Glossary of Terms Flashcards

1
Q

32-bit versus 64-bit

A

Processing modes referring to the size of each instruction processed by the CPU. 320bit CPU’s replaced earlier 16-bit CPU’s and were used through the 1990s to the present day, through most PC and laptop CPUs now work in 640bit mode. The main 64-bit platform is called AMD64 or EM64T (by Intel). Software can be compiled as 32-bit or 64-bit. 64 bit CPUs can run most 32-bit software, but a 32-bit CPU can’t execute 64-bit software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

3D Printer

A

Hardware device capable of small-scale manufacturing. Most 3D printers use either a variety of filament (typically plastic) or resin media with different properties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

802.11 Standards

A

Specifications developed by IEEE for wireless networking over microwave radio transmission in the 2.4 GHz, 5 GHz, and 6 GHz frequency bands. The Wi-Fi standards brand has six main iterations: a, b, g, Wi-Fi 4 (n), Wi-Fi 5 (ac), and Wi-Fi 6 (ax). These specify different modulation techniques, supported distances, and data rates, plus special features, such as channel bonding, MIMO, and MU-MIMO.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

802.3 Ethernet

A

Standards developed as the IEEE 802.3 series describing media types, access methods, data rates, and distance limitations at OSI Layers 1 and 2 using xBASE-y designations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Access Point (AP)

A

Device that provides a connection between wireless devices and can connect to wired networks, implementing an infrastructure mode WLAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Adapter Cable

A

Peripheral cable converting between connector form factors or between signaling types, such as DisplayPort to HDMI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Advanced Micro Devices (AMD)

A

CPU manufacturer providing healthy competition for Intel. AMD chips such as the K6 or Athlon 64 and latterly the Ryzen have been very popular with computer manufacturers and have often out-performed their Intel equivalents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Advanced RISC Machines (ARM)

A

Designer of CPU and chipset architectures widely used in mobile devices. RISC stands for reduced instruction set computing. RISC microarchitectures use a small number of simple instructions that can be performed as a single operation. This contrasts with complex (CISC) microarchitectures, which use a large set of more powerful instructions that can take more than one operation to complete.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

advanced technology extended (ATX)

A

Standard PC case, motherboard, and power supply specification. Mini-, Micro-, and Flex-ATX specify smaller board designs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

airplane mode

A

A toggle found on mobile devices enabling the user to disable and enable wireless functionality quickly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

App Store

A

Feature of mobile computing that provides a managed interface for installing third-party software apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Application Programming Interface (API)

A

Library of programming utilities used, for example, to enable software developers to access functions of the TCP/IP network stack under a particular operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Application Virtualization

A

Software delivery model where the code runs on a server and is streamed to a client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Authentication, Authorization, and Accounting (AAA)

A

Security concept where a centralized platform verifies subject identification, ensures the subject is assigned relevant permissions, and then logs these actions to create an audit trail.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Automatic Document Feeder (ADF)

A

Device that feeds media automatically into a scanner or printer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Automatic Private IP Addressing (APIPA)

A

Mechanism for Windows hosts configured to obtain an address automatically that cannot contact a DHCP server to revert to using an address from the range 169.254.x.y. This is also called a link-local address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Backlight

A

LED or fluorescent lamp that illuminates the image on a flat-panel (TFT) screen. If the backlight component fails, only a dim image will be shown.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Basic Input/Output System (BIOS)

A

Legacy 32-bit firmware type that initializes hardware and provides a system setup interface for configuring boot devices and other hardware settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Basic Service Set ID (BSSID)

A

MAC address of an access point supporting a basic service area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Battery

A

Power source for a portable computer, typically a rechargeable Lithium-ion (Li-ion) type. A small coin cell battery is also used in a computer to power CMOS RAM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Beep Codes

A

During POST, errors in hardware or the system firmware data can be brought to the attention of the user by beep noises. Each beep code is able to draw attention to a particular fault with the hardware. It was once customary for a computer to beep once to indicate that POST has been successful, though most modern computers boot silently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Binary

A

Notational system with two values per digit (zero and one). Computers process code in binary because the transistors in its CPU and memory components also have two states (off and on).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Biometric Authentication

A

Authentication mechanism that allows a user to perform a biometric scan to operate an entry or access system. Physical characteristics stored as a digital data template can be used to authenticate a user. Typical features used include facial pattern, iris, retina, fingerprint pattern, and signature recognition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Blue Screen of Death (BSOD)

A

Microsoft status screen that indicates an error from which the system cannot recover (also called a stop error). Blue screens are usually caused by bad driver software or hardware faults (memory or disk). Other operating systems use similar crash indicators, such as Apple’s pinwheel and Linux’s kernel panic message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Bluetooth

A

Short-range, wireless radio-network-transmission medium normally used to connect two personal devices, such as a mobile phone and a wireless headset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Blu-ray Disc

A

Latest generation of optical drive technology, with disc capacity of 25 GB per layer. Transfer rates are measured in multiples of 36 MB/s.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Boot Options

A

Disk or network adapter device from which an operating system can be loaded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Boot Password

A

Feature of system setup that prevents the computer from booting until the correct user password is supplied. A supervisor password restricts access to the system setup program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Bus

A

Connections between components on the motherboard and peripheral devices providing data pathways, memory addressing, power supply, timing, and connector/port form factor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Cable Modem

A

Cable-Internet-access digital modem that uses a coaxial connection to the service provider’s fiber-optic core network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Cable Stripper

A

Tool for stripping cable jacket or wire insulation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Cable Tester

A

Two-part tool used to test successful termination of copper cable by attaching to each end of a cable and energizing each wire conductor in turn with an LED to indicate an end-to-end connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Capture Card

A

Adapter card designed to record video from a source such as a TV tuner or games console.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Carriage Belt

A

Inkjet print device component that moves the print head over the paper.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Cellular Radio

A

Standards for implementing data access over cellular networks are implemented as successive generations. For 2G (up to about 48 Kb/s) and 3G (up to about 42 Mb/s), there are competing GSM and CDMA provider networks. Standards for 4G (up to about 90 Mb/s) and 5G (up to about 300 Mb/s) are developed under converged LTE standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Central Processing Unit (CPU)

A

Principal microprocessor in a PC or mobile device responsible for running firmware, operating system, and applications software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Certificate

A

Issued by a Certificate Authority (CA) as a guarantee that a public key it has issued to an organization to encrypt messages sent to it genuinely belongs to that organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Certificate Authority (CA)

A

Server that guarantees subject identities by issuing signed digital certificate wrappers for their public keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Channel

A

Subdivision of frequency bands used by Wi-Fi products into smaller channels to allow multiple networks to operate at the same location without interfering with one another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Channel Bonding

A

Capability to aggregate one or more adjacent wireless channels to increase bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Chipset

