M-Z Flashcards

IT Support Certificate glossary M-Z

1
Q

MAC(Media Access Control) address:

A

MAC(Media Access Control) address: A globally unique identifier attached to an individual network interface. It’s a 48-bit number normally represented by six groupings of two hexadecimal numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

MAC address:

A

MAC address: A globally unique identifier attached to an individual network interface. It’s a 48-bit number normally represented by six groupings of two hexadecimal numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

MAC filtering:

A

MAC filtering: Access points are configured to only allow for connections from a specific set of MAC addresses belonging to devices you trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Mac OS:

A

Mac OS: Apple’s operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MACs (Message Authentication Codes):

A

MACs (Message Authentication Codes): A bit of information that allows authentication of a received message, ensuring that the message came from the alleged sender and not a third party masquerading as them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Maintenance:

A

Maintenance: Where software is updated and hardware issues are fixed if, and when, they occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Malware:

A

Malware: A type of malicious software that can be used to obtain your sensitive information or delete or modify files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Manifest:

A

Manifest: A library used if an application needs to use a shared library

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Master boot record (MBR):

A

Master boot record (MBR): a traditional partition table within a storage disk that lets you have volume sizes of 2 terabytes or less and is mostly used in the Windows OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Master file table (MFT):

A

Master file table (MFT): A way NTFS stores and represents the files you?re working with on your operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Mb/s:

A

Mb/s: megabit per second, which is a unit of data transfer rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

MD5:

A

MD5: A popular and widely used hash function designed in the early 1990s as a cryptographic hashing function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

MDM policy:

A

MDM policy: The profiles that contains settings for the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

MDM profile:

A

MDM profile: The policies that contains settings for the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Meddler in the middle (formerly known as Man in the Middle):

A

Meddler in the middle (formerly known as Man in the Middle): An attack that places the attacker in the middle of two hosts that think they’re communicating directly with each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Memory controller chip (MCC):

A

Memory controller chip (MCC): A bridge between the CPU and the RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Memory management:

A

Memory management: One of the functions that a kernel performs; it optimizes memory usage and make sure our applications have enough memory to run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Memory manager:

A

Memory manager: A Windows OS program that helps manage virtual memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Memory usage:

A

Memory usage: The amount of memory available in your system as well as what memory is currently being used by other applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Mesh networks:

A

Mesh networks: Like ad-hoc networks, lots of devices communicate with each other device, forming a mesh if you were to draw lines for all the links between all the nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Metadata:

A

Metadata: Tells us everything we need to know about a file, including who created it, when it was last modified, who has access to it, and what type of file it is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Metered connection:

A

Metered connection: An internet connection where all data transfer usage is tracked. Cell phone plans that have a limit on data usage per month or that charge based on usage are examples of metered connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

MIC (Message Integrity Check):

A

MIC (Message Integrity Check): It is essentially a hash digest of the message in question

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Micro display port:

A

Micro display port: One of the standard power, data and display connector types used in mobile devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Micro HDMI:

A

Micro HDMI: One of the standard power, data and display connector types used in mobile devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Microsoft Install Package(.msi) and MSI files:

A

Microsoft Install Package(.msi) and MSI files: Microsoft Install Package is a file extension used to guide a program called Windows Installer in the installation, maintenance, and removal of programs of the windows operating systems. MSI files are a combination of of databases that contain installation instructions in different tables along with all the files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Microsoft Terminal Services Client:

A

Microsoft Terminal Services Client: A client program used to create RDP connections to remote computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Micro USB:

A

Micro USB: One of the standard power, data and display connector types used in mobile devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Mini HDMI:

A

Mini HDMI: One of the standard power, data and display connector types used in mobile devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Mini USB:

A

Mini USB: One of the standard power, data and display connector types used in mobile devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Mobile applications:

A

Mobile applications: Software that is distributed on mobile OS devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Mobile device management:

A

Mobile device management: A system used to apply and enforce rules about how the device has to be configured and used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Modify:

A

Modify: An umbrella permission that includes read and execute and write

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Modulation:

A

Modulation: A way of varying the voltage of a constant electrical charge moving across a standard copper network cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Monitor mode:

A

Monitor mode: It allows to scan across channels to see all wireless traffic being sent by APs and clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Motherboard:

A

Motherboard: The body or circulatory system of the computer that connects all the pieces together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Mounting:

A

Mounting: Making a file or hard disk accessible to the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Multicast

A

Multicast: A way of addressing groups of hosts all at once

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Multicast frame:

A

Multicast frame: If the least significant bit in the first octet of a destination address is set to one, it means you’re dealing with a multicast frame. A multicast frame is similarly set to all devices on the local network signal, and it will be accepted or discarded by each device depending on criteria aside from their own hardware MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Multifactor authentication (MFA):

A

Multifactor authentication (MFA): A system where users are authenticated by presenting multiple pieces of information or objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Multilingual user interface:

A

Multilingual user interface: Interface that offers and support different languages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Multiplexing:

A

Multiplexing: It means that nodes on the network have the ability to direct traffic toward many different receiving services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

MX record:

A

MX record: It stands for mail exchange and this resource record is used in order to deliver email to the correct server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Name resolution:

A

Name resolution: This process of using DNS to turn a domain name into an IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

NAS device:

A

NAS device: A network attached storage device that has hard drives to automatically create backups and store data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Network:

A

Network: The interconnection of computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Network Address Translation (NAT):

A

Network Address Translation (NAT): A mitigation tool that lets organizations use one public IP address and many private IP addresses within the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Network Address Translation (NAT):

A

Network Address Translation (NAT): A mitigation tool that lets organizations use one public IP address and many private IP addresses within the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Network file system:

A

Network file system: A protocol that enables files to be shared over a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Network hardening:

A

Network hardening: Is the process of securing a network by reducing its potential vulnerabilities through configuration changes, and taking specific steps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Networking:

A

Networking: Managing, building and designing networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Networking protocols:

A

Networking protocols: A set of rules for how we transfer data in a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Network layer:

A

Network layer: It’s the layer that allows different networks to communicate with each other through devices known as routers. It is responsible for getting data delivered across a collection of networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Network port:

A

Network port: The physical connector to be able to connect a device to the network. This may be attached directly to a device on a computer network, or could also be located on a wall or on a patch panel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Network separation (network segmentation):

A

Network separation (network segmentation): A good security principle for an IT support specialists to implement. It permits more flexible management of the network, and provides some security benefits. This is the concept of using VLANs to create virtual networks for different device classes or types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Network software hardening

A

Network software hardening: Includes things like firewalls, proxies, and VPNs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Network stack:

A

Network stack: A set of hardware or software that provides the infrastructure for a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Network switch:

A

Network switch: It is a level 2 or data link device that can connect to many devices so they can communicate. It can inspect the contents of the Ethernet protocol data being sent around the network, determine which system the data is intended for and then only send that data to that one system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Network time protocol (NTP):

A

Network time protocol (NTP): A network protocol used to synchronize the time between the authenticator token and the authentication server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Next header field:

A

Next header field: Defines what kind of header is immediately after this current one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Next hop:

