Random Tech Terms To Know Flashcards

1
Q

VPN

A

Virtual Private network
-encrypts your internet connection
-Internet traffic is routed through a connected tunnel so that other people can’t see your activity and information

3 types:
-Remote access VPN
-Site-to-site VPN
-Mobile VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IDE

A

Integrated Development Environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ISP

A

Internet service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DHCP

A

Dynamic Host Configuration Protocol
-network server that automatically provides and assigns IP addresses, default gateways and other network parameters to client devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MFA

A

Multi-factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Internet connection path

A

ISP>travels to…>firewall>switch>peripherals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IIS

A

Internet information service
-A web server hosted by Microsoft that runs on Windows
-Used to exchange web content with users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AD

A

Active Directory
-database and set of services that connect users with network resources
-includes users and computers and who is allowed to do what
-used by administrators to manage permissions and control access to network resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Services (Windows)

A

Background apps that don’t have an interface and do a variety of things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

cmdlet

A

a lightweight command in the Windows PowerShell environment that performs a specific action and manipulates objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

EDR

A

Endpoint detection and response. Security tool, firewall, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

BitLocker

A

a Windows security feature that encrypts drives to protect data from theft or unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SOC

A

Security operations center
SOC acts like the hub or central command post, taking in telemetry from across an organization’s IT infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Kernel

A

Core of an OS
-controls security, file management, platform for apps to run
-user rarely interacts with the kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Registry

A

a database that stores configuration settings and other details about the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hyper-V

A

Windows compatible virtualization product

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A-record

A

a type of DNS record that maps a domain name to the IP address of the computer that hosts it

A records are used when a user tries to access a website by typing in its domain name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CNAME

A

Maps an alias/subdomain to the primary domain name
-on DNS record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

DC

A

Domain controller
-a server that manages a network’s security and access/identity requests. The Active Directory (AD) services database is stored on the DC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Domain

A

Large network
-different users have different privileges and access rights
-managed by a server called a domain controller (DC)
-manages security and authentication
-stores the shared information for the
-pcs can be on different local networks but in the same domain
-main function of an AD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Workgroups

A

Small networks
-each computer has its own storage, management, and the account must be on that device
-same local network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Windows ADK

A

Windows Assessment and Deployment Kit
-used to customize windows installation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

ODD

A

Optical Disk drives
-tray that opens and reads DVD drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

ISO file

A

Copy of an entire optical disk, archived into a single file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

.bat file

A

Batch file, it contains a series of commands that are executed in sequence when the file is run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

NIC

A

Network interface controller
-A network interface controller is a computer hardware component that connects a computer to a computer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

System image

A

Exact copy of a hard drive: including OS, executable files, system settings and all files and folders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

WIM

A

Windows imagine format
-file extension for a complete windows image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Answer/unattend file

A

an XML-based file that contains settings and values used to customize Windows Setup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Media/media technology/media device

A

Electronic devices used to store data, such as hard drives (HDD and SSD), USB drives, DVDs, CD-ROM, and floppy disks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

USMT

A

User state migration tool
-Windows ADK tool to move user profiles and data across

32
Q

MDT

A

Microsoft Deployment Toolkit
-used to capture and deploy images

33
Q

WinPE

A

Windows pre-installation environment
-barebones version of windows used to trouble shoot and deploy windows

34
Q

ADK

A

Assessment and Deployment Kit
-windows tool that can be used to assist in the creation and management of image files
-customize windows installation

35
Q

OOBE

A

Out-of-box-experience
-what windows users experience with their fresh, new devices
-prompts that ask about language, keyboards and other preferences that users see and go through after booting a configured device for the first time

36
Q

MDM

A

Mobile Device Management
-a solution that can configure devices over the cloud that are apart of an Active Directory

37
Q

OU

A

Organizational unit
-type of container/unit within an AD domain
-good for organizing domain objects

38
Q

Domain objects

A

Different kinds of objects within a DC
-computer, printers, users

39
Q

TPM chip

A

International standard for a secure crypto processor
-secures hardware through integrated cryptographic keys

40
Q

RBAC

A

Role-based access control
-Security model used to control an organizations access to resources

41
Q

Azure Active Directory

A

A cloud-based authentication service

42
Q

SID

A

Security identifier
-string attached to each user, computer and group in Windows

43
Q

SAN (domain)

A

Subject alternative name
-alternative name for a FQDN (fully qualified domain name)

44
Q

MMC

A

Microsoft management console
-tool that can be used for many purposes in Windows

45
Q

LSDOU

A

Stands for Local, Site, Domain, Organizational Units (in that order)
-this is the order of processing for GPOs
-ones processed later will override earlier ones and will be applied to those under that tree

