Glossary Flashcards

1
Q

Designed for moderate power requirements. This type of AC power is normally used in households.

A

One phase power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Unit of height measurement for racks and rack mounted equipment 1U equals 1 3/4-in

A

1U

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Third generation wireless telecommunications network

A

3G

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Designed for demanding power requirements. This type of AC power is normally used in industrial environments and data centers

A

Three phase power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

4th generation wireless telecommunications network speeds are faster than 3G and it supports more broadband applications

A

4G

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An IPv6 transition technology that allows IPv6 traffic over the IPv4 internet. Routers on both ends must support IPv6 and each must have an IPv6 address configured on its internal surface

A

6to4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Domain name service (DNS) record type that resolves fully qualified domain names FQDNs to IPv4 addresses.

A

A record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DNS record type that resolves FQDNs to IPv6 addresses

A

AAAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A list of entities such as users and groups that are granted or denied permission to access a resource such as a file

A

Access control list (ACL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Microsoft’s lightweight directory access protocol (LDAP) compliant network database containing objects such as users, groups and computers. The database is replicated between domain controller servers and is used for authentication, centralized Group Policy settings, and storage of some network application configurations including DNS (domain name service) and activation keys.

A

Active directory domain services
(AD DS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Microsoft’s Identify Federation Solution used for web Single Sign On (SSO). ADFS can be configured with user and device claim types that are consumed by trusting applications. Claims are digitally signed by ADFS using a private key; trusting applications verify the signature with the related public key.

A

Active Directory Federation Services (ADFS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A symmetric block cipher available in 128 bit, 192 bit and 256 bit cypher strengths. It supersedes the data encryption standard (DES).

A

Advance Encryption Standard (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A magnetic tape storage medium used with tape backup and archiving systems

A

Advanced Intelligent Tape (AIT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A 32 bit and 64 bit multi-core processor type used in small computing devices such as smartphones.

A

Advanced RISC machine (ARM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A type of network that does not have a connection to the internet, either wirelessly or using a wired connection. This isolated network can be used for testing purposes or highly sensitive networks

A

Air-gapped network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A type of power that uses small variations in voltage and current. It is available from power outlets and consumed by power supplies.

A

Alternating Current (AC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

AMDs virtualization firmware support that is required by some type 1 and type 2 hypervisors

A

AMD virtualization (AMD-V)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Similar to multi-casting, this IPv6 transmission method attempts to find the nearest receiver of a multicast group.

A

Anycast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A server configured to serve a specific business need beyond core functionality, such as generic file server or database server.

A

Application Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A data replication method in which a delay occurs after the initial data right before the secondary right takes place.

A

Asynchronous replication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A self-assigned unique LAN IPv4 address that Windows devices use when the Dynamic Host Configuration Protocol (DHCP) server is unreachable. APIPA devices can communicate only with other APIPA devices on the LAN.

A

Automatic Private IP Address (APIPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

An IT service configuration, normally for load balancing, that can add virtual machines (scaling out) or remove virtual machines (scaling in) based on a schedule or metric threshold configuration.

A

Auto scaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A term used to describe installation or disaster recovery scenarios in which a computer system has no operating system installed.

A

Bare metal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

An interface between server management tools and the physical server hardware being managed. The BMC also monitors the state of servers and is often used with blade servers.

A

Baseboard management controller (BMC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Used with disk array controllers, upon restart, for data not yet written to the disk. It is cached data (not lost during a power cycle) so the data gets written to disk.

A

Battery-backed write caching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Numeric system consisting of zeros and ones

A

Binary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Uses a personal identifying characteristic for proof of identity such as a fingerprint or retinal scan

A

Biometric authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Basic input-output system; the firmware instructions embedded on a motherboard that provide basic hardware functionality, including the initial Power On Self-Test (POST) sequence when the machine is powered on.

A

BIOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Microsoft’s disk volume encryption tool. Although it can be used without the Trusted Platform Module (TPM), it is designed to use TPM functionality.