A

Next hop: The IP address of the next router that should receive data intended for the destination networking question or this could just state the network is directly connected and that there aren’t any additional hops needed. Defined as part of the routing table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

NIST:

A

NIST: National Institute of Standards and Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Node:

A

Node: Any device connected to a network. On most networks, each node will typically act as a server or a client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Non-metered connection:

A

Non-metered connection: A connection where your data usage is not tracked or limited, instead you are charged a flat fee for unlimited and unrestricted usage. A Wi-Fi connection is an example of a non-metered connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Non-routable address space:

A

Non-routable address space: They are ranges of IPs set aside for use by anyone that cannot be routed to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Normalization:

A

Normalization: It’s the process of taking log data in different formats and converting it into a standardized format that’s consistent with a defined log structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Northbridge:

A

Northbridge: interconnects stuff like RAM and video cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

NS record:

A

NS record: It indicates other name servers that may also be responsible for a particular zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

NTP:

A

NTP: Network Time Protocol, keeping clocks synchronized on machines connected to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

NTP servers

A

NTP servers: Used to keep all computers on a network synchronized in time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

NVMe (NVM Express):

A

NVMe (NVM Express): interface standard which allows greater throughput of data and increased efficiency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

OAuth:

A

OAuth: An open standard that allows users to grant third-party websites and applications access to their information without sharing account credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Octet:

A

Octet: Any number that can be represented by 8 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

One-time password (OTP):

A

One-time password (OTP): A short-lived token, typically a number that’s entered along with a username and password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

One-time password (OTP) tokens

A

One-time password (OTP) tokens: Another very common method for handling multifactor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

One-way cryptographic hash:

A

One-way cryptographic hash: The method used by AD to store passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

OpenID:

A

OpenID: An open standard that allows participating sites known as Relying Parties to allow authentication of users utilizing a third party authentication service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

OpenLDAP (lightweight directory access protocol):

A

OpenLDAP (lightweight directory access protocol): An open source and free directory service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Open source:

A

Open source: This means the developers will let other developers share, modify, and distribute their software for free

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Open SSH:

A

Open SSH: The most popular program to use SSH within Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Operating system:

A

Operating system: The whole package that manages our computers resources and lets us interact with it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Optical Network Terminator:

A

Optical Network Terminator: Converts data from protocols the fiber network can understand to those that are more traditional twisted pair copper networks can understand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Options field:

A

Options field: It is sometimes used for more complicated flow control protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Organizationally Unique Identifier (OUI):

A

Organizationally Unique Identifier (OUI): The first three octets of a MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Organizational units (OU):

A

Organizational units (OU): A hierarchical model of objects and containers that can contain objects or more organizational units

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Organizational units (OUs):

A

Organizational units (OUs): Folders that let us group related objects into units like people or groups to distinguish between individual user accounts and groups that accounts can belong to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

OSI model:

A

OSI model: A model used to define how network devices communicate. This model has seven layers that stack on top of each other: Physical, Data Link, Network, Transport, Session, Presentation, and Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

OTA update:

A

OTA update: A type of update that is installed by the mobile device itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Overclocking:

A

Overclocking: it increases the rate of your CPU clock cycles in order to perform more tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Packaged archives:

A

Packaged archives: The core or source software files that are compressed into one file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Packaged managers:

A

Packaged managers: An application that makes package installation and removal easier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Packet sniffing (packet capture):

A

Packet sniffing (packet capture): the process of intercepting network packets in their entirety for analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Padding field:

A

Padding field: A series of zeros used to ensure the header is the correct total size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Pairing:

A

Pairing: When a wireless peripheral connects to a mobile device, and the two devices exchange information, sometimes including a PIN or password, so that they can remember each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Pairwise Transient Key (PTK):

A

Pairwise Transient Key (PTK): It is generated using the PMK, AP nonce, Client nonce, AP MAC address, and Client MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Parameter:

A

Parameter: A value that is associated with a command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Parent directory & child directories:

A

Parent directory & child directories: A parent directory is a directory that houses all subsequent child directories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Parent group:

A

Parent group: Groups that are principal groups and contain other groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Partition:

A

Partition: A logical division of a hard disk that is treated as a separate unit by operating systems and file systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Partition table:

A

Partition table: How the disk is partitioned on an OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Password attacks:

A

Password attacks: Utilize software like password crackers that try and guess your password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Password salt:

A

Password salt: Additional randomized data that’s added into the hashing function to generate the hash that’s unique to the password and salt combination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Patch panel:

A

Patch panel: A device containing many physical network ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Paths:

A

Paths: A main directory that branches off and holds other directories and files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Payload:

A

Payload: The actual data being transported, which is everything that isn’t a header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

Payload length field:

A

Payload length field: 16-bit field that defines how long the data payload section of the datagram is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

PBKDF2 (Password Based Key Derivation Function 2):

A

PBKDF2 (Password Based Key Derivation Function 2): Password Based Key Derivation Function 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

PC:

A

PC: Personal computer, which technically means a computer that one person uses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

PCI DSS:

A

PCI DSS: Payment Card Industry Data Security Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

PCI Express:

A

PCI Express: Peripheral Component Interconnect Express

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

PDA (Personal Digital Assistant):

A

PDA (Personal Digital Assistant): Allows computing to go mobile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Penetration testing:

A

Penetration testing: The practice of attempting to break into a system or network to verify the systems in place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

Peripherals:

A

Peripherals: the external devices which we connect to our computer that add functionality, like: a mouse, a keyboard, and a monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

Permission denied:

A

Permission denied: An error message you might find when accessing a protected file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Personal package archives:

A

Personal package archives: A software repository for uploading source packages to be built and published

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

PGP (Pretty Good Privacy) encryption:

A

PGP (Pretty Good Privacy) encryption: An encryption application that allows authentication of data along with privacy from third parties relying upon asymmetric encryption to achieve this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

Phishing attack:

A

Phishing attack: It usually occurs when a malicious email is sent to a victim disguised as something legitimate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

PHPLDAPadmin:

A

PHPLDAPadmin: A tool to manage OpenLDAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

Physical layer:

A

Physical layer: It represents the physical devices that interconnect computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

Physical tokens:

A

Physical tokens: They take a few different forms, such as a USB device with a secret token on it, a standalone device which generates a token, or even a simple key used with a traditional lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

PIN authentication method:

A

PIN authentication method: It uses PINs that are eight-digits long, but the last digit is a checksum that’s computed from the first seven digits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

Ping flood:

A

Ping flood: It sends tons of ping packets to a system. If a computer can’t keep up with this, then it’s prone to being overwhelmed and taken down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

Pin Grid Array (PGA):

A

Pin Grid Array (PGA): CPU socket where the pins are located on the processor itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

PKI system:

A

PKI system: A system that defines the creation, storage and distribution of digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

Platform as a service:

A

Platform as a service: A subset of cloud computing where a platform is provided for customers to run their services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

Platform key:

A

Platform key: It’s the public key corresponding to the private key used to sign the boot files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

Platform services:

