CompTia Study Cards Flashcards

1
Q

ACL

A

access control list (ACL) contains rules that grant or deny access to certain digital environments. There are two types of ACLs: Filesystem ACLs filter access to files and/or directories. Filesystem ACLs tell operating systems which users can access the system, and what privileges the users are allowed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AES

A

Advanced Encryption Standard AES is implemented in software and hardware throughout the world to encrypt sensitive data. It is essential for government computer security, cybersecurity and electronic data protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AIO

A

All-in-One PCs (AIO PCs) are streamlined desktop computers that integrate all of the components of a traditional desktop computer, except for the keyboard and mouse, into one single unit. … Many AIO PCs have integrated touch screen monitors, touch-pads, and solid-state disk drives and memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

APIPA

A

APIPA stands for Automatic Private IP Addressing (APIPA). It is a feature or characteristic in operating systems (eg. Windows) which enables computers to self-configure an IP address and subnet mask automatically when their DHCP(Dynamic Host Configuration Protocol) server isn’t reachable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ARM

A

Advanced RISC Machine and originally Acorn RISC Machine) is a family of reduced instruction set computing. ARM makes 32-bit and 64-bit RISC multi-core processors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ARP

A

The Address Resolution Protocol (ARP) is a communication protocol used for discovering the link layer address, such as a MAC address, associated with a given internet layer address, typically an IPv4 address. This mapping is a critical function in the Internet protocol suite.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ASCll

A

American Standard Code for Information Interchange: a standard code, consisting of 128 7-bit combinations, for characters stored in a computer or to be transmitted between computers. Uses numeric codes to represent characters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CAD

A

Computer-aided design (CAD) is the use of computers (or workstations) to aid in the creation, modification, analysis, or optimization of a design. The term CADD (for Computer Aided Design and Drafting) is also used. Its use in designing electronic systems is known as electronic design automation (EDA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CAM

A

Computer Aided Manufacturing (CAM) is the use of software and computer-controlled machinery to automate a manufacturing process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CRUD

A

create, read, update, and delete
In computer programming, create, read, update, and delete (CRUD) are the four basic functions of persistent storage. Alternate words are sometimes used when defining the four basic functions of CRUD, such as retrieve instead of read, modify instead of update, or destroy instead of delete.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CSS

A

CSS is the acronym of “Cascading Style Sheets”. CSS is a computer language for laying out and structuring web pages (HTML or XML). This language contains coding elements and is composed of these “cascading style sheets” which are equally called CSS files (. css).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DDL

A

“Data Definition Language.” A DDL is a language used to define data structures and modify data. For example, DDL commands can be used to add, remove, or modify tables within in a database. DDLs used in database applications are considered a subset of SQL, the Structured Query Language.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DDoS

A

A DDoS is a cyberattack on a server, service, website, or network floods it with Internet traffic. If the traffic overwhelms the target, its server, service, website, or network is rendered inoperable. Network connections on the Internet consist of different layers of the Open Systems Interconnection (OS) model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DDR

A

“Double Data Rate.” It is an advanced version of SDRAM, a type of computer memory. DDR-SDRAM, sometimes called “SDRAM II,” can transfer data twice as fast as regular SDRAM chips. This is because DDR memory can send and receive signals twice per clock cycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DHCP

A

Dynamic Host Configuration Protocol (DHCP) is a network management protocol used to automate the process of configuring devices on IP networks, thus allowing them to use network services such as DNS, NTP, and any communication protocol based on UDP or TCP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DIMM

A

DIMM stands for Dual In-Line Memory Module, a type of computer memory that is natively 64 bits, enabling fast data transfer. This enables a single DIMM to transfer data twice as fast as a single SIMM. DIMM memory chips are dynamic random access memory (DRAM), the most common type of primary memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

DLL

A

Dynamic Link Library, a file containing code for commonly used program functions on personal computers (PCs) that run the Microsoft Corporation’s Windows operating system. DLL. Operating system. Computer program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

DDoS

A

DDoS is a cyberattack on a server, service, website, or network floods it with Internet traffic. If the traffic overwhelms the target, its server, service, website, or network is rendered inoperable. Network connections on the Internet consist of different layers of the Open Systems Interconnection (OS) model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

