A

An older computer display that contains heavy
metals, including lead solder on older models, and that can retain potentially dangerous electric charges long after it has been shut down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

material safety data sheet (MSDS)

A

a document that provides information about a particular substance or device, such as the toner in a laser printer’s toner cartridge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

blackout

A

A total loss of power that stops computers and peripherals from working

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

brownout

A

A sustained voltage drop of as much as half of rated output that can stop computers and peripherals from working.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

data/device preservation

A

As part of an investigation into inappropriate use, the

process of securing the device or data in question and protecting it from tampering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

documentation process

A

As part of an investigation into inappropriate use, the

process of keeping necessary records of the chain of custody of evidence

17
Q

chain of custody

A

Chronological documentation or paper trail of evidence

18
Q

software licensing

A

The purchase of the right to use software from a developer or company. There are several types of software licenses, including enterprise, subscriptions, site, and single user.

19
Q

digital rights management (DRM)

A

The general term for software or service

mechanisms that limit the end user’s rights to copy, transfer, or use software or digital media.

20
Q

end-user license agreement (EULA)

A

An agreement that restricts how an app can be used and what the transfer rights are.

21
Q

open source

A

Software that can be freely accessed, used, changed, and shared (in modified or unmodified form) by anyone.

22
Q

commercial license

A
A license that does not allow for the use of source code (the actual instructions used to make the software) and that limits how licensees can use 
object code (the program).
23
Q

personal license

A

A software license provided for a computer purchased at a retail or online store and for downloaded or packaged apps designed for use by individuals

24
Q

enterprise license

A

A license covering use of software by workers in a company or another organization.

25
Q

Personally identifiable information (PII)

A

information such as a person’s name and

Social Security number

26
Q

Peripheral Component Interconnect (PCI)

A

a 32-bit I/O bus that provides a shared 33MHz or 66MHz data path between the CPU and peripheral controllers.

27
Q

General Data Protection Regulation (GDPR)

A

a European data protection standard.

28
Q

Protected health information (PHI)

A

a type of data that is subject to protection

under HIPAA

29
Q

active listening

A

A conversational skill that includes making eye contact, taking notes, and encouraging open-ended answers without interrupting

30
Q

integer

A

A whole number that does not contain decimal places

31
Q

string

A

Text within code, usually encapsulated by quotation marks so as not to be
read as code

32
Q

environmental variable

A

A script variable that allows a single script to run yet still have sources in various places. For example, if an update of three files is needed, but
the files are in different places, the script can insert the locations of the files where a variable was identified in the script

33
Q

variable

A

A part of a script that can change the instructions while the script is run

34
Q

loop

A

In scripting, the process of having a computer repeat an instruction until a
proscribed condition is true.

35
Q

Remote Desktop Protocol (RDP)

A

a protocol used by Remote Desktop Services

(RDS), which is the Windows Server–based companion of Remote Desktop Connection. RDP uses port 3389

36
Q

Telnet

A

A protocol that enables a user to make a text-based connection to a remote
computer or networking device and use it as if he were a regular user sitting in front of it rather than simply downloading pages and files as he would with an http:// or
ftp:// connection. Telnet uses port 23.

37
Q

Secure Shell (SSH)

A

A protocol that allows data to be exchanged between computers on a secured channel. A more secure replacement for FTP and Telnet.