FULL FLASHCARD STUDY DECK
CertMaster
Instant Search
Windows feature allowing rapid search of apps, data folders, messages, and the web.
Windows Settings
Touch-enabled interface for managing user and system settings in Windows.
Control Panel
Legacy management interface for configuring user and system settings in Windows.
Microsoft account
Cloud-based SSO service allowing users to synchronize settings between multiple Windows devices.
Account Settings
Windows Settings pages relating to user account creation and maintenance.
User Accounts applet
Control Panel app relating to user account creation and maintenance.
Privacy settings
Windows Settings pages related to personal data collection and use.
Time & Language settings
Windows Settings pages allowing configuration of default data formats (date, currency, and so on), location information, and keyboard input locale.
Personalization settings
Windows Settings pages related to customizing the appearance of the desktop using themes.
Ease of Access
Windows Settings pages related to desktop and input/output device accessibility configuration.
OneDrive
Cloud storage service operated by Microsoft and closely integrated with Windows.
This PC
File system object representing a Windows computer and the disk drives installed to it.
Recycle Bin
When files are deleted from a local hard disk, they are stored in the Recycle Bin. They can be recovered from here if so desired.
File Explorer Options
Control Panel app related to view and browsing settings for File Explorer.
Indexing Options
Control Panel app related to search database maintenance.
System Settings
Windows Settings pages relating to basic and advanced system settings.
Update & Security settings
Windows Settings pages related to configuring automatic patching, deploying feature updates, and managing security features.
Windows Security
Touch-enabled app for configuring features such as firewall and antivirus.
Devices settings
Windows Settings pages for using and configuring attached hardware.
Phone settings
Windows Settings pages for associating a smartphone with Windows.
Devices and Printers
Control Panel app for using and configuring attached hardware.
Device Manager
Primary interface for configuring and managing hardware devices in Windows. Device Manager enables the administrator to disable and remove devices, view hardware properties and system resources, and update device drivers.
Sound applet
Control Panel applet related to speaker and microphone configuration plus Windows sound events and notifications.
Standby
Power-saving mode where power to all compatible components except system memory is cut. Note that systems on standby still consume some electricity.
Hibernate
Power-saving state where the contents of memory are saved to hard disk (hiberfil.sys) and the computer is powered off. Restarting the computer restores the desktop.
sleep
Power-saving mode in Windows. On a laptop, this functions much like standby, but on a desktop, the system also creates a hibernation file before entering the standby state.
Power Options
Control Panel app related to configuring power button/lid events and power-saving modes.
fast startup
Power-saving option allowing swift resume from sleep via an image of system memory contents saved to a hibernation file.
Apps
Windows Settings pages relating to configuration of Windows Features and third-party software apps.
Programs and Features
Control Panel applet allowing management of Windows Features and third-party software.
Network & Internet
Windows Settings pages related to interface configuration, network profiles, and proxy configuration.
Network and Sharing Center
Control Panel related to interface configuration, network profiles, and discovery/file sharing settings.
Windows Defender Firewall
Built-in, host-based filtering of network connections.
Internet Options
Control Panel applet allowing configuration of the Internet Explorer web browser.
Administrative Tools
Folder in Control Panel containing default Microsoft management consoles used to configure the local system.
WinX menu
Start button shortcut menu with quick access to principal configuration and management utilities.
Run dialog
Windows interface for executing commands.
Disk Management (diskmgmt.msc)
Console related to initializing, partitioning, and formatting disk drives.
Mail applet
Control Panel applet related to configuration of Microsoft Outlook email accounts and storage files.
Storage Spaces
Windows feature for creating a single storage resource from multiple devices. Data can be protected against device failure by RAID-like mirroring or parity.
Defragment and Optimize Drives tool (dfrgui.exe)
Fragmentation occurs when a data file is not saved to contiguous sectors on an HDD and reduces performance. The defragmenter mitigates this and can also perform optimization operations for SSDs.
Disk Clean-up (cleanmgr.exe)
Windows utility for removing temporary files to reclaim disk space.
