IT Support Course Flashcards

1
Q

Bit

A

The smallest representation of data that a computer can understand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Border Gateway Protocol (BGP)

A

A protocol by which routers share data with each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Broadcast

A

A type of Ethernet transmission, sent to every single device on a LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Broadcast address

A

A special destination used by an Ethernet broadcast composed by all Fs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cable categories

A

Groups of cables that are made with the same material. Most network cables used today can be split into two categories, copper and fiber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cables

A

Insulated wires that connect different devices to each other allowing data to be transmitted over them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Carrier-Sense Multiple Access with Collision Detection (CSMA/CD)

A

CSMA/CD is used to determine when the communications channels are clear and when the device is free to transmit data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Client

A

A device that receives data from a server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Collision domain

A

A network segment where only one device can communicate at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Computer networking

A

The full scope of how computers communicate with each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Copper cable categories

A

These categories have different physical characteristics like the number of twists in the pair of copper wires. These are defined as names like category (or cat) 5, 5e, or 6, and how quickly data can be sent across them and how resistant they are to outside interference are all related to the way the twisted pairs inside are arranged

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Crosstalk

A

Crosstalk is when an electrical pulse on one wire is accidentally detected on another wire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cyclical Redundancy Check (CRC)

A

A mathematical transformation that uses polynomial division to create a number that represents a larger set of data. It is an important concept for data integrity and is used all over computing, not just network transmissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data packet

A

An all-encompassing term that represents any single set of binary data being sent across a network link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Datalink layer

A

The layer in which the first protocols are introduced. This layer is responsible for defining a common way of interpreting signals, so network devices can communicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Destination MAC address

A

The hardware address of the intended recipient that immediately follows the start frame delimiter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Duplex communication

A

A form of communication where information can flow in both directions across a cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Ethernet

A

The protocol most widely used to send data across individual links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Ethernet frame

A

A highly structured collection of information presented in a specific order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

EtherType field

A

It follows the Source MAC Address in a dataframe. It’s 16 bits long and used to describe the protocol of the contents of the frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Fiber Optic cable

A

Fiber optic cables contain individual optical fibers which are tiny tubes made of glass about the width of a human hair. Unlike copper, which uses electrical voltages, fiber cables use pulses of light to represent the ones and zeros of the underlying data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Five layer model

A

A model used to explain how network devices communicate. This model has five layers that stack on top of each other: Physical, Data Link, Network, Transport, and Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Frame check sequence

A

It is a 4-byte or 32-bit number that represents a checksum value for the entire frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Full duplex

A

The capacity of devices on either side of a networking link to communicate with each other at the exact same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Half-duplex

A

It means that, while communication is possible in each direction, only one device can be communicating at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Hexadecimal

A

A way to represent numbers using a numerical base of 16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Hub

A

It is a physical layer device that broadcasts data to everything computer connected to it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Internet Protocol (IP)

A

The most common protocol used in the network layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Internet Service Provider (ISP)

A

A company that provides a consumer an internet connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Internetwork

A

A collection of networks connected together through routers - the most famous of these being the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Line coding

A

Modulation used for computer networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Local Area Network (LAN)

A

A single network in which multiple devices are connected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

MAC(Media Access Control) address

A

A globally unique identifier attached to an individual network interface. It’s a 48-bit number normally represented by six groupings of two hexadecimal numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Modulation

A

A way of varying the voltage of a constant electrical charge moving across a standard copper network cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Multicast frame

A

If the least significant bit in the first octet of a destination address is set to one, it means you’re dealing with a multicast frame. A multicast frame is similarly set to all devices on the local network signal, and it will be accepted or discarded by each device depending on criteria aside from their own hardware MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Network layer

A

It’s the layer that allows different networks to communicate with each other through devices known as routers. It is responsible for getting data delivered across a collection of networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Network port

A

The physical connector to be able to connect a device to the network. This may be attached directly to a device on a computer network, or could also be located on a wall or on a patch panel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Network switch

A

It is a level 2 or data link device that can connect to many devices so they can communicate. It can inspect the contents of the Ethernet protocol data being sent around the network, determine which system the data is intended for and then only send that data to that one system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Node

A

Any device connected to a network. On most networks, each node will typically act as a server or a client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Octet

A

Any number that can be represented by 8 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Organizationally Unique Identifier (OUI)

A

The first three octets of a MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

OSI model

A

A model used to define how network devices communicate. This model has seven layers that stack on top of each other: Physical, Data Link, Network, Transport, Session, Presentation, and Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Patch panel

A

A device containing many physical network ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Payload

A

The actual data being transported, which is everything that isn’t a header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Physical layer

A

It represents the physical devices that interconnect computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Preamble

A

The first part of an Ethernet frame, it is 8 bytes or 64 bits long and can itself be split into two sections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Protocol

A

A defined set of standards that computers must follow in order to communicate properly is called a protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Router

A

A device that knows how to forward data between independent networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Server

A

A device that provides data to another device that is requesting that data, also known as a client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Simplex communication

A

A form of data communication that only goes in one direction across a cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Source MAC address

A

The hardware address of the device that sent the ethernet frame or data packet. In the data packet it follows the destination MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Start Frame Delimiter (SFD)

A

The last byte in the preamble, that signals to a receiving device that the preamble is over and that the actual frame contents will now follow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Transmission Control Protocol (TCP)

A

The data transfer protocol most commonly used in the fourth layer. This protocol requires an established connection between the client and server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Transport layer

A

The network layer that sorts out which client and server programs are supposed to get the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Twisted pair cable

A

The most common type of cabling used for connecting computing devices. It features pairs of copper wires that are twisted together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Unicast transmission

A

A unicast transmission is always meant for just one receiving address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

User Datagram Protocol (UDP)

A

A transfer protocol that does not rely on connections. This protocol does not support the concept of an acknowledgement. With UDP, you just set a destination port and send the data packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Virtual LAN (VLAN)

A

It is a technique that lets you have multiple logical LANs operating on the same physical equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

VLAN header

A

A piece of data that indicates what the frame itself is. In a data packet it is followed by the EtherType

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

802.1X

A

It is the IEEE standard for encapsulating EAP or Extensible Authentication Protocol traffic over the 802 networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

802.1X with EAP-TLS

A

Offers arguably the best security available, assuming proper and secure handling of the PKI aspects of it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Access Control Entries

A

The individual access permissions per object that make up the ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Access Control List (ACL)

A

It is a way of defining permissions or authorizations for objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Accounting

A

Keeping records of what resources and services your users access or what they did when they were using your systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Activation threshold

A

Triggers a pre-configured action when it is reached and will typically block the identified attack traffic for a specific amount of time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Advanced Encryption Standard (AES)

A

The first and only public cipher that’s approved for use with top secret information by the United States National Security Agency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Adware

A

Software that displays advertisements and collects data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Analyzing logs

A

The practice of collecting logs from different network and sometimes client devices on your network, then performing an automated analysis on them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Antivirus software

A

It monitors and analyze things like new files being created or being modified on the system in order to watch for any behavior that matches a known malware signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Application policies

A

Defines boundaries of what applications are permitted or not, but they also help educate folks on how to use software more securely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Asymmetric encryption

A

Systems where different keys are used to encrypt and decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Attack

A

An actual attempt at causing harm to a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Attack surface

A

It’s the sum of all the different attack vectors in a given system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Attack vector

A

Method or mechanism by which an attacker or malware gains access to a network or system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Auditing

A

It involves reviewing records to ensure that nothing is out of the ordinary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Authentication

A

A crucial application for cryptographic hash functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Authentication server (AS)

A

It includes the user ID of the authenticating user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Authorization

A

It pertains to describing what the user account has access to or doesn’t have access to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Availability

A

Means that the information we have is readily accessible to those people that should have it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Backdoor

A

A way to get into a system if the other methods to get in a system aren’t allowed, it’s a secret entryway for attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Baiting

A

An attack that happens through actual physical contact, enticing a victim to do something

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Bastion hosts or networks

A

A server used to provide access to a private network from an external network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Binary whitelisting software

A

It’s a list of known good and trusted software and only things that are on the list are permitted to run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Biometric authentication

A

Authentication that uses Biometric data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Bind

A

It is how clients authenticate to the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Botnet

A

A collection of one or more Bots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Bots

A

Machines compromised by malware that are utilized to perform tasks centrally controlled by an attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Block ciphers

A

The cipher takes data in, places that into a bucket or block of data that’s a fixed size, then encodes that entire block as one unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Brute force attacks

A

A common password attack which consists of just continuously trying different combinations of characters and letters until one gets access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

CA (Certificate authority)

A

It’s the entity that’s responsible for storing, issuing, and signing certificates. It’s a crucial component of the PKI system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Caesar cipher

A

A substitution alphabet, where you replace characters in the alphabet with others usually by shifting or rotating the alphabet, a set of numbers or characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

CBC-MAC (Cipher block chaining message authentication codes)

A

A mechanism for building MACs using block ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

CCMP (counter mode CBC-MAC protocol)

A

A mode of operation for block ciphers that allows for authenticated encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Central repository

A

It is needed to securely store and index keys and a certificate management system of some sort makes managing access to storage certificates and issuance of certificates easier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Certificate-based authentication

A

It is the most secure option, but it requires more support and management overhead since every client must have a certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Certificate fingerprints

A

These are just hash digests of the whole certificate, and aren’t actually fields in the certificate itself, but are computed by clients when validating or inspecting certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Certificate Revocation List (CRL)

A

A means to distribute a list of certificates that are no longer valid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Certificate Signature Algorithm

A

This field indicates what public key algorithm is used for the public key and what hashing algorithm is used to sign the certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Certificate Signature Value

A

The digital signature data itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

CIA Triad

A

Confidentiality, integrity, and availability. Three key principles of a guiding model for designing information security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Client certificates

A

They operate very similarly to server certificates but are presented by clients and allow servers to authenticate and verify clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

CMACs (Cipher-based Message Authentication Codes)

A

The process is similar to HMAC, but instead of using a hashing function to produce a digest, a symmetric cipher with a shared keys used to encrypt the message and the resulting output is used as the MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Code signing certificates

A

It is used for signing executable programs and allows users of these signed applications to verify the signatures and ensure that the application was not tampered with

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Confidentiality

A

Keeping things hidden

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Correlation analysis

A

The process of taking log data from different systems, and matching events across the systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

Counter-based tokens

A

They use a secret seed value along with the secret counter value that’s incremented every time a one-time password is generated on the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

Cross-site scripting (XSS)

A

A type of injection attack where the attacker can insert malicious code and target the user of the service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Cryptanalysis

A

Looking for hidden messages or trying to decipher coded message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Cryptographic hashing

A

It is distinctly different from encryption because cryptographic hash functions should be one directional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Cryptography

A

The overarching discipline that covers the practice of coding and hiding messages from third parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

Cryptology

A

The study of cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Cryptosystem

A

A collection of algorithms for key generation and encryption and decryption operations that comprise a cryptographic service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

Data binding and sealing

A

It involves using the secret key to derive a unique key that’s then used for encryption of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

Data exfiltration

A

The unauthorized transfer of data from a computer. It’s also a very important concern when a security incident happens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Data handling policies

A

Should cover the details of how different data is classified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

Data information tree

A

A structure where objects will have one parent and can have one or more children that belong to the parent object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

Decryption

A

The reverse process from encryption; taking the garbled output and transforming it back into the readable plain text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

Defense in depth

A

The concept of having multiple overlapping systems of defense to protect IT systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

Denial-of-Service (DoS) attack

A

An attack that tries to prevent access to a service for legitimate users by overwhelming the network or server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

DES (Data Encryption Standard)

A

One of the earliest encryption standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

Deterministic

A

It means that the same input value should always return the same hash value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

DH (Diffie-Hellman)

A

A popular key exchange algorithm, named for its co-inventors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

Dictionary attack

A

A type of password attack that tries out words that are commonly used in passwords, like password, monkey, football

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

Distinguished name (DN)