A

Processors embedded on a motherboard to support the operation of the CPU and implementing various controllers (for memory, graphics, I/O, and so on).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Clock

A

System clock signal that synchronizes the operation of all of the components within a PC. It also provides the basic timing signal for the processor, bus, and memory. The CPU typically runs at many multiples of the basic clock speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Cloud Computing

A

Computing architecture where on-demand resources provisioned with the attributes of high availability, scalability, and elasticity are billed to customers on the basis of metered utilization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Cloud Servicing Model

A

Classifying the provision of cloud services and the limit of the cloud service provider’s responsibility as software, platform, infrastructure, and so on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Cloud Service Provider (CSP)

A

Organization providing infrastructure, application, and/or storage services via an “as a service” subscription-based, cloud-centric offering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Coaxial Cable

A

Media type using two separate conductors that share a common axis categorized using the Radio Grade (RG) specifications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Code Division Multiple Access (CDMA)

A

Method of multiplexing a communications channel using a code to key the modulation of a particular signal. CDMA is associated with Sprint and Verizon cellular phone networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Collision Domain

A

Network segment where nodes are attached to the same shared access media, such as a bus network or Ethernet hub.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Community cloud

A

Cloud that is deployed for shared use by cooperating tenants.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Compact Disc (CD)

A

Optical storage technology supporting up to 700 MB per disc with recordable and re-writable media also available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Containerization

A

Type of virtualization applied by a host operating system to provision an isolated execution environment for an application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Crimped

A

Tool to join a Registered Jack (RJ) form factor connector to the ends of twisted-pair patch cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Cyan, Magenta, Yellow, Black (CMYK)

A

Subtractive color model used by print devices. CMYK printing involves use of halftone screens. Four screens (or layers) of dots printed in each of the colors are overlaid. The size and density of the dots on each layer produce different shades of color and is viewed as a continuous tone image.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Data Cap

A

Feature of mobile computing that allows use of a network connection to be limited to avoid incurring additional carrier charges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Data Loss (leak) Prevention (DLP)

A

Software solution that detects and prevents sensitive information from being stored on unauthorized systems or transmitted over unauthorized networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Data Center

A

Facility dedicated to the provisioning of reliable power, environmental controls, and network fabric to server computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

DDR SDRAM (Double Data Rate SDRAM)

A

Series of high-bandwidth system-memory standards (DDR3/DDR4/DDR5) where data is transferred twice per clock cycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Decibel (dB)

A

Unit for representing the power of network signaling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

decibels per isotopic (dBi)

A

Unit for representing the increase in power gained by the directional design of a wireless antenna.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Default Gateway

A

IP configuration parameter that identifies the address of a router on the local subnet that the host can use to contact other networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Desktop as a Service

A

Cloud service model that provisions desktop OS and applications software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Digital Camera

A

Version of a 35 mm film camera where the film is replaced by light-sensitive diodes and electronic storage media (typically a flash memory card). The sensitivity of the array determines the maximum resolution of the image, measured in megapixels. Most mobile devices are fitted with embedded cameras that can function as both still and video cameras.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Digital Subscriber Line (DSL)

A

Carrier technology to implement broadband Internet access for subscribers by transferring data over voice-grade telephone lines. There are various “flavors” of DSL, notably S(ymmetric)DSL, A(symmetric)DSL, and V(ery HIgh Bit Rate)DSL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Digital Video Interface (DVI)

A

Legacy video interface that supports digital only or digital and analog signaling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Digital Video/Versatile Disk (DVD)

A

Optical storage technology supporting up to 4.7 GB per layer per disc with recordable and re-writable media also available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Digitizer

A

As part of a touch screen assembly, the digitizer is a touch-sensitive layer placed on top of the display panel. The digitizer converts analog touch and gesture events to digital signals that can be interpreted as different types of input.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Direct Burial

A

A type of outside plant (OSP) installation where cable is laid directly into the ground with no protective conduit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

DisplayPort

A

Digital audio/video interface developed by VESA. DisplayPort supports some cross-compatibility with DVI and HDMI devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Docking Station

A

Advanced type of port replicator designed to provide additional ports (such as network or USB) and functionality (such as expansion slots and drives) to a portable computer when used at a desk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Domain Name System (DNS)

A

Service that maps fully qualified domain name labels to IP addresses on most TCP/IP networks, including the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Domain-Based Message Authentication, Reporting and Conformance (DMARC)

A

Framework for ensuring proper application of SPF and DKIM utilizing a policy published as a DNS record.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

DomainKeys Identified Mail (DKIM)

A

Cryptographic authentication mechanism for mail utilizing a public key published as a DNS record.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

D-subminiature Shell Connector (DB-9)

A

Legacy connector form factor used for serial (9-pin) and VGA (15-pin) interfaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Dual Inline Memory Module

A

Standard form factor for system memory. There are different pin configurations for different DDR-SDRAM RAM types.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Dual-Channel

A

System-memory controller configuration that provides two data pathways between the memory modules and a compatible CPU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Duplex Unit

A

Installable option that enables a print device or scanner to use both sides of a page automatically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Dynamic Frequency Selection (DFS)

A

Regulatory feature of wireless access points that prevents use of certain 5 GHz channels when in range of a facility that uses radar.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Dynamic Host Configuration Protocol (DHCP)

A

Protocol used to automatically assign IP addressing information to hosts that have not been configured manually.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Effective Isotropic Radiated Power (EIRP)

A

Signal strength from a transmitter, measured as the sum of transmit power, antenna cable/connector loss, and antenna gain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Elasticity

A

Property by which a computing environment can add or remove resources in response to increasing and decreasing demands in workload.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Electrostatic Discharge (ESD)

A

Metal and plastic surfaces can allow a charge to build up. This can discharge if a potential difference is formed between the charged object and an oppositely charged conductive object. This electrical discharge can damage silicon chips and computer components if they are exposed to it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Email

A

Electronic store and forward messaging system. Email supports text messages and binary file attachments. For Internet email, an SMTP (Simple Mail Transfer Protocol) server is used to forward mail to a host. A mail client then uses either POP3 (Post Office Protocol) or IMAP (Internet Mail Access Protocol) to access the mailbox on the server and download messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Embedded System

A

Electronic system that is designed to perform a specific, dedicated function, such as a microcontroller in a medical drip or components in a control system managing a water treatment plant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Enclosure

A

Chassis for connecting an internal disk unit as an external peripheral device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

End of Life (EOL)

A

Product life cycle phase where mainstream vendor support is no longer available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Error Correction Code (ECC)

A

System memory (RAM) with built-in error correction security. It is more expensive than normal memory and requires motherboard support. It is typically only used in servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Escalation

A

In the context of support procedures, incident response, and breach-reporting, escalation is the process of involving expert and senior staff to assist in problem management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

External Serial Advanced Technology Attachment (eSATA)

A

Variant of SATA cabling designed for external connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Fan

