IT support glossary Flashcards

learn terminology

1
Q

What is ABSTRACTION?

A

To take a relatively complex system and simplify it for our use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an ALGORITHYM?

A

A series of steps that solves specific problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is ACII, why is it important?

A

The oldest character encoding standard used, representing the English alphabet, digits, and punctuation marks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a BINARY SYSTEM?

A

The communication that a computer uses, also known as the “base-2” numeral system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the term BYTE mean, why is it crucial in encoding?

A

A group of 8 BITS.
Character encoding: Used to assign binary values to characters so that we as humans can read them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does a COMPUTER do and mean, in IT?

A

A device that stores and processes data by performing calculations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is CRYPTOGRAPHY?

A

The practice of coding and hiding messages from third parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a DECIMAL FORM BASE 10 SYSTEM?

A

In the decimal system, there are 10 possible numbers ranging from zero to nine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the Digital Divide?

A

The growing skills gap between people with and without digital literacy skills.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is INFORMATION TECHNOLOGY?

A

The use of digital technology, like computers and the internet, to store and process data into useful information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is LINUX OS?

A

One of the largest open-source operating systems used heavily in business infrastructure and the consumer space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are LOGIC GATES?

A

Allow transistors to perform more complex tasks, like deciding where to send electrical signals depending on logical conditions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does OPEN SOURCE mean?

A

Developers share, modify, and distribute their software for free.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does PDA stand for

A

PDA (Personal Digital Assistant): Allows computing to go mobile.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

404 NOT FOUND

A

An error message you might see on websites that have been moved or deleted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

802.1X

A

It is the IEEE standard for encapsulating EAP or Extensible Authentication Protocol traffic over the 802 networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

802.1X with EAP-TLS

A

Offers arguably the best security available, assuming proper and secure handling of the PKI aspects of it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

AAA (authentication, authorisation, accounting)

A

The services that the directory services provide to all the computers within a company or organisation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

ABSOLUTE PATH

A

It is one that starts from the main directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

ACCESS CONTROL ENTRIES

A

The individual access permissions per object that make up the ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ACCESS CONTROL LIST (ACL)

A

It is a way of defining permissions or authorizations for objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

ACCOUNTING

A

Keeping records of what resources and services your users access or what they did when they were using your systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