A

A unique identifier for each entry in the directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

Distributed Denial-of-Service (DDoS) attack

A

A DoS attack using multiple systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

DNS Cache Poisoning Attack

A

It works by tricking a DNS server into accepting a fake DNS record that will point you to a compromised DNS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

DSA (Digital Signature Algorithm)

A

It is another example of an asymmetric encryption system, though its used for signing and verifying data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

Dynamic ARP inspection (DAI)

A

A feature on enterprise switches that prevents certain types of attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

EAP-TLS

A

One of the more common and secure EAP methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

ECDH & ECDSA

A

Elliptic curve variants of Diffie-Hellman and DSA, respectively

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

Eliptic curve cryptography (ECC)

A

A public key encryption system that uses the algebraic structure of elliptic curves over finite fields to generate secure keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

Encapsulating security payload

A

It’s a part of the IPsec suite of protocols, which encapsulates IP packets, providing confidentiality, integrity, and authentication of the packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

Encryption

A

The act of taking a message (plaintext), and applying an operation to it (cipher), so that you receive a garbled, unreadable message as the output (ciphertext)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

Encryption algorithm

A

The underlying logic or process that’s used to convert the plaintext into ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

End-entity (leaf certificate)

A

A certificate that has no authority as a CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

Entropy pool

A

A source of random data to help seed random number generators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

Entry point

A

the act to determine the entry point to figure out how the attacker got in, or what vulnerability the malware exploited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

Evil twin

A

The premise of an evil twin attack is for you to connect to a network that is identical to yours but that is controlled by an attacker. Once connected to it, they will be able to monitor your traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

Exploit

A

Software that is used to take advantage of a security bug or vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

Extensible authentication protocol (EAP over LAN, or EAPOL)

A

A standard authentication protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

Fail to ban

A

A common open source flood guard protection tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

File-based encryption

A

Guarantees confidentiality and integrity of files protected by encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

FIPS (Federal Information Processing Standard)

A

The DES that was adopted as a federal standard for encrypting and securing government data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

Flood guards

A

Provide protection against DoS or Denial of Service Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

Forward secrecy

A

This is a property of a cryptographic system so that even in the event that the private key is compromised, the session keys are still safe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

Four-Way Handshake

A

It is designed to allow an AP to confirm that the client has the correct pairwise master key in a WPA-PSK setup without disclosing the PMK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

Frequency analysis

A

The practice of studying the frequency with which letters appear in ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

Full disk encryption (FDE)

A

It is the practice of encrypting the entire drive in the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

GTK (Groupwise Transient Key)

A

A temporal key, which is actually used to encrypt data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

Hacker

A

Someone who attempts to break into or exploit a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

Half-open attacks

A

A way to refer to SYN floods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

Hash collisions

A

Two different inputs mapping to the same output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

Hashing (Hash function)

A

A type of function or operation that takes in an arbitrary data input and maps it to an output of a fixed size, called a hash or a digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

High value data

A

usually includes account information, like usernames and passwords. Typically, any kind of user data is considered high value, especially if payment processing is involved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

HMAC (Keyed-Hash Message Authentication Codes)

A

It uses a cryptographic hash function along with a secret key to generate a MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

Host-based firewalls

A

Protects individual hosts from being compromised when they’re used in untrusted and potentially malicious environments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

HTTPS

A

It is the secure version of HTTP, the Hypertext Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q

Hubs

A

Devices that serve as a central location through which data travels through; a quick and dirty way of getting packets mirrored to your capture interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

Identification

A

The idea of describing an entity uniquely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q

Impact

A

The impact of an incident is also an important issue to consider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

Implicit deny

A

A network security concept where anything not explicitly permitted or allowed should be denied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
162
Q

Injection attacks

A

A common security exploit that can occur in software development and runs rampant on the web, where an attacker injects malicious code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
163
Q

Integrity

A

Means keeping our data accurate and untampered with

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
164
Q

Intermediary (subordinate) CA

A

It means that the entity that this certificate was issued to can now sign other certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
165
Q

Intrusion detection and intrusion protection systems (IDS/IPS)

A

Operates by monitoring network traffic and analyzing it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
166
Q

IPsec (Internet Protocol security)

A

A VPN protocol that was designed in conjunction with IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
167
Q

IP source guard (IPSG)

A

It can be enabled on enterprise switches along with DHCP snooping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
168
Q

Issuer Name

A

This field contains information about the authority that signed the certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
169
Q

Kerberos

A

A network authentication protocol that uses tickets to allow entities to prove their identity over potentially insecure channels to provide mutual authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
170
Q

Kerckhoff’s principle

A

A principle that states that a cryptosystem, or a collection of algorithms for key generation and encryption and decryption operations that comprise a cryptographic service should remain secure, even if everything about the system is known except for the key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
171
Q

Key

A

A crucial component of a cipher, which introduces something unique into your cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
172
Q

Key escrow

A

Allows encryption key to be securely stored for later retrieval by an authorized party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
173
Q

Key length

A

It defines the maximum potential strength of the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
174
Q

Key signing parties

A

Organized by people who are interested in establishing a web of trust, and participants perform the same verification and signing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
175
Q

Key size

A

It is the total number of bits or data that comprises the encryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
176
Q

Keylogger

A

A common type of spyware that’s used to record every keystroke you make

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
177
Q

Lightweight Directory Access Protocol (LDAP)

A

An open industry-standard protocol for accessing and maintaining directory services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
178
Q

Logic bomb

A

A type of Malware that’s intentionally installed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
179
Q

Logs analysis systems

A

They are configured using user-defined rules to match interesting or atypical log entries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
180
Q

L2TP (Layer 2 Tunneling Protocol)

A

It is typically used to support VPNs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
181
Q

MACs (Message Authentication Codes)

A

A bit of information that allows authentication of a received message, ensuring that the message came from the alleged sender and not a third party masquerading as them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
182
Q

Malware

A

A type of malicious software that can be used to obtain your sensitive information or delete or modify files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
183
Q

MD5

A

A popular and widely used hash function designed in the early 1990s as a cryptographic hashing function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
184
Q

Meddler in the middle (formerly known as Man in the Middle)

A

An attack that places the attacker in the middle of two hosts that think they’re communicating directly with each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
185
Q

MIC (Message Integrity Check)

A

It is essentially a hash digest of the message in question

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
186
Q

Monitor mode

A

It allows to scan across channels to see all wireless traffic being sent by APs and clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
187
Q

Multifactor authentication (MFA)

A

A system where users are authenticated by presenting multiple pieces of information or objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
188
Q

Network hardening

A

Is the process of securing a network by reducing its potential vulnerabilities through configuration changes, and taking specific steps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
189
Q

Network separation (network segmentation)

A

A good security principle for an IT support specialists to implement. It permits more flexible management of the network, and provides some security benefits. This is the concept of using VLANs to create virtual networks for different device classes or types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
190
Q

Network software hardening

A

Includes things like firewalls, proxies, and VPNs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
191
Q

Network time protocol (NTP)

A

A network protocol used to synchronize the time between the authenticator token and the authentication server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
192
Q

NIST

A

National Institute of Standards and Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
193
Q

Normalization

A

It’s the process of taking log data in different formats and converting it into a standardized format that’s consistent with a defined log structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
194
Q

OAuth

A

An open standard that allows users to grant third-party websites and applications access to their information without sharing account credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
195
Q

One-time password (OTP)

A

A short-lived token, typically a number that’s entered along with a username and password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
196
Q

One-time password (OTP) tokens

A

Another very common method for handling multifactor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
197
Q

OpenID

A

An open standard that allows participating sites known as Relying Parties to allow authentication of users utilizing a third party authentication service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
198
Q

Organizational units (OUs)

A

Folders that let us group related objects into units like people or groups to distinguish between individual user accounts and groups that accounts can belong to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
199
Q

Packet sniffing (packet capture)

A

the process of intercepting network packets in their entirety for analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
200
Q

Pairwise Transient Key (PTK)

A

It is generated using the PMK, AP nonce, Client nonce, AP MAC address, and Client MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
201
Q

Password attacks

A

Utilize software like password crackers that try and guess your password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
202
Q

Password salt

A

Additional randomized data that’s added into the hashing function to generate the hash that’s unique to the password and salt combination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
203
Q

PBKDF2 (Password Based Key Derivation Function 2)

A

Password Based Key Derivation Function 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
204
Q

PCI DSS

A

Payment Card Industry Data Security Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
205
Q

Penetration testing

A

The practice of attempting to break into a system or network to verify the systems in place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
206
Q

PGP (Pretty Good Privacy) encryption

A

An encryption application that allows authentication of data along with privacy from third parties relying upon asymmetric encryption to achieve this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
207
Q

Phishing attack

A

It usually occurs when a malicious email is sent to a victim disguised as something legitimate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
208
Q

Physical tokens

A

They take a few different forms, such as a USB device with a secret token on it, a standalone device which generates a token, or even a simple key used with a traditional lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
209
Q

PIN authentication method

A

It uses PINs that are eight-digits long, but the last digit is a checksum that’s computed from the first seven digits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
210
Q

Ping flood

A

It sends tons of ping packets to a system. If a computer can’t keep up with this, then it’s prone to being overwhelmed and taken down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
211
Q

PKI system

A

A system that defines the creation, storage and distribution of digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
212
Q

Platform key

A

It’s the public key corresponding to the private key used to sign the boot files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
213
Q

Port mirroring

A

Allows the switch to take all packets from a specified port, port range, or the entire VLAN and mirror the packets to a specified switch port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
214
Q

Pre-shared key

A

It’s the Wi-Fi password you share with people when they come over and want to use your wireless network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
215
Q

Principle of least privilege

A

Helps to ensure that sensitive data is only accessed by people who are authorized to access it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
216
Q

Privacy policies

A

Oversees the access and use of sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
217
Q

Promiscuous mode

A

A type of computer networking operational mode in which all network data packets can be accessed and viewed by all network adapters operating in this mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
218
Q

Proxy:

A

Can be useful to protect client devices and their traffic. They also provide secure remote access without using a VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
219
Q

Pseudo-random

A

Something that isn’t truly random

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
220
Q

Public key authentication

A

A key pair is generated by the user who wants to authenticate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
221
Q

Public key signatures

A

Digital signature generated by composing the message and combining it with the private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
222
Q

RA (Registration Authority)

A

It is responsible for verifying the identities of any entities requesting certificates to be signed and stored with the CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
223
Q

Rainbow table attacks

A

To trade computational power for disk space by pre-computing the hashes and storing them in a table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
224
Q

Rainbow tables

A

A pre-computed table of all possible password values and their corresponding hashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
225
Q

Random numbers

A

A very important concept in encryption because it avoids some kind of pattern that an adversary can discover through close observation and analysis of encrypted messages over time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
226
Q

Ransomware

A

A type of attack that holds your data or system hostage until you pay some sort of ransom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
227
Q

RC4 (Rivest Cipher 4)

A

Asymmetric stream cipher that gained widespread adoption because of its simplicity and speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
228
Q

Recoverability

A

How complicated and time-consuming the recovery effort will be

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
229
Q

Remote attestation

A

The idea of a system authenticating its software and hardware configuration to a remote system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
230
Q

Remote Authentication Dial-in User Service (RADIUS)

A

A protocol that provides AAA services for users on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
231
Q

Reverse proxy

A

A service that might appear to be a single server to external clients, but actually represents many servers living behind it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
232
Q

Risk

A

The possibility of suffering a loss in the event of an attack on the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
233
Q

Risk mitigation

A

Understanding the risks your systems face, take measures to reduce those risks, and monitor them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
234
Q

Rogue Access Point (AP) Attack

A

An access point that is installed on the network without the network administrator’s knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
235
Q

Rogue DHCP server attack

A

An attacker can hand out DHCP leases with whatever information they want by deploying a rogue DHCP server on your network, setting a gateway address or DNS server, that’s actually a machine within their control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
236
Q

Root certificate authority

A

They are self signed because they are the start of the chain of trust, so there’s no higher authority that can sign on their behalf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
237
Q

