IT support glossary Flashcards

learn terminology

1
Q

What is ABSTRACTION?

A

To take a relatively complex system and simplify it for our use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an ALGORITHYM?

A

A series of steps that solves specific problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is ACII, why is it important?

A

The oldest character encoding standard used, representing the English alphabet, digits, and punctuation marks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a BINARY SYSTEM?

A

The communication that a computer uses, also known as the “base-2” numeral system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the term BYTE mean, why is it crucial in encoding?

A

A group of 8 BITS.
Character encoding: Used to assign binary values to characters so that we as humans can read them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does a COMPUTER do and mean, in IT?

A

A device that stores and processes data by performing calculations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is CRYPTOGRAPHY?

A

The practice of coding and hiding messages from third parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a DECIMAL FORM BASE 10 SYSTEM?

A

In the decimal system, there are 10 possible numbers ranging from zero to nine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the Digital Divide?

A

The growing skills gap between people with and without digital literacy skills.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is INFORMATION TECHNOLOGY?

A

The use of digital technology, like computers and the internet, to store and process data into useful information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is LINUX OS?

A

One of the largest open-source operating systems used heavily in business infrastructure and the consumer space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are LOGIC GATES?

A

Allow transistors to perform more complex tasks, like deciding where to send electrical signals depending on logical conditions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does OPEN SOURCE mean?

A

Developers share, modify, and distribute their software for free.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does PDA stand for

A

PDA (Personal Digital Assistant): Allows computing to go mobile.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

404 NOT FOUND

A

An error message you might see on websites that have been moved or deleted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

802.1X

A

It is the IEEE standard for encapsulating EAP or Extensible Authentication Protocol traffic over the 802 networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

802.1X with EAP-TLS

A

Offers arguably the best security available, assuming proper and secure handling of the PKI aspects of it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

AAA (authentication, authorisation, accounting)

A

The services that the directory services provide to all the computers within a company or organisation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

ABSOLUTE PATH

A

It is one that starts from the main directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

ACCESS CONTROL ENTRIES

A

The individual access permissions per object that make up the ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ACCESS CONTROL LIST (ACL)

A

It is a way of defining permissions or authorizations for objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

ACCOUNTING

A

Keeping records of what resources and services your users access or what they did when they were using your systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

ACL

A

Access control lists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

ACK FLAG

A

One of the TCP control flags.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is ACK short for?

A

Acknowledge. A value of one in this field means that the acknowledgment number field should be examined.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

ACKNOWLEDGEMENT NUMBER

A

The number of the next expected segment in a TCP sequence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

ACTIVATION THRESHOLD

A

Triggers a pre-configured action when it is reached and will typically block the identified attack traffic for a specific amount of time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

ACTIVE DIRECTORY USERS AND COMPUTERS (ADUC)

A

The client tools that are used for accessing and administering a directory server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

ADDRESS BUS

A

Connects the CPU to the MCC and sends over the location of the data, but not the data itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

ADDRESS RESOLUTION PROTOCOL (ARP)

A

A protocol used to discover the hardware address of a node with a certain IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

ADDRESS CLASS SYSTEM

A

A system which defines how the global IP address space is split up.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

AD-HOC NETWORK

A

A network configuration without supporting network infrastructure. Every device involved with THE NETWORK communicates with every other device within range, and all nodes help pass along messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

ADMINISTRATOR

A

A user that has complete control over a machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

ADVANCED ENCRYPTION STANDARD (AES)

A

The first and only public cipher that’s approved for use with top secret information by the United States National Security Agency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

ADVANCED GROUP POLICY MANAGEMENT (AGPM)

A

A set of add-on tools from Microsoft that gives some added provision control abilities in GPMC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

ADWARE

A

Software that displays advertisements and collects data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

ALIAS

A

A nickname for common commands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

ANALYSING LOGS

A

The practice of collecting logs from different network and sometimes client devices on your network, then performing an automated analysis on them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

ANDROID

A

A mobile operating system based on LINUX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

ANTIVIRUS SOFTWARE

A

It monitors and analyse things like new files being created or being modified on the system in order to watch for any behaviour that matches a known malware signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

ANYCAST

A

A technique that’s used to route traffic to different destinations depending on factors like location, congestion, or link health.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

APPENDING FLAGS

A

A way to add the data of the file without erasing existing data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

APPLICATION

A

A computer program designed for a specific use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

APPLICATION LAYER

A

The layer that allows network applications to communicate in a way they understand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

APPLICATION LAYER PAYLOAD

A

The entire contents of whatever data applications want to send to each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