A

Platform services: A platform for developers to completely build and deploy software applications, without having to deal with OS maintenance, server hardware, networking or other services that are needed to use the platform tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

Plink (PuTTY Link):

A

Plink (PuTTY Link): A tool built into the command line after PuTTY is installed that is used to make remote SSH connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

Pointer resource record:

A

Pointer resource record: It resolves an IP to a name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

Point-To-Point VPN:

A

Point-To-Point VPN: Establishes a VPN tunnel between two sites but VPN tunneling logic is handled by network devices at either side, so that users don’t all have to establish their own connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

Policies:

A

Policies: Settings that are reapplied every few minutes, and aren?t meant to be changed even by the local administrators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

Port:

A

Port: It is a 16-bit number that’s used to direct traffic to specific services running on a networked computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

Portable Executable (PE) format:

A

Portable Executable (PE) format: Windows unique version of .exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

Port forwarding:

A

Port forwarding: A technique where specific destination ports can be configured to always be delivered to specific nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

Port mirroring:

A

Port mirroring: Allows the switch to take all packets from a specified port, port range, or the entire VLAN and mirror the packets to a specified switch port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

Port preservation

A

Port preservation: A technique where the source port chosen by a client, is the same port used by the router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

Ports:

A

Ports: Connection points that we can connect devices to that extend the functionality of our computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

POST (Power On Self Test):

A

POST (Power On Self Test): It figures out what hardware is on the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

Post-fail analysis:

A

Post-fail analysis: Investigating how a compromise happened after the breach is detected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

Post mortem:

A

Post mortem: A way for you to document any problems you discovered along the when recovering data, and the ways you fixed them so you can make sure they don’t happen again

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

Powershell:

A

Powershell: A shell (program that interprets text commands) for Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

Power supply:

A

Power supply: Converts electricity from our wall outlet onto a format that our computer can use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

Power user:

A

Power user: Above average computer users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

Preamble:

A

Preamble: The first part of an Ethernet frame, it is 8 bytes or 64 bits long and can itself be split into two sections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

Precedence:

A

Precedence: When computers are processing the Group Policy Objects that apply to them, all of these policies will be applied in a specific order based on a set of precedents rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

Presentation layer:

A

Presentation layer: It is responsible for making sure that the unencapsulated application layer data is actually able to be understood by the application in question

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

Pre-shared key:

A

Pre-shared key: It’s the Wi-Fi password you share with people when they come over and want to use your wireless network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

Preventative measures:

A

Preventative measures: Any procedures or systems in place that will proactively minimize the impact of a disaster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

Primary account:

A

Primary account: The initial account you made during setup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

Principle of least privilege:

A

Principle of least privilege: Helps to ensure that sensitive data is only accessed by people who are authorized to access it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

Privacy policies:

A

Privacy policies: Oversees the access and use of sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

Private cloud:

A

Private cloud: When a company owns the services and the rest of the cloud infrastructure, whether on-site or in a remote data center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

Processes:

A

Processes: Help the computer run programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

Process Explorer:

A

Process Explorer: A utility Microsoft created to let IT support specialists and system administrators look at running processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

Process ID:

A

Process ID: Unique identifier for processes on your computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

Process management:

A

Process management: The capacity to manage the many programs in a system - when to run them, the order they run in, how many resources they take up, how long they run, et cetera

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

Process monitoring:

A

Process monitoring: A way of monitoring what processes are happening during installation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q

Process scheduler:

A

Process scheduler: The part of the kernel that makes multitasking possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

Procurement:

A

Procurement: Hardware is purchased or reused for an employee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q

Production:

A

Production: The parts of the infrastructure where certain services are executed and serve to its users production

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

Programming:

A

Programming: Coding in a programming language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
162
Q

Programming language:

A

Programming language: Special languages that software developers use to write instructions for computers to execute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
163
Q

Programs: ,

A

Programs: Basic instructions that tell the computer what to do, The applications that we can run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
164
Q

Promiscuous mode:

A

Promiscuous mode: A type of computer networking operational mode in which all network data packets can be accessed and viewed by all network adapters operating in this mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
165
Q

Prompt:

A

Prompt: A prompt shows you which directory you?re currently in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
166
Q

Protocol:

A

Protocol: A defined set of standards that computers must follow in order to communicate properly is called a protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
167
Q

Protocol field:

A

Protocol field: A protocol field is an 8-bit field that contains data about what transport layer protocol is being used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
168
Q

Proxy:

A

Proxy: Can be useful to protect client devices and their traffic. They also provide secure remote access without using a VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
169
Q

Proxy server:

A

Proxy server: An intermediary between a company’s network and the Internet, receiving network traffic and relaying that information to the company network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
170
Q

Proxy service

A

Proxy service: A server that acts on behalf of a client in order to access another service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
171
Q

Pseudo-random:

A

Pseudo-random: Something that isn’t truly random

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
172
Q

PSH flag:

A

PSH flag: One of the TCP control flags. PSH is short for push. This flag means that the transmitting device wants the receiving device to push currently- buffered data to the application on the receiving end as soon as possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
173
Q

Public cloud:

A

Public cloud: The cloud services provided by a third party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
174
Q

Public cloud:

A

Public cloud: The cloud services provided by a third party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
175
Q

Public DNS servers

A

Public DNS servers: Name servers specifically set up so that anyone can use them for free

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
176
Q

Public key authentication:

A

Public key authentication: A key pair is generated by the user who wants to authenticate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
177
Q

Public key signatures:

A

Public key signatures: Digital signature generated by composing the message and combining it with the private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
178
Q

Punch cards:

A

Punch cards: A sequence of cards with holes in them to automatically perform calculations instead of manually entering them by hand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
179
Q

Quad A (AAAA) record:

A

Quad A (AAAA) record: It is very similar to an A record except that it returns in IPv6 address instead of an IPv4 address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
180
Q

Qwiklabs:

A

Qwiklabs: An online platform which provides training in cloud services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
181
Q

RA (Registration Authority):

A

RA (Registration Authority): It is responsible for verifying the identities of any entities requesting certificates to be signed and stored with the CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
182
Q

RAID (redundant array of independent disks):

A

RAID (redundant array of independent disks): A method of taking multiple physical disks and combining them into one large virtual disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
183
Q

Rainbow table attacks:

A

Rainbow table attacks: To trade computational power for disk space by pre-computing the hashes and storing them in a table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
184
Q

Rainbow tables:

A

Rainbow tables: A pre-computed table of all possible password values and their corresponding hashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
185
Q

RAM:

A

RAM: Random Access Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
186
Q

Random numbers:

A

Random numbers: A very important concept in encryption because it avoids some kind of pattern that an adversary can discover through close observation and analysis of encrypted messages over time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
187
Q

Ransomware:

A

Ransomware: A type of attack that holds your data or system hostage until you pay some sort of ransom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
188
Q

RC4 (Rivest Cipher 4):

A

RC4 (Rivest Cipher 4): Asymmetric stream cipher that gained widespread adoption because of its simplicity and speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
189
Q

Read and execute permission:

A

Read and execute permission: Permissions that grant you access to read the file that exists and execute it if its runnable