Rootkit:

A

A collection of software or tools that an admin would use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
238
Q

RSA

A

One of the first practical asymmetric cryptography systems to be developed, named for the initials of the three co-inventors: Ron Rivest, Adi Shamir and Leonard Adleman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
239
Q

Screen lock

A

A security feature that helps prevent unwanted access by creating an action you have to do to gain entry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
240
Q

Secure boot protocol

A

It uses public key cryptography to secure the encrypted elements of the boot process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
241
Q

Secure channel

A

It is provided by IPsec, which provides confidentiality, integrity, and authentication of data being passed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
242
Q

Secure element

A

It’s a tamper resistant chip often embedded in the microprocessor or integrated into the mainboard of a mobile device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
243
Q

Secure Shell (SSH)

A

A secure network protocol that uses encryption to allow access to a network service over unsecured networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
244
Q

Security

A

It’s all about determining risks or exposure understanding the likelihood of attacks; and designing defenses around these risks to minimize the impact of an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
245
Q

Security information and event management systems (SIEMS)

A

Form of centralized logging for security administration purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
246
Q

Security keys

A

Small embedded cryptoprocessors, that have secure storage of asymmetric keys and additional slots to run embedded code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
247
Q

Security through obscurity

A

The principle that if no one knows what algorithm is being used or general security practices, then one is safe from attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
248
Q

Seed value

A

A secret value that is used to initialize a process that is generated by software using one or more values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
249
Q

Self-signed certificate

A

This certificate has been signed by the same entity that issued the certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
250
Q

Serial number

A

A unique identifier for their certificate assigned by the CA which allows the CA to manage and identify individual certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
251
Q

Session hijacking (cookie hijacking)

A

A common meddler in the middle attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
252
Q

Session key

A

The shared symmetric encryption key using TLS sessions to encrypt data being sent back and forth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
253
Q

Severity

A

Includes factors like what and how many systems were compromised and how the breach affects business functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
254
Q

SHA1

A

It is part of the secure hash algorithm suite of functions, designed by the NSA and published in 1995

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
255
Q

Shannon’s maxim

A

It states that the system should remain secure, even if your adversary knows exactly what kind of encryption systems you’re employing, as long as your keys remain secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
256
Q

Single Sign-on (SSO)

A

An authentication concept that allows users to authenticate once to be granted access to a lot of different services and applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
257
Q

Social engineering

A

An attack method that relies heavily on interactions with humans instead of computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
258
Q

Software signing certificate

A

Trust mechanism where a software vendor can cryptographically sign binaries they distribute using a private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
259
Q

Spear phishing

A

Phishing that targets individual or group - the fake emails may contain some personal information like your name, or the names of friends or family

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
260
Q

Spoofing

A

When a source is masquerading around as something else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
261
Q

Spyware

A

The type of malware that’s meant to spy on you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
262
Q

SQL Injection Attack

A

An attack that targets the entire website if the website is using a SQL database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
263
Q

SSL 3.0

A

The latest revision of SSL that was deprecated in 2015

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
264
Q

SSL/TLS Client Certificate

A

Certificates that are bound to clients and are used to authenticate the client to the server, allowing access control to a SSL/TLS service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
265
Q

SSL/TLS Server Certificate

A

A certificate that a web server presents to a client as part of the initial secure setup of an SSL, TLS connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
266
Q

StartTLS

A

It permits a client to communicate using LDAP v3 over TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
267
Q

Steganography

A

The practice of hiding information from observers, but not encoding it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
268
Q

Stream ciphers

A

It takes a stream of input and encrypts the stream one character or one digit at a time, outputting one encrypted character or digit at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
269
Q

Subject:

A

This field contains identifying information about the entity the certificate was issued to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
270
Q

Subject Public Key Info

A

These two subfields define the algorithm of the public key along with the public key itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
271
Q

Substitution cipher

A

An encryption mechanism that replaces parts of your plaintext with ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
272
Q

Symmetric key algorithm

A

Encryption algorithms that use the same key to encrypt and decrypt messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
273
Q

SYN flood

A

The server is bombarded with SYN packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
274
Q

TACACS+

A

It is a device access AAA system that manages who has access to your network devices and what they do on them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
275
Q

Tailgating

A

Gaining access into a restricted area or building by following a real employee in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
276
Q

Tcpdump

A

It’s a super popular, lightweight command-line based utility that you can use to capture and analyze packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
277
Q

Threat

A

The possibility of danger that could exploit a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
278
Q

Threats & password policies

A

Protects Data & IP, Data Protection, Infrastructure Defense, Identity Management, and users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
279
Q

Ticket granting service (TGS)

A

It decrypts the Ticket Granting Ticket using the Ticket Granting Service secret key, which provides the Ticket Granting Service with the client Ticket Granting Service session key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
280
Q

Time-based token (TOTP)

A

A One-Time-Password that’s rotated periodically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
281
Q

TKIP (Temporal Key Integrity Protocol):

A

To address the shortcomings of WEP security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
282
Q

TLS 1.2

A

The current recommended revision of SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
283
Q

TLS 1.2 with AES GCM

A

A specific mode of operation for the AES block cipher that essentially turns it into a stream cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
284
Q

TLS Handshake

A

A mechanism to initially establish a channel for an application to communicate with a service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
285
Q

TPM (Trusted Platform Module)

A

This is a hardware device that’s typically integrated into the hardware of a computer, that’s a dedicated crypto processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
286
Q

Transport mode

A

One of the two modes of operations supported by IPsec. When used, only the payload of the IP packet is encrypted, leaving the IP headers untouched

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
287
Q

Trojan

A

malware that disguises itself as one thing but does something else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
288
Q

Trusted execution environment (TEE)

A

It provides a full-blown isolated execution environment that runs alongside the main OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
289
Q

Tunnel

A

It is provided by L2TP, which permits the passing of unmodified packets from one network to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
290
Q

​​Tunnel mode

A

One of the two modes of operations supported by IPsec. When used, the entire IP packet, header, payload, and all, is encrypted and encapsulated inside a new IP packet with new headers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
291
Q

Unbind

A

It closes the connection to the LDAP server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
292
Q

Username and password authentication

A

Can be used in conjunction with certificate authentication, providing additional layers of security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
293
Q

U2F (Universal 2nd Factor)

A

It’s a standard developed jointly by Google, Yubico and NXP Semiconductors that incorporates a challenge-response mechanism, along with public key cryptography to implement a more secure and more convenient second-factor authentication solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
294
Q

Validity

A

This field contains two subfields, Not Before and Not After, which define the dates when the certificate is valid for

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
295
Q

Vendor risk review

A

Questionnaire that covers different aspects of their security policies procedures and defenses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
296
Q

Version

A

What version of the X.509 standard certificate adheres to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
297
Q

Viruses

A

The best known type of malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
298
Q

VPN (Virtual Private Network)

A

A secure method of connecting a device to a private network over the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
299
Q

VPNs

A

Commonly used to provide secure remote access, and link two networks securely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
300
Q

Vulnerability

A

A flaw in the system that could be exploited to compromise the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
301
Q

Vulnerability scanner

A

Detect lots of things, ranging from misconfigured services that represent potential risks, to detecting the presence of back doors and systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
302
Q

Web of trust

A

It is where individuals instead of certificate authorities sign other individuals’ public keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
303
Q

WEP (Wired Equivalent Privacy)

A

First security protocol introduced for Wi-FI networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
304
Q

Wireshark

A

It’s another packet capture and analysis tool that you can use, but it’s way more powerful when it comes to application and packet analysis, compared to tcpdump

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
305
Q

Worms

A

They are similar to viruses except that instead of having to attach themselves onto something to spread, worms can live on their own and spread through channels like the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
306
Q

WPA (Wi-fi protected access)

A

Designed as a short-term replacement that would be compatible with older WEP-enabled hardware with a simple firmware update

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
307
Q

WPA2 Enterprise

A

It’s an 802.1x authentication to Wi-Fi networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
308
Q

WPS (Wifi Protected Setup)

A

It’s a convenience feature designed to make it easier for clients to join a WPA-PSK protected network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
309
Q

X.509 standard

A

It is what defines the format of digital certificates, as well as a certificate revocation list or CRL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
310
Q

XTACACS

A

It stands for Extended TACACS, which was a Cisco proprietary extension on top of TACACS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
311
Q

0-Day Vulnerability (Zero Day)

A

A vulnerability that is not known to the software developer or vendor, but is known to an attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
312
Q

404 Not Found

A

An error message you might see on websites that have been moved or deleted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
313
Q

AAA (authentication, authorization, accounting)

A

The services that the directory services provide to all the computers within a company or organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
314
Q

Abstraction

A

To take a relatively complex system and simplify it for our use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
315
Q

Absolute path

A

It is one that starts from the main directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
316
Q

ACI

A

Access Control Lists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
317
Q

ACK flag

A

One of the TCP control flags. ACK is short for acknowledge. A value of one in this field means that the acknowledgment number field should be examined

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
318
Q

Acknowledgement number

A

The number of the next expected segment in a TCP sequence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
319
Q

Active directory (AD)

A

The Microsoft alternative to directory services that offers customization and added features for the Windows platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
320
Q

Active directory users and computers (ADUC)

A

The client tools that are used for accessing and administering a directory server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
321
Q

Address bus

A

Connects the CPU to the MCC and sends over the location of the data, but not the data itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
322
Q

Address class system

A

A system which defines how the global IP address space is split up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
323
Q

Address Resolution Protocol (ARP)

A

A protocol used to discover the hardware address of a node with a certain IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
324
Q

Ad-Hoc network

A

A network configuration without supporting network infrastructure. Every device involved with the ad-hoc network communicates with every other device within range, and all nodes help pass along messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
325
Q

Administrator

A

A user that has complete control over a machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
326
Q

Advanced group policy management (AGPM)

A

A set of add-on tools from Microsoft that gives some added provision control abilities in GPMC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
327
Q

Algorithm

A

A series of steps that solves specific problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
328
Q

Alias

A

A nickname for common commands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
329
Q

Android

A

A mobile operating system based on Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
330
Q

Anycast

A

A technique that’s used to route traffic to different destinations depending on factors like location, congestion, or link health

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
331
Q

Appending flags

A

A way to add the data of the file without erasing existing data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
332
Q

Application

A

A computer program designed for a specific use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
333
Q

Application layer

A

The layer that allows network applications to communicate in a way they understand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
334
Q

Application layer payload

A

The entire contents of whatever data applications want to send to each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
335
Q

Application software

A

Any software created to fulfill a specific need, like a text editor, web browser, or graphics editor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
336
Q

App store apps

A

A Package Manager that acts as a repository

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
337
Q

App store repository

A

A app store service that also acts as a repository

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
338
Q

App stores

A

A central managed marketplace for app developers to publish and sell mobile apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
339
Q

APPX

A

An APPX is another way to package contents of a file to act like a unit of distribution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
340
Q

Archive

A

An archive is comprised of one or more files that are compressed into a single file” for verb agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
341
Q

A record:

A

The most common resource record, used to point a certain domain name at a certain IPv4 IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
342
Q

ARPANET

A

The earliest version of the Internet that we see today, created by the US government project DARPA in the 1960s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
343
Q

ARP table

A

A list of IP addresses and the MAC addresses associated with them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
344
Q

ASCII

A

The oldest character encoding standard used is ASCII. It represents the English alphabet, digits, and punctuation marks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
345
Q

ASN

A

Autonomous System Number is a number assigned to an individual autonomous system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
346
Q

Assembly language

A

A language that allowed computer scientists to use human readable instructions, assembled into code that the machines could understand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
347
Q

Asymmetric Digital Subscriber Line (ADSL)

A

A device that establishes data connections across phone lines and different speeds for uploading and downloading data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
348
Q

ATA

A

The most common interface that hard drives use to connect to our system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
349
Q

ATX (Advanced Technology eXtended)

A

The most common form factor for motherboards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
350
Q

