ITLC REVIEWER Flashcards
(33 cards)
is an object that stores information on a computer. It can contain user data, in the case of a document file, or it can contain program code in the case of application files.
Files
include files responsible for system configuration, booting, device drivers, and core operating system functionalities.
System Files
include documents, images, videos, personal configuration, and application data specific to the user.
User Files
is a link or pointer to a program, file, or folder that is represented by a small icon, placed on the desktop.
Shortcuts
known as subfolders are organized and stored.
Folders
help protect files from unauthorized access, modification, or deletion
Windows OS Permissions
lets you browse and manage files and folders on your computer.
File Explorer
are combinations of keyboard keys that provide quick access to certain functions or commands in software, saving time and improving efficiency
Shortcut Keys
maintain organization in your file structure. Items can be stored in more than one location and can be moved to a different location.
Manage File And Folders
computer where deleted files are temporarily stored.
Recycle Bin
that provide information about a file, beyond just the data it contains
File Attributes
Files is the process of reducing the size of a file; it makes it easier to transfer files from one location to another.
File Compression and Extraction
It is also known as a screenshot, screen grab, or screen dump.
Screen Captures
It enables you to select specific areas of the screen, such as a freeform region or rectangular region.
The Snipping Tool
often does this professionally, working for a security organization or a system manufacturer. This is sometimes called an ethical hack.
White Hat
discovers and exposes security vulnerabilities for financial gain or for some malicious purpose.
Black Hat
is a type of attack that uses deception and trickery to convince
unsuspecting users to provide sensitive data or to violate security guidelines.
Social Engineering Attacks
This is a human-based attack where the goal is to look over the shoulder of an individual as he or she enters password information or a PIN.
Shoulder Surfing
attackers are not above jumping into a dumpster or large recycling location in an attempt to obtain information they can use or sell.
Dumpster Diving
attack in which the attacker attempts to obtain and make use of
passwords illegitimately
Password Cracking
The items most often stolen are portable devices such as laptops, tablets, and smartphones. The pieces of hardware often have highly valuable data on them.
Theft
standard communication for mobile devices, such as smartphones and tablets that are in very close proximity, usually when touching or being only a few inches apart from each other.
Near Field Communication (NFC)
is a network security measure in which a computer user or some other network component
Authentication
that requires validation of two or more authentication factors.
Multi-Factor Authentication