190
Q

Read permission:

A

Read permission: Permissions that grant you access to read the file that exists

191
Q

Read-write replicas:

A

Read-write replicas: Domain controllers in the Active Directory network that each have a complete copy of the AD database and are able to make changes to it

192
Q

Receiving address:

A

Receiving address: The MAC address of the access point that should receive the frame

193
Q

Recoverability:

A

Recoverability: How complicated and time-consuming the recovery effort will be

194
Q

Recursive name servers:

A

Recursive name servers: Servers that perform full DNS resolution requests

195
Q

Re-flash:

A

Re-flash: A way to preserve end-user data on a device that you plan on resetting

196
Q

Regions:

A

Regions: A geographical location containing a number of data centers

197
Q

Registers:

A

Registers: An accessible location for storing the data that our CPU works with

198
Q

Registrar:

A

Registrar: An organization responsible for assigning individual domain names to other organizations or individuals

199
Q

Regular expression:

A

Regular expression: A pattern matching language that describes words, phrases, or more complicated patterns; regular expressions are used to help you do advanced pattern based selection

200
Q

Reimaging:

A

Reimaging: The process of reimaging involves wiping and reinstalling an operating system using a disk image which is a copy of an operating system

201
Q

Relative path:

A

Relative path: It is a path from your current directory

202
Q

Remote attestation:

A

Remote attestation: The idea of a system authenticating its software and hardware configuration to a remote system

203
Q

Remote Authentication Dial-in User Service (RADIUS):

A

Remote Authentication Dial-in User Service (RADIUS): A protocol that provides AAA services for users on a network

204
Q

Remote connection:

A

Remote connection: The ability to connect an authorized person to a computer or network remotely; allows us to manage multiple machines from anywhere in the world

205
Q

Remote Desktop Protocol (RDP)

A

Remote Desktop Protocol (RDP): A secure network communication protocol developed by Microsoft that allows a user to connect to another device remotely

206
Q

Remote wipe:

A

Remote wipe: A factory reset that you can trigger from your central MDM rather than having to do it in person on the device

207
Q

Replication:

A

Replication: the store directory data is copied and distributed across a number of physically distributed servers but still appears as one unified data store for querying and administering

208
Q

Replication failure:

A

Replication failure: A reason that a GPO might fail to apply as expected

209
Q

Repository:

A

Repository: A server that acts like a central storage location for packages

210
Q

Reproduction case:

A

Reproduction case: Recreating an error to test a solution to make sure the problem is gone after a fix has been applied

211
Q

Reset:

A

Reset: When an SysAdmin restores or resets the password of a user

212
Q

Resource monitoring:

A

Resource monitoring: The most common way to quickly take a peek at how system resources are doing

213
Q

Restart:

A

Restart: A command that will let the machine reboot to complete a domain join

214
Q

Restoration procedures:

A

Restoration procedures: A recovery process and process needs to be tested regularly that is documented and accessible so that anyone with the right access can restore operation when needed

215
Q

Resultant set of policy (RSOP):

A

Resultant set of policy (RSOP): The policy that forms when all of the group policies have been grouped together for a specific machine and apply precedence rules to them

216
Q

Retirement:

A

Retirement: Hardware becomes unusable or no longer needed, and it needs to be properly removed from the fleet

217
Q

Return merchandise authorization (RMA):

A

Return merchandise authorization (RMA): The process of receiving returned merchandise and authorizing a refund

218
Q

Reverse lookup zone files:

A

Reverse lookup zone files: They let DNS resolvers ask for an IP, and get the FQDN associated with it returned

219
Q

Reverse proxy:

A

Reverse proxy: A service that might appear to be a single server to external clients, but actually represents many servers living behind it

220
Q

RGB model:

A

RGB model: RGB or red, green, and blue model is the basic model of representing colors

221
Q

Risk:

A

Risk: The possibility of suffering a loss in the event of an attack on the system

222
Q

Risk assessment:

A

Risk assessment: Allows you to prioritize certain aspects of the organization that are more at risk if there?s an unforeseen event

223
Q

Risk mitigation:

A

Risk mitigation: Understanding the risks your systems face, take measures to reduce those risks, and monitor them

224
Q

Rogue Access Point (AP) Attack:

A

Rogue Access Point (AP) Attack: An access point that is installed on the network without the network administrator’s knowledge

225
Q

Rogue DHCP server attack:

A

Rogue DHCP server attack: An attacker can hand out DHCP leases with whatever information they want by deploying a rogue DHCP server on your network, setting a gateway address or DNS server, that’s actually a machine within their control

226
Q

Role-based access control (RBAC):

A

Role-based access control (RBAC): The process of changing a persons group that they are a part of when they have changed roles within a company to limit or change their access to resources

227
Q

Rollback:

A

Rollback: Reverting to the previous state before you made changes

228
Q

ROM chip (Read Only Memory):

A

ROM chip (Read Only Memory): A read-only memory chip where the BIOS is stored

229
Q

Root cause:

A

Root cause: The main factor that’s causing a range of issues

230
Q

Root certificate authority:

A

Root certificate authority: They are self signed because they are the start of the chain of trust, so there’s no higher authority that can sign on their behalf

231
Q

Root directory:

A

Root directory: A parent directory for all other directories in a file system

232
Q

Rootkit:

A

Rootkit: A collection of software or tools that an admin would use

233
Q

Root user:

A

Root user: It is the first user that gets automatically created when we install a Linux OS and has all the privileges on the OS. Also called the super user. There’s technically only one superuser or root account, but anyone that’s granted access to use their powers can be called a superuser too

234
Q

Round robin:

A

Round robin: It is a concept that involves iterating over a list of items one by one in an orderly fashion

235
Q

Router:

A

Router: A device that knows how to forward data between independent networks

236
Q

Routing protocols:

A

Routing protocols: Special protocols the routers use to speak to each other in order to share what information they might have

237
Q

RPM:

A

RPM: Revolutions per minute

238
Q

RSA:

A

RSA: One of the first practical asymmetric cryptography systems to be developed, named for the initials of the three co-inventors: Ron Rivest, Adi Shamir and Leonard Adleman

239
Q

RSOP report:

A

RSOP report: The process of troubleshooting group policy and comparing what you expect to be applied to a computer and the resultant set of policy report

240
Q

RST flag:

A

RST flag: One of the TCP control flags. RST is short for reset. This flag means that one of the sides in a TCP connection hasn’t been able to properly recover from a series of missing or malformed segments

241
Q

SACL?s:

A

SACL?s: System Access Control List

242
Q

Safe operating temperature:

A

Safe operating temperature: The temperature range in which rechargeable batteries must be kept in order to avoid demanage

243
Q

SATA:

A

SATA: The most popular serial ATA drive, which uses one cable for data transfers

244
Q

Scalability:

A

Scalability: The measure of a system?s ability to increase or decrease in performance and cost in response to varying loads in system processing demands

245
Q

Screen lock:

A

Screen lock: A security feature that helps prevent unwanted access by creating an action you have to do to gain entry

246
Q

Script:

A

Script: It is run by an interpreter, which interprets the code into CPU instructions just in time to run them