A

Cooling device fitted to PC cases and components to improve air flow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Fiber Optic Cable

A

Network cable type that uses light signals as the basis for data transmission. Infrared light pulses are transmitted down the glass core of the fiber. The cladding that surrounds this core reflects light back to ensure transmission efficiency. Two main categories of fiber are available; multi-mode, which uses cheaper, shorter wavelength LEDs or VCSEL diodes, or single-mode, which uses more expensive, longer wavelength laser diodes. At the receiving end of the cable, light-sensitive diodes re-convert the light pulse into an electrical signal. Fiber optic cable is immune to eavesdropping and EMI, has low attenuation, supports rates of 10 Gb/s+, and is light and compact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Fiber to Premise (FTTP)

A

Internet connection type that uses a fiber link between the subscriber premises and ISP network. Fiber to the premises (FTTP) uses a full fiber link, while fiber to the curb (FTTC) retains a short segment of copper wire between the subscriber premises and a street cabinet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Filament

A

3-D print device media type.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

File Server

A

In file server–based networks, a central machine provides dedicated file and print services to workstations. Benefits of server-based networks include ease of administration through centralization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

File Transfer Protocol (FTP)

A

Application protocol used to transfer files between network hosts. Variants include S(ecure)FTP, FTP with SSL (FTPS and FTPES) and T(rivial)FTP. FTP utilizes ports 20 and 21.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Finisher Unit

A

Print device component used to automate document production, such as hole punching or stapling print jobs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Firewall

A

Software or hardware device that protects a network segment or individual host by filtering packets to an access control list.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Firmware

A

Software instructions embedded on a hardware device such as a computer motherboard. Modern types of firmware are stored in flash memory and can be updated more easily than legacy programmable read-only memory (ROM) types.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Flash Drive

A

Solid state flash memory provisioned as a peripheral device with a USB interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Flatbed Scanner

A

Type of scanner where the object is placed on a glass faceplate and the scan head moves underneath it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Form Factor

A

Size and shape of a component, determining its compatibility. Form factor is most closely associated with PC motherboard, case, and power supply designs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Frequency Band

A

Portion of the microwave radio-frequency spectrum in which wireless products operate, such as 2.4 GHz band or 5 GHz band.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

F-Type Connector

A

Screw down connector used with coaxial cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Fully Qualified Domain Name (FQDN)

A

Unique label specified in a DNS hierarchy to identify a particular host within a subdomain within a top-level domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Fused

A

Assembly in a laser print device that fixes toner to media. This is typically a combination of a heat and pressure roller.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Global Positioning System (GPS)

A

Means of determining a receiver’s position on Earth based on information received from orbital satellites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

Global System for Mobile Communication (GSM)

A

Standard for cellular radio communications and data transfer. GSM phones use a SIM card to identify the subscriber and network provider. 4G and later data standards are developed for GSM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

Google Workspace

A

Mobile/cloud computing office productivity and data storage suite operated by Google.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Hard Disk Drive (HDD)

A

Mass storage device that uses mechanical platters with a magnetic coating that are spun under disk heads that can read and write to locations on each platter (sectors).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Hardware Security Module (HSM)

A

An appliance for generating and storing cryptographic keys. This sort of solution may be less susceptible to tampering and insider threats than software-based storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Header (Motherboard)

A

Connector on the motherboard for internal cabling, such as fan power and front panel ports and buttons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

Headset

A

Peripheral device supporting audio input (microphone) and output (speaker headphones).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Heat Sink

A

Cooling device fitted to PC components to optimize heat transfer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

High Availability (HA)

A

Metric that defines how closely systems approach the goal of providing data availability 100% of the time while maintaining a high level of system performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

High-Definition Multimedia Interface (HDMI)

A

Digital audio/video interface developed for use on both consumer electronics and computer equipment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Hotspot

A

Using the cellular data plan of a mobile device to provide Internet access to a laptop or PC. The PC can be tethered to the mobile by USB, Bluetooth, or Wi-Fi (a mobile hotspot).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

Hub

A

Layer 1 (Physical) network device used to implement a star network topology on legacy Ethernet networks, working as a multiport repeater.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

Hybrid Cloud

A

Cloud deployment that uses both private and public elements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

HyperText Transfer Protocol/HTTP Secure

A

Application protocol used to provide web content to browsers. HTTP uses port 80. HTTPS(ecure) provides for encrypted transfers, using TLS and port 443.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

iCloud

A

Mobile/cloud computing office-productivity and data-storage suite operated by Apple and closely integrated with macOS and iOS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

Image

A

Clone copy of an operating system installation (including installed software, settings, and user data) stored as a file on disk. VMs use images to store persistent data, and the technology is also used to make system backups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

Imaging Drum

A

Drum or belt in a laser printer that supports a high electric charge that can be selectively removed using a laser or LED light source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

Impact Printer

A

Typically a dot matrix printer, this uses pressure to transfer ink from a ribbon onto paper in a particular pattern, similar to the mechanism of a typewriter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

Indoor Positioning System (IPS)

A

Technology that can derive a device’s location when indoors by triangulating its proximity to radio sources such as Bluetooth beacons or Wi-Fi access points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

Information Technology Extended (ITX)

A

Series of motherboard form factors designed for small form factor (SFF) computers and appliances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

Infrastructure as a Service (IaaS)

A

Cloud service model that provisions virtual machines and network infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

Injector

A

A device that can supply Power over Ethernet (PoE) if the Ethernet switch ports do not support it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

Inkjet Printer

A

Type of printer where colored ink is sprayed onto the paper using microscopic nozzles in the print head. There are two main types of ink dispersion system: thermal shock (heating the ink to form a bubble that bursts through the nozzles) and piezoelectric (using a tiny element that changes shape to act as a pump).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

In-Plane Switching

A

Type of TFT display with the best overall quality, including wide viewing angles, good contrast ratio, and good response times (on premium units).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

Input Voltage

A

Range of alternating current (AC) voltages that a PSU can accept when connected to grid power. Some PSUs are manually switched between low-line 110–120 VAC and high-line 220–240 VAC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

Input / Output Operations Per Second (IOPS)

A

Performance indicator that measures the time taken to complete read/write operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

Insulation Displacement Connector (IDC)

A

Block used to terminate twisted pair cabling at a wall plate or patch panel available in different formats, such as 110, BIX, and Krone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

Integrated Drive Electronics (IDE)

A

Legacy mass storage bus, most commonly implemented as extended IDE (EIDE) and also referred to as parallel advanced technology attachment (PATA). Each IDE controller port supports two devices connected over ribbon cable with three connectors (controller, primary device, and secondary device).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

Intel

A

Intel processors were used in the first IBM PCs, and the company’s CPUs and chipsets continue to dominate the PC and laptop market.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

Internet Message Access Protocol (IMAP)