Gaming settings
Windows Settings pages related to game mode settings and Xbox integration.
Task Scheduler (tasksch.msc)
Enables execution of an action (such as running a program or a script) automatically at a pre-set time or in response to some sort of trigger.
Local Users and Groups (lusrmgr.msc)
Console for creating and managing user and group accounts with the authentication and permissions scope of the local system.
Certificate Manager console (certmgr.msc)
Console related to managing digital certificates for the current user and trusted root certification authority certificates.
Group Policy Editor (gpedit.msc)
Console related to configuring detailed user and system registry settings via policies.
Registry Editor (regedit.exe)
Tool for making direct edits to the registry database, such as adding or modifying keys or values. The Registry Editor can be used to make backups of the registry.
registry
In the Windows registry, a key is analogous to a folder on the file system. Keys are used to group like settings together in a hierarchy that is logical to navigate.
hives
File storing configuration data corresponding to a section of the Windows registry.
Microsoft Management Console (MMC)
Utility allowing Windows administrative tools to be added as snap-ins to a single interface.
System Information (msinfo32.exe)
Utility that provides a report of the PC’s hardware and software configuration.
Event Viewer (eventvwr.msc)
Windows console related to viewing and exporting events in the Windows logging file format.
Task Manager (taskmgr.exe)
Windows utility used to monitor and manage process execution, resource utilization, user sessions, startup settings, and service configuration.
process
Software program that has been executed and is running in system memory.
Startup
Apps and scripts set to run when the computer starts or when the user signs in. Startup items can be configured as shortcuts, registry entries, or Task Scheduler triggers.
Services (services.msc)
Windows machines run services to provide functions; for example, Plug-and-Play, the print spooler, DHCP client, and so on. These services can be viewed, configured, and started/stopped via the Services console. You can also configure which services run at startup using msconfig. You can view background services (as well as applications) using the Processes tab in Task Manager.
Resource Monitor (resmon.exe)
Console for live monitoring of resource utilization data for the CPU and GPU, system memory, disk/file system, and network.
Performance Monitor (perfmon.msc)
Console for reporting and recording resource utilization via counter data for object instances.
System Configuration Utility (msconfig.exe)
Utility for configuring Windows startup settings.
cmd.exe
Basic shell interpreter for Windows.
Run as administrator
Windows feature that requires a task to be explicitly launched with elevated privileges and consented to via UAC.
directory
File system object used to organize other file system objects into containers.
dir command
Command-line utility that displays information about the contents of the current directory.
cd command
Command-line tool used to navigate the directory structure.
move command
Command-line tool for moving files.
copy command
Command-line tool for copying files.
xcopy command
Command-line directory and file copy utility offering improved functionality compared to the basic copy command.
robocopy command
Command-line file copy utility recommended for use over the older xcopy.
md command
Command-line tool for creating directories.
rmdir
Command-line tool for deleting directories. The /s switch enables the deletion of non-empty directories.
diskpart
Command-line utility used to configure disk partitions.
format command
Command-line utility for creating a file system on a partition.
X:
Command-line utility used to select the working drive.
chkdsk
Command-line tool that verifies the integrity of a disk’s file system.
shutdown command
Command-line tool for shutting down or restarting the computer. The command is supported by Windows and Linux, though with different syntax.
System File Checker
Command-line utility that checks the integrity of system and device driver files.
winver command
Command-line tool for reporting Windows version information.
Windows
Windows started as version 3.1 for 16-bit computers. A workgroup version provided rudimentary network facilities. Windows NT 4 workstations and servers (introduced in 1993) provided reliable 32-bit operation and secure network facilities, based around domains. The Windows 9x clients (Windows 95, 98, and Me) had far-lower reliability and support only for workgroups but were still hugely popular as home and business machines. Windows 2000 and Windows XP workstations married the hardware flexibility and user interface of Windows 9x to the reliability and security of Windows NT, while the server versions saw the introduction of Active Directory for managing network objects. The subsequent client releases of Windows (Vista/7/8/8.1) feature a substantially different interface (Aero) with 3D features as well as security improvements. The latest client versions—Windows 10 and Windows 11—are designed for use with touch-screen devices.
macOS
Proprietary (Closed-Source) OS designed by Apple for their range of iMac computers, Mac workstations, and MacBook portables.
