General Terms Flashcards

1
Q

What is a Fork?

A

the process of creating a new copy of an existing process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a null interface?

A

a virtual interface in a router or other network device that has no physical connection to any other device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a rainbow table?

A

a precomputed table of possible plaintext passwords/hashes and their corresponding hash values.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Shim?

A

a piece of software code that is placed between two components to intercept calls and redirect them, that is used to bridge or adapt between two different interfaces, systems, or versions of a software library or API.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Same Origin Policy (SOP)?

A

a security concept used in web browsers to prevent one website from accessing or modifying content from another website without permission. web content can only interact with content from the same origin or domain. An origin is combination of the protocol, domain name, and port number used to access a resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Geotagging?

A

embedding of the geolocation coordinates into a piece of data, such as a photo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data at Rest

A

any data stored in memory, a hard drive, or a storage device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data in Transit/Motion

A

any data moving from one computer or system to another over the network or within the same computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data in Use/Processing

A

any data read into memory or is currently inside the processor and being worked on or modified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

PII

A

personally identifiable information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Asset Management

A

systematic approach to the governance and realization of value of things over their life cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Change Management

A

maximizes the number of successful IT changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Standard Change - change management

A

preauthorized and can be implemented without any additional authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Normal Change - change management

A

changes where the authorization is gained

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Emergency Change - change management

A

changes that need to be expedited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Change Schedule - change management

A

helps plan the changes and assists in communication such changes to the stakeholders to avoid conflicts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Back Out/Rollback Plan - change management

A

plan of action to take if something goes wrong

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Acceptable Use Policy

A

employees’ set of policies for a service or resource enforced by the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Standard Operating Procedure (SOP)

A

step-by-step list of actions to do in order to comply with an organization’s policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

End-user Termination Checklist and Procedures

A

used as part of the employee offboarding process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Incident Report/After Action Report (AAR)

A

a report that gathers the opinions of all involved users, customers, technicians, managers, and stakeholders for the problem being investigated - what caused it and how to prevent it in the future

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Network Topology Diagram

A

shows a mapping of an organization’s network connections. 1 for logical connections and 1 for physical connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Asset ID

A

used to uniquely identify each piece of hardware tracked in an asset management database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Backup

A

process of creating and storing copies of data to protect against data loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Recovery - backups

A

process of restoring data backup during data or system loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Full Backup - backups

A

the backup job is going to create a file that contains all the data from the source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Incremental Backup - backups

A

will only back up things that have changed since the last backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Differential Backup - backups

A

backs up all the data that has been changed since the last full backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Synthetic Backup - backups

A

an optional type of backup that uses incremental backups that can create full backups with lower data transfer requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Archive Attribute - backups

A

file attributes that indicate whether a file has changed since the last backup. flags are set to on so the backup system knows what to backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Frequency - backups

A

the period between backup jobs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

On-site - backups

A

the backup storage mechanism is located in the same location as the system they’re backing up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Off-site - backups

A

backing up to some system not inside the same physical building where your workstations are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Grandfather-Father-Son (GFS) - backups

A

tape media rotation scheme that allows some of your backup media to be take to an offsite storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

3-2-1 Backup Rule - backups

A

states that you should have three copies of your data, including your production copy on your servers, two different types of media, and one copy being held offline, and off-site

36
Q

Surge - power

A

an unexpected increase in the amount of voltage that’s being provided

37
Q

Spike - power

A

a short, transient voltage that can be due to a short circuit, a trip circuit breaker, a power outage, or even a lightning strike

38
Q

Sag - power

A

an unexpected decrease in the amount of voltage provided

39
Q

Brownout - power

A

occurs when the voltage drops low enough that it causes the lights to dim and can cause a computer to shut off

40
Q

Blackout - power

A

occurs when there is a total loss of power for a long period of time

41
Q

Uninterruptible Power Supply (UPS) - power

A

combines the functionality of a surge suppressor with a battery backup

42
Q

Backup Generator - power

A

an emergency power system used where there is an outage of the regular electric grid power

43
Q

Electrostatic Discharge (ESD) - power

A

occurs whenever there’s a path that allows electrons to rush from a statically charged body to a component that has no charge

44
Q

Material Safety Data Sheet

A

contains all the information about the ingredients, health hazards, precautions, and first aid information

45
Q

Data Acquisition

A

creates a forensically sound copy of the data from a source device

46
Q

Order of Volatility

A

collecting evidence that could be easily tampered with or destroyed, first

47
Q

Proprietary Software

A

original developer retains all rights and ownership of a software code, where you pay them a fee and you receive a license in return