DDR

A

“Double Data Rate.” It is an advanced version of SDRAM, a type of computer memory. DDR-SDRAM, sometimes called “SDRAM II,” can transfer data twice as fast as regular SDRAM chips. This is because DDR memory can send and receive signals twice per clock cycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

DHCP

A

Dynamic Host Configuration Protocol (DHCP) is a network management protocol used to automate the process of configuring devices on IP networks, thus allowing them to use network services such as DNS, NTP, and any communication protocol based on UDP or TCP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

DIMM

A

Dual In-Line Memory Module, a type of computer memory that is natively 64 bits, enabling fast data transfer. This enables a single DIMM to transfer data twice as fast as a single SIMM. DIMM memory chips are dynamic random access memory (DRAM), the most common type of primary memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

DLL

A

Dynamic Link library, a file containing code for commonly used program functions on personal computers (PCs) that run the Microsoft Corporation’s Windows operating system. DLL. Operating system. Computer program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

DLP

A

Data loss prevention (DLP) is a set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users. Also provides reporting to meet compliance and auditing requirements and identify areas of weakness and anomalies for forensics and incident response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

DML

A

Data Manipulation Language is a computer programming language used for adding (inserting), deleting, and modifying (updating) data in a database. A DML is often a sublanguage of a broader database language such as SQL, with the DML comprising some of the operators in the language.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

DNS

A

Domain Name System (DNS) connects URLs with their IP address. With DNS, it’s possible to type words instead of a string of numbers into a browser, allowing people to search for websites and send emails using familiar names.

26
Q

DoS

A

Disk Operating System (abbreviated DOS) is a computer operating system that resides on and can use a disk storage device, such as a floppy disk, hard disk drive, or optical disc. A disk operating system must provide a file system for organizing, reading, and writing files on the storage disk.

27
Q

DSL

A

A digital subscriber line (DSL) modem is a device used to connect a computer or router to a telephone line which provides the digital subscriber line service for connection to the Internet, which is often called DSL broadband.

28
Q

FAT

A

File Allocation Table (FAT) is a file system developed for personal computers. Originally developed in 1977 for use on floppy disks, it was adapted for use on hard disks and other devices.

29
Q

FTP

A

File transfer protocol (FTP) is a set of rules that computers follow for the transferring of files from one system to another over the internet. It may be used by a business to transfer files from one computer system to another, or websites may use FTP to upload or download files from a website’s server.

30
Q

HFS

A

“Hierarchical File System.” HFS is the file system used for organizing files on a Macintosh hard disk. When a hard disk is formatted for a Macintosh computer, the hierarchical file system is used to create a directory that can expand as new files and folders are added to the disk.

31
Q

HTML

A

HTML, in full hypertext markup language, a formatting system for displaying material retrieved over the Internet. HTML markup tags specify document elements such as headings, paragraphs, and tables. They mark up a document for display by a computer program known as a Web browser.

32
Q

ICMP

A

“Internet Control Message Protocol.” When information is transferred over the Internet, computer systems send and receive data using the TCP/IP protocol. These may be messages such as, “Network unreachable” for a system that is down, or “Access denied” for a secure, password-protected system.

33
Q

IDS

A

An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations. The most common classifications are network intrusion detection systems (NIDS) and host-based intrusion detection systems (HIDS).

34
Q

IOPS

A

IOPS (Input/Output Operations Per Second, pronounced i-ops) is a common performance measurement used to benchmark computer storage devices like hard disk drives (HDD), solid state drives (SSD), and storage area networks (SAN).

35
Q

IoT

A

Internet of things (IoT) describes the network of physical objects—“things”—that are embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the Internet.

36
Q

IPS

A

Intrusion Prevention System (IPS) is a network security/threat prevention technology that examines network traffic flows to detect and prevent vulnerability exploits.

37
Q

IR

A

IR Infrared light-emitting diodes (LED) are used to transmit IR signals, which pass through a lens and focus into a beam of IR data. The beam source is rapidly switched on and off for data encoding.