UNIX
UNIX is a family of more than 20 related operating systems that are produced by various companies. It can run on a wide variety of platforms. UNIX offers a multitude of file systems in addition to its native system. UNIX remains widely deployed in enterprise data centers to run mission-critical applications and infrastructure.
Linux
Open-source OS packaged in distributions supported by a wide range of hardware and software vendors.
Chrome OS
Proprietary (Closed-Sourced) OS developed by Google to run on specific laptop (chromebooks) and PC (chromeboxes) hardware.
iPadOS
OS for some models of the Apple iPad tablet.
iOS
OS for Apple’s iPhone smartphone and most iPad tablet models.
update limitations
Product life cycle and procurement consideration where a device or product no longer receives a full range of updates or support from its vendor.
Android
Cell phone/smartphone/tablet OS developed by the Open Handset Alliance (primarily driven by Google). Unlike iOS, it is an open-source OS, based on Linux.
file system
Structure for file data indexing and storage created by a process of formatting a partition that allows an OS to make use of a mass storage device, such as an HDD, SSD, or thumb drive.
New Technology File System (NTFS)
64-bit default file system for Windows, with file-by-file compression and RAID support as well as advanced file attribute management tools, encryption, and disk quotas.
FAT32
32-bit file system used principally for system partitions and removable media.
exFAT
64-bit version of the FAT file system with support for larger partition and file sizes.
ext3
Standard Linux file system that includes journaling and has since been replaced with ext4.
Apple File System (APFS)
Default file system for macOS-based computers and laptops.
Compatibility concerns
Considerations that must be made when using an app in an environment with multiple device and OS platforms.
end of life (EOL)
Product life-cycle phase where mainstream vendor support is no longer available.
desktop
Graphical OS interface that allows programs to run within window containers. Desktop styles include tools for launching apps, such as the Windows Start Menu, and managing apps, such as the Windows taskbar. Changes to the desktop style over the course of version and feature updates can be confusing for users.
32-bit (x86) or 64-bit (x64)
Processing modes referring to the size of each instruction processed by the CPU. 32-bit CPUs replaced earlier 16-bit CPUs and were used through the 1990s to the present day, though most PC and laptop CPUs now work in 64-bit mode. The main 64-bit platform is called AMD64 or EM64T (by Intel). Software can be compiled as 32-bit or 64-bit. 64-bit CPUs can run most 32-bit software, but a 32-bit CPU cannot execute 64-bit software.
Windows editions
Home versus Professional versus Enterprise. Windows xp, Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
feature updates
Release paradigm introduced for Windows 10 where significant changes and new features are distributed via Windows Update on a semiannual schedule.
original equipment manufacturer (OEM)
In PC terms, companies that sell Windows co-branded under their own logo. OEM Windows licenses are valid only on the system that the software was installed on, and the OEM must provide support.
BitLocker
Feature of Windows allowing for encryption of NTFS-formatted drives. The encryption key can be stored in a TPM chip on the computer or on a USB drive.
Remote Desktop Protocol (RDP)
Application protocol for operating remote connections to a host using a graphical interface. The protocol sends screen data from the remote host to the client and transfers mouse and keyboard input from the client to the remote host. It uses TCP port 3389.
upgrade path
Earlier versions of an OS that support an in-place upgrade to a newer version, retaining settings, third-party apps, and user data files.
Clean install
OS setup method where the target disk is repartitioned and formatted, removing any existing OS and/or data files.