247
Q

Scripting:

A

Scripting: Coding in a scripting language

248
Q

Scripts:

A

Scripts: Mainly used to perform a single or limited range task

249
Q

SD devices:

A

SD devices: Mass storage devices like hard drives

250
Q

SDRAM:

A

SDRAM: It stands for Synchronous DRAM, this type of RAM is synchronized to our systems’ clock speed allowing quicker processing of data

251
Q

Secondary or stand-by machine:

A

Secondary or stand-by machine: A machine that is the same as a production machine, but won’t receive any traffic from actual users until enabled

252
Q

Secure boot protocol:

A

Secure boot protocol: It uses public key cryptography to secure the encrypted elements of the boot process

253
Q

Secure channel:

A

Secure channel: It is provided by IPsec, which provides confidentiality, integrity, and authentication of data being passed

254
Q

Secure copy:

A

Secure copy: A command you can use in Linux to copy files between computers on a network

255
Q

Secure element:

A

Secure element: It’s a tamper resistant chip often embedded in the microprocessor or integrated into the mainboard of a mobile device

256
Q

Secure Shell (SSH):

A

Secure Shell (SSH): A secure network protocol that uses encryption to allow access to a network service over unsecured networks

257
Q

Security:

A

Security: It’s all about determining risks or exposure understanding the likelihood of attacks; and designing defenses around these risks to minimize the impact of an attack

258
Q

Security account manager (SAM):

A

Security account manager (SAM): A database in windows that stores user names and password

259
Q

Security filtering:

A

Security filtering: A tool to make group policies apply more selectively

260
Q

Security group:

A

Security group: One of the two categories that groups in Active Directories can be part of, they can contain user accounts, computer accounts or other security groups

261
Q

Security information and event management systems (SIEMS):

A

Security information and event management systems (SIEMS): Form of centralized logging for security administration purposes

262
Q

Security keys:

A

Security keys: Small embedded cryptoprocessors, that have secure storage of asymmetric keys and additional slots to run embedded code

263
Q

Security patch:

A

Security patch: A piece of software that is meant to fix up a security hole

264
Q

Security principal:

A

Security principal: Any entity that can be authenticated by the system, such as a user account, a computer account, or a thread or process that runs in the security context of a user or computer account

265
Q

Security through obscurity:

A

Security through obscurity: The principle that if no one knows what algorithm is being used or general security practices, then one is safe from attackers

266
Q

Seed value:

A

Seed value: A secret value that is used to initialize a process that is generated by software using one or more values

267
Q

Self-signed certificate:

A

Self-signed certificate: This certificate has been signed by the same entity that issued the certificate

268
Q

Sequence control field:

A

Sequence control field: A field that is 16 bits long and mainly contains a sequence number used to keep track of ordering the frames

269
Q

Sequence number:

A

Sequence number: A 32-bit number that’s used to keep track of where in a sequence of TCP segments this one is expected to be

270
Q

Serial number:

A

Serial number: A unique identifier for their certificate assigned by the CA which allows the CA to manage and identify individual certificates

271
Q

Server:

A

Server: A device that provides data to another device that is requesting that data, also known as a client

272
Q

Server:

A

Server: Software or a machine that provides services to other software or machines

273
Q

Server logs:

A

Server logs: Text files that contains recorded information about activities performed on a specific web server in a defined period of time

274
Q

Server operating systems:

A

Server operating systems: Regularly operating systems that are optimized for server functionality

275
Q

Server or Service:

A

Server or Service: A program running on a computer waiting to be asked for data

276
Q

Servers:

A

Servers: Devices that provide data to other devices that request that data, also known as a client

277
Q

Service discovery:

A

Service discovery: One of the services that the domain controller provides to the clients

278
Q

Service type field:

A

Service type field: A eight bit field that can be used to specify details about quality of service or QoS technologies

279
Q

Session hijacking (cookie hijacking):

A

Session hijacking (cookie hijacking): A common meddler in the middle attack

280
Q

Session key:

A

Session key: The shared symmetric encryption key using TLS sessions to encrypt data being sent back and forth

281
Q

Session layer:

A

Session layer: The network layer responsible for facilitating the communication between actual applications and the transport layer

282
Q

Session manager subsystem:

A

Session manager subsystem: Process that is in charge of setting some stuff up to work for the OS

283
Q

Severity:

A

Severity: Includes factors like what and how many systems were compromised and how the breach affects business functions

284
Q

SHA1:

A

SHA1: It is part of the secure hash algorithm suite of functions, designed by the NSA and published in 1995

285
Q

Shannon’s maxim:

A

Shannon’s maxim: It states that the system should remain secure, even if your adversary knows exactly what kind of encryption systems you’re employing, as long as your keys remain secure

286
Q

Shared folders:

A

Shared folders: A way to share files between computers on the same network on Windows

287
Q

Shell:

A

Shell: A program that interprets text commands and sends them to the OS to execute

288
Q

Shortcut:

A

Shortcut: An entry in the MFT that has a reference to some destination, so that when you open it up, you get taken to that destination

289
Q

Short-range wireless network:

A

Short-range wireless network: It is what mobile devices uses to connect to their peripherals

290
Q

Side-by-side assemblies:

A

Side-by-side assemblies: A system that manages most shared libraries and resources on Windows and supports access to multiple versions of the same shared library automatically

291
Q

Side-loading:

A

Side-loading: A process of installing mobile apps directly without using an app store

292
Q

Signal:

A

Signal: A way to tell a process that something has just happened

293
Q

Simple authentication and security layer (SASL):

A

Simple authentication and security layer (SASL): The authentication method that can employ the help of security protocols like TLS, it requires the client and the directory server to authenticate using some method

294
Q

Simple permissions:

A

Simple permissions: Special or specific permissions

295
Q

Simplex communication:

A

Simplex communication: A form of data communication that only goes in one direction across a cable

296
Q

Single point of failure:

A

Single point of failure: When one system in a redundant pair suffers a failure

297
Q

Single sign on (SSO):

A

Single sign on (SSO): An account that grants you access to multiple accounts without require constant entry of a password or username

298
Q

SOC (System On a Chip):

A

SOC (System On a Chip): Packs the CPU, Ram, and sometimes even the storage onto a single chip

299
Q

Social engineering:

A

Social engineering: An attack method that relies heavily on interactions with humans instead of computers

300
Q

Socket:

A

Socket: The instantiation of an endpoint in a potential TCP connection

301
Q

Softlinks:

A

Softlinks: A shortcut in Linux, that allows us to link to another file using a file name

302
Q

Software:

A

Software: The intangible instructions that tell the hardware what to do

303
Q

Software as a Service (SaaS):

A

Software as a Service (SaaS): A way of licensing the use of software to others while keeping that software centrally hosted and managed

304
Q

Software bug:

A

Software bug: An error in software that causes unexpected results

305
Q

Software management:

A

Software management: A broad term used to refer to any and all kinds of software that are designed to manage or help manage some sort of project or task

306
Q

Software services:

A

Software services: The services that employees use that allow them to do their daily job functions, such as word processors, Internet browsers, email clients, chat clients, and more

