General Terms Flashcards
What is a Fork?
the process of creating a new copy of an existing process
What is a null interface?
a virtual interface in a router or other network device that has no physical connection to any other device.
What is a rainbow table?
a precomputed table of possible plaintext passwords/hashes and their corresponding hash values.
What is a Shim?
a piece of software code that is placed between two components to intercept calls and redirect them, that is used to bridge or adapt between two different interfaces, systems, or versions of a software library or API.
What is Same Origin Policy (SOP)?
a security concept used in web browsers to prevent one website from accessing or modifying content from another website without permission. web content can only interact with content from the same origin or domain. An origin is combination of the protocol, domain name, and port number used to access a resource.
What is Geotagging?
embedding of the geolocation coordinates into a piece of data, such as a photo
Data at Rest
any data stored in memory, a hard drive, or a storage device
Data in Transit/Motion
any data moving from one computer or system to another over the network or within the same computer
Data in Use/Processing
any data read into memory or is currently inside the processor and being worked on or modified
PII
personally identifiable information
Asset Management
systematic approach to the governance and realization of value of things over their life cycle
Change Management
maximizes the number of successful IT changes
Standard Change - change management
preauthorized and can be implemented without any additional authorization
Normal Change - change management
changes where the authorization is gained
Emergency Change - change management
changes that need to be expedited
Change Schedule - change management
helps plan the changes and assists in communication such changes to the stakeholders to avoid conflicts
Back Out/Rollback Plan - change management
plan of action to take if something goes wrong
Acceptable Use Policy
employees’ set of policies for a service or resource enforced by the organization
Standard Operating Procedure (SOP)
step-by-step list of actions to do in order to comply with an organization’s policy
End-user Termination Checklist and Procedures
used as part of the employee offboarding process
Incident Report/After Action Report (AAR)
a report that gathers the opinions of all involved users, customers, technicians, managers, and stakeholders for the problem being investigated - what caused it and how to prevent it in the future
Network Topology Diagram
shows a mapping of an organization’s network connections. 1 for logical connections and 1 for physical connections
Asset ID
used to uniquely identify each piece of hardware tracked in an asset management database
Backup
process of creating and storing copies of data to protect against data loss
Recovery - backups
process of restoring data backup during data or system loss
Full Backup - backups
the backup job is going to create a file that contains all the data from the source
Incremental Backup - backups
will only back up things that have changed since the last backup
Differential Backup - backups
backs up all the data that has been changed since the last full backup
Synthetic Backup - backups
an optional type of backup that uses incremental backups that can create full backups with lower data transfer requirements
Archive Attribute - backups
file attributes that indicate whether a file has changed since the last backup. flags are set to on so the backup system knows what to backup
Frequency - backups
the period between backup jobs
On-site - backups
the backup storage mechanism is located in the same location as the system they’re backing up
Off-site - backups
backing up to some system not inside the same physical building where your workstations are
Grandfather-Father-Son (GFS) - backups
tape media rotation scheme that allows some of your backup media to be take to an offsite storage
3-2-1 Backup Rule - backups
states that you should have three copies of your data, including your production copy on your servers, two different types of media, and one copy being held offline, and off-site
Surge - power
an unexpected increase in the amount of voltage that’s being provided
Spike - power
a short, transient voltage that can be due to a short circuit, a trip circuit breaker, a power outage, or even a lightning strike
Sag - power
an unexpected decrease in the amount of voltage provided
Brownout - power
occurs when the voltage drops low enough that it causes the lights to dim and can cause a computer to shut off
Blackout - power
occurs when there is a total loss of power for a long period of time
Uninterruptible Power Supply (UPS) - power
combines the functionality of a surge suppressor with a battery backup
Backup Generator - power
an emergency power system used where there is an outage of the regular electric grid power
Electrostatic Discharge (ESD) - power
occurs whenever there’s a path that allows electrons to rush from a statically charged body to a component that has no charge
Material Safety Data Sheet
contains all the information about the ingredients, health hazards, precautions, and first aid information
Data Acquisition
creates a forensically sound copy of the data from a source device