In-place upgrade
OS installation method where the setup program is launched from an existing OS. This can typically retain user data files, settings, and third-party apps.
unattended installations
Deployment method where installation choices are saved in an answer file or script so that the setup program executes without manual intervention.
image deployment
Deployment method where the target disk is written with an image of the new OS.
boot media
Device used to start the setup program and hold source files for installing or upgrading an OS.
master boot record (MBR)
Sector on a mass storage device that holds information about partitions and the OS boot loader.
globally unique identifier(GUID) partition table (GPT)
Modern disk partitioning system allowing large numbers of partitions and very large partition sizes.
recovery partition
OEM recovery media enabling the user to reset the system to its factory configuration.
System requirements
Minimum specifications for CPU speed, memory, and disk capacity for installing an OS or app.
distribution method
Formats for provisioning application installation files, such as via optical discs, downloads, and image files.
potential impacts
Considerations that should be made when planning the installation or upgrade of new apps.
Safe Mode
Troubleshooting startup mode that loads a limited selection of drivers and services.
Startup Repair
Troubleshooting boot options that allow use of tools such as safe mode and recovery discs.
Windows Recovery Environment (WinRE)
Windows troubleshooting feature that installs a command shell environment to a recovery partition to remediate boot issues.
System Restore
Windows System Protection feature that allows the configuration to be reverted to a restore point.
Roll Back Driver
Windows troubleshooting feature that allows removal of an update or reversion to a previous driver version.
Reset this PC
Windows feature to attempt system recovery by reinstalling Windows from source.
fixboot
Windows command in Windows allowing for the repair (or attempted repair) of the boot manager and boot loader.
blue screen of death (BSoD)
Microsoft status screen that indicates an error from which the system cannot recover (also called a stop error). Blue screens are usually caused by bad driver software or hardware faults (memory or disk). Other operating systems use similar crash indicators, such as Apple’s pinwheel and Linux’s kernel panic message.
drifting out of sync
Situation where hosts on a network are not closely synchronized to the same date/time source.
network interface card (NIC)
Adapter card that provides one or more Ethernet ports for connecting hosts to a network so that they can exchange data over a link.
subnet mask
Number of bits applied to an IP address to mask the network ID portion from the host/interface ID portion.
Internet Protocol (IP)
Network (Internet) layer protocol in the TCP/IP suite providing packet addressing and routing for all higher-level protocols in the suite.
Domain Name System (DNS)
Service that maps fully qualified domain name labels to IP addresses on most TCP/IP networks, including the Internet.
Dynamic Host Configuration Protocol (DHCP)
Protocol used to automatically assign IP addressing information to hosts that have not been configured manually.
Network Location Awareness (NLA)
Windows feature that categorizes network profile as public or private. Each profile can have a different firewall configuration, with public network types being more restricted, by default.
virtual private network (VPN)
Secure tunnel created between two endpoints connected via an unsecure transport network (typically the Internet).
Wireless Wide Area Network (WWAN)
Network covering a large area using wireless technologies, such as a cellular radio data network or line-of-sight microwave transmission.
metered
Windows feature for indicating that network data transfer is billable and for setting warnings and caps to avoid unexpected charges from the provider.
proxy server
Server that mediates the communications between a client and another server. It can filter and often modify communications as well as provide caching services to improve performance.
ipconfig command
Command tool used to gather information about the IP configuration of a Windows host.
ping command
Cross-platform command tool for testing IP packet transmission.
tracert command
Diagnostic utilities that trace the route taken by a packet as it “hops” to the destination host on a remote network. tracert is the Windows implementation, while traceroute runs on Linux.
pathping command
Windows utility for measuring latency and packet loss across an internetwork.
nslookup command
Cross-platform command tool for querying DNS resource records.
netstat command
Cross-platform command tool to show network information on a machine running TCP/IP, notably active connections, and the routing table.
access control list (ACL)
Collection of access control entries (ACEs) that determines which subjects (user accounts, host IP addresses, and so on) are allowed or denied access to the object and the privileges given (read-only, read/write, and so on).
Implicit deny
Basic principle of security stating that unless something has explicitly been granted access, it should be denied access.
least privilege
Basic principle of security stating that something should be allocated the minimum necessary rights, privileges, or information to perform its role.
local account
User account that can be authenticated again and allocated permissions for the computer that hosts the account only.
security group
Access control feature that allows permissions to be allocated to multiple users more efficiently.