APPLICATION SOFTWARE

A

Any software created to fulfil a specific need, like a text, editor ,web browser, or graphics editor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

APPLICATION POLICIES

A

Defines boundaries of what applications are permitted or not, but they also help teach how to use software more securely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

APP STORE APPS

A

A package manager that acts as a repository

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

APP STORE REPOSITORY

A

A app store service that also as a repository

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

APP STORES

A

A central managed marketplace for app developers to publish and sell mobile apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

ARCHIVE

A

An archive is cp,[rosed of one or more files that are compressed into a single file for verb agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

A RECORD

A

The most common resource record, used to point a certain domain name at a certain IPv4 IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

APPX

A

An APPX is another way to package contents of a file to act like a unit of distribution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

ARPANET

A

The earliest version of the Internet that we see today, created by the US government project DARPA in the 1960s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

ARP TABLE

A

A list of IP addresses and the MAC addresses associated with them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

ASii

A

the oldest character encoding the standard. It represents the English alphabet, digits, and punctuation marks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

ATTACK VECTOR

A

Method or mechanism by which an attacker or malware gains access to a network or system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

ASN

A

AUTONOMOUS SYSTEM NUMBER is a number assigned to an individual AUTONOMOUS SYSTEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

ASYMMETRIC DIGITAL SUBSCRIBER LINE (ADSL)

A

A device that establishes data connections across phone lines and different speeds for uploading and downloading data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

ATTACK

A

An actual attempt at causing harm to a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

ATA

A

The most common interface that hard drives use to connect to our system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

ASYMMETRIC ENCRYPTION

A

Systems where different keys are used to encrypt and decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

ATTACK SURFACE

A

It’s the sum of all the different attack vectors in a given system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

ATX

A

(ADVANCED TECHNOLOGY EXTENDED) the most common form factor for motherboards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

AUDITING

A

It involves reviewing records to ensure that nothing is out of the ordinary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

AUTHENTICATION

A

A crucial application for cryptographic hash functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

AUTHENICATION SERVER (AS)

A

It includes the user ID of the authenticating user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

AUTHORISATION

A

It describes to what the user account has access to or doesn’t have access to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

AUTOMATIC ALLOCATION

A

A range of IP addresses is set aside for assignment purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

ASSEMBLY LANGUAGE

A

A language that allowed computer scientists to use human readable instructions, assembled into code that the machines could understand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

AUTOMATION

A

It makes processes work automatically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

What is AUTOSCALING

A

A system that allows the service to increase or reduce capacity as needed, while the service owner only pays for the cost of the machines that are in use at any given time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

BACKDOOR

A

A way to get into a system if the other methods to get in a system aren’t allowed it’s a secret entryway for attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

BACKGROUND PROCESSES/DAEMON PROCESSES

A

Processes that run or take place in the background

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

AVAILABILITY

A

Means that the information we have is readily accessible to those people that should have it

70
Q

BACKUP & RESTORE

A

A Microsoft offer and first party solution that has modes of operation, as a file based version where files are backed up to a zip archive

71
Q

BACKWARD COMPATIBLE

A

It means older hardware works with newer hardware

72
Q

BAITING

A

An attack that happens through actual physical contact, enticing a victim to do something

73
Q

BASTION HOSTS OR NETWORKS

A

A server used to provide access to a private network from an external network

73
Q

BASH

A

The language used to interact with the shell

74
Q

BAUD RATE

A

A measurement of how many bits could be passed across a phone line in a second

75
Q

BINARY WHITELISTING SOFTWARE

A

It’s a list of known good and trusted software and only things that are on the list are permitted to run

76
Q

BIND

A

It is how clients authenticates to the server

77
Q

BIND OPERATION

A

The operation which authenticates clients to the directory server

78
Q

BIOMETRIC AUTHENTICATION

A

authentication that uses biometric data

79
Q

BIOMETRIC DATA

A

A way of protecting your accounts and information using biometric data such as facial recognition and fingerprint

80
Q

BIOS/UEFI

A

A low level software that initialises our computer’s hardware to make sure everything is good to go

81
Q

BIOS

A

(BASIC INPUT OUTPUT SERVICES) the BIOS is software that helps initialise the hardware computer’s hardware to make sure everything is good to go

82
Q

BIT

A

The smallest representation of data that a computer can understand

83
Q

BLOCK CIPHERS

A

The cipher takes data in, places that into a bucket or block of data that’s a fixed size, then encodes that entire block as one unit