A

Application protocol providing a means for a client to access and manage email messages stored in a mailbox on a remote server. IMAP4 utilizes TCP port number 143, while the secure version IMAPS uses TCP/993.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

Internet of Things (IoT)

A

Devices that can report state and configuration data and be remotely managed over IP networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

Internet Protocol (IP)

A

Network (Internet) layer protocol in the TCP/IP suite providing packet addressing and routing for all higher-level protocols in the suite.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

Internet Service Provider (ISP)

A

Provides Internet connectivity and web services to its customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

Intrusion Detection System

A

Security appliance or software that analyzes data from a packet sniffer to identify traffic that violates policies or rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

Inverter

A

Fluorescent lamp backlights require AC power. An inverter component converts DC power from the motherboard to AC. The inverter can fail separately to the backlight.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

IPv4

A

Version of the Internet Protocol that uses 32-bit address values and subnet masks typically expressed in dotted decimal notation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

IPv6

A

Version of the Internet Protocol that uses 64-bit address values typically expressed in canonical hex notation with slash notation network prefixes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

Jitter

A

Variation in the time it takes for a signal to reach the recipient. Jitter manifests itself as an inconsistent rate of packet delivery. If packet loss or delay is excessive, then noticeable audio or video problems (artifacts) are experienced by users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

Land Grid Array (LGA)

A

CPU socket form factor used predominantly by Intel where connector pins are located on the socket.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

Laser Printer

A

Type of printer that develops an image on a drum by using electrical charges to attract special toner, then applying it to paper. The toner is then fixed to the paper using a high-heat and pressure roller (fuser). The process can be used with black toner only or CMYK toner cartridges to create full-color prints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

Latency

A

Time taken for a signal to reach the recipient, measured in milliseconds. Latency is a particular problem for two-way applications, such as VoIP (telephone) and online conferencing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

Lease (DHCP)

A

Address configuration assigned by a DHCP server to a client for a limited period.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

Legacy System

A

Hardware or software product that is no longer supported by its vendor and therefore no longer provided with security updates and patches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

Light Emitting Diode (LED)

A

Small, low-power lamps used both as diagnostic indicators, the backlight for a TFT display, and (as an organic LED array) in high-quality flat panels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

Lightning

A

Proprietary connector and interface used by Apple iPhone and iPad devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

Lightweight Directory Access Protocol (LDAP)

A

Protocol used to access network directory databases, which store information about authorized users and their privileges, as well as other organizational information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

Liquid Cooling

A

Cooling system that uses system of pipes, water blocks, and pumps to transfer heat away from components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

Liquid Crystal Display (LCD)

A

Flat-panel display technology where the image is made up of liquid crystal cells with color filters controlled using electrical charges. The display must be illuminated by a backlight.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

Load Balancer

A

Type of switch, router, or software that distributes client requests between different resources, such as communications links or similarly configured servers. This provides fault tolerance and improves throughput.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

Local Area Network (LAN)

A

Network scope restricted to a single geographic location and owned/managed by a single organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

Local Connector (LC)

A

Small form factor push-pull fiber optic connector; available in simplex and duplex versions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

Location Service

A

Feature of mobile computing that identifies or estimates the device’s geographical position using GPS and/or network data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

Long Term Evolution (LTE)

A

Packet data communications specification providing an upgrade path for both GSM and CDMA cellular networks. LTE Advanced is designed to provide 4G standard network access.

158
Q

long-range fixed wireless

A

Ground-based microwave transmission that supports long distances over precisely aligned directional antennas. These products can either make privileged use of licensed frequency bands or use public unlicensed radio-frequency spectrum.

159
Q

Loopback Adapter

A

Tool used to verify the integrity of a network interface port by checking that it can receive a signal generated by itself.

160
Q

M.2

A

Hardware specification for internal adapter cards. M.2 is often used for PCIe-based SSDs.

161
Q

Maintenance Kit

A

On a laser printer, the fuser unit (the part that fuses toner onto the paper) needs replacing according to the maintenance kit schedule. A maintenance kit also includes new pickup, feed, and separation rollers. It may also include transfer components (roller or belt), or these may be replaced on a different schedule, depending on the printer model.

162
Q

Managed Switch

A

Ethernet switch that is configurable via a command-line interface or SDN controller.

163
Q

Mass Storage

A

Device with a persistent storage mechanism, such as hard drives, solid state drives, and optical drives.

164
Q

Media Access Control (MAC)

A

Hardware address that uniquely identifies each network interface at layer 2 (Data Link). A MAC address is 48 bits long with the first half representing the manufacturer’s organizationally unique identifier (OUI).

165
Q

Memory Card

A

Solid state flash memory provisioned as a peripheral device in a proprietary adapter card form factors, such as Secure Digital and microSD.

166
Q

Metered Utilization

A

Feature of cloud service models that allows customers to track and pay for precise compute, storage, and network resource units.

167
Q

Metropolitan Area Network (MAN)

A

Network scope covers the area of a city (that is, no more than tens of kilometers).

168
Q

Microsoft 365

A

Mobile/cloud computing office productivity and data storage suite operated by Microsoft.

169
Q

Mobile Application Management (MAM)

A

Enterprise management function that enables control over apps and storage for mobile devices and other endpoints.

170
Q

Mobile Device Management (MDM)

A

Process and supporting technologies for tracking, controlling, and securing the organization’s mobile infrastructure.

171
Q

Modular Power Supply (PSU)

A

PSU design where power cables can be attached to ports on the unit as needed.

172
Q

Moles Connector

A

Legacy power connector for internal devices such as hard drives and optical drives.

173
Q

mSATA

A

Connector form factor for internal solid state drives.

174
Q

Multicore

A

CPU design that puts two chips onto the same package. Most CPUs are multicore (more than two cores).

175
Q

Multi mode Fiber (MMF)

A

Fiber optic cable type using LED or vertical cavity surface emitting laser optics and graded using optical multimode types for core size and bandwidth.

176
Q

Multiple Input Multiple Output (MIMO)

A

Use of multiple reception and transmission antennas to boost wireless bandwidth via spatial multiplexing and to boost range and signal reliability via spatial diversity.

177
Q

Multi socket

A

Motherboard configuration with multiple CPU sockets. The CPUs installed must be identical.

178
Q

Multithreading

A

CPU architecture that exposes two or more logical processors to the OS, delivering performance benefits similar to multicore and multisocket to threaded applications.

179
Q

Multiuser MIMO (MU-MIMO)

A

Use of spatial multiplexing to allow a wireless access point to support multiple client stations simultaneously.

180
Q

MX Record

A

Type of DNS resource record used to identify the email servers used by a domain.

181
Q

Near-Field Communication

A

Standard for two-way radio communications over very short (around four inches) distances, facilitating contactless payment and similar technologies. NFC is based on RFID.

182
Q

NetBIOS

A

Session management protocol used to provide name registration and resolution services on legacy Microsoft networks.

