ITLC REVIEWER Flashcards

1
Q

is an object that stores information on a computer. It can contain user data, in the case of a document file, or it can contain program code in the case of application files.

A

Files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

include files responsible for system configuration, booting, device drivers, and core operating system functionalities.

A

System Files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

include documents, images, videos, personal configuration, and application data specific to the user.

A

User Files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

is a link or pointer to a program, file, or folder that is represented by a small icon, placed on the desktop.

A

Shortcuts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

known as subfolders are organized and stored.

A

Folders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

help protect files from unauthorized access, modification, or deletion

A

Windows OS Permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

lets you browse and manage files and folders on your computer.

A

File Explorer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

are combinations of keyboard keys that provide quick access to certain functions or commands in software, saving time and improving efficiency

A

Shortcut Keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

maintain organization in your file structure. Items can be stored in more than one location and can be moved to a different location.

A

Manage File And Folders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

computer where deleted files are temporarily stored.

A

Recycle Bin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

that provide information about a file, beyond just the data it contains

A

File Attributes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Files is the process of reducing the size of a file; it makes it easier to transfer files from one location to another.

A

File Compression and Extraction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

It is also known as a screenshot, screen grab, or screen dump.

A

Screen Captures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

It enables you to select specific areas of the screen, such as a freeform region or rectangular region.

A

The Snipping Tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

often does this professionally, working for a security organization or a system manufacturer. This is sometimes called an ethical hack.

A

White Hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

discovers and exposes security vulnerabilities for financial gain or for some malicious purpose.

A

Black Hat

17
Q

is a type of attack that uses deception and trickery to convince
unsuspecting users to provide sensitive data or to violate security guidelines.

A

Social Engineering Attacks

18
Q

This is a human-based attack where the goal is to look over the shoulder of an individual as he or she enters password information or a PIN.

A

Shoulder Surfing

19
Q

attackers are not above jumping into a dumpster or large recycling location in an attempt to obtain information they can use or sell.

A

Dumpster Diving

20
Q

attack in which the attacker attempts to obtain and make use of
passwords illegitimately

A

Password Cracking

21
Q

The items most often stolen are portable devices such as laptops, tablets, and smartphones. The pieces of hardware often have highly valuable data on them.

A

Theft

22
Q

standard communication for mobile devices, such as smartphones and tablets that are in very close proximity, usually when touching or being only a few inches apart from each other.

A

Near Field Communication (NFC)

23
Q

is a network security measure in which a computer user or some other network component

A

Authentication

24
Q

that requires validation of two or more authentication factors.

A

Multi-Factor Authentication

25
Q

to provide users with one-time authentication to multiple resources, servers, or sites.

A

Single Sign-in

26
Q

is a text file that is created by a website and then placed on a computer’s hard drive to store information that is used to identify users and possibly to prepare customized web pages for them

A

Cookies

27
Q

is a local storage area that holds the files saved by a browser to decrease the time it takes to reload a web page.

A

Internet Cache

28
Q

enables the browser to process specific types of content

A

Plug-ins

29
Q

adds additional features to the browser and becomes part of the browser application.

A

Extensions

30
Q

is an electronic document that provides for the secure exchange of information over a network

A

Digital Certificates

31
Q

when you attempt to access a site, you might receive a warning that the digital certificate is invalid

A

Invalid Certificate

32
Q

is any information that can be used to determine who a person is

A

Personal Identifying Information (PII)

33
Q

avoid using the autofill feature of web browsers

A

Automated Forms