307
Q

Software signing certificate:

A

Software signing certificate: Trust mechanism where a software vendor can cryptographically sign binaries they distribute using a private key

308
Q

Source MAC address:

A

Source MAC address: The hardware address of the device that sent the ethernet frame or data packet. In the data packet it follows the destination MAC address

309
Q

Source port:

A

Source port: A high numbered port chosen from a special section of ports known as ephemeral ports

310
Q

Southbridge:

A

Southbridge: It maintains our IO or input/output controllers, like hard drives and USB devices that input and output data

311
Q

Spear phishing:

A

Spear phishing: Phishing that targets individual or group - the fake emails may contain some personal information like your name, or the names of friends or family

312
Q

Spoofing:

A

Spoofing: When a source is masquerading around as something else

313
Q

Spyware:

A

Spyware: The type of malware that’s meant to spy on you

314
Q

SQL Injection Attack:

A

SQL Injection Attack: An attack that targets the entire website if the website is using a SQL database

315
Q

SRV record:

A

SRV record: A service record used to define the location of various specific services

316
Q

SSD:

A

SSD: Solid State Drive

317
Q

SSH (Secure shell)

A

SSH (Secure shell): A protocol implemented by other programs to securely access one computer from another

318
Q

SSH authentication key:

A

SSH authentication key: A secure authentication method for accessing a computer from other device

319
Q

SSH client:

A

SSH client: A program you must have installed on your device in order to establish an SSH connection with another device

320
Q

SSH server:

A

SSH server: Software installed on a machine that allows for that device to accept an SSH connection

321
Q

SSL/TLS Client Certificate:

A

SSL/TLS Client Certificate: Certificates that are bound to clients and are used to authenticate the client to the server, allowing access control to a SSL/TLS service

322
Q

SSL 3.0:

A

SSL 3.0: The latest revision of SSL that was deprecated in 2015

323
Q

Standard error (stderr):

A

Standard error (stderr): A data stream that redirects the output of error messages in a different output stream. It works both in Linux and Windows

324
Q

Standard In (stdin):

A

Standard In (stdin): A data stream in which the input that you provide through the keyboard goes to the standard in stream of the process that you’re interacting with. It works both in Linux and Windows

325
Q

Standardization:

A

Standardization: A systematic way of naming hosts

326
Q

Standard out (stdout):

A

Standard out (stdout): A data stream that, when a process creates output, it adds data to the standard out stream, which flows out of the process. It works both in Linux and Windows

327
Q

Standard user:

A

Standard user: A user who is given access to the machine but has restricted access to do thing like install software or change certain setting

328
Q

Standoffs:

A

Standoffs: Used to raise and attach your motherboard to the case

329
Q

Start Frame Delimiter (SFD):

A

Start Frame Delimiter (SFD): The last byte in the preamble, that signals to a receiving device that the preamble is over and that the actual frame contents will now follow

330
Q

Start of authority:

A

Start of authority: A declaration of the zone and the name of the name server that is authoritative for it

331
Q

StartTLS

A

StartTLS: It permits a client to communicate using LDAP v3 over TLS

332
Q

Static IP address:

A

Static IP address: An IP address that must be manually configured on a node

333
Q

Steganography:

A

Steganography: The practice of hiding information from observers, but not encoding it

334
Q

Stream ciphers:

A

Stream ciphers: It takes a stream of input and encrypts the stream one character or one digit at a time, outputting one encrypted character or digit at a time

335
Q

Subdirectories:

A

Subdirectories: A directory below or at a deeper level in the directory hierarchy

336
Q

Subject:

A

Subject: This field contains identifying information about the entity the certificate was issued to

337
Q

Subject Public Key Info:

A

Subject Public Key Info: These two subfields define the algorithm of the public key along with the public key itself

338
Q

Subnet mask:

A

Subnet mask: 32-bit numbers that are normally written as four octets of decimal numbers

339
Q

Subnetting:

A

Subnetting: The process of taking a large network and splitting it up into many individual smaller sub networks or subnets

340
Q

Substitution cipher:

A

Substitution cipher: An encryption mechanism that replaces parts of your plaintext with ciphertext

341
Q

Suspended apps:

A

Suspended apps: A command that will tell the OS to suspend background mobile apps

342
Q

Swap space:

A

Swap space: The allocated space where the virtual memory is stored on the hard drive when the amount of physical memory space is used up or full

343
Q

Switches:

A

Switches: Devices that help our data travel

344
Q

Symbolic links:

A

Symbolic links: Work similarly to shortcuts, but at the file system level. The key difference is that the operating system treats them like substitutes for the file they’re linked to in almost every meaningful way

345
Q

Symmetric Digital Subscriber Line (SDSL):

A

Symmetric Digital Subscriber Line (SDSL): A device that establishes data connections across phone lines and has upload and download speeds that are the same

346
Q

Symmetric key algorithm:

A

Symmetric key algorithm: Encryption algorithms that use the same key to encrypt and decrypt messages

347
Q

SYN_RECEIVED:

A

SYN_RECEIVED: A TCP socket state that means that a socket previously in a listener state, has received a synchronization request and sent a SYN_ACK back

348
Q

SYN_SENT:

A

SYN_SENT: A TCP socket state that means that a synchronization request has been sent, but the connection hasn’t been established yet

349
Q

SYN flag:

A

SYN flag: One of the TCP flags. SYN stands for synchronize. This flag is used when first establishing a TCP connection and make sure the receiving end knows to examine the sequence number field

350
Q

SYN flood:

A

SYN flood: The server is bombarded with SYN packets

351
Q

Sysinternals package:

A

Sysinternals package: A set of tools released by Microsoft that can help you troubleshoot

352
Q

System:

A

System: A group of hardware components and software components that work together to fun the programs or processes in the computer

353
Q

System Administration:

A

System Administration: The field in IT that is responsible for maintaining reliable computer systems, in a Multi-user environment

354
Q

System properties:

A

System properties: A control panel applet that allows you to edit the size and number and location of paging files

355
Q

Systems administrator (sysadmin):

A

Systems administrator (sysadmin): A person who works only in system administration, configuring servers, monitoring the network, provisioning, or setting up new users in computers and taking responsibility of systems

356
Q

System settings:

A

System settings: Settings like display resolution, user accounts, network, devices, etc

357
Q

System software:

A

System software: Software used to keep our core system running, like operating system tools and utilities

358
Q

Tab completion:

A

Tab completion: A way to auto-complete a command or file names and directories

359
Q

TACACS+:

A

TACACS+: It is a device access AAA system that manages who has access to your network devices and what they do on them

360
Q

Tailgating:

A

Tailgating: Gaining access into a restricted area or building by following a real employee in

361
Q

Task bar:

A

Task bar: It gives us quick options and shows us information like network connectivity, the date, system notifications, sound etc

362
Q

Task Manager:

A

Task Manager: A Windows utility that allows you to gain information about what tasks you have running in the background

363
Q

T-Carrier technologies:

A

T-Carrier technologies: Technologies Invented to transmit multiple phone calls over a single link. Eventually, they also became common transmission systems to transfer data much faster than any dial-up connection could handle