183
Q

Network Address Translation (NAT)

A

Routing mechanism that conceals internal addressing schemes from the public Internet by translating between a single public address on the external side of a router and private, non-routable addresses internally.

184
Q

Network Attached Storage (NAS)

A

Storage device enclosure with network port and an embedded OS that supports typical network file access protocols (FTP and SMB for instance).

185
Q

Network Interface Card (NIC)

A

Adapter card that provides one or more Ethernet ports for connecting hosts to a network so that they can exchange data over a link.

186
Q

Network Mask

A

Number of bits applied to an IP address to mask the network ID portion from the host/interface ID portion.

187
Q

Network Topology Diagram

A

Documentation showing how network nodes are connected by cabling or how they are logically identified and connected, such as in IP networks.

188
Q

New Technology Filing System (NTFS)

A

64-bit default file system for Windows, with file-by-file compression and RAID support as well as advanced file attribute management tools, encryption, and disk quotas.

189
Q

Non-compliant System

A

System whose configuration is different from its secure baseline.

190
Q

NSlookup Command

A

Cross-platform command tool for querying DNS resource records.

191
Q

NTFS Permissions

A

ACL that mediates local and network access to a file system object under Windows when the volume is formatted with NTFS.

192
Q

Octal Notation

A

Linux file-permission mode that uses numeric values to represent permissions.

193
Q

On Site vs. Off Site

A

Media rotation scheme that ensures at least one copy of data is held at a different location to mitigate the risk of a disaster that destroys all storage at a single site.

194
Q

OneDrive

A

Cloud storage service operated by Microsoft and closely integrated with Windows.

195
Q

On-path Attach

A

Attack where the threat actor makes an independent connection between two victims and is able to read and possibly modify traffic.

196
Q

Open Source

A

Licensing model that grants permissive rights to end-users, such as to install, use, modify, and distribute a software product and its source code, as long as redistribution permits the same rights.

197
Q

Operator

A

Programming object that can resolve the truth value of a condition, such as whether one variable is equal to another.

198
Q

Organizational Unit (OU)

A

Structural feature of a network directory that can be used to group objects that should share a common configuration or organizing principle, such as accounts within the same business department.

199
Q

Original Equipment Manufacturer (OEM)

A

In PC terms, companies that sell Windows co-branded under their own logo. OEM Windows licenses are valid only on the system that the software was installed on, and the OEM must provide support.

200
Q

Palm Print Scanner

A

Biometric camera-based scanner that uses unique features of a palm shown by visible and infrared light.

201
Q

Password Attack

A

Any attack where the attacker tries to gain unauthorized access to and use of passwords.

202
Q

Password Manager

A

Software that can suggest and store site and app passwords to reduce risks from poor user choices and behavior. Most browsers have a built-in password manager.

203
Q

Path Ping Command

A

Windows utility for measuring latency and packet loss across an internetwork.

204
Q

Pattern Lock

A

Mobile-device authentication mechanism that requires the user to input a join-the-dots pattern to unlock the device.

205
Q

Performance Monitor (perfuming.msc)

A

Console for reporting and recording resource utilization via counter data for object instances.

206
Q

Personal Government Issued Information

A

Data related to identity documents issued by governments, such as passports, social security IDs, and driving licenses, that is liable to be subject to strict legal and regulatory compliance requirements.

207
Q

Personal Identification Number (PIN)

A

Number used in conjunction with authentication devices such as smart cards; as the PIN should be known only to the user, loss of the smart card should not represent a security risk.

208
Q

Personalization Settings

A

Windows Settings pages related to customizing the appearance of the desktop using themes.

209
Q

Personally Identifiable Information (PII)

A

Data that can be used to identify or contact an individual (or in the case of identity theft, to impersonate him or her).

210
Q

Phishing

A

Email-based social engineering attack, in which the attacker sends email from a supposedly reputable source, such as a bank, to try to elicit private information from the victim.

211
Q

Phone Settings

A

Windows Settings pages for associating a smartphone with Windows.

212
Q

Physical Destruction

A

Using drilling, shredding, incineration, or degaussing of storage media before recycling or repurposing to minimize the risk of leaving persistent data remnants.

213
Q

Physical Placement

A

Considerations for installation location for PC and network devices to ensure reliable and secure operation.

214
Q

Piggy Backing

A

Allowing a threat actor to enter a site or controlled location without authorization

215
Q

PIN Code Lock

A

Basic mobile-device authentication mechanism that requires the correct number or passcode to unlock the device.

216
Q

Ping Command

A

Cross-platform command tool for testing IP packet transmission.

217
Q

PKG

A

macOS installer format that supports complex setup tasks.

218
Q

Plug-in (browser)

A

Software installed to a web browser to handle multimedia objects embedded in web pages. Use of most plug-in types is now deprecated.

219
Q

Pop-up Blocker

A

Browser feature or extension that prevents sites from creating new browser windows.

220
Q

Port Forwarding

A

Process in which a router takes requests from the Internet for a particular application (such as HTTP) and sends them to a designated host on the LAN.

221
Q

Port Mapping

A

port mapping Type of port forwarding where the external port is forwarded to a different internal port on the LAN host.

222
Q

Port Triggering

A

Mechanism to configure access through a firewall for applications that require more than one port. Basically, when the firewall detects activity on outbound port A destined for a given external IP address, it opens inbound access for the external IP address on port B for a set period.

223
Q

Power Failure

A

Complete loss of building power.

224
Q

Power Options

A

Control Panel app related to configuring power button/lid events and power-saving modes.

225
Q

Power Users

A

One of the default Windows group accounts. Its use is deprecated, but it is still included with Windows to support legacy applications.

226
Q

PowerShell (PS)

A

Command shell and scripting language built on the .NET Framework that use cmdlets for Windows automation.

227
Q

Pre-boot Execution Environment (PXE)

A

Feature of a network adapter that allows the computer to boot by contacting a suitably configured server over the network.

228
Q

Pre-shared Key (PSK)

A

Wireless network authentication mode where a passphrase-based mechanism is used to allow group authentication to a wireless network. The passphrase is used to derive an encryption key.

229
Q

Pretexting

A

Social engineering tactic where a team will communicate, whether directly or indirectly, a lie or half-truth in order to get someone to believe a falsehood.

230
Q

Privacy Settings

A

Windows Settings pages related to personal data collection and use.

231
Q

Private Browsing

A

Browser mode in which all session data and cache is discarded and tracking protection features are enabled by default.

232
Q

Private Key

A

In asymmetric encryption, the private key is known only to the holder and is linked to, but not derivable from, a public key distributed to those with whom the holder wants to communicate securely. A private key can be used to encrypt data that can be decrypted by the linked public key or vice versa.

233
Q

Process

A

Software program that has been executed and is running in system memory.

234
Q

Programs and Features

A

Control Panel applet allowing management of Windows Features and third-party software.

