CompTIA 1002 Acronyms Flashcards

(93 cards)

1
Q

ACL

A

Access Control List
A list of rules used to grant access to a resource. An ACL identifies traffic that is allowed or blocked based on IP addresses, networks, ports, and some protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AES

A

Advanced Encryption Standard

A symmetric algorithm used to encrypt data and provide confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AUP

A

Acceptable Use Policy

Rules or guidelines for the proper use of technology or digital devices within an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

BIOS

A

Basic Input/ Output System

A computer’s firmware used to manipulate different settings such as the date and time, boot drive, and access password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

BYOD

A

Bring your Own Device

A policy allowing employees to connect personally owned devices, such as tablets and smartphones, to a company network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CD-ROM

A

Compact Disc-Read-Only Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CDFS

A

Compact Disc File System

a file system type used on CDs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CPU

A

Central Processing Unit
The key component of a computer system, which contains the circuitry necessary to interpret and execute program instructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DDoS

A

Distributed Denial of Service
An attack that attempts to make an online service, like a website, unavailable by overwhelming it with a flood of traffic from many computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DHCP

A

Dynamic Host Configuration Protocol
A service used to dynamically assign IP addresses, subnet masks, default gateways, DNS server addresses, and other configurations to clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DLP

A

Data Loss Prevention

a system that identifies, monitors, and protects data to prevent it from unauthorized use, modification, or destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DNS

A

Domain Name Service

Converts a human-friendly hostname (such as www.google.com) into a computer-friendly IP address (such as 192.168.1.1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DoS

A

Denial of Service

An interruption in an authorized user’s access to a computer network, typically one caused with malicious intent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DVD

A

Digital Versatile Disc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

EFS

A

Encrypting File System

A feature within NTFS on Windows systems that supports encrypting individual files or folders for confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

EMI

A

Electromagnetic Interference

Electromagnetic interference caused by such things as motors, power lines, and fluorescent lights.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

EULA

A

End User License Agreement

The contract between a user and a company selling software for installation on the user’s computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

ext2/ext3/ext4

A

Extended File System

File system Used by Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

FAT

A

File Allocation Table

Table used by the operating system (OS) to manage files on hard drives and other computer systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

FAT32

A

32-bit File Allocation Table
An older partition type that is not commonly used anymore. it is mainly used on devices like USB flash drives to make them compatible between computers running different operating systems (Window/Linux/MacOS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

FTP

A

File Transfer Protocol

A format and set of rules for transferring files from a host to a remote computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

GUI

A

Graphical User Interface

Interface that relies on graphics to communicate with the user (example: Microsoft Windows)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

GPS

A

Global Positioning System

A system that determines accurately the precise position of something on earth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

