Exam Items Flashcards
VNC
Virtual Network Computer
FileVault
MacOS
Built-in encryption capability
Password protected
Access Control Vestibule
Man trap
.vbs
VBScript file extension
VBScript is a programming language
WPA3
Wifi Protected Access 3
Password protected wifi
RDP location
Settings>System
DLP
Data loss prevention
Detects potential data breaches
WPS
WiFi protected setup
When enabled on router, looks for devices within range and allow them to connect without having to type in password
BCD
Binary coded decimal
WDM
Windows driver model
In-place installation
Installing a new OS or application without removing the older version and without saving any data beyond normal precautions
Clean installation
Installation of an OS on a computer where the hard drive is formatted and completely erased
Sector
A subdivision of a storage device
Smallest addressable unit for data storage. Typically 512 bytes.
Full format
Entire disk is overwritten with zeros or random data to ensure that the files are permanently erased and cannot be recovered
Wipe a drive
Hotfix
A quick correction to address a bug, bypassing the normal software development process
Windows 10 64 bit req.
1 GHz processor
2 GB of RAM
20 GB of hard disk space
DirectX 9 graphics card
Windows 10 32 bit req.
1 GHz processor
1 GB RAM
16 GB hard disk space
BitLocker
Windows encryption technology
Offline file
Sync Center
allows users to access files stored at another point on their network even if the network connection is not working
Defrag tool
Needs 15% of hard drive space
GFS Linux
Cluster file system
allows cluster of computers to use a block device
Block Device
Nonvolatile mass storage devices
information can be accessed in any order
AUP
Acceptable use policy
Flammable liquids/electrical contact
ABC powder extinguisher
Carbon dioxide extinguisher
32 bit OS RAM limit
4GB
Phishing
Tricks target into downloading malware
Boot sector virus
Malware that infects a systems boot partition or the MBR of a hard disk
TACACS
Terminal access controller access-control system
A network protocol
encryption and authentication of packets
TKIP
Temporal key integrity protocol
Network Security protocol
Replaced WEP
WEP
Wired Equivalent Privacy
Wi-Fi encryption
GCMP
Galois/counter mode protection
Encryption protocol in wireless security
RC4
Rivest Cipher 4
stream cipher
Encrypts messages one byte at a time
GPT
GUID Partition Table
128 partitions
9.4 ZB
Part of UEFI
Replaced MBR
MBR
Master Boot Record
Up to four partitions
512 bytes up to 2.2 TB
Identifies how and where the systems OS is located in order to be booted into the main storage or RAM
NTFS
New technology file system
Microsoft
Superseded FAT
Disk Controller
The controller circuit which enables the CPU to communicate with a disk drive
Time Machine
The backup mechanism of macOS
Public domain license
No restrictions on use
Lesser General Public License
Doesn’t have to make the latest software available under a matching license if it isn’t a derivative of the original software
Permissive License
An agreement with few requirements about how they can modify, redistribute, and use the software.
Copyleft License
Reciprocal or restrictive licenses
Similar to an LGPL but has more stipulations to follow
Proprietary license
Most restrictive, uses EULA,
x64
Allows the CPU to process 64-bits of data per clock cycle
x86
32 bit CPU, 32 bits per clock cycle
Virus signature
A unique string of code that can identify a specific computer virus
VNC
Virtual network computing
A graphical desktop-sharing system that uses the remote frame buffer protocol to remotely control another computer
Cloud connection
RADIUS
Remote authentication dial-in user service
Networking protocol that provides centralized authentication, authorization, and accounting management for users who connect and use a network service
MAC filtering
A security access control method where MAC address assigned to each network interface controller is used to determine access to the network
SSID suppression
You can disable your SSID broadcast if you don’t want anyone trying to connect to your network
Your Wi-Fi won’t appear on the list of available networks
Content filtering
A process that manages or screens access to specific emails or webpages
VGA mode
640x480 pixels, 16 colors
For troubleshooting display-related issues
NAT
Network address translation
Way to map multiple private addresses inside a local network to a public IP address
Orgs that want multiple devices to employ a single IP address and home routers
Dictionary attack
Entering every word in a dictionary or word list as a password
Password partitioning attack
WPA3 vulnerability
Side-channel attack
Attack enabled by leakage of information from a physical cryptosystem
Virus
Spread from one computer to another
Worm
Replicates itself, spreads across networks exploiting security vulnerabilities
Delete files or create botnets
Spyware
Steals data
Rootkit
Give hackers access to and control over a target device
Hides within a computer system
Eludes conventional scans
Bot
Self-replicating malware, spreads to other devices creating a network - botnet