364
Q

TCP checksum:

A

TCP checksum: A mechanism that makes sure that no data is lost or corrupted during a transfer

365
Q

Tcpdump:

A

Tcpdump: It’s a super popular, lightweight command-line based utility that you can use to capture and analyze packets

366
Q

TCP segment:

A

TCP segment: A payload section of an IP datagram made up of a TCP header and a data section

367
Q

TCP window:

A

TCP window: The range of sequence numbers that might be sent before an acknowledgement is required

368
Q

Terminal:

A

Terminal: A text based interface to the computer

369
Q

Termination signal:

A

Termination signal: A kill command that will stop whatever process you tell it to

370
Q

Test environment:

A

Test environment: A virtual machine running the same configuration as a production environment, but isn’t actually serving any users of the service

371
Q

Thermal paste:

A

Thermal paste: A substance used to better connect our CPU and heat sink, so the heat transfers from to the other better

372
Q

Threat:

A

Threat: The possibility of danger that could exploit a vulnerability

373
Q

Threats & password policies:

A

Threats & password policies: Protects Data & IP, Data Protection, Infrastructure Defense, Identity Management, and users

374
Q

Ticket granting service (TGS):

A

Ticket granting service (TGS): It decrypts the Ticket Granting Ticket using the Ticket Granting Service secret key, which provides the Ticket Granting Service with the client Ticket Granting Service session key

375
Q

Time-based token (TOTP):

A

Time-based token (TOTP): A One-Time-Password that’s rotated periodically

376
Q

Time slice:

A

Time slice: A very short interval of time that gets allocated to a process for CPU execution

377
Q

Time-To-Live field (TTL):

A

Time-To-Live field (TTL): An 8-bit field that indicates how many router hops a datagram can traverse before it’s thrown away

378
Q

TKIP (Temporal Key Integrity Protocol):

A

TKIP (Temporal Key Integrity Protocol): To address the shortcomings of WEP security

379
Q

TLS 1.2:

A

TLS 1.2: The current recommended revision of SSL

380
Q

TLS 1.2 with AES GCM:

A

TLS 1.2 with AES GCM: A specific mode of operation for the AES block cipher that essentially turns it into a stream cipher

381
Q

TLS Handshake:

A

TLS Handshake: A mechanism to initially establish a channel for an application to communicate with a service

382
Q

Top Level Domain (TLD):

A

Top Level Domain (TLD): The top level of the DNS or the last part of a domain name. For example, the ?com? in www.weather.com

383
Q

Total hops:

A

Total hops: The total number of devices data passes through to get from its source to its destination. Routers try to choose the shortest path, so fewest hops possible. The routing table is used to keep track of this

384
Q

Total length field:

A

Total length field: A 16-bit field that indicates the total length of the IP datagram it’s attached to

385
Q

TPM (Trusted Platform Module):

A

TPM (Trusted Platform Module): This is a hardware device that’s typically integrated into the hardware of a computer, that’s a dedicated crypto processor

386
Q

Traffic class field:

A

Traffic class field: An 8-bit field that defines the type of traffic contained within the IP datagram and allows for different classes of traffic to receive different priorities

387
Q

Transfer Control Protocol (TCP):

A

Transfer Control Protocol (TCP): A protocol that handles reliable delivery of information from one network to another

388
Q

Transmission Control Protocol (TCP):

A

Transmission Control Protocol (TCP): The data transfer protocol most commonly used in the fourth layer. This protocol requires an established connection between the client and server

389
Q

Transmitter address:

A

Transmitter address: The MAC address of whatever has just transmitted the frame

390
Q

Transport layer:

A

Transport layer: The network layer that sorts out which client and server programs are supposed to get the data

391
Q

Transport mode:

A

Transport mode: One of the two modes of operations supported by IPsec. When used, only the payload of the IP packet is encrypted, leaving the IP headers untouched

392
Q

Trim:

A

Trim: A command to delete unused data blocks so the space can be used for the computer?s storage needs

393
Q

Trojan:

A

Trojan: Malware that disguises itself as one thing but does something else

394
Q

Troubleshooting:

A

Troubleshooting: The ability to diagnose and resolve a problem

395
Q

Trusted execution environment (TEE):

A

Trusted execution environment (TEE): It provides a full-blown isolated execution environment that runs alongside the main OS

396
Q

TTL:

A

TTL: The lifetime limit of data given in seconds. This number can be configured by the owner of a domain name for how long a name server is allowed to cache in entry before it should discard it and perform a full resolution again

397
Q

Tunnel:

A

Tunnel: It is provided by L2TP, which permits the passing of unmodified packets from one network to another

398
Q

??Tunnel mode:

A

??Tunnel mode: One of the two modes of operations supported by IPsec. When used, the entire IP packet, header, payload, and all, is encrypted and encapsulated inside a new IP packet with new headers

399
Q

Twisted pair cable:

A

Twisted pair cable: The most common type of cabling used for connecting computing devices. It features pairs of copper wires that are twisted together

400
Q

Two-factor authentication:

A

Two-factor authentication: A technique where more than just a username and password are required to authenticate. Usually, a short-lived numerical token is generated by the user through a specialized piece of hardware or software

401
Q

TXT record:

A

TXT record: It stands for text and was originally intended to be used only for associating some descriptive text with a domain name for human consumption

402
Q

Type-C connector:

A

Type-C connector: A type of USB connector meant to replace many peripheral connections

403
Q

Types of DNS servers:

A

Types of DNS servers: There are five primary types of DNS servers; caching name servers, recursive name servers, root name servers, TLD name servers, and authoritative name servers

404
Q

U2F (Universal 2nd Factor):

A

U2F (Universal 2nd Factor): It’s a standard developed jointly by Google, Yubico and NXP Semiconductors that incorporates a challenge-response mechanism, along with public key cryptography to implement a more secure and more convenient second-factor authentication solution

405
Q

Ubuntu:

A

Ubuntu: The most popular Linux consumer distribution

406
Q

UEFI:

A

UEFI: United Extensible Firmware Interface, a new standard for BIOS

407
Q

Unbind:

A

Unbind: It closes the connection to the LDAP server

408
Q

Unicast transmission:

A

Unicast transmission: A unicast transmission is always meant for just one receiving address

409
Q

Uniform Resource Locator (URL):

A

Uniform Resource Locator (URL): A web address similar to a home address

410
Q

Universal:

A

Universal: The tool that is used to group global roles in a forest

411
Q

Unix epoch:

A

Unix epoch: It is the number of seconds since midnight on January first, 1970. It’s a ‘Zero Hour’ for Unix based computers to anchor their concept of time

412
Q

Urgent pointer field:

A

Urgent pointer field: A field used in conjunction with one of the TCP control flags to point out particular segments that might be more important than others

413
Q

URG flag:

A

URG flag: One of the TCP control flags. URG is short for urgent. A value of one here indicates that the segment is considered urgent and that the urgent pointer field has more data about this

414
Q

USB (Universal Serial Bus):

A

USB (Universal Serial Bus): A connection standard for connecting peripherals to devices such as computers