235
Q

Prohibited Content

A

Data found on a computer system that is not permitted by policy or that is not compliant with relevant legislation or regulations.

236
Q

Protected Health Information (PHI)

A

Data that can be used to identify an individual and includes information about past, present, or future health as well as related payments and data used in the operation of a healthcare business.

237
Q

Proxy Server

A

Server that mediates the communications between a client and another server. It can filter and often modify communications as well as provide caching services to improve performance.

238
Q

PS Command

A

Linux command for retrieving process information.

239
Q

PSI

A

Extension for the PowerShell script format.

240
Q

Public Key

A

During asymmetric encryption, this key is freely distributed and can be used to perform the reverse encryption or decryption operation of the linked private key in the pair.

241
Q

pwd Command

A

Linux command for showing the current directory (“Print Working Directory”).

242
Q

PY

A

Extension for a script written in the Python programming language.

243
Q

Python

A

High-level programming language that is widely used for automation.

244
Q

Quarantine

A

The process of isolating a file, computer system, or computer network to prevent the spread of a virus or another cybersecurity incident.

245
Q

Quick Assist

A

Windows support feature allowing remote screen-sharing over the Internet.

246
Q

Ransomware

A

Malware that tries to extort money from the victim by blocking normal operation of a computer and/or encrypting the victim’s files and demanding payment.

247
Q

Recovery

A

Operation to recover system functionality and/or data integrity using backup media.

248
Q

Recovery Partition

A

OEM recovery media enabling the user to reset the system to its factory configuration.

249
Q

Recycle Bin

A

When files are deleted from a local hard disk, they are stored in the Recycle Bin. They can be recovered from here if so desired.

250
Q

Redirection

A

Consequence of malware infection where DNS and/or search results are corrupted to redirect requests from legitimate site hosts to spoofed sites or ads.

251
Q

Registry Editor (regedit)

A

Tool for making direct edits to the registry database, such as adding or modifying keys or values. The Registry Editor can be used to make backups of the registry.

252
Q

Regulated Data

A

Information that has storage and handling compliance requirements defined by national and state legislation and/or industry regulations.

253
Q

Remote Access Trojan (RAT)

A

Malware that creates a backdoor remote administration channel to allow a threat actor to access and control the infected host.

254
Q

Remote Assistance (msra.exe)

A

Windows remote-support feature allowing a user to invite a technical support professional to provide assistance over a network using chat. The user can also grant the support professional control over his or her desktop. Remote Assistance uses the same RDP protocol as Remote Desktop.

255
Q

Remote Authentication Dial-in User Service (RADIUS)

A

AAA protocol used to manage remote and wireless authentication infrastructures.

256
Q

Remote Desktop Protocol (RDP)

A

Application protocol for operating remote connections to a host using a graphical interface. The protocol sends screen data from the remote host to the client and transfers mouse and keyboard input from the client to the remote host. It uses TCP port 3389.

257
Q

Remote Disc

A

macOS tool for sharing an optical drive over the network.

258
Q

Remote Monitoring and Management (RMM)

A

Category of support software designed for outsourced management of client networks by MSPs.

259
Q

Remote Wipe

A

Software that allows deletion of data and settings on a mobile device to be initiated from a remote server.

260
Q

Reservation (DHCP)

A

DHCP configuration that assigns either a prereserved or persistent IP address to a given host, based on its hardware address or other ID.

261
Q

Reset this PC

A

Windows feature to attempt system recovery by reinstalling Windows from source

262
Q

Resource Monitor (resmon.exe)

A

Console for live monitoring of resource utilization data for the CPU and GPU, system memory, disk/file system, and network.

263
Q

Retina Scanner

A

Biometric scanner based on analysis of the unique pattern of blood vessels at the back of the eye.

264
Q

Risk

A

Likelihood and impact (or consequences) of a threat actor exercising a vulnerability.

265
Q

Risk Analysis

A

Process for qualifying or quantifying the likelihood and impact of a factor.

266
Q

rm Command

A

Command-line tool for deleting file system objects in Linux.

267
Q

rmdir command

A

Command-line tool for deleting directories in Windows. The /s switch enables the deletion of non-empty directories.

268
Q

Roaming Profile

A

Configuring a network share to hold user profile data. The data is copied to and from the share at logon and logoff.

269
Q

robocopy Command

A

Command-line file copy utility recommended for use over the older xcopy.

270
Q

Roll Back Updates/Drivers

A

Windows troubleshooting feature that allows removal of an update or reversion to a previous driver version.

271
Q

Root Access (mobile)

A

Gaining superuser-level access over an Android-based mobile device.

272
Q

Rootkit

A

Class of malware that modifies system files, often at the kernel level, to conceal its presence.

273
Q

Run as Administrator

A

Windows feature that requires a task to be explicitly launched with elevated privileges and consented to via UAC.

274
Q

Run Dialog

A

Windows interface for executing commands.

275
Q

Safe Mode

A

Troubleshooting startup mode that loads a limited selection of drivers and services.

276
Q

Samba

A

Linux software package that implements Server Message Block (SMB) file/print sharing, primarily to support integration with Windows hosts.

277
Q

Retention

A

Process an organization uses to maintain the existence of and control over certain data in order to comply with business policies and/or applicable laws and regulations.

278
Q

Rogue Antivirus

A

Spoofed desktop notifications and browser ads designed to alarm users and promote installation of Trojan malware.

279
Q

Sandbox

A

Computing environment that is isolated from a host system to guarantee that the environment runs in a controlled, secure fashion. Communication links between the sandbox and the host are usually completely prohibited so that malware or faulty software can be analyzed in isolation and without risk to the host.

280
Q

Sanitization

A

Process of thoroughly and completely removing data from a storage medium so that file remnants cannot be recovered.

281
Q

Screen Lock

A

Mobile-device mechanism that locks the screen after a period of inactivity.

282
Q

Screened Subnet

A

Segment isolated from the rest of a private network by one or more firewalls that accepts connections from the Internet over designated ports.

283
Q

Screensaver Lock

A

Security mechanism that locks the desktop after a period of inactivity and requires the user to authenticate to resume.

284
Q

Screen-Sharing

A

Software that allows clients to view and control the desktop over a network or the Internet.

285
Q

Script

A

Series of simple or complex commands, parameters, variables, and other components stored in a text file and processed by a shell interpreter.

286
Q

Secure Connection

A

Using HTTPS to browse a site where the host has presented a valid digital certificate issued by a CA that is trusted by the browser. A padlock icon is shown to indicate the secure status of the connection.

287
Q

Secure Erase (SE)

A

Method of sanitizing a drive using the ATA command set.

288
Q

Secure Shell (SSH)

A

Application protocol supporting secure tunneling and remote terminal emulation and file copy. SSH runs over TCP port 22.

289
Q

Security Group

A

Access control feature that allows permissions to be allocated to multiple users more efficiently.