48
Q

Open Source License

A

Makes software free to use, modify, and share

49
Q

End User License Agreement

A

dictates the terms of the license for a software

50
Q

Digital Rights Management

A

ensures copy protection for music and video that is being used in an online or digital manner

51
Q

Data Retention

A

maintains and controls certain data to comply with business policies and applicable laws and regulations

52
Q

Data Preservation

A

keeping information for a specific purpose outside of an organization’s data retention policy

53
Q

Recovery Point Objective (RPO)

A

the maximum amount of time that can be lost from a recovery after a disaster, failure, or other event

54
Q

Payment Card Industry Data Security Standard (PCI DSS)

A

an agreement that any organization that collects, stores, or processes credit card customer information must abide by

55
Q

Structured Data

A

something like a csv file

56
Q

Unstructured Data

A

things like chat logs, emails, text files, where you have to parse through the data

57
Q

Acceptable Use Policy (AUP)

A

defines the rules that restrict how a computer, network, or other systems may be used

58
Q

Job Rotation

A

different users are trained to perform the tasks of the same position to help prevent and identify fraud that could occur if there was only one user with the job

59
Q

Boolean

A

a form of data with only 2 possible values (True or False)

60
Q

Integer

A

a variable that stores an integer or a whole number that may be positive or negative

61
Q

Float/Decimal/Real Number

A

a variable that stores a decimal number

62
Q

Character

A

a variable that can only store one ASCII character

63
Q

String

A

a variable that can store multiple characters

64
Q

Constant - scripting

A

like a variable, but cannot be changed within the program once defined

65
Q

Loop

A

a type of flow control that controls which order the code will be executed in a given program

66
Q

For Loop

A

used when the number of times to repeat a block of code is known

67
Q

While Loop

A

used when the number of times to repeat a block of code is not known and will only stop until something happens

68
Q

Do Loop

A

used when there’s an indefinite iteration that needs to happen and will only stop until some condition is met at the end of the loop

69
Q

Logic Control

A

type of programming paradigm that is based on formal logic and mathematical reasoning. It involves expressing the program as a set of logical rules and constraints, and using logical inference and deduction to determine the appropriate actions to take based on the input data and the defined rules.

70
Q

Remote Desktop Gateway (RDG)

A

provides a secure connection using the SSL/TLS protocols to the server via RDP

71
Q

Virtual Network Computing (VNC) Port 5900

A

protocol that defines how a remote desktop sharing session is established and managed between 2 computers over a network. remote access and control of computers over a network similar to Virtual Desktop Infrastructure (VDI)

72
Q

Virtual Desktop Infrastructure (VDI)

A

hosts desktop environments on a centralized server. each desktop has its own experience and applications. allows a specific desktop image to be run in a virtual machine and delivered to an end user over a network (DaaS)

73
Q

In-Band Management

A

managing devices through the use of Telnet or SSH protocols over the network that is accessbile through the same network path that is used for normal data traffic.

74
Q

Out-of-Band Management

A

connecting to and configuring different network devices using an alternate path or dedicated management network path. it is isolated from regular data

75
Q

Password Authentication Protocol (PAP)

A

sends usernames and passwords in plaintext for authentication

76
Q

Challenge Handshake Authentication Protocol (CHAP)

A

sends the client a string of random text called a challenge which is then hashed with a shared secret password and sent back to the server.

77
Q

Extensible Authentication Protocol (EAP)

A

allows for more secure authentication methods to be used instead of just a username and a password

78
Q

Remote Monitoring and Management

A

a centralized tool used by managed service providers to manage groups of users and workstations remotely

79
Q

Microsoft Remote Assistance (MSRA)

A

allows a user to ask for help from a technician or a coworker by using a passcode-protected invitation file. Quick Assist is a new version where you don’t have to send a file and instead just need a code

80
Q

Desktop Management Software (Unified Endpoint Management)

A

designed for the deployment by an enterprise organization that allows them to understand all the access controls and authorization involved with all of their different systems

81
Q

Endpoint Detection and Responses (EDR)

A

allows for the scanning of the desktops and laptops that are being managed by the EDM

82
Q

What is the BCD file on windows?

A

boot configuration data file which stores boot configuration parameters that are used by the Windows Boot Manager to load the OS and drivers/services

83
Q

System Image

A

a snapshot of how a system looks right now, including all personal files, applications, and installations

84
Q

What is APK sideloading?

A

installing an application outside of the official store

85
Q

What is a thin client?

A

A thin client is a lightweight computer device that relies heavily on a central server for processing and storage.