38
Q

ISP

A

Internet Service Provider (ISP) refers to a company that provides access to the internet to both personal and business customers. ISPs may also provide other services including email services, domain registration, web hosting, and browser packages.

39
Q

MAC

A

Media Access Control, MAC is a network sublayer that controls transmission hardware. registered trademark for a line of laptop and desktop computers from Apple, Inc.

40
Q

NAS

A

Network Attached Storage NAS system is a storage device connected to a network that allows storage and retrieval of data from a centralized location for authorized network users and heterogeneous clients. NAS systems are flexible and scale-out, meaning that as you need additional storage, you can add on to what you have.

41
Q

NDA

A

(Non Disclosure Agreement) An agreement signed between two parties that have to disclose confidential information to each other in order to do business. In general, the NDA states why the information is being divulged and stipulates that it cannot be used for any other purpose.

42
Q

NFC

A

Near-field communication (NFC) allows data to be exchanged between devices via short-range, high frequency wireless communication technology by combining the interface of a smartcard and reader into a single device.

43
Q

PB

A

One petabyte (abbreviated “PB”) is equal to 1,000 terabytes and precedes the exabyte unit of measurement.

44
Q

PCI

A

Peripheral Component Interconnect (PCI) is a local computer bus for attaching hardware devices in a computer and is part of the PCI Local Bus standard.

45
Q

PCIe

A

PCI Express a network of serial connections controlled by a hub on the computer’s motherboard. PCI express is a much improved version in terms of speed. PCIe uses a serial interface instead of the old parallel interface used by PCI.

46
Q

Pll

A

Personally identifiable information (PII) is any data that could potentially identify a specific individual.

47
Q

POP3

A

POP3, sometimes referred to as just “POP,” is a simple, standardized method of delivering e-mail messages.

48
Q

PXE

A

Preboot Execution Environment (PXE) is an industry standard client/server interface that allows networked computers that are not yet loaded with an operating system to be configured and booted remotely by an administrator.

49
Q

RAID

A

Redundant Array of Inexpensive Disks. That means that RAID is a way of logically putting multiple disks together into a single array.

50
Q

SaaS

A

Software-as-a-Service allows access to software a subscription basis using external servers. SaaS allows each user to access programs via the internet, instead of having to install the software on the user’s computer.

51
Q

SATA

A

Serial Advanced Technology Attachment, also called serial ATA, an interface for transferring data between a computer’s central circuit board and storage devices.

52
Q

SID

A

A security identifier (SID) is a unique value of variable length that is used to identify a security principal (such as a security group) in Windows operating systems. SIDs that identify generic users or generic groups is well known.

53
Q

SMB

A

Server Message Block (SMB), one version of which was also known as Common Internet File System (CIFS /sɪfs/), is a communication protocol for providing shared access to files, printers, and serial ports between nodes on a network.

54
Q

SNMP

A

Simple Network Management Protocol (SNMP) is an Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behavior. Is widely used in network management for network monitoring.

55
Q

SSID

A

SSID is simply the technical term for a Wi-Fi network name. You’ll see this name when you connect your devices to your wireless network.

56
Q

SSL

A

SSL Secure Sockets Layer. Protocol for web browsers and servers that allows for the authentication, encryption and decryption of data sent over the Internet.

57
Q

TKIP

A

(Temporal Key Integrity Protocol) is an encryption protocol included as part of the IEEE 802.11i standard for wireless LANs (WLANs). It was designed to provide more secure encryption than the notoriously weak Wired Equivalent Privacy (WEP), the original WLAN security protocol.

58
Q

TLS

A

Thread-local storage (TLS) is a computer programming method that uses static or global memory local to a thread. Cannot be read from or written to from other threads, implying that there can be no race conditions).

59
Q

WEP

A

Wired Equivalent Privacy (WEP) is a security algorithm for IEEE 802.11 wireless networks. Introduced as part of the original 802.11 standard ratified in 1997, its intention was to provide data confidentiality comparable to that of a traditional wired network.

60
Q

WPA

A

“Wi-Fi Protected Access.” WPA is a security protocol designed to create secure wireless (Wi-Fi) networks. It is similar to the WEP protocol, but offers improvements in the way it handles security keys and the way users are authorized.