290
Q

Service Set Identifier (SSID)

A

Character string that identifies a particular wireless LAN (WLAN).

291
Q

Services Console (services.msc)

A

Windows machines run services to provide functions; for example, Plug-and-Play, the print spooler, DHCP client, and so on. These services can be viewed, configured, and started/stopped via the Services console. You can also configure which services run at startup using msconfig. You can view background services (as well as applications) using the Processes tab in Task Manager.

292
Q

sfc Command

A

Command-line utility that checks the integrity of system and device driver files.

293
Q

SH

A

Extension for a Linux shell script file format. The shebang in the first line of the script identifies the shell type (Bash, for instance).

294
Q

Shell

A

System component providing a command interpreter by which the user can use a kernel interface and operate the OS.

295
Q

Short Message Service (SMS)

A

System for sending text messages between cell phones.

296
Q

Shoulder Surfing

A

Social engineering tactic to obtain someone’s password or PIN by observing him or her as he or she types it in.

297
Q

Shutdown Command

A

Command-line tool for shutting down or restarting the computer. The command is supported by Windows and Linux, though with different syntax.

298
Q

Simultaneous Authentication of Equals (SAE)

A

Personal authentication mechanism for Wi-Fi networks introduced with WPA3 to address vulnerabilities in the WPA-PSK method.

299
Q

Single Sign On (SSO)

A

Authentication technology that enables a user to authenticate once and receive authorizations for multiple services.

300
Q

Sleep

A

Power-saving mode in Windows. On a laptop, this functions much like standby, but on a desktop, the system also creates a hibernation file before entering the standby state.

301
Q

Smart Card

A

Security device similar to a credit card that can store authentication information, such as a user’s private key, on an embedded cryptoprocessor.

302
Q

Social Engineering

A

Activity where the goal is to use deception and trickery to convince unsuspecting users to provide sensitive data or to violate security guidelines.

303
Q

Soft Token

A

Either an additional code to use for 2-step verification, such as a one-time password, or authorization data that can be presented as evidence of authentication in an SSO system.

304
Q

Sound Applet

A

Control Panel applet related to speaker and microphone configuration plus Windows sound events and notifications.

305
Q

Spear Phishing

A

Email-based or web-based form of phishing that targets specific individuals.

306
Q

Spinning Wait Cursor

A

macOS indicator that a process is busy and is not able to accept input.

307
Q

Splash Screen

A

Displaying terms of use or other restrictions before use of a computer or app is allowed.

308
Q

Spoofing

A

Attack technique where the threat actor disguises his or her identity or impersonates another user or resource.

309
Q

Spotlight Search

A

macOS file system search tool.

310
Q

Spyware

A

Software that records information about a PC and its users, often installed without the user’s consent.

311
Q

Standard Account

A

Non-privileged user account in Windows that typically has membership of the Users security group only.

312
Q

Standard Formatting

A

Using a vendor tool to delete the file system and/or partition table on storage media before recycling or repurposing. This method carries the greatest risk of leaving persistent data remnants.

313
Q

Standard Operating Procedure (SOP)

A

Documentation of best practice and work instructions to use to perform a common administrative task.

314
Q

Standby

A

Power-saving mode where power to all compatible components except system memory is cut. Note that systems on standby still consume some electricity.

315
Q

Startup

A

Apps and scripts set to run when the computer starts or when the user signs in. Startup items can be configured as shortcuts, registry entries, or Task Scheduler triggers.

316
Q

Startup Repair

A

Troubleshooting boot options that allow use of tools such as safe mode and recovery discs.

317
Q

Storage Spaces

A

Windows feature for creating a single storage resource from multiple devices. Data can be protected against device failure by RAID-like mirroring or parity.

318
Q

Structured Query Language injection (SQL injection)

A

Attack that injects a database query into the input data directed at a server by accessing the client side of the application.

319
Q

su/sudo Commands

A

Linux commands allowing a user to use the root account or execute commands restricted to privileged users.

320
Q

Surge Suppressor

A

A simple device intended to protect electrical devices against the damaging effects of a power spike.

321
Q

Swipe

A

Mobile gesture that unlocks the screen without requiring authentication.

322
Q

Symbolic Mode

A

Syntax for setting Linux permissions that uses characters to represent permissions values.

323
Q

Symmetric Encryption

A

Two-way encryption scheme in which encryption and decryption are both performed by the same key. Also known as shared-key encryption.

324
Q

Synthetic Full Backup

A

Job type that combines incremental backup jobs to synthesize a full backup job. Synthetic full backups have the advantage of being easy to restore from while also being easy on bandwidth across the network as only changes are transmitted.

325
Q

System Applet

A

Control Panel applet relating to basic system settings, such as host name and network type, System Protection, performance settings, and virtual memory.

326
Q

System Configuration Utility (msconfig.exe)

A

Utility for configuring Windows startup settings.

327
Q

System Information (msinfo32.exe)

A

Utility for configuring Windows startup settings.

328
Q

System Preferences

A

macOS control panel hosting multiple prefpane configuration utilities.

329
Q

System Requirements

A

Minimum specifications for CPU speed, memory, and disk capacity for installing an OS or app.

330
Q

System Restore (rstrui.exe)

A

Windows System Protection feature that allows the configuration to be reverted to a restore point.

331
Q

System Settings

A

Windows Settings pages relating to basic and advanced system settings.

332
Q

Tailgating

A

Social engineering technique to gain access to a building by following someone who is unaware of their presence.

333
Q

Task Manager (taskmgr.exe)

A

Windows utility used to monitor and manage process execution, resource utilization, user sessions, startup settings, and service configuration.

334
Q

Task Scheduler

A

Enables execution of an action (such as running a program or a script) automatically at a pre-set time or in response to some sort of trigger.

335
Q

Temporal Key Integrity Protocol (TKIP)

A

Mechanism used in the first version of WPA to improve the security of wireless encryption mechanisms, compared to the flawed WEP standard.

336
Q

Terminal

A

Software that implements input and output for a command shell.

337
Q

Terminal Access Controller Access Control System Plus (TACACS+)

A

AAA protocol developed by Cisco that is often used to authenticate to administrator accounts for network appliance management.

338
Q

This PC

A

File system object representing a Windows computer and the disk drives installed to it.

339
Q

Threat

A

Potential for an entity to exercise a vulnerability (that is, to breach security).

340
Q

Threat Actor

A

Person or entity responsible for an event that has been identified as a security incident or as a risk.

341
Q

Ticketing System

A

Database software designed to implement a structured support process by identifying each case with a unique job ticket ID and with descriptive fields to record how the issue was resolved.

342
Q

Time & Language Settings

A

Windows Settings pages allowing configuration of default data formats (date, currency, and so on), location information, and keyboard input locale.

343
Q

Time Drift

A

Situation where hosts on a network are not closely synchronized to the same date/time source.