83
Q

BLOCK DEVICES

A

A system that acts like USB drives and hard drive by transmitting data

84
Q

BLUETOOTH

A

The most common short range network

84
Q

BLOCK STORAGE

A

It improves faster handling of data because the data isn’t stored in one long piece but in blocks, so it can be accessed more quickly

85
Q

BOOT

A

to start up a computer

86
Q

BOOTLOADER

A

A small program that loads the operating system

87
Q

BORDER GATEWAY PROTOCOL (BGP)

A

A protocol by which routers share data with each other

88
Q

BOTNET

A

A collection of one or more Bots

89
Q

BOTS

A

machines comprised by malware that are utilised to perform tasks centrally controlled by an attacker

90
Q

BROADBAND

A

Any connectivity technology that isn’t dial-up internet

91
Q

BROADCAST

A

A type of Ethernet transmission, sent to every single device on a LAN

92
Q

BROADCAST ADDRESS

A

A special destination used by an Ethernet broadcast composed by all Fs

93
Q

BROWSER

A

A user interface for displaying and interacting with web pages

94
Q

BRUTE FORCE ATTACKS

A

A common password attack which consists of just continuously trying different combinations of characters and letters until one gets access

95
Q

BYOD

A

(BRING YOUR OWN DEVICE) refers to practise of allowing people to use their own personal devices for work

96
Q

CA

A

CERTIFICATION AUTHORITY It’s the entity that’s responsible for storing, issuing, and signing certificates. It’s a crucial component of the PKI system

97
Q

CABLE CATEGORIES

A

Groups of cables that are made with the same material. Most network cables used today can be split into two categories, copper and fiber

98
Q

CABLE MODEM

A

A device that sits at the edge of a consumer’s network and connects it to the cable modem termination system

99
Q

CABLE MODEM TERMINATION SYSTEM

A

Connects lots of different cable connections to an ISP’s core network

100
Q

CABLES

A

Insulated wires that connect different devices to each other allowing data to be transmitted over them

101
Q

CACHE

A

The assigned stored location for recently or frequently accessed data; on a mobile app it is where anything that was changed or created with that app is stored

102
Q

CACHING AND RECURSIVE NAME SERVERS

A

They are generally provided by an ISP or your local network, and their purpose is to store domain name lookups for a certain amount of time

103
Q

CAESAR CYPHER

A

A substitution alphabet, where you replace characters in the alphabet with others usually by shifting or rotating the alphabet, a set of numbers or characters

103
Q

what is CSMA/CD stand for and what is it use for?

A

CARRIER-SENSE MULTIPLE ACESS WITH COLLISION DETECTION

Is used to determine when the communications channels and when the device is free to transmit data

104
Q

CBC-MAC (Cipher block chaining message authentication codes)

A

A mechanism for building MACs using block ciphers

105
Q

central management

A

A central service that provides instructions to all the different parts of my IT infrastructure.

105
Q

CCMP (counter mode CBC-MAC protocol)

A

A mode of operation for block ciphers that allows for authenticated encryption

106
Q

Centralized logging

A

syntax analysing logs in one central location

107
Q

central repository:

A

It is needed to securely store and index keys and a certificate management system of some sort makes managing access to storage certificates and issuance of certificates easier

108
Q

Central Fingerprints

A

hash digests of the whole certificate and aren’t actually fields. Not in the certificate itself buat are computed by clients when validating or inspecting certificates

109
Q
A
109
Q
A
110
Q
A
111
Q
A
112
Q
A
113
Q
A
114
Q
A
115
Q
A
116
Q
A
117
Q
A
118
Q
A
119
Q
A
120
Q
A
121
Q
A
121
Q
A
122
Q
A
123
Q
A
124
Q
A
125
Q
A
126
Q
A
126
Q
A
127
Q
A
128
Q
A
129
Q
A
130
Q
A
131
Q
A
132
Q
A
133
Q
A
134
Q
A
134
Q
A
135
Q
A
136
Q
A
137
Q
A
138
Q
A
139
Q
A
140
Q
A
141
Q
A
142
Q
A
143
Q
A
144
Q
A
145
Q
A
146
Q
A
147
Q
A
148
Q
A
149
Q
A
150
Q
A
150
Q
A
150
Q
A
150
Q
A
150
Q
A
150
Q
A
150
Q
A
151
Q
A
151
Q
A
151
Q
A
151
Q
A
151
Q
A
152
Q
A
153
Q
A
154
Q
A
155
Q
A
156
Q
A
157
Q
A
158
Q
A
159
Q
A
160
Q
A
161
Q
A
162
Q
A