Automatic allocation

A

A range of IP addresses is set aside for assignment purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
351
Q

Automation

A

It makes processes work automatically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
352
Q

Autoscaling

A

A system that allows the service to increase or reduce capacity as needed, while the service owner only pays for the cost of the machines that are in use at any given time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
353
Q

Background processes/Daemon processes

A

Processes that run or take place in the background

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
354
Q

Backup and restore

A

A Microsoft offer and first party solution that has modes of operation, as a file based version where files are backed up to a zip archive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
355
Q

Backward compatible

A

It means older hardware works with newer hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
356
Q

Bash

A

The language used to interact with the shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
357
Q

Baud rate

A

A measurement of how many bits could be passed across a phone line in a second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
358
Q

Binary system

A

The communication that a computer uses is referred to as binary system, also known as base-2 numeral system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
359
Q

Bind operation

A

The operation which authenticates clients to the directory server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
360
Q

Biometric data

A

A way of protecting your accounts and information using biometric data such as facial recognition and fingerprint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
361
Q

BIOS/UEFI

A

A low-level software that initializes our computer’s hardware to make sure everything is good to go

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
362
Q

Bios (Basic Input Output Services)

A

The BIOS is software that helps initialize the hardware in our computer and gets our operating system up and running

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
363
Q

Block ciphers

A

The cipher takes data in, places that into a bucket or block of data that’s a fixed size, then encodes that entire block as one unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
364
Q

Block devices

A

A system that acts like USB drives and hard drive by transmitting data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
365
Q

Block storage

A

It improves faster handling of data because the data isn’t stored in one long piece but in blocks, so it can be accessed more quickly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
366
Q

Bluetooth

A

The most common short range wireless network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
367
Q

Boot

A

To start up a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
368
Q

Bootloader

A

A small program that loads the operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
369
Q

Botnet

A

A collection of one or more Bots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
370
Q

Bots

A

Machines compromised by malware that are utilized to perform tasks centrally controlled by an attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
371
Q

Broadband

A

Any connectivity technology that isn’t dial-up Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
372
Q

Browser

A

A user interface for displaying and interacting with web pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
373
Q

BYOD (Bring Your Own Device)

A

Refers to the practice of allowing people to use their own personal devices for work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
374
Q

Byte

A

A group of 8 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
375
Q

Cable modem

A

A device that sits at the edge of a consumer’s network and connects it to the cable modem termination system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
376
Q

Cable modem termination system

A

Connects lots of different cable connections to an ISP’s core network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
377
Q

Cache

A

The assigned stored location for recently or frequently accessed data; on a mobile app it is where anything that was changed or created with that app is stored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
378
Q

Caching and recursive name servers

A

They are generally provided by an ISP or your local network, and their purpose is to store domain name lookups for a certain amount of time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
379
Q

Centralized logging

A

Parsing logs in one central location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
380
Q

Central management

A

A central service that provides instructions to all of the different parts of my IT infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
381
Q

Change management process

A

The process to notify others in the organization about the changes that you are about to make

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
382
Q

Channels

A

Individual, smaller sections of the overall frequency band used by a wireless network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
383
Q

Character devices

A

A way to transmit data character by character like a keyboard and mouse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
384
Q

Character encoding

A

Is used to assign our binary values to characters so that we as humans can read them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
385
Q

Charge cycle

A

One full charge and discharge of a battery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
386
Q

Child directories

A

It is a directory housed by a parent directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
387
Q

Children’s Online Privacy Protection Act (COPPA)

A

Regulates the information we show to children under the age of 13

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
388
Q

Chipset

A

It decides how components talk to each other on our machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
389
Q

Chocolatey

A

A third party package manager for Windows

390
Q

Chrome OS

A

A Linux-based operating system designed by Google

391
Q

CLI

A

Command line interpreter

392
Q

Client/Server runtime subsystem

A

System that handles running Windows GUI and Command line

393
Q

Clock cycle

A

When you send a voltage to the clock wire

394
Q

Clock speed:

A

The maximum number of clock cycles that it can handle in a set in a certain time period

395
Q

Clock wire

A

When you send or receive data, it sends a voltage to that clock wire to let the CPU know it can start doing calculations

396
Q

CLOSE_WAIT

A

A connection state that indicates that the connection has been closed at the TCP layer, but that the application that opened the socket hasn’t released its hold on the socket yet

397
Q

CLOSE

A

A connection state that indicates that the connection has been fully terminated, and that no further communication is possible

398
Q

Closed source packages

A

A source code that does not allow public access

399
Q

Cloud computing

A

The concept and technological approach of accessing data, using applications, storing files, etc. from anywhere in the world as long as you have an internet connection

400
Q

Cloud computing

A

The concept and technological approach of accessing data, using applications, storing files, etc. from anywhere in the world as long as you have an internet connection

401
Q

CNAME

A

A resource record used to map one domain to another

402
Q

Coding

A

Translating one language to another

403
Q

Command line

A

A text interface program for a computer that inputs text commands and translates them to the operating system

404
Q

Command Line Interface (CLI)

A

A shell that uses text commands to interact with the operating system

405
Q

Command line mode

A

When you are able to run commands while still in your current shell

406
Q

Compiled programming language

A

A language that uses human readable instructions, then sends them through a compiler

407
Q

Computer

A

A device that stores and processes data by performing calculations

408
Q

Computer configuration

A

Contained within a Group Policy Object (GPO)

409
Q

Computer file

A

Data that we store and a file can be anything, a word document, a picture, a song, literally anything

410
Q

Computer management

A

A tool that lets you manage a local or remote computer

411
Q

Configuration management

A

The creation of rules about how things should work in your organization, such as printers, configure software, or mounting network file systems

412
Q

Connectionless protocol

A

A data-transmission protocol that allows data to be exchanged without an established connection at the transport layer. The most common of these is known as UDP, or User Datagram Protocol

413
Q

Connection-oriented protocol

A

A data-transmission protocol that establishes a connection at the transport layer, and uses this to ensure that all data has been properly transmitted

414
Q

Copyright

A

Used when creating original work

415
Q

CPU

A

Central processing unit

416
Q

CPU sockets

A

A CPU socket is a series of pins that connect a CPU’s processor to the PC’s motherboard

417
Q

DACL

A

Directory Control Lists

418
Q

DARPA

A

A US government project in the 1960s that went on to create the earliest version of the Internet that we see today

419
Q

Data

A

Actual content of a file

420
Q

Databases

A

Databases allow us to store query, filter, and manage large amounts of data

421
Q

Data blocks

A

Data that can be broken down into many pieces and written to different parts of the hard disk

422
Q

Data buffer

A

A region of RAM that’s used to temporarily store data while it’s being moved around

423
Q

Data center

A

A facility that stores hundreds, if not thousands of servers

424
Q

Data offset field

A

The number of the next expected segment in a TCP packet/datagram

425
Q

Data payload section

A

Has all of the data of the protocols further up the stack of a frame

426
Q

Data recovery

A

Is the process of trying to restore data after an unexpected event that results in data loss or corruption

427
Q

Data sizes

A

Metrics that refer to data sizes including bit, byte, kilobyte, kibibyte, and megabyte

428
Q

Data tapes

A

The standard medium for archival backup data storage

429
Q

DDR SDRAM (Double Data Rate SDRAM)

A

A type of RAM that is faster, takes up less power, and has a larger capacity than earlier SDRAM versions

430
Q

Debian(.deb)

A

A Debian package is packaged as a .deb file

431
Q

Decimal form- base 10 system

A

In the decimal system, there are 10 possible numbers you can use ranging from zero to nine

432
Q

Default domain control policy

A

One of the two GPOs that are created when a new Active Directory domain has been made

433
Q

Defragmentation

A

A process of taking all the files stored on a given disk and reorganizing them into neighboring locations

434
Q

Delegation

A

The administrative tasks that you need to perform a lot as a part of your day to day job but you don’t need to have broad access to make changes in AD

435
Q

Demarcate

A

To set the boundaries of something

436
Q

Demarcation point

A

Where one network or system ends and another one begins

437
Q

Demultiplexing

A

Taking traffic that’s all aimed at the same node and delivering it to the proper receiving service

438
Q

Deployment

A

Hardware is set up so that the employee can do their job

439
Q

Desktop

A

The main screen where we can navigate our files, folders, and applications

440
Q

Destination network

A

The column in a routing table that contains a row for each network that the router knows about

441
Q

Destination port

A

The port of the service the TCP packet is intended for

442
Q

Detection measure

A

The measures to alert you and your team that a disaster has occurred that can impact operations

443
Q

Device manager

A

A console management system for your device

444
Q

DHCP

A

A technology that assigns an IP address automatically to a new device. It is an application layer protocol that automates the configuration process of hosts on a network

445
Q

DHCP discovery

A

The process by which a client configured to use DHCP attempts to get network configuration information

446
Q

Dial-up

A

Uses POTS for data transfer, and gets its name because the connection is established by actually dialing a phone number

447
Q

Differential backup

A

A backup of files that are changed, or has been created since the last full backup

448
Q

Digital divide

A

The growing skills gap between people with and without digital literacy skills

449
Q

DIMM

A

Dual Inline Memory Module

450
Q

Directory Access Protocol (DAP)

A

A protocol that is included in the X.500 directory standard from 1988

451
Q

Directory Information Shadow Protocol (DISP)

A

A protocol that is included in the X.500 directory standard from 1988

452
Q

Directory Operational Bindings Protocol (DOBMP)

A

A protocol that is included in the X.500 directory standard from 1988

453
Q

Directory server

A

The server that contains a lookup service that provides mapping between network resources and their network addresses

454
Q

Directory services

A

A lookup service contained in a network server that provides mapping between network resources and their network addresses

455
Q

Directory System Protocol (DSP)

A

A protocol that is included in the X.500 directory standard from 1988

456
Q

Disaster recovery plan:

A

A collection of documented procedures and plans on how to react and handle an emergency or disaster scenario, from the operational perspective

457
Q

Disaster recovery testing

A

A regular exercise that happens once a year or so, that has different teams, including IT support specialists, going through simulations of disaster events

458
Q

Disk Management utility

A

Native tool for Windows that helps with managing disk space

459
Q

Disk to disk cloning

A

A type of cloning that happens when you connect an external hard drive to the machine you want to clone

460
Q

Display port

A

Port which also outputs audio and video

461
Q

Distribution

A

A version of the operating system

462
Q

Distribution group

A

A group that is only designed to group accounts and contacts for email communication

463
Q

Distributions

A

Some common Linux distributions are Ubuntu, Debian, and Red Hat

464
Q

DNS records

A

A DNS request for the SRV records matching the domain that it’s been bound to

465
Q

DNS zones

A

A portion of space in the Domain Name System (DNS) that is controlled by an authoritative name server

466
Q

Domain

A

Used to demarcate where control moves from a top-level domain name server to an authoritative name server

467
Q

Domain admin

A

The administrators of the Active Directory domain

468
Q

Domain computers

A

All the computers joined to the domain except domain controllers

469
Q

Domain controllers (DC)

A

The service that hosts copies of the Active Directory database

470
Q

Domain local

A

The tool used used to assign permission to a resource

471
Q

Domain name

A

A website name; the part of the URL following www.