344
Q

Time Machine

A

App facilitating backup operations in macOS.

345
Q

top Command

A

Interactive Linux command for monitoring process information.

346
Q

traceroute/tracert Command

A

Diagnostic utilities that trace the route taken by a packet as it “hops” to the destination host on a remote network. tracert is the Windows implementation, while traceroute runs on Linux.

347
Q

Trojan

A

Malicious software program hidden within an innocuous-seeming piece of software. Usually, the Trojan is used to try to compromise the security of the target computer.

348
Q

Trusted Platform Module (TPM)

A

Specification for secure hardware-based storage of encryption keys, hashed passwords, and other user- and platform-identification information.

349
Q

Trusted Source

A

Installer package that can be verified by a digital signature or cryptographic hash.

350
Q

Unattended Installation

A

Deployment method where installation choices are saved in an answer file or script so that the setup program executes without manual intervention.

351
Q

Under-Voltage Event

A

When the power that is supplied by the electrical wall socket is insufficient to allow the computer to function correctly. Under-voltage events are long sags in power output that are often caused by overloaded or faulty grid distribution circuits or by a failure in the supply route from electrical power station to a building.

352
Q

Unified Endpoint Management (UEM)

A

Enterprise software for controlling device settings, apps, and corporate data storage on all types of fixed, mobile, and IoT computing devices.

353
Q

Uninterruptible Power Supply (UPS)

A

Battery-powered device that supplies AC power that an electronic device can use in the event of power failure.

354
Q

Universal Plug-and-Play (UPnP)

A

Protocol framework allowing network devices to autoconfigure services, such as allowing a games console to request appropriate settings from a firewall.

355
Q

UNIX Systems

A

UNIX is a family of more than 20 related operating systems that are produced by various companies. It can run on a wide variety of platforms. UNIX offers a multitude of file systems in addition to its native system. UNIX remains widely deployed in enterprise data centers to run mission-critical applications and infrastructure.

356
Q

Unprotected System

A

System where one or more required security controls (antivirus or firewall, for example) are missing or misconfigured.

357
Q

Untrusted Source

A

Installer package whose authenticity and integrity cannot be verified.

358
Q

Update & Security settings

A

Windows Settings pages related to configuring automatic patching, deploying feature updates, and managing security features.

359
Q

Update Limitation

A

Product life cycle and procurement consideration where a device or product no longer receives a full range of updates or support from its vendor.

360
Q

Upgrade Path

A

Earlier versions of an OS that support an in-place upgrade to a newer version, retaining settings, third-party apps, and user data files.

361
Q

User Account Control (UAC)

A

Windows feature designed to mitigate abuse of administrative accounts by requiring explicit consent to use privileges.

362
Q

User Accounts Applet

A

Control Panel app relating to user account creation and maintenance.

363
Q

Variable

A

Identifier for a value that can change during program execution. Variables are usually declared with a particular data type.

364
Q

VBS

A

Extension for the Visual Basic Script file format.

365
Q

Video Conferencing

A

Software that allows users to configure virtual meeting rooms, with options for voice, video, instant messaging, and screen-sharing.

366
Q

Video Surveillance

A

Software that allows users to configure virtual meeting rooms, with options for voice, video, instant messaging, and screen-sharing.

367
Q

VIM

A

Command-line text editor that extends the original vi software. Vim uses a command mode for file operations and an insert mode for editing.

368
Q

Virtual Network Computing (VNC)

A

Remote access tool and protocol. VNC is the basis of macOS screen-sharing.

369
Q

Virtual Private Network (VPN)

A

Secure tunnel created between two endpoints connected via an unsecure transport network (typically the Internet).

370
Q

Virus

A

Malicious code inserted into an executable file image. The malicious code is executed when the file is run and can deliver a payload, such as attempting to infect other files.

371
Q

Vishing

A

Social engineering attack where the threat actor extracts information while speaking over the phone or leveraging IP-based voice messaging services (VoIP).

372
Q

Visual Basic Script (VBScript)

A

A command shell and scripting language built on the .NET Framework, which allows the administrator to automate and manage computing tasks.

373
Q

Vulnerability

A

Weakness that could be triggered accidentally or exploited intentionally to cause a security breach.

374
Q

Whaling

A

An email-based or web-based form of phishing that targets senior executives or wealthy individuals.

375
Q

WI-FI Protected Access (WPA)

A

Standards for authenticating and encrypting access to Wi-Fi networks.

376
Q

Windows

A

Windows started as version 3.1 for 16-bit computers. A workgroup version provided rudimentary network facilities. Windows NT 4 workstations and servers (introduced in 1993) provided reliable 32-bit operation and secure network facilities, based around domains. The Windows 9x clients (Windows 95, 98, and Me) had far-lower reliability and support only for workgroups but were still hugely popular as home and business machines. Windows 2000 and Windows XP workstations married the hardware flexibility and user interface of Windows 9x to the reliability and security of Windows NT, while the server versions saw the introduction of Active Directory for managing network objects. The subsequent client releases of Windows (Vista/7/8/8.1) feature a substantially different interface (Aero) with 3-D features as well as security improvements. The latest client versions—Windows 10 and Windows 11—are designed for use with touch-screen devices.

377
Q

Windows Defender Antivirus

A

Security scanner installed and enabled by default in Windows that provides protection against general malware types.

378
Q

Windows Defender Firewall

A

Built-in, host-based filtering of network connections.

379
Q

Windows Edition

A

Feature restrictions applied to Windows to distinguish different markets, pricing, and licensing models, such as home versus professional versus enterprise.

380
Q

Windows Hello

A

Feature that supports passwordless sign-in for Windows.

381
Q

Windows Recovery Environment (WinRE)

A

Windows troubleshooting feature that installs a command shell environment to a recovery partition to remediate boot issues.

382
Q

Windows Security

A

Touch-enabled app for configuring features such as firewall and antivirus.

383
Q

Windows Settings

A

Touch-enabled interface for managing user and system settings in Windows.

384
Q

winver Command

A

Command-line tool for reporting Windows version information.

385
Q

WinX menu

A

Start button shortcut menu with quick access to principal configuration and management utilities.

386
Q

Wireless Wide Area Network (WWAN)

A

Network covering a large area using wireless technologies, such as a cellular radio data network or line-of-sight microwave transmission.

387
Q

Workgroup

A

Group of network hosts that shares resources in a peer-to-peer fashion. No one computer provides a centralized directory.

388
Q

Worm

A

Type of malware that replicates between processes in system memory and can spread over client/server network connections.

389
Q

xcopy Command

A

Command-line directory and file copy utility offering improved functionality compared to the basic copy command.

390
Q

Yum

A

Package manager for installing, maintaining, inventorying, and removing software from the Red Hat family of Linux distributions.

391
Q

Zero-Day

A

Vulnerability in software that is unpatched by the developer or an attack that exploits such a vulnerability.