Administrators
Privileged user account that has been granted memberships of the Administrators security group. There is also an account named Administrator, but this is usually disabled by default.
standard account
Non-privileged user account in Windows that typically has membership of the Users security group only.
Guest
Non-privileged account that is permitted to access the computer/network without authenticating.
Power Users
One of the default Windows group accounts. Its use is deprecated, but it is still included with Windows to support legacy applications.
User Account Control (UAC)
Windows feature designed to mitigate abuse of administrative accounts by requiring explicit consent to use privileges.
Multifactor authentication (MFA)
Authentication scheme that requires the user to present at least two different factors as credentials; for example, something you know, something you have, something you are, something you do, and somewhere you are. Specifying two factors is known as 2FA.
2-step verification
Authentication mechanism that uses a separate channel to authorize a sign-on attempt or to transmit an additional credential. This can use a registered email account or a contact phone number for an SMS or voice call.
soft token
Either an additional code to use for 2-step verification, such as a one-time password, or authorization data that can be presented as evidence of authentication in an SSO system.
short message service (SMS)
System for sending text messages between cell phones.
authenticator application
Software that allows a smartphone to operate as a second authentication factor or as a trusted channel for 2-step verification.
hard token
USB storage key or smart card with a cryptographic module that can hold authenticating encryption keys securely.
Windows Hello
Feature that supports passwordless sign-in for Windows.
Trusted Platform Module (TPM)
Specification for secure hardware-based storage of encryption keys, hashed passwords, and other user- and platform-identification information.
Fingerprint
Biometric authentication device that can produce a template signature of a user’s fingerprint and then subsequently compare the template to the digit submitted for authentication.
Facial recognition
Biometric authentication mechanism that uses an infrared camera to verify that the user’s face matches a 3D model recorded at enrollment.
Single sign-On (SSO)
Authentication technology that enables a user to authenticate once and receive authorizations for multiple services.
domain
Group of hosts that is within the same namespace and administered by the same authority.
Active Directory (AD)
Network directory service for Microsoft Windows domain networks that facilitates authentication and authorization of user and computer accounts.
member server
Any application server computer that has joined a domain but does not maintain a copy of the Active Directory database.
organizational unit (OU)
Structural feature of a network directory that can be used to group objects that should share a common configuration or organizing principle, such as accounts within the same business department.
group policy objects (GPOs)
On a Windows domain, a way to deploy per-user and per-computer settings such as password policy, account restrictions, firewall status, and so on.
gpupdate
Command-line tools to apply and analyze group policies. Group policies are a means of configuring registry settings.
login script
Code that performs a series of tasks automatically when a user account is authenticated.
Mobile Device Management (MDM)
Process and supporting technologies for tracking, controlling, and securing the organization’s mobile infrastructure.
workgroup
Group of network hosts that shares resources in a peer-to-peer fashion. No one computer provides a centralized directory.
network discovery
Windows firewall configuration that makes a host visible to network browsers.
file sharing
Windows firewall configuration that opens the network ports required to operate as a file/print server.
mapped drive
Windows mechanism for navigating shared network folders by assigning them with drive letters.
NTFS permissions
ACL that mediates local and network access to a file system object under Windows when the volume is formatted with NTFS.
inheritance
File system access-control-concept where child objects are automatically assigned the same permissions as their parent object.
Everyone
System security group that represents any account, including unauthenticated users.
home folder
Default local or network folder for users to save data files to.
Roaming profiles
Configuring a network share to hold user profile data. The data is copied to and from the share at logon and logoff.
Folder redirection
In Windows, redirecting an individual user profile folder, such as Documents or Pictures, to a network share.
shell
System component providing a command interpreter by which the user can use a kernel interface and operate the OS.
Bash
Command interpreter and scripting language for Unix-like systems.
terminal
Software that implements input and output for a command shell.
consoles
Device that implements input and output for a command shell. In Linux, multiple virtual consoles support use of a single host by multiple user sessions simultaneously.