A

BitLocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Blade servers (essentially server motherboards) are placed into a blade enclosure, which is mounted into a rack. Since each blade does not have its own cooling, networking and power, this is supplied through this type of enclosure.

A

Blade enclosure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

A thin server that is placed into a blade enclosure that provides cooling, networking and power. These servers increase server density and data centers compared to traditional rack mounted and tower servers.

A

Blade server

32
Q

A group of infected computers under centralized malicious user control. The malicious user can provide instructions for the group of computers much like an army general ordering soldiers to attack an adversary.

A

Botnet

33
Q

The policy that enables people to bring their own personal computing devices into a business or corporate environment. Using mobile devices, the company often exercises control over business apps, settings and data on the device in a separate logical device partition that can be selectively wiped, while leaving personal apps settings and data intact.

A

Bring your own device (BYOD)

34
Q

A standard way to measure heat output of computing equipment which can be used to determine cooling requirements for an HVAC system.

A

British thermal units (BTUs)

35
Q

A transmission received by all network nodes on the LAN. Network broadcasts can apply at the hardware or software level. Routers do not forward broadcasts by default.

A

Broadcast

36
Q

An exploit that provides more data than the programmer intended in memory, which can lead to remote escalation attacks. Secure coding practices can prevent this from happening.

A

Buffer overflow

37
Q

Buses are sets of conductors that carry data (bits) around the computer and a computer consists of various buses. The size of this is commonly 32 or 64 bits.

A

Bus Width

38
Q

Proactive planning which ensures that business operations continue when negative incidents occur. The plan is not as detailed or specific as a disaster recovery plan.

A

Business continuity plan (BCP)

39
Q

Identifies the degree and scope of impact on a business when negative incidents occur. This enables easier prioritization of assets that require protection from threats.

A

Business impact analysis (BIA)

40
Q

In equipment racks, a folding arm that holds cables. When rack equipment is slid out on rack rails, the arm extends to provide longer cable lengths.

A

Cable management arm

41
Q

A small amount of high-speed memory used to fetch recent instructions or data.

A

Cache

42
Q

Category 3 copper wire network cabling that is designed to support up to 10 megabytes per second

A

Cat 3

43
Q

Category 5 copper wire network cabling that is designed to support up to 100 megabytes per second. Also called 100Base-T or Fast Ethernet.

A

Cat5

44
Q

Category 5 copper wire network cabling that is designed to support up to 1000 megabytes per second or one gigabyte per second. Also called 1000Base-T or gigabit ethernet.

A

CAT5e

45
Q

Category 6 copper wire network cabling that is designed to support up to 10 gigabytes per second. It is more resistant to interference than CAT5 and has more twists per foot in the cable. Also called 10G Base-T, longer cable distances (approximately 60 to 100 meters) can be run at one gigabyte per second.

A

Cat6

46
Q

Category 7 copper wire network cabling that is designed to support up to 10 GB per second and uses individual wire pair shielding which makes it useful in environments with high electromagnetic interference (EMI).

A

CAT7

47
Q

A microprocessor chip on a motherboard that carries out instructions within the system. Modern chips consist of multiple logical cores within a single physical chip.

A

Central Processing Unit (CPU)

48
Q

Issuer of digital security certificates in a public key infrastructure (PKI). Companies can create their own CAs or use certificates issued from trusted third party CAs.

A

Certificate Authority (CA)

49
Q

Also called a snapshot, this takes a point in time picture of virtual machine settings and data disks. This can also refer to disk volume snapshots which copy only disk blocks changed since the previous snapshot.

A

Checkpoint (or snapshot)

50
Q

An algorithm used for encryption, decryption, or hashing mathematical operations.

A

Cipher

51
Q

A short hand way of referring to the number of bits in a network mask. For example, /24 can be used to represent 255.255.255.0.

