ITLC REVIEWER Flashcards
is an object that stores information on a computer. It can contain user data, in the case of a document file, or it can contain program code in the case of application files.
Files
include files responsible for system configuration, booting, device drivers, and core operating system functionalities.
System Files
include documents, images, videos, personal configuration, and application data specific to the user.
User Files
is a link or pointer to a program, file, or folder that is represented by a small icon, placed on the desktop.
Shortcuts
known as subfolders are organized and stored.
Folders
help protect files from unauthorized access, modification, or deletion
Windows OS Permissions
lets you browse and manage files and folders on your computer.
File Explorer
are combinations of keyboard keys that provide quick access to certain functions or commands in software, saving time and improving efficiency
Shortcut Keys
maintain organization in your file structure. Items can be stored in more than one location and can be moved to a different location.
Manage File And Folders
computer where deleted files are temporarily stored.
Recycle Bin
that provide information about a file, beyond just the data it contains
File Attributes
Files is the process of reducing the size of a file; it makes it easier to transfer files from one location to another.
File Compression and Extraction
It is also known as a screenshot, screen grab, or screen dump.
Screen Captures
It enables you to select specific areas of the screen, such as a freeform region or rectangular region.
The Snipping Tool
often does this professionally, working for a security organization or a system manufacturer. This is sometimes called an ethical hack.
White Hat
discovers and exposes security vulnerabilities for financial gain or for some malicious purpose.
Black Hat
is a type of attack that uses deception and trickery to convince
unsuspecting users to provide sensitive data or to violate security guidelines.
Social Engineering Attacks
This is a human-based attack where the goal is to look over the shoulder of an individual as he or she enters password information or a PIN.
Shoulder Surfing
attackers are not above jumping into a dumpster or large recycling location in an attempt to obtain information they can use or sell.
Dumpster Diving
attack in which the attacker attempts to obtain and make use of
passwords illegitimately
Password Cracking
The items most often stolen are portable devices such as laptops, tablets, and smartphones. The pieces of hardware often have highly valuable data on them.
Theft
standard communication for mobile devices, such as smartphones and tablets that are in very close proximity, usually when touching or being only a few inches apart from each other.
Near Field Communication (NFC)
is a network security measure in which a computer user or some other network component
Authentication
that requires validation of two or more authentication factors.
Multi-Factor Authentication
to provide users with one-time authentication to multiple resources, servers, or sites.
Single Sign-in
is a text file that is created by a website and then placed on a computer’s hard drive to store information that is used to identify users and possibly to prepare customized web pages for them
Cookies
is a local storage area that holds the files saved by a browser to decrease the time it takes to reload a web page.
Internet Cache
enables the browser to process specific types of content
Plug-ins
adds additional features to the browser and becomes part of the browser application.
Extensions
is an electronic document that provides for the secure exchange of information over a network
Digital Certificates
when you attempt to access a site, you might receive a warning that the digital certificate is invalid
Invalid Certificate
is any information that can be used to determine who a person is
Personal Identifying Information (PII)
avoid using the autofill feature of web browsers
Automated Forms