General Terms Flashcards

(85 cards)

1
Q

What is a Fork?

A

the process of creating a new copy of an existing process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a null interface?

A

a virtual interface in a router or other network device that has no physical connection to any other device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a rainbow table?

A

a precomputed table of possible plaintext passwords/hashes and their corresponding hash values.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Shim?

A

a piece of software code that is placed between two components to intercept calls and redirect them, that is used to bridge or adapt between two different interfaces, systems, or versions of a software library or API.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Same Origin Policy (SOP)?

A

a security concept used in web browsers to prevent one website from accessing or modifying content from another website without permission. web content can only interact with content from the same origin or domain. An origin is combination of the protocol, domain name, and port number used to access a resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Geotagging?

A

embedding of the geolocation coordinates into a piece of data, such as a photo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data at Rest

A

any data stored in memory, a hard drive, or a storage device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data in Transit/Motion

A

any data moving from one computer or system to another over the network or within the same computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data in Use/Processing

A

any data read into memory or is currently inside the processor and being worked on or modified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

PII

A

personally identifiable information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Asset Management

A

systematic approach to the governance and realization of value of things over their life cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Change Management

A

maximizes the number of successful IT changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Standard Change - change management

A

preauthorized and can be implemented without any additional authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Normal Change - change management

A

changes where the authorization is gained

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Emergency Change - change management

A

changes that need to be expedited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Change Schedule - change management

A

helps plan the changes and assists in communication such changes to the stakeholders to avoid conflicts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Back Out/Rollback Plan - change management

A

plan of action to take if something goes wrong

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Acceptable Use Policy

A

employees’ set of policies for a service or resource enforced by the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Standard Operating Procedure (SOP)

A

step-by-step list of actions to do in order to comply with an organization’s policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

End-user Termination Checklist and Procedures

A

used as part of the employee offboarding process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Incident Report/After Action Report (AAR)

A

a report that gathers the opinions of all involved users, customers, technicians, managers, and stakeholders for the problem being investigated - what caused it and how to prevent it in the future

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Network Topology Diagram

A

shows a mapping of an organization’s network connections. 1 for logical connections and 1 for physical connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Asset ID

A

used to uniquely identify each piece of hardware tracked in an asset management database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Backup