GSM

A

Global System for Mobile Communications

a 2G standard for cellular transmissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
HDD
Hard Disk Drive
26
HTML
Hypertext Markup Language | The authoring language used to create documents on the World Wide Web.
27
HTTP
HyperText Transfer Protocol | The protocol used for transmitting web pages over the Internet
28
HTTPS
Hypertext Transfer Protocol Secure | Encrypts HTTP traffic with SSL or TLS using port 443.
29
I/O
Input/Output
30
IDS
Intrusion Detection System A detective control used to detect attacks when they occur, but does not automatically take measures to prevent the attack.
31
IP
Internet Protocol | The main delivery system for information over the Internet
32
IPConfig
Internet Protocol Configuration | A command line tool n Microsoft Windows that displays all current TCP/IP network configuration values and settings.
33
IPS
Intrusion Prevention System | A preventative control that will stop an attack in progress.
34
IPSec
Internet Protocol Security | Used to encrypt data in transit
35
IR
Infrared
36
IRP
Incident Response Plan | The procedures documented in an incident response policy.
37
ISP
Internet Service Provider | A company that provides access to the Internet.
38
JBoD
Just a Bunch of Disks | Disks installed on a computer but not as a RAID.
39
KVM
Keyboard, Video, and Mouse | Use many computers with a single keyboard, video display, and mouse
40
LAN
Local Area Network A geographic network that covers a relatively small geographic area such as a building or a small campus - no more than a mile distance between computers
41
LDAP
Lightweight Directory Access Protocol | Language used to communicate with directories such as Microsoft's Active Directory
42
MAC
Media Access Control A network data transfer policy that determines how data is transmitted between two computer terminals through a network cable.
43
MBR
Master Boot Record An area on a hard disk in its first sector. When the BIOS boots a system, it looks at the MBR for instructions and information on how to boot the disk and load the operating system.
44
MBSA
Microsoft Baseline Security Analyzer Software developed and used by Microsoft to check the security of an operating system by assessing missing security updates and less secure areas of the operating system.
45
MDM
Mobile Device Management A group of applications and/or technologies used to manage mobile devices. MDM tools can monitor mobile devices and ensure they are compliance with security policies.
46
MSConfig
Microsoft Configuration Enables users to configure a system's boot files and critical system files. It is an executable file which runs the Windows System Configuration Utility.
47
MSDS
Material Safety Data Sheet | Contains information on the possible health effects of exposure to chemicals
48
NAC
Network Access Control Inspects clients for health and can restrict network access to unhealthy (missing updates, using an outdated operating system, etc) clients to a remediation network.
49
NAS
Network Attached Storage A storage device that is directly attached to the network and is used to supply file-based storage services to other computers on the network.
50
NAT
Network Address Translation A service that translates public IP addresses to private and private IP addresses to public. It hides addresses on an internal network.
51
NetBIOS
Networked Basic Input/Output System | A legacy system that was the predecessor to using host names to identify devices on networks.
52
NIC
Network Interface Card | A piece of hardware that allows a computer to connect to a network.
53
NTFS
New Technology File System | A file system used in Microsoft operating systems that provides security.
54
OS
Operating System
55
PC
Personal Computer
56
PE
Pre-Installation Environment Windows Pre-Installation Environment is a lightweight version of Windows used for the deployment of PCs, workstations, and servers
57
PII
Personally Identifiable Information. Information about individuals that can be used to trace a person's identity, such as a full name, birthdate, biometric data, and identifying numbers such as a Social Security number (SSN).
58
PHI
Personal Health Information Information about an individual held by parties that are involved in the healthcare and billing process. a.k.a. (Protected Health Information)
59
PKI
Public Key Infrastructure | Group of technologies used to request, create, manage, store, distribute, and revoke digital certificates.
60
PnP
Plug-and-play | Technology that allows a computer to automatically configure the devices that connect to it.
61
PXE
Preboot Execution Environment | Allows computer to load an operating system from a server.
62
QoS
Quality of Service | Gives specific traffic precedence over other traffic on networks.
63
RADIUS
Remote Authentication Dial-In User Server
64
RAID
Redundant Array of Independent/Inexpensive Disks | A hard disk drive where data is written across multiple disks as if they were a single disk.
65
RAM
Random Access Memory | Temporary memory. RAM is expandable, and resides on the motherboard.
66
RDP
Remote Desktop Protocol Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft which provides a user with a graphical interface to connect to another computer over a network connection
67
RFID
Radio Frequency Identification Tags/microchips that contain a predetermined code which can be read by an RFID reader. These are used in credit cards, badges, passports, pet tracking just to name a few
68
ROM
Read Only Memory | Permanent instructions that cannot be changed easily
69
SAN
Storage Area Network | A specialized network of high-speed storage devices.
70
SFC
System File Checker | Command used to verify and repair system files.
71
SOHO
Small Office/Home Office
72
SSH
Secure Shell | Network protocol for secure transfer of data between computers.
73
SSID
Service Set Identifier | Identifies the name of a wireless network.
74
SSL
Secure Sockets Layer | A security protocol that uses encryption to establish a secure connection between a computer and a Web server.
75
SSO
Single Sign-On
76
TACACS+
Terminal Access Controller Access-Control System Plus
77
TCP/IP
Transmission Control Protocol/Internet Protocol | A set of standards that control how data is sent across networks including the internet.
78
UAC
User Account Control Informs you when a program makes a change that requires administrator-level permission, also adjusts the permission level of your user accounts.
79
UEFI
Unified Extensible Firmware Interface The extensible successor to the BIOS that features support for a vast array of systems and platforms by allowing access to system resources to access additional software modules.
80
UPnP
Universal Plug and Play | Enables network-ready devices to discover each other automatically.
81
UPS
Uninterruptible Power Supply | A battery backup system that provides fault tolerance for power and can protect against power fluctuations.
82
URL
Uniform Resource Locator | Also called a web address.
83
VM
Virtual Machine
84
VoIP
Voice over Internet Protocol | a phone connection through a personal computer with any type of broadband Internet connection.
85
VPN
Virtual Private Network | Provides access to a private network over a public network such as the Internet.
86
WAP
Wireless Access Point | Provides access to a wired network to wireless clients.
87
WEP
Wired Equivalent Privacy | An older encryption algorithm used to protect data on Wi-Fi Networks. Weak security and no longer used.
88
WiFi
Wireless Fidelity | It is similar to Bluetooth in that it is used to exchange data, but the signals can travel further distances.
89
WLAN
Wireless Local Area Network | Network connected wirelessly.
90
WPA
Wireless Protected Access
91
WPA2
WiFi Protected Access 2 | More permanent upgrade to WEP and uses AES technology. Currently WP2 is the standard wireless security type.
92
WPS
WiFi Protected Setup Allows users to configure a wireless network without typing in the passphrase. (Can be done by pressing buttons or by entering a PIN)
93
GPT
GUID Partition Table | A newer partition type that is used to create drives larger than 2 TB.