ACL

A

Access control lists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

ACK FLAG

A

One of the TCP control flags.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is ACK short for?
Acknowledge. A value of one in this field means that the acknowledgment number field should be examined.
26
ACKNOWLEDGEMENT NUMBER
The number of the next expected segment in a TCP sequence
27
ACTIVATION THRESHOLD
Triggers a pre-configured action when it is reached and will typically block the identified attack traffic for a specific amount of time
28
ACTIVE DIRECTORY USERS AND COMPUTERS (ADUC)
The client tools that are used for accessing and administering a directory server
29
ADDRESS BUS
Connects the CPU to the MCC and sends over the location of the data, but not the data itself.
30
ADDRESS RESOLUTION PROTOCOL (ARP)
A protocol used to discover the hardware address of a node with a certain IP address
30
ADDRESS CLASS SYSTEM
A system which defines how the global IP address space is split up.
31
AD-HOC NETWORK
A network configuration without supporting network infrastructure. Every device involved with THE NETWORK communicates with every other device within range, and all nodes help pass along messages
32
ADMINISTRATOR
A user that has complete control over a machine
33
ADVANCED ENCRYPTION STANDARD (AES)
The first and only public cipher that's approved for use with top secret information by the United States National Security Agency
34
ADVANCED GROUP POLICY MANAGEMENT (AGPM)
A set of add-on tools from Microsoft that gives some added provision control abilities in GPMC
35
ADWARE
Software that displays advertisements and collects data
36
ALIAS
A nickname for common commands
37
ANALYSING LOGS
The practice of collecting logs from different network and sometimes client devices on your network, then performing an automated analysis on them
38
ANDROID
A mobile operating system based on LINUX
39
ANTIVIRUS SOFTWARE
It monitors and analyse things like new files being created or being modified on the system in order to watch for any behaviour that matches a known malware signature
40
ANYCAST
A technique that's used to route traffic to different destinations depending on factors like location, congestion, or link health.
41
APPENDING FLAGS
A way to add the data of the file without erasing existing data
42
APPLICATION
A computer program designed for a specific use
43
APPLICATION LAYER
The layer that allows network applications to communicate in a way they understand
44
APPLICATION LAYER PAYLOAD
The entire contents of whatever data applications want to send to each other
45
APPLICATION SOFTWARE
Any software created to fulfil a specific need, like a text, editor ,web browser, or graphics editor
46
APPLICATION POLICIES
Defines boundaries of what applications are permitted or not, but they also help teach how to use software more securely
47
APP STORE APPS
A package manager that acts as a repository
48
APP STORE REPOSITORY
A app store service that also as a repository
48
APP STORES
A central managed marketplace for app developers to publish and sell mobile apps
49
ARCHIVE
An archive is cp,[rosed of one or more files that are compressed into a single file for verb agreement
50
A RECORD
The most common resource record, used to point a certain domain name at a certain IPv4 IP address
51
APPX
An APPX is another way to package contents of a file to act like a unit of distribution
52
ARPANET
The earliest version of the Internet that we see today, created by the US government project DARPA in the 1960s
53
ARP TABLE
A list of IP addresses and the MAC addresses associated with them
54
ASii
the oldest character encoding the standard. It represents the English alphabet, digits, and punctuation marks
55
ATTACK VECTOR
Method or mechanism by which an attacker or malware gains access to a network or system
55
ASN
AUTONOMOUS SYSTEM NUMBER is a number assigned to an individual AUTONOMOUS SYSTEM
56
ASYMMETRIC DIGITAL SUBSCRIBER LINE (ADSL)
A device that establishes data connections across phone lines and different speeds for uploading and downloading data
57
ATTACK
An actual attempt at causing harm to a system
58
ATA
The most common interface that hard drives use to connect to our system
58
ASYMMETRIC ENCRYPTION
Systems where different keys are used to encrypt and decrypt
59
ATTACK SURFACE
It's the sum of all the different attack vectors in a given system
59
ATX
(ADVANCED TECHNOLOGY EXTENDED) the most common form factor for motherboards
60
AUDITING
It involves reviewing records to ensure that nothing is out of the ordinary
61
AUTHENTICATION
A crucial application for cryptographic hash functions
62
AUTHENICATION SERVER (AS)
It includes the user ID of the authenticating user
63
AUTHORISATION
It describes to what the user account has access to or doesn't have access to
64
AUTOMATIC ALLOCATION
A range of IP addresses is set aside for assignment purposes
65
ASSEMBLY LANGUAGE
A language that allowed computer scientists to use human readable instructions, assembled into code that the machines could understand
66
AUTOMATION
It makes processes work automatically
67
What is AUTOSCALING
A system that allows the service to increase or reduce capacity as needed, while the service owner only pays for the cost of the machines that are in use at any given time
68
BACKDOOR
A way to get into a system if the other methods to get in a system aren't allowed it's a secret entryway for attackers