415
Q

USB-C adapter:

A

USB-C adapter: One of the standard power, data and display connector types used in mobile devices

416
Q

User configuration:

A

User configuration: Contained within a Group Policy Object (GPO)

417
Q

User Datagram Protocol (UDP):

A

User Datagram Protocol (UDP): A transfer protocol that does not rely on connections. This protocol does not support the concept of an acknowledgement. With UDP, you just set a destination port and send the data packet

418
Q

User Groups:

A

User Groups: The management of resources on a computer and on a network through organizing user accounts into various groups

419
Q

User name:

A

User name: A unique identifier for a user account

420
Q

Username and password authentication:

A

Username and password authentication: Can be used in conjunction with certificate authentication, providing additional layers of security

421
Q

User space:

A

User space: The aspect of an operating system that humans interact with directly like programs, such as text editors, music players, system settings, user interfaces, et cetera

422
Q

UTF-8:

A

UTF-8: The most prevalent encoding standard used today

423
Q

UUID:

A

UUID: Universally Unique ID

424
Q

Validity:

A

Validity: This field contains two subfields, Not Before and Not After, which define the dates when the certificate is valid for

425
Q

Variable:

A

Variable: Files that constantly change

426
Q

Vendor risk review:

A

Vendor risk review: Questionnaire that covers different aspects of their security policies procedures and defenses

427
Q

Version:

A

Version: What version of the X.509 standard certificate adheres to

428
Q

Version field:

A

Version field: First field in an IP header that specifies the version of IP

429
Q

Virtual Box:

A

Virtual Box: An application you can use to install Linux and have it completely isolated from your machine

430
Q

Virtual instance:

A

Virtual instance: A single virtual machine

431
Q

Virtualization:

A

Virtualization: A single physical machine called a host runs many individual virtual instances called guests

432
Q

Virtual LAN (VLAN):

A

Virtual LAN (VLAN): It is a technique that lets you have multiple logical LANs operating on the same physical equipment

433
Q

Virtual machine (VM):

A

Virtual machine (VM): An application that uses physical resources like memory, CPU and storage, but they offer the added benefit of running multiple operating systems at once

434
Q

Virtual memory:

A

Virtual memory: A combination of hard drive space and RAM that acts like memory which our processes can use

435
Q

Viruses:

A

Viruses: The best known type of malware

436
Q

VLAN header:

A

VLAN header: A piece of data that indicates what the frame itself is. In a data packet it is followed by the EtherType

437
Q

Volume:

A

Volume: A format for a filesystem on a partition

438
Q

VPN (Virtual Private Network):

A

VPN (Virtual Private Network): A secure method of connecting a device to a private network over the internet

439
Q

Vulnerability:

A

Vulnerability: A flaw in the system that could be exploited to compromise the system

440
Q

Vulnerability scanner:

A

Vulnerability scanner: Detect lots of things, ranging from misconfigured services that represent potential risks, to detecting the presence of back doors and systems

441
Q

WannaCry Attack:

A

WannaCry Attack: A cyber attack that started in Europe and infected hundreds of thousands of computers across the world

442
Q

Web of trust:

A

Web of trust: It is where individuals instead of certificate authorities sign other individuals’ public keys

443
Q

Web server:

A

Web server: A web server stores and serves content to clients through the Internet.

444
Q

WEP (Wired Equivalent Privacy):

A

WEP (Wired Equivalent Privacy): First security protocol introduced for Wi-FI networks

445
Q

Wide area network:

A

Wide area network: Acts like a single network but spans across multiple physical locations. WAN technologies usually require that you contract a link across the Internet with your ISP

446
Q

Wi-Fi Protected Access (WPA):

A

Wi-Fi Protected Access (WPA): A security program that uses a 128-bit key to protect wireless computer networks, which makes it more difficult to crack than WEP

447
Q

Wildcard:

A

Wildcard: A character that is used to help select files based on a certain pattern

448
Q

Windows domain:

A

Windows domain: A network of computers and users that are added to a central database

449
Q

Windows management instrumentation (WMI):

A

Windows management instrumentation (WMI): The container that is used to define powerful targeting rules for your GPO

450
Q

Windows registry:

A

Windows registry: A hierarchical database of settings that Windows, and Windows applications, use for storing configuration data

451
Q

Windows Search service:

A

Windows Search service: A service that indexes files on your computer by looking through them on a schedule

452
Q

Windows store:

A

Windows store: A Windows store is an application repository or warehouse where you can download and instal universal Windows platform apps

453
Q

Windows update client service:

A

Windows update client service: System that runs in the background on your computer to download and install updates and patches for your operating system

454
Q

Wired Equivalence Privacy (WEP):

A

Wired Equivalence Privacy (WEP): An encryption technology that provides a very low level of privacy. WEP should really only be seen as being as safe as sending unencrypted data over a wired connection

455
Q

Wireless access point:

A

Wireless access point: A device that bridges the wireless and wired portions of a network

456
Q

Wireless LANS (WLANS):

A

Wireless LANS (WLANS): One or more access points act as a bridge between a wireless and a wired network

457
Q

Wireless networking:

A

Wireless networking: Networks you connect to through radios and antennas

458
Q

Wireshark:

A

Wireshark: It’s another packet capture and analysis tool that you can use, but it’s way more powerful when it comes to application and packet analysis, compared to tcpdump

459
Q

WMI filter:

A

WMI filter: A tool to make group policies apply more selectively on the configuration of the computer

460
Q

Work group computer:

A

Work group computer: A Windows computer that isn’t joined to a domain

461
Q

World Wide Web (WWW):

A

World Wide Web (WWW): The information system that enables documents and other web resources to be accessed over the Internet

462
Q

Worms:

A

Worms: They are similar to viruses except that instead of having to attach themselves onto something to spread, worms can live on their own and spread through channels like the network

463
Q

WPA (Wi-fi protected access):

A

WPA (Wi-fi protected access): Designed as a short-term replacement that would be compatible with older WEP-enabled hardware with a simple firmware update

464
Q

WPA2 Enterprise:

A

WPA2 Enterprise: It’s an 802.1x authentication to Wi-Fi networks

465
Q

WPS (Wifi Protected Setup):

A

WPS (Wifi Protected Setup): It’s a convenience feature designed to make it easier for clients to join a WPA-PSK protected network

466
Q

Write permission:

A

Write permission: A permission that allows you to make changes to a file

467
Q

X.500 directory:

A

X.500 directory: The agreed upon directory standard that wa approved in 1988 that includes, DAP, DSP, DISP, DOP, DAP, and LDAP

468
Q

X.509 standard:

A

X.509 standard: It is what defines the format of digital certificates, as well as a certificate revocation list or CRL

469
Q

XTACACS:

A

XTACACS: It stands for Extended TACACS, which was a Cisco proprietary extension on top of TACACS

470
Q

Zone Files:

A

Zone Files: Simple configuration files that declare all resource records for a particular zone

471
Q

0-Day Vulnerability (Zero Day):

A

0-Day Vulnerability (Zero Day): A vulnerability that is not known to the software developer or vendor, but is known to an attacker