Order of Volatility
collecting evidence that could be easily tampered with or destroyed, first
Proprietary Software
original developer retains all rights and ownership of a software code, where you pay them a fee and you receive a license in return
Open Source License
Makes software free to use, modify, and share
End User License Agreement
dictates the terms of the license for a software
Digital Rights Management
ensures copy protection for music and video that is being used in an online or digital manner
Data Retention
maintains and controls certain data to comply with business policies and applicable laws and regulations
Data Preservation
keeping information for a specific purpose outside of an organization’s data retention policy
Recovery Point Objective (RPO)
the maximum amount of time that can be lost from a recovery after a disaster, failure, or other event
Payment Card Industry Data Security Standard (PCI DSS)
an agreement that any organization that collects, stores, or processes credit card customer information must abide by
Structured Data
something like a csv file
Unstructured Data
things like chat logs, emails, text files, where you have to parse through the data
Acceptable Use Policy (AUP)
defines the rules that restrict how a computer, network, or other systems may be used
Job Rotation
different users are trained to perform the tasks of the same position to help prevent and identify fraud that could occur if there was only one user with the job
Boolean
a form of data with only 2 possible values (True or False)
Integer
a variable that stores an integer or a whole number that may be positive or negative
Float/Decimal/Real Number
a variable that stores a decimal number
Character
a variable that can only store one ASCII character
String
a variable that can store multiple characters
Constant - scripting
like a variable, but cannot be changed within the program once defined
Loop
a type of flow control that controls which order the code will be executed in a given program
For Loop
used when the number of times to repeat a block of code is known
While Loop
used when the number of times to repeat a block of code is not known and will only stop until something happens
Do Loop
used when there’s an indefinite iteration that needs to happen and will only stop until some condition is met at the end of the loop
Logic Control
type of programming paradigm that is based on formal logic and mathematical reasoning. It involves expressing the program as a set of logical rules and constraints, and using logical inference and deduction to determine the appropriate actions to take based on the input data and the defined rules.
Remote Desktop Gateway (RDG)
provides a secure connection using the SSL/TLS protocols to the server via RDP
Virtual Network Computing (VNC) Port 5900
protocol that defines how a remote desktop sharing session is established and managed between 2 computers over a network. remote access and control of computers over a network similar to Virtual Desktop Infrastructure (VDI)
Virtual Desktop Infrastructure (VDI)
hosts desktop environments on a centralized server. each desktop has its own experience and applications. allows a specific desktop image to be run in a virtual machine and delivered to an end user over a network (DaaS)
In-Band Management
managing devices through the use of Telnet or SSH protocols over the network that is accessbile through the same network path that is used for normal data traffic.
Out-of-Band Management
connecting to and configuring different network devices using an alternate path or dedicated management network path. it is isolated from regular data
Password Authentication Protocol (PAP)
sends usernames and passwords in plaintext for authentication
Challenge Handshake Authentication Protocol (CHAP)
sends the client a string of random text called a challenge which is then hashed with a shared secret password and sent back to the server.
Extensible Authentication Protocol (EAP)
allows for more secure authentication methods to be used instead of just a username and a password
Remote Monitoring and Management
a centralized tool used by managed service providers to manage groups of users and workstations remotely
Microsoft Remote Assistance (MSRA)
allows a user to ask for help from a technician or a coworker by using a passcode-protected invitation file. Quick Assist is a new version where you don’t have to send a file and instead just need a code
Desktop Management Software (Unified Endpoint Management)
designed for the deployment by an enterprise organization that allows them to understand all the access controls and authorization involved with all of their different systems
Endpoint Detection and Responses (EDR)
allows for the scanning of the desktops and laptops that are being managed by the EDM
What is the BCD file on windows?
boot configuration data file which stores boot configuration parameters that are used by the Windows Boot Manager to load the OS and drivers/services
System Image
a snapshot of how a system looks right now, including all personal files, applications, and installations
What is APK sideloading?
installing an application outside of the official store
What is a thin client?
A thin client is a lightweight computer device that relies heavily on a central server for processing and storage.