472
Q

Domain Name System (DNS)

A

A global and highly distributed network service that resolves strings of letters, such as a website name, into an IP address

473
Q

Domain users

A

A group that contains every user account in the domain

474
Q

Dotted decimal notation

A

A format of using dots to separate numbers in a string, such as in an IP address

475
Q

DRAM

A

Dynamic Random Access Memory

476
Q

Driver

A

Used to help our hardware devices interact with our Operating System

477
Q

Drivers

A

The drivers contain the instructions our CPU needs to understand external devices like keyboards, webcams, printers

478
Q

DSL

A

Digital subscriber line was able to send much more data across the wire than traditional dial-up technologies by operating at a frequency range that didn’t interfere with normal phone calls

479
Q

DSLAM

A

Digital Subscriber Line Access Multiplexers are devices that connect multiple DSL connections to a high-speed digital communications channel

480
Q

Duration field

A

Specifies how long the total frame is

481
Q

DVI

A

DVI cables generally just output video

482
Q

Dynamic allocation

A

A range of IP addresses is set aside for client devices and one of these IPs is issued to these devices when they request one

483
Q

Dynamic IP address

A

An IP address assigned automatically to a new device through a technology known as Dynamic Host Configuration Protocol

484
Q

Dynamic-link libraries

A

Programs that want to use functionality that the code provides can tap into it if they need to (shared libraries)

485
Q

.exe

A

A file extension found in Windows for an executable file

486
Q

Electrostatic discharge

A

Electrostatic discharge is a sudden and momentary flow of electric current between two electrically charged objects caused by contact, an electrical short or dielectric breakdown

487
Q

Enterprise admin

A

The administrators of the Active Directory domain that has permission to make changes to the domain that affect other domains in a multi-domain forest

488
Q

Enterprise app management

A

A management system that allows an organization to distribute custom mobile apps

489
Q

Enterprise mobility management (EMM)

A

A system that can create and distribute policies and MDMs

490
Q

Environment

A

Whatever settings or variables a child process inherits from the parent’s process

491
Q

Error detection

A

The ability for a protocol or program to determine that something went wrong

492
Q

Backup and restore

A

A Microsoft offer and first party solution that has modes of operation, as a file based version where files are backed up to a zip archive

492
Q

DACL

A

Directory Control Lists

493
Q

Error message

A

Helpful indicators that can point you in the right direction

494
Q

Error recovery

A

The ability for a protocol or program to attempt to fix an error

495
Q

Escape characters

A

A concept that means that the next character after the back tick should be treated literally

496
Q

ESTABLISHED

A

Status indicating that the TCP connection is in working order, and both sides are free to send each other data

497
Q

Etcher.io

A

A tool you can use to load an install image onto your USB device and make it bootable

498
Q

Ethernet cable

A

It lets you physically connect to the network through a cable

499
Q

Event Viewer

A

A place where all events that have been logged are stored

500
Q

Executable file

A

A file containing instructions for a computer to execute when they’re run

501
Q

Expansion slots

A

Give us the ability to increase the functionality of our computer

502
Q

Exterior gateway

A

Protocols that are used for the exchange of information between independent autonomous systems

503
Q

External Data Bus (EDB)

A

It’s a row of wires that interconnect the parts of our computer

504
Q

Factory reset

A

Resetting a device to the settings it came with from the factory

505
Q

Fast logon optimization

A

The group policy engine that applies policy settings to a local machine may sacrifice the immediate application of some types of policies in order to make logon faster

506
Q

File compression

A

The files and folder structures are copied and put into an archive

507
Q

File extension

A

The appended part of a filename that tells us what type of file it is in certain operating systems

508
Q

File handling

A

A process of storing data using a program

509
Q

File permissions

A

A process for setting permissions for who has access to certain files

510
Q

File record number

A

The index of the files entry in the MFT

511
Q

File storage service

A

Allows to centrally store files and manage access between files and groups

512
Q

File system

A

A system used to manage files

513
Q

FIN_WAIT

A

A TCP socket state indicating that a FIN has been sent, but the corresponding ACK from the other end hasn’t been received yet

514
Q

FIN

A

One of the TCP control flags. FIN is short for finish. When this flag is set to one, it means the transmitting computer doesn’t have any more data to send and the connection can be closed

515
Q

Finder

A

The file manager for all Macs

516
Q

Firewall

A

It is a device that blocks or allows traffic based on established rules

517
Q

Firmware

A

Software that’s permanently stored on a computer component

518
Q

Fixed allocation

A

Requires a manually specified list of MAC address and the corresponding IPs

519
Q

Flag field

A

It is used to indicate if a datagram is allowed to be fragmented, or to indicate that the datagram has already been fragmented

520
Q

Flat file

A

A collection of records/information that follow a consistent format with rules around stored values. On a host computer, one use is to have a list of network address and host name pairs (a hosts file)

521
Q

Flexible single-master operations (FSMO)

A

The single domain controller that has been tasked with making changes to the AD database that can only be made by one DC at a time

522
Q

Flow label field

A

20-bit field that’s used in conjunction with the traffic class field for routers to make decisions about the quality of service level for a specific datagram

523
Q

Folders/Directories

A

Used to organize files

524
Q

Forest

A

The hierarchy above a domain that contains multiple domains, allowing accounts to share resources between domains that are in the same forest

525
Q

Form factor

A

A mathematical way to compensate for irregularities in the shape of an object by using a ratio between its volume and height

526
Q

Fragmentation

A

The process of taking a single IP datagram and splitting it up into several smaller datagrams

527
Q

Fragmentation offset field

A

It contains values used by the receiving end to take all the parts of a fragmented packet and put them back together in the correct order

528
Q

Frame control field

A

16 bits long, it contains a number of sub-fields that are used to describe how the frame itself should be processed

529
Q

Frequency band

A

A certain section of the radio spectrum that’s been agreed upon to be used for certain communications

530
Q

FTP

A

An older method used for transferring files from one computer to another, but you still see it in use today

531
Q

FTTB

A

Fiber to the building, fiber to the business or even fiber to the basement, since this is generally where cables to buildings physically enter. FTTB is a setup where fiber technologies are used for data delivery to an individual building

532
Q

FTTH

A

Fiber to the home. This is used in instances where fiber is actually run to each individual residents in a neighborhood or apartment building

533
Q

FTTN

A

Fiber to the neighborhood. This means that fiber technologies are used to deliver data to a single physical cabinet that serves a certain amount of the population

534
Q

FTTP

A

Fiber to the premises. FTTH and FTTB may both also be referred to as FTTP

535
Q

FTTX

A

Stands for fiber to the X, where the X can be one of many things

536
Q

Full backup

A

The full unmodified contents of all files to be backed up is are included in this backup mechanism whether the data was modified or not

537
Q

Full control

A

A user or group with full control that can do anything they want to files

538
Q

Fully qualified domain name

A

When you combine all the parts of a domain together

539
Q

Functional levels

A

The different versions of Active Directory, a functional level that describes the features that it supports

540
Q

GIT

A

A version control system that helps keep track of changes made to files and directories

541
Q

Global

A

The tool that is used to group accounts into a role

542
Q

Globalization

A

The movement that lets governments, businesses, and organizations communicate and integrate together on an international scale

543
Q

Group policy management console (GPMC)

A

The tools used for creating and viewing a group policy object

544
Q

Group policy objects (GPO)

A

The ways to manage the configuration of Windows machines, referring to the objects that represent things in your network that you want to be able to reference or manage

545
Q

Group policy settings reference

A

A spreadsheet that details the GPO policies and preferences that are available and where to find them

546
Q

Groups

A

A collection of users

547
Q

Group scope:

A

The way that group definitions are replicated across domains

548
Q

GUI

A

graphical user interface

549
Q

GUID partition table

A

Only used if you are using UEFI booting

550
Q

Handshake

A

A way for two devices to ensure that they’re speaking the same protocol and will be able to understand each other

551
Q

Hard drive

A

It is a long term memory component that holds all of our data, which can include music, pictures, applications

552
Q

Hard link

A

When created in NTFS, an entry is added to the MFT that points to the linked file record number, not the name of the file. This means the file name of the target can change and the hard link will still point to it

553
Q

Hardware

A

External or internal devices and equipment that help you perform major functions

554
Q

Hardware ID

A

A special string of characters assigned to hardware

555
Q

Hardware resource deficiency

A

It refers to the lack of system resources like memory, hard drive space, et cetera

556
Q

Having dependencies

A

A process of counting on other pieces of software to make an application work since one bit of code depends on another in order to work

557
Q

HDD (Hard disk drive)

A

Hard disk drives, or HDDs, use a spinning platter and a mechanical arm to read and write information

558
Q

HDMI

A

A type of cable that outputs both video and audio

559
Q

HDSL

A

High Bit-rate Digital Subscriber Lines. These are DSL technologies that provision speeds above 1.544 megabits per second

560
Q

Header checksum field

A

A checksum of the contents of the entire IP datagram header

561
Q

Header length field

A

A four bit field that declares how long the entire header is. It is almost always 20 bytes in length when dealing with IPv4

562
Q

Heatsink

A

It is used to dissipate heat from our CPU

563
Q

HFS+/APFS

A

HFS+ is a journaling system developed by Apple Inc. and APFS is another but more encrypted Apple journaling system

564
Q

Hidden files

A

A set of files that are not visible either to avoid alteration or simply because you don’t want someone to see them

565
Q

Hop limit field

A

An 8-bit field that’s identical in purpose to the TTL field in an IPv4 header

566
Q

Host file

A

It is a flat file that contains, on each line, a network address followed by the host name it can be referred to as

567
Q

Hostname

A

Used to identify the computer when it needs to talk to other computers

568
Q

Hot key

A

A keyboard shortcut that does a particular task

569
Q

HTTP status code

A

The codes or numbers that indicate some sort of error or info messages that occurred when trying to access a web resource

570
Q

Hybrid cloud

A

Used to describe situations where companies might run things like their most sensitive proprietary technologies on a private cloud or on premise while entrusting their less sensitive servers to a public cloud

571
Q

Hypervisor

A

A piece of software that runs and manages virtual machines while also
offering guests a virtual operating platform that’s indistinguishable from actual hardware

572
Q

I/O management

A

Anything that can give us input or that we can use for output of data

573
Q

I/O Streams

A

An input stream handles data flowing into and out of a program

574
Q

IANA

A

The Internet Assigned Numbers Authority, is a non-profit organization that helps manage things like IP address allocation

575
Q

ICMP

A

Internet control message protocol is used by router or remote hosts to communicate error messages when network problems prevent delivery of IP packets

576
Q

ICMP payload

A

Piece of the packet which lets the recipient of the message knows which of their transmissions caused the error being reported

577
Q

Identification field

A

It is a 16-bit number that’s used to group messages together

578
Q

Import

A

Moving a backup of the test example policy to the production example policy

579
Q

Information technology

A

The use of digital technology, like computers and the internet, to store and process data into useful information

580
Q

Infrastructure as a Service (IaaS)

A

A subset of cloud computing where a network and servers are provided for customers to run their services

581
Q

Inherit only

A

A permission group that means that a DACL will be inherited, but not applied to a container

582
Q

Inode

A

A file structure for metadata and files

583
Q

Input/Output device

A

A device that performs input and output, including monitors, keyboards, mice, hard disk drives, speakers, bluetooth headsets, webcams, and network adapters

584
Q

Install image:

A

A downloadable operating system image used to install an operating system on a device

585
Q

Installing from source

A

A process of installing from a source

586
Q

Instantiation

A

The actual implementation of something defined elsewhere

587
Q

Instruction set

A

A list of instructions that our CPU is able to run

588
Q

Interactive mode

A

When the parted tool launches you into a separate program

589
Q

Interface

A

For a router, the port where a router connects to a network. A router gives and receives data through its interfaces. These are also used as part of the routing table

590
Q

Interior gateway

A

Interior gateway protocols are used by routers to share information within a single autonomous system

591
Q

Internet

A

A worldwide system of interconnected networks

592
Q

Internet Corporation for Assigned Names and Numbers (ICANN)

A

Where website names are registered

593
Q

Internet of Things (IoT)

A

The concept that more and more devices are connected to the internet in a smarter fashion such as smart thermostats that turn off the air conditioner when you leave and turn it on when you come back

594
Q

Internet Protocol version 4 (IPv4)

A

An address that consists of 32 bits separated into four groups

595
Q

Internet Protocol version 6 (IPv6)

A

An address that consist of a 128 bits, four times the amount that IPv4 uses

596
Q

Interpreted programming language

A

A language that isn’t compiled ahead of time

597
Q

Intranet

A

An internal network inside a company, accessible if you are on a company’s network

598
Q

iOS

A

A mobile operating system developed by Apple Inc.