46
Q

CIDR

A

Classless Inter-Domain Routing
-denoting sub masks by the number of 1s in the subnet mask
-example: 255.255.0.0 would be denoted as “/16”

47
Q

RU or U

A

“Rack unit” or “Unit”
Unit of measurement indicating one server rack slot/space
-1 RU= 1.75” in height or of vertical space

48
Q

NIC

A

Network interface card
-hardware component that allows a computer to connect to a network and exchange data with other devices

49
Q

ADDS

A

Active Directory domain services
-on premise AD services with domain controllers

50
Q

ICMP (echo and response)

A

Set of packets being sent or received, can be used by sending “ping” commands in command line/powershell

51
Q

PAAS

A

Platform as a service
-platform is ready to use, has to be administered before being used

52
Q

SAAS

A

Software as a service
-a fully functional app that is ready to use

53
Q

IAAS

A

Infrastructure as a service
-I.e. Azure, AWS (Amazon Web Services), GCE (Google)

54
Q

SSO

A

Single-sign on
-used to have only one account to logon to cloud apps and even on-Prem services
-Azure AD connect/Entra connect

55
Q

MAC address

A

Unique identifier assigned to NIC (network interface controller) for use as a network address in communications within a network segment
-also used to identify a device on a network

56
Q

ISATAP

A

Intra-site automatic tunnel addressing protocol
-type of tunneling method used when two sites in the same network are using different kinda of networks (IPv4 and IPv6)
-Needs an ISATAP router, can go both ways

57
Q

What 4 addresses does a computer need to function on a network?

A
  1. IP address
  2. Subnet mask
  3. Default gateway (router) address
  4. DNS (domain name system) server address
58
Q

SSID

A

Service Set Identifier
-name of a wireless network
-most routers have a default name, it’s a good idea to change this to something different

59
Q

RBAC

A

Role-based access control
-rights and permissions in an environment are based on the roles given to the user (when using RBAC)

60
Q

UAC

A

User access control
-can be edited in a GPO
-standard users get a standard user token when logging in
-admins get an admin user token when logging in
-when standard user tries to do something that requires admin credentials, UAC is activated and prompts for admin credential input
-4 levels of UAC

61
Q

Open network

A

Wireless network open to public, often used a captive portal (portal that must be used/gone through to access the network, sometimes makes you pay)
-no authentication required

62
Q

PSK network

A

Pre-shared key network
-most common wireless network
-pre configured password to access

63
Q

WPS method

A

Method of accessing a wireless network by pushing WPS button on AP (access point), or by using NFC (near-field communication)

64
Q

802.1x standard

A

Network security standard, usually used at an enterprise level
-uses three components
-supplicant-user requesting access
-Authenticator-device (typically a
switch in wired networks or an access
point in wireless networks) that
controls network access
-Authentication server- server (usually
RADIUS server) that verifies users
creds

65
Q

RADIUS

A

Remote authentication dial-in service
-open authentication standard
-credential sent in UDP packet
-uses port 1812 for authentication and authorization
-uses port 1813 for accounting
-only encrypts passwords

66
Q

TACACS+

A

Terminal access controller access-control system
-type of authentication method
-better than RADIUS
-creds sent in TCP packet
-uses port 49
-all data is encrypted

67
Q

TKIP

A

Temporal key integrity protocol
-older, used with WPA2 and 3
-each packet gets its own encryption key
-Vulnerable

68
Q

AES

A

Advanced encryption standard
-block ciphers or 128 bits
-keys up to 256 bits in length
-based on the Rijndael algorithm
-one of the strongest encryption protocols available

69
Q

Kerberos

A

Windows Authentication method
-only authenticates, DOES NOT authorize or account
-often used alongside TACACS+ or RADIUS

70
Q

UDP and TCP

A

UDP (user datagram protocol)
TCP (transmission control protocol)
Both are protocols
-both are protocols that operate at the transport level of the OSI model and apart of the IP (Internet protocol) suite

71
Q

TCP/IP

A

Internet protocol (IP) suite, organizes communication protocols for the Internet

72
Q

PIM

A

Privileged identity management
-tech that allows you to manage, control, and monitor access to resources in your organization.

73
Q

Source anchor

A

Immutable attribute that is the same attribute in AD and Azure
-links AD and Azure together for syncing and other scenarios (recovery, rebuilding of sync server)

74
Q

TPM

A

Trust platform module
-chip on the MB that secures hardware through cryptographic keys

75
Q

UPN

A

User principal name
-username followed by an “@“ symbol followed by the Active Directory internet domain