Random Tech Terms To Know Flashcards

1
Q

VPN

A

Virtual Private network
-encrypts your internet connection
-Internet traffic is routed through a connected tunnel so that other people can’t see your activity and information

3 types:
-Remote access VPN
-Site-to-site VPN
-Mobile VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IDE

A

Integrated Development Environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ISP

A

Internet service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DHCP

A

Dynamic Host Configuration Protocol
-network server that automatically provides and assigns IP addresses, default gateways and other network parameters to client devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MFA

A

Multi-factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Internet connection path

A

ISP>travels to…>firewall>switch>peripherals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IIS

A

Internet information service
-A web server hosted by Microsoft that runs on Windows
-Used to exchange web content with users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AD

A

Active Directory
-database and set of services that connect users with network resources
-includes users and computers and who is allowed to do what
-used by administrators to manage permissions and control access to network resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Services (Windows)

A

Background apps that don’t have an interface and do a variety of things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

cmdlet

A

a lightweight command in the Windows PowerShell environment that performs a specific action and manipulates objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

EDR

A

Endpoint detection and response. Security tool, firewall, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

BitLocker

A

a Windows security feature that encrypts drives to protect data from theft or unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SOC

A

Security operations center
SOC acts like the hub or central command post, taking in telemetry from across an organization’s IT infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Kernel

A

Core of an OS
-controls security, file management, platform for apps to run
-user rarely interacts with the kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Registry

A

a database that stores configuration settings and other details about the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hyper-V

A

Windows compatible virtualization product

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A-record

A

a type of DNS record that maps a domain name to the IP address of the computer that hosts it

A records are used when a user tries to access a website by typing in its domain name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CNAME

A

Maps an alias/subdomain to the primary domain name
-on DNS record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

DC

A

Domain controller
-a server that manages a network’s security and access/identity requests. The Active Directory (AD) services database is stored on the DC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Domain

A

Large network
-different users have different privileges and access rights
-managed by a server called a domain controller (DC)
-manages security and authentication
-stores the shared information for the
-pcs can be on different local networks but in the same domain
-main function of an AD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Workgroups

A

Small networks
-each computer has its own storage, management, and the account must be on that device
-same local network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Windows ADK

A

Windows Assessment and Deployment Kit
-used to customize windows installation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

ODD

A

Optical Disk drives
-tray that opens and reads DVD drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