69
BACKGROUND PROCESSES/DAEMON PROCESSES
Processes that run or take place in the background
69
AVAILABILITY
Means that the information we have is readily accessible to those people that should have it
70
BACKUP & RESTORE
A Microsoft offer and first party solution that has modes of operation, as a file based version where files are backed up to a zip archive
71
BACKWARD COMPATIBLE
It means older hardware works with newer hardware
72
BAITING
An attack that happens through actual physical contact, enticing a victim to do something
73
BASTION HOSTS OR NETWORKS
A server used to provide access to a private network from an external network
73
BASH
The language used to interact with the shell
74
BAUD RATE
A measurement of how many bits could be passed across a phone line in a second
75
BINARY WHITELISTING SOFTWARE
It's a list of known good and trusted software and only things that are on the list are permitted to run
76
BIND
It is how clients authenticates to the server
77
BIND OPERATION
The operation which authenticates clients to the directory server
78
BIOMETRIC AUTHENTICATION
authentication that uses biometric data
79
BIOMETRIC DATA
A way of protecting your accounts and information using biometric data such as facial recognition and fingerprint
80
BIOS/UEFI
A low level software that initialises our computer's hardware to make sure everything is good to go
81
BIOS
(BASIC INPUT OUTPUT SERVICES) the BIOS is software that helps initialise the hardware computer's hardware to make sure everything is good to go
82
BIT
The smallest representation of data that a computer can understand
83
BLOCK CIPHERS
The cipher takes data in, places that into a bucket or block of data that's a fixed size, then encodes that entire block as one unit
83
BLOCK DEVICES
A system that acts like USB drives and hard drive by transmitting data
84
BLUETOOTH
The most common short range network
84
BLOCK STORAGE
It improves faster handling of data because the data isn't stored in one long piece but in blocks, so it can be accessed more quickly
85
BOOT
to start up a computer
86
BOOTLOADER
A small program that loads the operating system
87
BORDER GATEWAY PROTOCOL (BGP)
A protocol by which routers share data with each other
88
BOTNET
A collection of one or more Bots
89
BOTS
machines comprised by malware that are utilised to perform tasks centrally controlled by an attacker
90
BROADBAND
Any connectivity technology that isn't dial-up internet
91
BROADCAST
A type of Ethernet transmission, sent to every single device on a LAN
92
BROADCAST ADDRESS
A special destination used by an Ethernet broadcast composed by all Fs
93
BROWSER
A user interface for displaying and interacting with web pages
94
BRUTE FORCE ATTACKS
A common password attack which consists of just continuously trying different combinations of characters and letters until one gets access
95
BYOD
(BRING YOUR OWN DEVICE) refers to practise of allowing people to use their own personal devices for work
96
CA
CERTIFICATION AUTHORITY It's the entity that's responsible for storing, issuing, and signing certificates. It's a crucial component of the PKI system
97
CABLE CATEGORIES
Groups of cables that are made with the same material. Most network cables used today can be split into two categories, copper and fiber
98
CABLE MODEM
A device that sits at the edge of a consumer's network and connects it to the cable modem termination system
99
CABLE MODEM TERMINATION SYSTEM
Connects lots of different cable connections to an ISP's core network
100
CABLES
Insulated wires that connect different devices to each other allowing data to be transmitted over them
101
CACHE
The assigned stored location for recently or frequently accessed data; on a mobile app it is where anything that was changed or created with that app is stored
102
CACHING AND RECURSIVE NAME SERVERS
They are generally provided by an ISP or your local network, and their purpose is to store domain name lookups for a certain amount of time
103
CAESAR CYPHER
A substitution alphabet, where you replace characters in the alphabet with others usually by shifting or rotating the alphabet, a set of numbers or characters
103
what is CSMA/CD stand for and what is it use for?
CARRIER-SENSE MULTIPLE ACESS WITH COLLISION DETECTION Is used to determine when the communications channels and when the device is free to transmit data
104
CBC-MAC (Cipher block chaining message authentication codes)
A mechanism for building MACs using block ciphers
105
central management
A central service that provides instructions to all the different parts of my IT infrastructure.
105
CCMP (counter mode CBC-MAC protocol)
A mode of operation for block ciphers that allows for authenticated encryption
106
Centralized logging
syntax analysing logs in one central location
107
central repository:
It is needed to securely store and index keys and a certificate management system of some sort makes managing access to storage certificates and issuance of certificates easier
108
Central Fingerprints
hash digests of the whole certificate and aren't actually fields. Not in the certificate itself buat are computed by clients when validating or inspecting certificates
109
109
110
111
112
113
114
115
116
117
118
119
120
121
121
122
123
124
125
126
126
127
128
129
130
131
132
133
134
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
150
150
150
150
150
150
151
151
151
151
151
152
153
154
155
156
157
158
159
160
161
162