599
Q

IP address

A

The most common protocol used in the network layer, used to helps us route information

600
Q

IP datagram

A

A highly structured series of fields that are strictly defined

601
Q

IP masquerading

A

The NAT obscures the sender’s IP address from the receiver

602
Q

IP options field

A

An optional field and is used to set special characteristics for datagrams primarily used for testing purposes

603
Q

IPv6 tunnel

A

IPv6 tunnel servers on either end of a connection take incoming IPv6 traffic and encapsulate it within traditional IPv4 datagrams

604
Q

IPv6 tunnel brokers

A

Companies that provide IPv6 tunneling endpoints for you, so you don’t have to introduce additional equipment to your network

605
Q

IT Infrastructure

A

The software, the hardware, network, and services required for an organization to operate in an enterprise IT environment

606
Q

ITX (Information Technology eXtended)

A

A form factor for motherboards that is much smaller than ATX boards

607
Q

Kernel

A

The main core of an operating system that creates processes, efficiently schedules them, and manages how processes are terminated

608
Q

Kernel module

A

It extends the kernel’s functionality so developers don’t have to actually touch the Linux kernel

609
Q

Keylogger

A

A common type of spyware that’s used to record every keystroke you make

610
Q

KVM Switch

A

Keyboard, video, & mouse switch that looks like a hub that you can connect multiple computers to and control using one keyboard, mouse, and monitor

611
Q

L2TP (Layer 2 Tunneling Protocol)

A

It is typically used to support VPNs

612
Q

Land Grid Array (LGA)

A

It is a type of CPU socket that stick out of the motherboard

613
Q

LDAP data interchange format

A

The tool that allows you to authenticate, add, remove users, groups, computers and so on in a directory service

614
Q

Backup and restore

A

A Microsoft offer and first party solution that has modes of operation, as a file based version where files are backed up to a zip archive

614
Q

DACL

A

Directory Control Lists

614
Q

Fragmentation

A

The process of taking a single IP datagram and splitting it up into several smaller datagrams

614
Q

Identification field

A

It is a 16-bit number that’s used to group messages together

615
Q

DACL

A

Directory Control Lists

615
Q

Fragmentation

A

The process of taking a single IP datagram and splitting it up into several smaller datagrams

615
Q

Backup and restore

A

A Microsoft offer and first party solution that has modes of operation, as a file based version where files are backed up to a zip archive

616
Q

Identification field

A

It is a 16-bit number that’s used to group messages together

617
Q

LDAP Entry

A

A collection of information that’s used to describe something

618
Q

LDIF files

A

A text file that lists attributes and values that describe something

619
Q

Library

A

A way to package a bunch of useful code that someone else wrote

620
Q

Lightning adaptor

A

One of the standard power, data and display connector types used in mobile devices

621
Q

Linked

A

A GPO that all of the computers or users under a domain, site, or OU will have a policy applied

622
Q

Link-local unicast address

A

Allow for local network segment communications and are configured based upon a host’s MAC address

623
Q

Linux OS

A

Linux is one of the largest an open source operating system used heavily in business infrastructure and in the consumer space

624
Q

Listen

A

It means that a TCP socket is ready and listening for incoming connections

625
Q

List folder contents

A

A command that will execute and list folder contents and is an alias for Read and Execute

626
Q

Load balancer

A

Ensures that each VM receives a balanced number of queries

627
Q

Logging

A

The act of creating log events

628
Q

Logic gates

A

Allow transistors to do more complex tasks, like decide where to send electrical signals depending on logical conditions

629
Q

Log rotation

A

A way for the OS to clean out log files to make room for new ones

630
Q

Logs

A

Files that record system events on our computer

631
Q

Loopback address

A

An IP address that always points to itself. This type of address is used to test internal pathing through the TCP/IP protocols

632
Q

MAC address

A

A globally unique identifier attached to an individual network interface. It’s a 48-bit number normally represented by six groupings of two hexadecimal numbers

633
Q

MAC filtering

A

Access points are configured to only allow for connections from a specific set of MAC addresses belonging to devices you trust

634
Q

Mac OS

A

Apple’s operating system

635
Q

Maintenance

A

Where software is updated and hardware issues are fixed if, and when, they occur

636
Q

Manifest

A

A library used if an application needs to use a shared library

637
Q

Master boot record (MBR)

A

a traditional partition table within a storage disk that lets you have volume sizes of 2 terabytes or less and is mostly used in the Windows OS

638
Q

Master file table (MFT)

A

A way NTFS stores and represents the files you’re working with on your operating system

639
Q

Mb/s

A

megabit per second, which is a unit of data transfer rate

640
Q

MDM policy

A

The profiles that contains settings for the device

641
Q

MDM profile

A

The policies that contains settings for the device

642
Q

Memory controller chip (MCC)

A

A bridge between the CPU and the RAM

643
Q

Memory management

A

One of the functions that a kernel performs; it optimizes memory usage and make sure our applications have enough memory to run

644
Q

Memory manager

A

A Windows OS program that helps manage virtual memory

645
Q

Memory usage

A

The amount of memory available in your system as well as what memory is currently being used by other applications

646
Q

Mesh networks

A

Like ad-hoc networks, lots of devices communicate with each other device, forming a mesh if you were to draw lines for all the links between all the nodes

647
Q

Metadata

A

Tells us everything we need to know about a file, including who created it, when it was last modified, who has access to it, and what type of file it is

648
Q

Metered connection

A

An internet connection where all data transfer usage is tracked. Cell phone plans that have a limit on data usage per month or that charge based on usage are examples of metered connections

649
Q

Micro display port

A

One of the standard power, data and display connector types used in mobile devices

650
Q

Micro HDMI

A

One of the standard power, data and display connector types used in mobile devices

651
Q

Microsoft Install Package(.msi) and MSI files

A

Microsoft Install Package is a file extension used to guide a program called Windows Installer in the installation, maintenance, and removal of programs of the windows operating systems. MSI files are a combination of of databases that contain installation instructions in different tables along with all the files

652
Q

Microsoft Terminal Services Client

A

A client program used to create RDP connections to remote computers

653
Q

Micro USB

A

One of the standard power, data and display connector types used in mobile devices

654
Q

Mini HDMI

A

One of the standard power, data and display connector types used in mobile devices

655
Q

Mini USB

A

One of the standard power, data and display connector types used in mobile devices

656
Q

Mobile applications:

A

Software that is distributed on mobile OS devices

657
Q

Mobile device management

A

A system used to apply and enforce rules about how the device has to be configured and used

658
Q

Modify

A

An umbrella permission that includes read and execute and write

659
Q

Motherboard

A

The body or circulatory system of the computer that connects all the pieces together

660
Q

Mounting

A

Making a file or hard disk accessible to the computer

661
Q

Multicast

A

A way of addressing groups of hosts all at once

662
Q

Multilingual user interface

A

Interface that offers and support different languages

663
Q

Multiplexing

A

It means that nodes on the network have the ability to direct traffic toward many different receiving services

664
Q

MX record

A

It stands for mail exchange and this resource record is used in order to deliver email to the correct server

665
Q

Name resolution

A

This process of using DNS to turn a domain name into an IP address

666
Q

NAS device

A

A network attached storage device that has hard drives to automatically create backups and store data

667
Q

Network

A

The interconnection of computers

668
Q

Network Address Translation (NAT)

A

A mitigation tool that lets organizations use one public IP address and many private IP addresses within the network

669
Q

Network file system

A

A protocol that enables files to be shared over a network

670
Q

Networking

A

Managing, building and designing networks

671
Q

Networking protocols

A

A set of rules for how we transfer data in a network

672
Q

Network stack

A

A set of hardware or software that provides the infrastructure for a computer

673
Q

Next header field

A

Defines what kind of header is immediately after this current one

674
Q

Next hop

A

The IP address of the next router that should receive data intended for the destination networking question or this could just state the network is directly connected and that there aren’t any additional hops needed. Defined as part of the routing table

675
Q

Non-metered connection

A

A connection where your data usage is not tracked or limited, instead you are charged a flat fee for unlimited and unrestricted usage. A Wi-Fi connection is an example of a non-metered connection

676
Q

Non-routable address space

A

They are ranges of IPs set aside for use by anyone that cannot be routed to

677
Q

Northbridge

A

interconnects stuff like RAM and video cards

678
Q

NS record

A

It indicates other name servers that may also be responsible for a particular zone

679
Q

NTP

A

Network Time Protocol, keeping clocks synchronized on machines connected to a network

680
Q

NTP servers

A

Used to keep all computers on a network synchronized in time

681
Q

NVMe (NVM Express)

A

interface standard which allows greater throughput of data and increased efficiency

682
Q

One-way cryptographic hash

A

The method used by AD to store passwords

683
Q

OpenLDAP (lightweight directory access protocol)

A

An open source and free directory service

684
Q

Open source

A

This means the developers will let other developers share, modify, and distribute their software for free

685
Q

Open SSH

A

The most popular program to use SSH within Linux

686
Q

Operating system

A

The whole package that manages our computers resources and lets us interact with it

687
Q

Optical Network Terminator

A

Converts data from protocols the fiber network can understand to those that are more traditional twisted pair copper networks can understand

688
Q

Options field

A

It is sometimes used for more complicated flow control protocols

689
Q

OSI model

A

A model used to define how network devices communicate. This model has seven layers that stack on top of each other: Physical, Data Link, Network, Transport, Session, Presentation, and Application

690
Q

OTA update

A

A type of update that is installed by the mobile device itself

691
Q

Overclocking

A

it increases the rate of your CPU clock cycles in order to perform more tasks

692
Q

Packaged archives

A

The core or source software files that are compressed into one file

693
Q

Packaged managers

A

An application that makes package installation and removal easier

694
Q

Padding field

A

A series of zeros used to ensure the header is the correct total size

695
Q

Pairing

A

When a wireless peripheral connects to a mobile device, and the two devices exchange information, sometimes including a PIN or password, so that they can remember each other

696
Q

Parameter

A

A value that is associated with a command

697
Q

Parent directory & child directories

A

A parent directory is a directory that houses all subsequent child directories

698
Q

Parent group

A

Groups that are principal groups and contain other groups

699
Q

Partition

A

A logical division of a hard disk that is treated as a separate unit by operating systems and file systems

700
Q

Partition table

A

How the disk is partitioned on an OS

701
Q

Paths

A

A main directory that branches off and holds other directories and files

702
Q

Payload length field

A

16-bit field that defines how long the data payload section of the datagram is

703
Q

PC

A

Personal computer, which technically means a computer that one person uses

704
Q

PCI Express

A

Peripheral Component Interconnect Express

705
Q

PDA (Personal Digital Assistant)

A

Allows computing to go mobile

706
Q

Peripherals

A

the external devices which we connect to our computer that add functionality, like: a mouse, a keyboard, and a monitor

707
Q

Permission denied

A

An error message you might find when accessing a protected file

708
Q

Personal package archives

A

A software repository for uploading source packages to be built and published

709
Q

PHPLDAPadmin

A

A tool to manage OpenLDAP

710
Q

Physical tokens

A

They take a few different forms, such as a USB device with a secret token on it, a standalone device which generates a token, or even a simple key used with a traditional lock

711
Q

Pin Grid Array (PGA)

A

CPU socket where the pins are located on the processor itself

712
Q

Platform as a service

A

A subset of cloud computing where a platform is provided for customers to run their services

713
Q

Platform services

A

A platform for developers to completely build and deploy software applications, without having to deal with OS maintenance, server hardware, networking or other services that are needed to use the platform tools

714
Q

Plink (PuTTY Link)

A

A tool built into the command line after PuTTY is installed that is used to make remote SSH connections

715
Q

Pointer resource record

A

It resolves an IP to a name

716
Q

Point-To-Point VPN

A

Establishes a VPN tunnel between two sites but VPN tunneling logic is handled by network devices at either side, so that users don’t all have to establish their own connections

717
Q

Policies

A

Settings that are reapplied every few minutes, and aren’t meant to be changed even by the local administrators

718
Q

Port

A

It is a 16-bit number that’s used to direct traffic to specific services running on a networked computer