ISO file

A

Copy of an entire optical disk, archived into a single file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
.bat file
Batch file, it contains a series of commands that are executed in sequence when the file is run
26
NIC
Network interface controller -A network interface controller is a computer hardware component that connects a computer to a computer network
27
System image
Exact copy of a hard drive: including OS, executable files, system settings and all files and folders
28
WIM
Windows imagine format -file extension for a complete windows image
29
Answer/unattend file
an XML-based file that contains settings and values used to customize Windows Setup
30
Media/media technology/media device
Electronic devices used to store data, such as hard drives (HDD and SSD), USB drives, DVDs, CD-ROM, and floppy disks.
31
USMT
User state migration tool -Windows ADK tool to move user profiles and data across
32
MDT
Microsoft Deployment Toolkit -used to capture and deploy images
33
WinPE
Windows pre-installation environment -barebones version of windows used to trouble shoot and deploy windows
34
ADK
Assessment and Deployment Kit -windows tool that can be used to assist in the creation and management of image files -customize windows installation
35
OOBE
Out-of-box-experience -what windows users experience with their fresh, new devices -prompts that ask about language, keyboards and other preferences that users see and go through after booting a configured device for the first time
36
MDM
Mobile Device Management -a solution that can configure devices over the cloud that are apart of an Active Directory
37
OU
Organizational unit -type of container/unit within an AD domain -good for organizing domain objects
38
Domain objects
Different kinds of objects within a DC -computer, printers, users
39
TPM chip
International standard for a secure crypto processor -secures hardware through integrated cryptographic keys
40
RBAC
Role-based access control -Security model used to control an organizations access to resources
41
Azure Active Directory
A cloud-based authentication service
42
SID
Security identifier -string attached to each user, computer and group in Windows
43
SAN (domain)
Subject alternative name -alternative name for a FQDN (fully qualified domain name)
44
MMC
Microsoft management console -tool that can be used for many purposes in Windows
45
LSDOU
Stands for Local, Site, Domain, Organizational Units (in that order) -this is the order of processing for GPOs -ones processed later will override earlier ones and will be applied to those under that tree
46
CIDR
Classless Inter-Domain Routing -denoting sub masks by the number of 1s in the subnet mask -example: 255.255.0.0 would be denoted as “/16”
47
RU or U
“Rack unit” or “Unit” Unit of measurement indicating one server rack slot/space -1 RU= 1.75” in height or of vertical space
48
NIC
Network interface card -hardware component that allows a computer to connect to a network and exchange data with other devices
49
ADDS
Active Directory domain services -on premise AD services with domain controllers
50
ICMP (echo and response)
Set of packets being sent or received, can be used by sending “ping” commands in command line/powershell
51
PAAS
Platform as a service -platform is ready to use, has to be administered before being used
52
SAAS
Software as a service -a fully functional app that is ready to use
53
IAAS
Infrastructure as a service -I.e. Azure, AWS (Amazon Web Services), GCE (Google)
54
SSO
Single-sign on -used to have only one account to logon to cloud apps and even on-Prem services -Azure AD connect/Entra connect
55
MAC address
Unique identifier assigned to NIC (network interface controller) for use as a network address in communications within a network segment -also used to identify a device on a network
56
ISATAP
Intra-site automatic tunnel addressing protocol -type of tunneling method used when two sites in the same network are using different kinda of networks (IPv4 and IPv6) -Needs an ISATAP router, can go both ways
57
What 4 addresses does a computer need to function on a network?
1. IP address 2. Subnet mask 3. Default gateway (router) address 4. DNS (domain name system) server address
58
SSID
Service Set Identifier -name of a wireless network -most routers have a default name, it’s a good idea to change this to something different
59
RBAC
Role-based access control -rights and permissions in an environment are based on the roles given to the user (when using RBAC)
60
UAC
User access control -can be edited in a GPO -standard users get a standard user token when logging in -admins get an admin user token when logging in -when standard user tries to do something that requires admin credentials, UAC is activated and prompts for admin credential input -4 levels of UAC
61
Open network
Wireless network open to public, often used a captive portal (portal that must be used/gone through to access the network, sometimes makes you pay) -no authentication required
62
PSK network
Pre-shared key network -most common wireless network -pre configured password to access
63
WPS method
Method of accessing a wireless network by pushing WPS button on AP (access point), or by using NFC (near-field communication)
64
802.1x standard
Network security standard, usually used at an enterprise level -uses three components -supplicant-user requesting access -Authenticator-device (typically a switch in wired networks or an access point in wireless networks) that controls network access -Authentication server- server (usually RADIUS server) that verifies users creds
65
RADIUS
Remote authentication dial-in service -open authentication standard -credential sent in UDP packet -uses port 1812 for authentication and authorization -uses port 1813 for accounting -only encrypts passwords
66
TACACS+
Terminal access controller access-control system -type of authentication method -better than RADIUS -creds sent in TCP packet -uses port 49 -all data is encrypted
67
TKIP
Temporal key integrity protocol -older, used with WPA2 and 3 -each packet gets its own encryption key -Vulnerable
68
AES
Advanced encryption standard -block ciphers or 128 bits -keys up to 256 bits in length -based on the Rijndael algorithm -one of the strongest encryption protocols available
69
Kerberos
Windows Authentication method -only authenticates, DOES NOT authorize or account -often used alongside TACACS+ or RADIUS
70
UDP and TCP
UDP (user datagram protocol) TCP (transmission control protocol) Both are protocols -both are protocols that operate at the transport level of the OSI model and apart of the IP (Internet protocol) suite
71
TCP/IP
Internet protocol (IP) suite, organizes communication protocols for the Internet
72
PIM
Privileged identity management -tech that allows you to manage, control, and monitor access to resources in your organization.
73
Source anchor
Immutable attribute that is the same attribute in AD and Azure -links AD and Azure together for syncing and other scenarios (recovery, rebuilding of sync server)
74
TPM
Trust platform module -chip on the MB that secures hardware through cryptographic keys
75
UPN
User principal name -username followed by an “@“ symbol followed by the Active Directory internet domain