CompTIA 1002 Acronyms Flashcards

1
Q

ACL

A

Access Control List
A list of rules used to grant access to a resource. An ACL identifies traffic that is allowed or blocked based on IP addresses, networks, ports, and some protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AES

A

Advanced Encryption Standard

A symmetric algorithm used to encrypt data and provide confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AUP

A

Acceptable Use Policy

Rules or guidelines for the proper use of technology or digital devices within an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

BIOS

A

Basic Input/ Output System

A computer’s firmware used to manipulate different settings such as the date and time, boot drive, and access password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

BYOD

A

Bring your Own Device

A policy allowing employees to connect personally owned devices, such as tablets and smartphones, to a company network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CD-ROM

A

Compact Disc-Read-Only Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CDFS

A

Compact Disc File System

a file system type used on CDs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CPU

A

Central Processing Unit
The key component of a computer system, which contains the circuitry necessary to interpret and execute program instructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DDoS

A

Distributed Denial of Service
An attack that attempts to make an online service, like a website, unavailable by overwhelming it with a flood of traffic from many computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DHCP

A

Dynamic Host Configuration Protocol
A service used to dynamically assign IP addresses, subnet masks, default gateways, DNS server addresses, and other configurations to clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DLP

A

Data Loss Prevention

a system that identifies, monitors, and protects data to prevent it from unauthorized use, modification, or destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DNS

A

Domain Name Service

Converts a human-friendly hostname (such as www.google.com) into a computer-friendly IP address (such as 192.168.1.1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DoS

A

Denial of Service

An interruption in an authorized user’s access to a computer network, typically one caused with malicious intent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DVD

A

Digital Versatile Disc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

EFS

A

Encrypting File System

A feature within NTFS on Windows systems that supports encrypting individual files or folders for confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

EMI

A

Electromagnetic Interference

Electromagnetic interference caused by such things as motors, power lines, and fluorescent lights.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

EULA

A

End User License Agreement

The contract between a user and a company selling software for installation on the user’s computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

ext2/ext3/ext4

A

Extended File System

File system Used by Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

FAT

A

File Allocation Table

Table used by the operating system (OS) to manage files on hard drives and other computer systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

FAT32

A

32-bit File Allocation Table
An older partition type that is not commonly used anymore. it is mainly used on devices like USB flash drives to make them compatible between computers running different operating systems (Window/Linux/MacOS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

FTP

A

File Transfer Protocol

A format and set of rules for transferring files from a host to a remote computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

GUI

A

Graphical User Interface

Interface that relies on graphics to communicate with the user (example: Microsoft Windows)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

GPS

A

Global Positioning System

A system that determines accurately the precise position of something on earth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

GSM

A

Global System for Mobile Communications

a 2G standard for cellular transmissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

HDD

A

Hard Disk Drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

HTML

A

Hypertext Markup Language

The authoring language used to create documents on the World Wide Web.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

HTTP

A

HyperText Transfer Protocol

The protocol used for transmitting web pages over the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

HTTPS

A

Hypertext Transfer Protocol Secure

Encrypts HTTP traffic with SSL or TLS using port 443.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

I/O

A

Input/Output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

IDS

A

Intrusion Detection System
A detective control used to detect attacks when they occur, but does not automatically take measures to prevent the attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

IP

A

Internet Protocol

The main delivery system for information over the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

IPConfig

A

Internet Protocol Configuration

A command line tool n Microsoft Windows that displays all current TCP/IP network configuration values and settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

IPS

A

Intrusion Prevention System

A preventative control that will stop an attack in progress.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

IPSec

A

Internet Protocol Security

Used to encrypt data in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

IR

A

Infrared

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

IRP

A

Incident Response Plan

The procedures documented in an incident response policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

ISP

A

Internet Service Provider

A company that provides access to the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

JBoD

A

Just a Bunch of Disks

Disks installed on a computer but not as a RAID.

39
Q

KVM

A

Keyboard, Video, and Mouse

Use many computers with a single keyboard, video display, and mouse

40
Q

LAN

A

Local Area Network
A geographic network that covers a relatively small geographic area such as a building or a small campus - no more than a mile distance between computers

41
Q

LDAP

A

Lightweight Directory Access Protocol

Language used to communicate with directories such as Microsoft’s Active Directory

42
Q

MAC

A

Media Access Control
A network data transfer policy that determines how data is transmitted between two computer terminals through a network cable.

43
Q

MBR

A

Master Boot Record
An area on a hard disk in its first sector. When the BIOS boots a system, it looks at the MBR for instructions and information on how to boot the disk and load the operating system.

44
Q

MBSA

A

Microsoft Baseline Security Analyzer
Software developed and used by Microsoft to check the security of an operating system by assessing missing security updates and less secure areas of the operating system.

45
Q

MDM

A

Mobile Device Management
A group of applications and/or technologies used to manage mobile devices. MDM tools can monitor mobile devices and ensure they are compliance with security policies.

46
Q

MSConfig

A

Microsoft Configuration
Enables users to configure a system’s boot files and critical system files. It is an executable file which runs the Windows System Configuration Utility.