719
Q

Portable Executable (PE) format

A

Windows unique version of .exe

720
Q

Port forwarding

A

A technique where specific destination ports can be configured to always be delivered to specific nodes

721
Q

Port preservation

A

A technique where the source port chosen by a client, is the same port used by the router

722
Q

Ports

A

Connection points that we can connect devices to that extend the functionality of our computer

723
Q

POST (Power On Self Test):

A

It figures out what hardware is on the computer

724
Q

Post-fail analysis

A

Investigating how a compromise happened after the breach is detected

725
Q

Post mortem

A

A way for you to document any problems you discovered along the when recovering data, and the ways you fixed them so you can make sure they don’t happen again

726
Q

Powershell

A

A shell (program that interprets text commands) for Windows

727
Q

Power supply

A

Converts electricity from our wall outlet onto a format that our computer can use

728
Q

Power user

A

Above average computer users

729
Q

Precedence

A

When computers are processing the Group Policy Objects that apply to them, all of these policies will be applied in a specific order based on a set of precedents rules

730
Q

Presentation layer

A

It is responsible for making sure that the unencapsulated application layer data is actually able to be understood by the application in question

731
Q

Preventative measures

A

Any procedures or systems in place that will proactively minimize the impact of a disaster

732
Q

Primary account

A

The initial account you made during setup

733
Q

Private cloud

A

When a company owns the services and the rest of the cloud infrastructure, whether on-site or in a remote data center

734
Q

Processes

A

Help the computer run programs

735
Q

Process Explorer

A

A utility Microsoft created to let IT support specialists and system administrators look at running processes

736
Q

Process ID:

A

Unique identifier for processes on your computer

737
Q

Process management

A

The capacity to manage the many programs in a system - when to run them, the order they run in, how many resources they take up, how long they run, et cetera

738
Q

Process monitoring

A

A way of monitoring what processes are happening during installation

739
Q

Process scheduler

A

The part of the kernel that makes multitasking possible

740
Q

Procurement

A

Hardware is purchased or reused for an employee

741
Q

Production

A

The parts of the infrastructure where certain services are executed and serve to its users production

742
Q

Programming

A

Coding in a programming language

743
Q

Programming language

A

Special languages that software developers use to write instructions for computers to execute

744
Q

Programs

A

Basic instructions that tell the computer what to do

745
Q

Prompt

A

A prompt shows you which directory you’re currently in

746
Q

Protocol field

A

A protocol field is an 8-bit field that contains data about what transport layer protocol is being used

747
Q

Proxy server

A

An intermediary between a company’s network and the Internet, receiving network traffic and relaying that information to the company network

748
Q

Proxy service

A

A server that acts on behalf of a client in order to access another service

749
Q

PSH flag

A

One of the TCP control flags. PSH is short for push. This flag means that the transmitting device wants the receiving device to push currently- buffered data to the application on the receiving end as soon as possible

750
Q

Public cloud

A

The cloud services provided by a third party

751
Q

Public DNS servers

A

Name servers specifically set up so that anyone can use them for free

752
Q

Punch cards

A

A sequence of cards with holes in them to automatically perform calculations instead of manually entering them by hand

753
Q

Quad A (AAAA) record

A

It is very similar to an A record except that it returns in IPv6 address instead of an IPv4 address

754
Q

Qwiklabs

A

An online platform which provides training in cloud services

755
Q

Backup and restore

A

A Microsoft offer and first party solution that has modes of operation, as a file based version where files are backed up to a zip archive

755
Q

Identification field

A

It is a 16-bit number that’s used to group messages together

755
Q

DACL

A

Directory Control Lists

755
Q

Fragmentation

A

The process of taking a single IP datagram and splitting it up into several smaller datagrams

756
Q

RAID (redundant array of independent disks)

A

A method of taking multiple physical disks and combining them into one large virtual disk

757
Q

Read and execute permission

A

Permissions that grant you access to read the file that exists and execute it if its runnable

758
Q

Read permission

A

Permissions that grant you access to read the file that exists

759
Q

Read-write replicas

A

Domain controllers in the Active Directory network that each have a complete copy of the AD database and are able to make changes to it

760
Q

Receiving address

A

The MAC address of the access point that should receive the frame

761
Q

Recursive name servers

A

Servers that perform full DNS resolution requests

762
Q

Backup and restore

A

A Microsoft offer and first party solution that has modes of operation, as a file based version where files are backed up to a zip archive

762
Q

Fragmentation

A

The process of taking a single IP datagram and splitting it up into several smaller datagrams

762
Q

Identification field

A

It is a 16-bit number that’s used to group messages together

762
Q

DACL

A

Directory Control Lists

762
Q

Read and execute permission

A

Permissions that grant you access to read the file that exists and execute it if its runnable

762
Q

RAM

A

Random Access Memory

763
Q

Re-flash

A

A way to preserve end-user data on a device that you plan on resetting

764
Q

Regions

A

A geographical location containing a number of data centers

765
Q

Registers

A

An accessible location for storing the data that our CPU works with

766
Q

Registrar

A

An organization responsible for assigning individual domain names to other organizations or individuals

767
Q

Regular expression

A

A pattern matching language that describes words, phrases, or more complicated patterns; regular expressions are used to help you do advanced pattern based selection

768
Q

Reimaging

A

The process of reimaging involves wiping and reinstalling an operating system using a disk image which is a copy of an operating system

769
Q

Relative path

A

It is a path from your current directory

770
Q

Remote wipe

A

A factory reset that you can trigger from your central MDM rather than having to do it in person on the device

771
Q

Replication

A

the store directory data is copied and distributed across a number of physically distributed servers but still appears as one unified data store for querying and administering

772
Q

Replication failure

A

A reason that a GPO might fail to apply as expected

773
Q

Repository

A

A server that acts like a central storage location for packages

774
Q

Reproduction case

A

Recreating an error to test a solution to make sure the problem is gone after a fix has been applied

775
Q

Reset

A

When an SysAdmin restores or resets the password of a user

776
Q

Resource monitoring

A

The most common way to quickly take a peek at how system resources are doing

777
Q

Restart

A

A command that will let the machine reboot to complete a domain join

778
Q

Restoration procedures

A

A recovery process and process needs to be tested regularly that is documented and accessible so that anyone with the right access can restore operation when needed

779
Q

Resultant set of policy (RSOP)

A

The policy that forms when all of the group policies have been grouped together for a specific machine and apply precedence rules to them

780
Q

Retirement

A

Hardware becomes unusable or no longer needed, and it needs to be properly removed from the fleet

781
Q

Return merchandise authorization (RMA)

A

The process of receiving returned merchandise and authorizing a refund

782
Q

Reverse lookup zone files

A

They let DNS resolvers ask for an IP, and get the FQDN associated with it returned

783
Q

RGB model

A

RGB or red, green, and blue model is the basic model of representing colors

784
Q

Risk assessment

A

Allows you to prioritize certain aspects of the organization that are more at risk if there’s an unforeseen event

785
Q

Role-based access control (RBAC)

A

The process of changing a persons group that they are a part of when they have changed roles within a company to limit or change their access to resources

786
Q

Rollback

A

Reverting to the previous state before you made changes

787
Q

ROM chip (Read Only Memory)

A

A read-only memory chip where the BIOS is stored

788
Q

Root cause

A

The main factor that’s causing a range of issues

789
Q

Root directory

A

A parent directory for all other directories in a file system

790
Q

Root user

A

It is the first user that gets automatically created when we install a Linux OS and has all the privileges on the OS. Also called the super user. There’s technically only one superuser or root account, but anyone that’s granted access to use their powers can be called a superuser too

791
Q

Round robin

A

It is a concept that involves iterating over a list of items one by one in an orderly fashion

792
Q

Routing protocols

A

Special protocols the routers use to speak to each other in order to share what information they might have

793
Q

RPM

A

Revolutions per minute

794
Q

RSOP report

A

The process of troubleshooting group policy and comparing what you expect to be applied to a computer and the resultant set of policy report

795
Q

RST flag

A

One of the TCP control flags. RST is short for reset. This flag means that one of the sides in a TCP connection hasn’t been able to properly recover from a series of missing or malformed segments

796
Q

SACL’s

A

System Access Control List

797
Q

Safe operating temperature

A

The temperature range in which rechargeable batteries must be kept in order to avoid demanage

798
Q

SATA

A

The most popular serial ATA drive, which uses one cable for data transfers

799
Q

Scalability

A

The measure of a system’s ability to increase or decrease in performance and cost in response to varying loads in system processing demands

800
Q

Script

A

It is run by an interpreter, which interprets the code into CPU instructions just in time to run them

801
Q

Scripting

A

Coding in a scripting language

802
Q

Scripts

A

Mainly used to perform a single or limited range task

803
Q

SD devices

A

Mass storage devices like hard drives

804
Q

SDRAM

A

It stands for Synchronous DRAM, this type of RAM is synchronized to our systems’ clock speed allowing quicker processing of data

805
Q

Secondary or stand-by machine

A

A machine that is the same as a production machine, but won’t receive any traffic from actual users until enabled

806
Q

Secure copy

A

A command you can use in Linux to copy files between computers on a network

807
Q

Security account manager (SAM)

A

A database in windows that stores user names and password

808
Q

Security filtering

A

A tool to make group policies apply more selectively

809
Q

Security group

A

One of the two categories that groups in Active Directories can be part of, they can contain user accounts, computer accounts or other security groups

810
Q

Security patch

A

A piece of software that is meant to fix up a security hole

811
Q

Security principal

A

Any entity that can be authenticated by the system, such as a user account, a computer account, or a thread or process that runs in the security context of a user or computer account

812
Q

Sequence control field

A

A field that is 16 bits long and mainly contains a sequence number used to keep track of ordering the frames

813
Q

Sequence number

A

A 32-bit number that’s used to keep track of where in a sequence of TCP segments this one is expected to be

814
Q

Server logs

A

Text files that contains recorded information about activities performed on a specific web server in a defined period of time

815
Q

Server operating systems

A

Regularly operating systems that are optimized for server functionality

816
Q

Server or Service

A

A program running on a computer waiting to be asked for data

817
Q

Servers

A

Devices that provide data to other devices that request that data, also known as a client

818
Q

Service discovery

A

One of the services that the domain controller provides to the clients

819
Q

Service type field

A

A eight bit field that can be used to specify details about quality of service or QoS technologies

820
Q

Session layer

A

The network layer responsible for facilitating the communication between actual applications and the transport layer

821
Q

Session manager subsystem

A

Process that is in charge of setting some stuff up to work for the OS

822
Q

Shared folders

A

A way to share files between computers on the same network on Windows

823
Q

Shell

A

A program that interprets text commands and sends them to the OS to execute

824
Q

Shortcut

A

An entry in the MFT that has a reference to some destination, so that when you open it up, you get taken to that destination

825
Q

Short-range wireless network

A

It is what mobile devices uses to connect to their peripherals

826
Q

Side-by-side assemblies

A

A system that manages most shared libraries and resources on Windows and supports access to multiple versions of the same shared library automatically

827
Q

Side-loading

A

A process of installing mobile apps directly without using an app store

828
Q

Signal

A

A way to tell a process that something has just happened

829
Q

Simple authentication and security layer (SASL)

A

The authentication method that can employ the help of security protocols like TLS, it requires the client and the directory server to authenticate using some method

830
Q

Simple permissions

A

Special or specific permissions

831
Q

Single point of failure

A

When one system in a redundant pair suffers a failure

832
Q

SOC (System On a Chip)

A

Packs the CPU, Ram, and sometimes even the storage onto a single chip

833
Q

Socket

A

The instantiation of an endpoint in a potential TCP connection

834
Q

Softlinks

A

A shortcut in Linux, that allows us to link to another file using a file name

835
Q

Software

A

The intangible instructions that tell the hardware what to do

836
Q

Software as a Service (SaaS)

A

A way of licensing the use of software to others while keeping that software centrally hosted and managed