A

Classless Inter-Domain Routing (CIDR)

52
Q

Defines a relationship between the external CPU bus speed (Megahertz) versus the internal CPU speed (Gigahertz)

A

Clock multiplier

53
Q

Pooled computing resources that can be self-provisioned rapidly, usually over the internet. IT resource usage is metered so that consumers pay for only what they use. This type of computing resource must be available anywhere, any time, and on any device.

A

The Cloud

54
Q

Complementary metal oxide semiconductor; battery-powered firmware used to retain hardware settings available in the BIOS.

A

CMOS

55
Q

In data centers, these areas feed cool air to equipment intake fans to manage airflow for equipment and for cost optimization.

A

Cold aisle

56
Q

An alternate data center space that can be used in the event of a disaster to the original site. The site has power and communications links but no computing equipment, staff or data.

A

Cold site

57
Q

A memory characteristic that defines how long it takes for requested memory content to leave the actual memory chip on its way to the bus.

A

Column Access Strobe (CAS) latency

58
Q

A server under malicious user control that provides instructions to hosts infected with malware. Infected hosts (zombies) or collections of zombies (botnets), periodically contact this server for instructions.

A

Command and Control (C&C or C2)

59
Q

The standard UNIX print server software components are referred to as this.

A

Common Unix Printing System (CUPS)

60
Q

A cloud deployment model adhering to the five NIST cloud computing characteristics (on-demand self-service, broad network access, resource pooling, rapid elasticity or expansion, and measured service) that provides IT services to groups with the same computing needs such as government agencies or specific industries.

A

Community Cloud

61
Q

A small storage card used in devices such as cameras and audio recorders, similar to an SD card. The device being used determines whether SD cards or this type of storage must be used.

A

Compact Flash

62
Q

A microprocessor design used in larger non-mobile computing devices such as desktops and servers. This type of chip is designed not for energy efficiency, but for performance.

A

Complex Instruction Set Computing (CISC)

63
Q

Supported by encryption, this describes the prevention of disclosure of sensitive information to unauthorized users.

A

Confidentiality

64
Q

Real-time replication (synchronous) which is often used for data between data centers.

A

Continuous Data Protection (CDP)

65
Q

Server expansion card that combines Ethernet and Fiber Channel functionalities.

A

Converged Network Adapter (CNA)

66
Q

High-speed memory used to keep recently executed data or CPU instructions readily available for subsequent use.

A

CPU cache

67
Q

Cable used to link two network computing devices directly together, where receive and transmit wires are reversed on either end. This type of cable can also be required by older network equipment, such as linking two old ethernet switches together.

A

Cross-over cable

68
Q

This describes interference caused by electronic signals on adjacent wires. It can be reduced with wire shielding and by twisting wire pairs together a specific amount of times per foot. The more twists per foot, the less this will occur.

A

Cross-talk

69
Q

Components provided under warranty by a vendor that are installed by the customer.

A

Customer Replaceable Units (CRUs)

70
Q

A background process on a Unix or Linux system not tied to a user session. Examples include the sshd _____ for remote management and the syslogd _____ for logging.

A

Daemon

71
Q

A facility dedicated to housing computing equipment. Special designs enforce security, control HVAC, improve resistance to floods, fire and earthquakes and have backup power and communication solutions.

A

Data Center

72
Q

A Microsoft Windows Performance Monitor configuration that enables the addition of multiple metrics that can be scheduled to monitor hosts for a period of time. Useful for establishing Windows host performance baselines.

A

Data Collector Set (DCS)

73
Q

A storage mechanism designed to save storage space by removing redundant data blocks.

A

Data Deduplication

74
Q

A solution that prevents sensitive data from leaving the organization or prevents intellectual property from becoming available to unauthorized users.

A

Data Loss Prevention (DLP)

75
Q

An expansion circuit board that gets plugged into a motherboard. Unlike a normal expansion card, this type of card has direct access to CPU and memory resources.

A

Daughter card