47
Q

MSDS

A

Material Safety Data Sheet

Contains information on the possible health effects of exposure to chemicals

48
Q

NAC

A

Network Access Control
Inspects clients for health and can restrict network access to unhealthy (missing updates, using an outdated operating system, etc) clients to a remediation network.

49
Q

NAS

A

Network Attached Storage
A storage device that is directly attached to the network and is used to supply file-based storage services to other computers on the network.

50
Q

NAT

A

Network Address Translation
A service that translates public IP addresses to private and private IP addresses to public. It hides addresses on an internal network.

51
Q

NetBIOS

A

Networked Basic Input/Output System

A legacy system that was the predecessor to using host names to identify devices on networks.

52
Q

NIC

A

Network Interface Card

A piece of hardware that allows a computer to connect to a network.

53
Q

NTFS

A

New Technology File System

A file system used in Microsoft operating systems that provides security.

54
Q

OS

A

Operating System

55
Q

PC

A

Personal Computer

56
Q

PE

A

Pre-Installation Environment
Windows Pre-Installation Environment is a lightweight version of Windows used for the deployment of PCs, workstations, and servers

57
Q

PII

A

Personally Identifiable Information.
Information about individuals that can be used to trace a person’s identity, such as a full name, birthdate, biometric data, and identifying numbers such as a Social Security number (SSN).

58
Q

PHI

A

Personal Health Information
Information about an individual held by parties that are involved in the healthcare and billing process.
a.k.a. (Protected Health Information)

59
Q

PKI

A

Public Key Infrastructure

Group of technologies used to request, create, manage, store, distribute, and revoke digital certificates.

60
Q

PnP

A

Plug-and-play

Technology that allows a computer to automatically configure the devices that connect to it.

61
Q

PXE

A

Preboot Execution Environment

Allows computer to load an operating system from a server.

62
Q

QoS

A

Quality of Service

Gives specific traffic precedence over other traffic on networks.

63
Q

RADIUS

A

Remote Authentication Dial-In User Server

64
Q

RAID

A

Redundant Array of Independent/Inexpensive Disks

A hard disk drive where data is written across multiple disks as if they were a single disk.

65
Q

RAM

A

Random Access Memory

Temporary memory. RAM is expandable, and resides on the motherboard.

66
Q

RDP

A

Remote Desktop Protocol
Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft which provides a user with a graphical interface to connect to another computer over a network connection

67
Q

RFID

A

Radio Frequency Identification
Tags/microchips that contain a predetermined code which can be read by an RFID reader. These are used in credit cards, badges, passports, pet tracking just to name a few

68
Q

ROM

A

Read Only Memory

Permanent instructions that cannot be changed easily

69
Q

SAN

A

Storage Area Network

A specialized network of high-speed storage devices.

70
Q

SFC

A

System File Checker

Command used to verify and repair system files.

71
Q

SOHO

A

Small Office/Home Office

72
Q

SSH

A

Secure Shell

Network protocol for secure transfer of data between computers.

73
Q

SSID

A

Service Set Identifier

Identifies the name of a wireless network.

74
Q

SSL

A

Secure Sockets Layer

A security protocol that uses encryption to establish a secure connection between a computer and a Web server.

75
Q

SSO

A

Single Sign-On

76
Q

TACACS+

A

Terminal Access Controller Access-Control System Plus

77
Q

TCP/IP

A

Transmission Control Protocol/Internet Protocol

A set of standards that control how data is sent across networks including the internet.

78
Q

UAC

A

User Account Control
Informs you when a program makes a change that requires administrator-level permission, also adjusts the permission level of your user accounts.

79
Q

UEFI

A

Unified Extensible Firmware Interface
The extensible successor to the BIOS that features support for a vast array of systems and platforms by allowing access to system resources to access additional software modules.

80
Q

UPnP

A

Universal Plug and Play

Enables network-ready devices to discover each other automatically.

81
Q

UPS

A

Uninterruptible Power Supply

A battery backup system that provides fault tolerance for power and can protect against power fluctuations.

82
Q

URL

A

Uniform Resource Locator

Also called a web address.

83
Q

VM

A

Virtual Machine

84
Q

VoIP

A

Voice over Internet Protocol

a phone connection through a personal computer with any type of broadband Internet connection.

85
Q

VPN

A

Virtual Private Network

Provides access to a private network over a public network such as the Internet.

86
Q

WAP

A

Wireless Access Point

Provides access to a wired network to wireless clients.

87
Q

WEP

A

Wired Equivalent Privacy

An older encryption algorithm used to protect data on Wi-Fi Networks. Weak security and no longer used.

88
Q

WiFi

A

Wireless Fidelity

It is similar to Bluetooth in that it is used to exchange data, but the signals can travel further distances.

89
Q

WLAN

A

Wireless Local Area Network

Network connected wirelessly.

90
Q

WPA

A

Wireless Protected Access

91
Q

WPA2

A

WiFi Protected Access 2

More permanent upgrade to WEP and uses AES technology. Currently WP2 is the standard wireless security type.

92
Q

WPS

A

WiFi Protected Setup
Allows users to configure a wireless network without typing in the passphrase.
(Can be done by pressing buttons or by entering a PIN)

93
Q

GPT

A

GUID Partition Table

A newer partition type that is used to create drives larger than 2 TB.