A

process of creating and storing copies of data to protect against data loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Recovery - backups
process of restoring data backup during data or system loss
26
Full Backup - backups
the backup job is going to create a file that contains all the data from the source
27
Incremental Backup - backups
will only back up things that have changed since the last backup
28
Differential Backup - backups
backs up all the data that has been changed since the last full backup
29
Synthetic Backup - backups
an optional type of backup that uses incremental backups that can create full backups with lower data transfer requirements
30
Archive Attribute - backups
file attributes that indicate whether a file has changed since the last backup. flags are set to on so the backup system knows what to backup
31
Frequency - backups
the period between backup jobs
32
On-site - backups
the backup storage mechanism is located in the same location as the system they're backing up
33
Off-site - backups
backing up to some system not inside the same physical building where your workstations are
34
Grandfather-Father-Son (GFS) - backups
tape media rotation scheme that allows some of your backup media to be take to an offsite storage
35
3-2-1 Backup Rule - backups
states that you should have three copies of your data, including your production copy on your servers, two different types of media, and one copy being held offline, and off-site
36
Surge - power
an unexpected increase in the amount of voltage that's being provided
37
Spike - power
a short, transient voltage that can be due to a short circuit, a trip circuit breaker, a power outage, or even a lightning strike
38
Sag - power
an unexpected decrease in the amount of voltage provided
39
Brownout - power
occurs when the voltage drops low enough that it causes the lights to dim and can cause a computer to shut off
40
Blackout - power
occurs when there is a total loss of power for a long period of time
41
Uninterruptible Power Supply (UPS) - power
combines the functionality of a surge suppressor with a battery backup
42
Backup Generator - power
an emergency power system used where there is an outage of the regular electric grid power
43
Electrostatic Discharge (ESD) - power
occurs whenever there's a path that allows electrons to rush from a statically charged body to a component that has no charge
44
Material Safety Data Sheet
contains all the information about the ingredients, health hazards, precautions, and first aid information
45
Data Acquisition
creates a forensically sound copy of the data from a source device
46
Order of Volatility
collecting evidence that could be easily tampered with or destroyed, first
47
Proprietary Software
original developer retains all rights and ownership of a software code, where you pay them a fee and you receive a license in return
48
Open Source License
Makes software free to use, modify, and share
49
End User License Agreement
dictates the terms of the license for a software
50
Digital Rights Management
ensures copy protection for music and video that is being used in an online or digital manner
51
Data Retention
maintains and controls certain data to comply with business policies and applicable laws and regulations
52
Data Preservation
keeping information for a specific purpose outside of an organization's data retention policy
53
Recovery Point Objective (RPO)
the maximum amount of time that can be lost from a recovery after a disaster, failure, or other event
54
Payment Card Industry Data Security Standard (PCI DSS)
an agreement that any organization that collects, stores, or processes credit card customer information must abide by
55
Structured Data
something like a csv file
56
Unstructured Data
things like chat logs, emails, text files, where you have to parse through the data
57
Acceptable Use Policy (AUP)
defines the rules that restrict how a computer, network, or other systems may be used
58
Job Rotation
different users are trained to perform the tasks of the same position to help prevent and identify fraud that could occur if there was only one user with the job
59
Boolean
a form of data with only 2 possible values (True or False)
60
Integer
a variable that stores an integer or a whole number that may be positive or negative
61
Float/Decimal/Real Number
a variable that stores a decimal number
62
Character
a variable that can only store one ASCII character
63
String
a variable that can store multiple characters
64
Constant - scripting
like a variable, but cannot be changed within the program once defined
65
Loop
a type of flow control that controls which order the code will be executed in a given program
66
For Loop
used when the number of times to repeat a block of code is known
67
While Loop
used when the number of times to repeat a block of code is not known and will only stop until something happens
68
Do Loop
used when there's an indefinite iteration that needs to happen and will only stop until some condition is met at the end of the loop
69
Logic Control
type of programming paradigm that is based on formal logic and mathematical reasoning. It involves expressing the program as a set of logical rules and constraints, and using logical inference and deduction to determine the appropriate actions to take based on the input data and the defined rules.
70
Remote Desktop Gateway (RDG)
provides a secure connection using the SSL/TLS protocols to the server via RDP
71
Virtual Network Computing (VNC) Port 5900
protocol that defines how a remote desktop sharing session is established and managed between 2 computers over a network. remote access and control of computers over a network similar to Virtual Desktop Infrastructure (VDI)
72
Virtual Desktop Infrastructure (VDI)
hosts desktop environments on a centralized server. each desktop has its own experience and applications. allows a specific desktop image to be run in a virtual machine and delivered to an end user over a network (DaaS)
73
In-Band Management
managing devices through the use of Telnet or SSH protocols over the network that is accessbile through the same network path that is used for normal data traffic.
74
Out-of-Band Management
connecting to and configuring different network devices using an alternate path or dedicated management network path. it is isolated from regular data
75
Password Authentication Protocol (PAP)
sends usernames and passwords in plaintext for authentication
76
Challenge Handshake Authentication Protocol (CHAP)
sends the client a string of random text called a challenge which is then hashed with a shared secret password and sent back to the server.
77
Extensible Authentication Protocol (EAP)
allows for more secure authentication methods to be used instead of just a username and a password
78
Remote Monitoring and Management
a centralized tool used by managed service providers to manage groups of users and workstations remotely
79
Microsoft Remote Assistance (MSRA)
allows a user to ask for help from a technician or a coworker by using a passcode-protected invitation file. Quick Assist is a new version where you don't have to send a file and instead just need a code
80
Desktop Management Software (Unified Endpoint Management)
designed for the deployment by an enterprise organization that allows them to understand all the access controls and authorization involved with all of their different systems
81
Endpoint Detection and Responses (EDR)
allows for the scanning of the desktops and laptops that are being managed by the EDM
82
What is the BCD file on windows?
boot configuration data file which stores boot configuration parameters that are used by the Windows Boot Manager to load the OS and drivers/services
83
System Image
a snapshot of how a system looks right now, including all personal files, applications, and installations
84
What is APK sideloading?
installing an application outside of the official store
85
What is a thin client?
A thin client is a lightweight computer device that relies heavily on a central server for processing and storage.