837
Q

Software bug

A

An error in software that causes unexpected results

838
Q

Software management:

A

A broad term used to refer to any and all kinds of software that are designed to manage or help manage some sort of project or task

839
Q

Software services

A

The services that employees use that allow them to do their daily job functions, such as word processors, Internet browsers, email clients, chat clients, and more

840
Q

Source port

A

A high numbered port chosen from a special section of ports known as ephemeral ports

841
Q

Southbridge

A

It maintains our IO or input/output controllers, like hard drives and USB devices that input and output data

842
Q

SRV record

A

A service record used to define the location of various specific services

843
Q

SSD

A

Solid State Drive

844
Q

SSH (Secure shell)

A

A protocol implemented by other programs to securely access one computer from another

845
Q

SSH authentication key

A

A secure authentication method for accessing a computer from other device

846
Q

SSH client

A

A program you must have installed on your device in order to establish an SSH connection with another device

847
Q

SSH server

A

Software installed on a machine that allows for that device to accept an SSH connection

848
Q

Standard error (stderr)

A

A data stream that redirects the output of error messages in a different output stream. It works both in Linux and Windows

849
Q

Standard In (stdin)

A

A data stream in which the input that you provide through the keyboard goes to the standard in stream of the process that you’re interacting with. It works both in Linux and Windows

850
Q

Standardization

A

A systematic way of naming hosts

851
Q

Standard out (stdout)

A

A data stream that, when a process creates output, it adds data to the standard out stream, which flows out of the process. It works both in Linux and Windows

852
Q

Standard user

A

A user who is given access to the machine but has restricted access to do thing like install software or change certain setting

853
Q

Standoffs

A

Used to raise and attach your motherboard to the case

854
Q

Start of authority

A

A declaration of the zone and the name of the name server that is authoritative for it

855
Q

Static IP address

A

An IP address that must be manually configured on a node

856
Q

Subdirectories

A

A directory below or at a deeper level in the directory hierarchy

857
Q

Subnet mask

A

32-bit numbers that are normally written as four octets of decimal numbers

858
Q

Subnetting

A

The process of taking a large network and splitting it up into many individual smaller sub networks or subnets

859
Q

Suspended apps

A

A command that will tell the OS to suspend background mobile apps

860
Q

Swap space

A

The allocated space where the virtual memory is stored on the hard drive when the amount of physical memory space is used up or full

861
Q

Switches

A

Devices that help our data travel

862
Q

Symbolic links

A

Work similarly to shortcuts, but at the file system level. The key difference is that the operating system treats them like substitutes for the file they’re linked to in almost every meaningful way

863
Q

Symmetric Digital Subscriber Line (SDSL)

A

A device that establishes data connections across phone lines and has upload and download speeds that are the same

864
Q

SYN_RECEIVED

A

A TCP socket state that means that a socket previously in a listener state, has received a synchronization request and sent a SYN_ACK back

865
Q

SYN_SENT

A

A TCP socket state that means that a synchronization request has been sent, but the connection hasn’t been established yet

866
Q

SYN flag

A

One of the TCP flags. SYN stands for synchronize. This flag is used when first establishing a TCP connection and make sure the receiving end knows to examine the sequence number field

867
Q

Sysinternals package

A

A set of tools released by Microsoft that can help you troubleshoot

868
Q

System

A

A group of hardware components and software components that work together to fun the programs or processes in the computer

869
Q

System Administration

A

The field in IT that is responsible for maintaining reliable computer systems, in a Multi-user environment

870
Q

System properties

A

A control panel applet that allows you to edit the size and number and location of paging files

871
Q

Systems administrator (sysadmin)

A

A person who works only in system administration, configuring servers, monitoring the network, provisioning, or setting up new users in computers and taking responsibility of systems

872
Q

System settings

A

Settings like display resolution, user accounts, network, devices, etc

873
Q

System software

A

Software used to keep our core system running, like operating system tools and utilities

874
Q

Tab completion

A

A way to auto-complete a command or file names and directories

875
Q

Task bar

A

It gives us quick options and shows us information like network connectivity, the date, system notifications, sound etc

876
Q

Task Manager

A

A Windows utility that allows you to gain information about what tasks you have running in the background

877
Q

T-Carrier technologies

A

Technologies Invented to transmit multiple phone calls over a single link. Eventually, they also became common transmission systems to transfer data much faster than any dial-up connection could handle

878
Q

TCP checksum

A

A mechanism that makes sure that no data is lost or corrupted during a transfer

879
Q

TCP segment

A

A payload section of an IP datagram made up of a TCP header and a data section

880
Q

TCP window

A

The range of sequence numbers that might be sent before an acknowledgement is required

881
Q

Terminal

A

A text based interface to the computer

882
Q

Termination signal

A

A kill command that will stop whatever process you tell it to

883
Q

Test environment

A

A virtual machine running the same configuration as a production environment, but isn’t actually serving any users of the service

884
Q

Thermal paste

A

A substance used to better connect our CPU and heat sink, so the heat transfers from to the other better

885
Q

Time slice

A

A very short interval of time that gets allocated to a process for CPU execution

886
Q

Time-To-Live field (TTL)

A

An 8-bit field that indicates how many router hops a datagram can traverse before it’s thrown away

887
Q

Top Level Domain (TLD)

A

The top level of the DNS or the last part of a domain name. For example, the “com” in www.weather.com

888
Q

Total hops

A

The total number of devices data passes through to get from its source to its destination. Routers try to choose the shortest path, so fewest hops possible. The routing table is used to keep track of this

889
Q

Total length field

A

A 16-bit field that indicates the total length of the IP datagram it’s attached to

890
Q

Traffic class field

A

An 8-bit field that defines the type of traffic contained within the IP datagram and allows for different classes of traffic to receive different priorities

891
Q

Transmitter address

A

The MAC address of whatever has just transmitted the frame

892
Q

Trim

A

A command to delete unused data blocks so the space can be used for the computer’s storage needs

893
Q

Troubleshooting

A

The ability to diagnose and resolve a problem

894
Q

TTL

A

The lifetime limit of data given in seconds. This number can be configured by the owner of a domain name for how long a name server is allowed to cache in entry before it should discard it and perform a full resolution again

895
Q

Two-factor authentication

A

A technique where more than just a username and password are required to authenticate. Usually, a short-lived numerical token is generated by the user through a specialized piece of hardware or software

896
Q

TXT record

A

It stands for text and was originally intended to be used only for associating some descriptive text with a domain name for human consumption

897
Q

Type-C connector

A

A type of USB connector meant to replace many peripheral connections

898
Q

Types of DNS servers

A

There are five primary types of DNS servers; caching name servers, recursive name servers, root name servers, TLD name servers, and authoritative name servers

899
Q

Ubuntu

A

The most popular Linux consumer distribution

900
Q

UEFI

A

United Extensible Firmware Interface, a new standard for BIOS

901
Q

Uniform Resource Locator (URL)

A

A web address similar to a home address

902
Q

Universal

A

The tool that is used to group global roles in a forest

903
Q

Unix epoch

A

It is the number of seconds since midnight on January first, 1970. It’s a ‘Zero Hour’ for Unix based computers to anchor their concept of time

904
Q

Urgent pointer field

A

A field used in conjunction with one of the TCP control flags to point out particular segments that might be more important than others

905
Q

URG flag

A

One of the TCP control flags. URG is short for urgent. A value of one here indicates that the segment is considered urgent and that the urgent pointer field has more data about this

906
Q

USB (Universal Serial Bus)

A

A connection standard for connecting peripherals to devices such as computers

907
Q

USB-C adapter

A

One of the standard power, data and display connector types used in mobile devices

908
Q

User configuration

A

Contained within a Group Policy Object (GPO)

909
Q

User Groups

A

The management of resources on a computer and on a network through organizing user accounts into various groups

910
Q

User name

A

A unique identifier for a user account

911
Q

User space

A

The aspect of an operating system that humans interact with directly like programs, such as text editors, music players, system settings, user interfaces, et cetera

912
Q

UTF-8

A

The most prevalent encoding standard used today

913
Q

UUID

A

Universally Unique ID

914
Q

Variable

A

Files that constantly change

915
Q

Version field

A

First field in an IP header that specifies the version of IP

916
Q

Virtual Box

A

An application you can use to install Linux and have it completely isolated from your machine

917
Q

Virtual instance

A

A single virtual machine

918
Q

Backup and restore

A

A Microsoft offer and first party solution that has modes of operation, as a file based version where files are backed up to a zip archive

918
Q

DACL

A

Directory Control Lists

918
Q

Identification field

A

It is a 16-bit number that’s used to group messages together

918
Q

Fragmentation

A

The process of taking a single IP datagram and splitting it up into several smaller datagrams

918
Q

Read and execute permission

A

Permissions that grant you access to read the file that exists and execute it if its runnable

919
Q

RAM

A

Random Access Memory

920
Q

Virtualization

A

A single physical machine called a host runs many individual virtual instances called guests

921
Q

Virtual machine (VM)

A

An application that uses physical resources like memory, CPU and storage, but they offer the added benefit of running multiple operating systems at once

922
Q

Virtual memory

A

A combination of hard drive space and RAM that acts like memory which our processes can use

923
Q

Volume

A

A format for a filesystem on a partition

924
Q

WannaCry Attack

A

A cyber attack that started in Europe and infected hundreds of thousands of computers across the world

925
Q

Web server

A

A web server stores and serves content to clients through the Internet.

926
Q

Wide area network

A

Acts like a single network but spans across multiple physical locations. WAN technologies usually require that you contract a link across the Internet with your ISP

927
Q

Wildcard

A

A character that is used to help select files based on a certain pattern

928
Q

Windows domain

A

A network of computers and users that are added to a central database

929
Q

Windows management instrumentation (WMI)

A

The container that is used to define powerful targeting rules for your GPO

930
Q

Windows registry:

A

A hierarchical database of settings that Windows, and Windows applications, use for storing configuration data

931
Q

Windows Search service

A

A service that indexes files on your computer by looking through them on a schedule

932
Q

Windows store

A

A Windows store is an application repository or warehouse where you can download and instal universal Windows platform apps

933
Q

Windows update client service

A

System that runs in the background on your computer to download and install updates and patches for your operating system

934
Q

Wireless access point

A

A device that bridges the wireless and wired portions of a network

935
Q

Wireless LANS (WLANS)

A

One or more access points act as a bridge between a wireless and a wired network

936
Q

Wireless networking

A

Networks you connect to through radios and antennas

937
Q

WMI filter:

A

A tool to make group policies apply more selectively on the configuration of the computer

938
Q

Work group computer

A

A Windows computer that isn’t joined to a domain

939
Q

World Wide Web (WWW)

A

The information system that enables documents and other web resources to be accessed over the Internet

940
Q

Write permission

A

A permission that allows you to make changes to a file

941
Q

X.500 directory

A

The agreed upon directory standard that wa approved in 1988 that includes, DAP, DSP, DISP, DOP, DAP, and LDAP

942
Q

Zone Files

A

Simple configuration files that declare all resource records for a particular zone

943
Q

Read and execute permission

A

Permissions that grant you access to read the file that exists and execute it if its runnable

943
Q

Backup and restore

A

A Microsoft offer and first party solution that has modes of operation, as a file based version where files are backed up to a zip archive

943
Q

DACL

A

Directory Control Lists

943
Q

Fragmentation

A

The process of taking a single IP datagram and splitting it up into several smaller datagrams

943
Q

RAM

A

Random Access Memory

943
Q

Identification field

A

It is a 16-bit number that’s used to group messages together

944
Q

Read and execute permission

A

Permissions that grant you access to read the file that exists and execute it if its runnable

944
Q

Backup and restore

A

A Microsoft offer and first party solution that has modes of operation, as a file based version where files are backed up to a zip archive

944
Q

Identification field

A

It is a 16-bit number that’s used to group messages together

944
Q

Fragmentation

A

The process of taking a single IP datagram and splitting it up into several smaller datagrams

944
Q

DACL

A

Directory Control Lists

944
Q

RAM

A

Random Access Memory