Nano
Command-line text editor operated by CTRL key combinations.
vi or vim
Command-line text editor that extends the original vi software. Vim uses a command mode for file operations and an insert mode for editing.
pwd
Linux command for showing the current directory (“Print Working Directory”).
ls
Linux command for listing file system objects.
cat
Linux command to view and combine (concatenate) files.
find command
Command-line Linux tool used to search the file system.
grep
Linux command for searching and filtering input. This can be used as a file search tool when combined with ls.
cp command
Command-line tool for copying files in Linux.
mv command
Command-line tool for moving files in Linux.
rm command
Command-line tool for deleting file system objects in Linux.
df and du commands
Command-line tools used to report storage usage in Linux.
su
Linux commands allowing a user to use the root account or execute commands restricted to privileged users.
sudo
Linux commands allowing a user to use the root account or execute commands restricted to privileged users.
symbolic
Syntax for setting Linux permissions that uses characters to represent permissions values.
chmod command
Linux command for managing file permissions.
octal notation
Linux file-permission mode that uses numeric values to represent permissions.
chown
Linux command for managing the account owner for files and directories.
apt-get
One of the package management tools available in Linux for installing and updating software.
yum
Package manager for installing, maintaining, inventorying, and removing software from the Red Hat family of Linux distributions.
ps command
Linux command for retrieving process information.
top command
Interactive Linux command for monitoring process information.
ifconfig
Deprecated Linux command tool used to gather information about the IP configuration of the network adapter or to configure the network adapter.
ip command
Linux command tool used to gather information about the IP configuration of the network adapter or to configure the network adapter.
dig
Utility to query a DNS server and return information about a particular domain name or resource record.
Samba
Linux software package that implements Server Message Block (SMB) file/print sharing, primarily to support integration with Windows hosts.
cron
Scheduled task that is managed by the Linux cron daemon.
dock
macOS feature for managing applications from the desktop; similar to the Windows taskbar.
Spotlight Search
macOS file system search tool.
Mission Control
App facilitating multiple desktops in macOS.
System Preferences
macOS control panel hosting multiple prefpane configuration utilities.
Magic Mouse
Touch-enabled mouse and trackpad hardware for Apple computers.
Accessibility prefpane
macOS utility related to desktop and input/output device accessibility configuration.
Apple ID
Cloud-based service allowing users to synchronize settings and manage apps, file sharing, and backups between multiple Apple devices.
keychain
macOS app for managing passwords cached by the OS and supported browser/web applications.
FileVault
macOS disk encryption product.
Finder
File management app in macOS.
iCloud
Mobile/cloud computing office-productivity and data-storage suite operated by Apple and closely integrated with macOS and iOS.
DMG
macOS installer format that can be copied directly to the Applications folder.
PKG
macOS installer format that supports complex setup tasks.
.APP
Default extension for a macOS app subdirectory when installed to the Applications folder.
Disk Utility
macOS tool for disk and file system support tasks.
Remote Disc
macOS tool for sharing an optical drive over the network.
Time Machine
App facilitating backup operations in macOS.
spinning wait cursor
macOS indicator that a process is busy and is not able to accept input.
Force Quit
macOS tool for halting a process; equivalent to the process management functionality in Task Manager.
confidentiality, integrity, and availability (CIA triad)
Three principles of security control and management. Also known as the information security triad. Also referred to in reverse order as the AIC triad.
cybersecurity
Protection of computer systems and digital information resources from unauthorized access, attack, theft, or data damage.
threat actor
Person or entity responsible for an event that has been identified as a security incident or as a risk.
Risk
Likelihood and impact (or consequence) of a threat actor exercising a vulnerability.
Vulnerability
Weakness that could be triggered accidentally or exploited intentionally to cause a security breach.
non-compliant system
System whose configuration is different from its secure baseline.
unprotected system
System where one or more required security controls (antivirus or firewall, for example) is missing or misconfigured.
exploit
Specific method by which malware code infects a target host, often via some vulnerability in a software process.