Set 35 Flashcards

(28 cards)

1
Q

Snapshot

A

A saved state of a virtual machine or system at a specific point in time that can be restored later to that exact state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Social Engineering

A

A technique attackers use to manipulate or trick people into revealing confidential information or performing actions that compromise security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SO-DIMM

A

(Small Outline Dual Inline Memory Module). A smaller, more compact type of RAM module used mainly in laptops and small form-factor computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Soft Power

A

The ability to power off a device gracefully through the operating system, allowing programs to close and save data before shutting down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Soft Reset

A

Restarting a device or computer without cutting power, usually through a software command, to clear errors or refresh the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Soft Token

A

A software-based security token (often an app) that generates time-based codes for two-factor authentication (2FA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Software

A

Programs and operating systems that tell the hardware what to do; intangible instructions executed by a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Software Firewall

A

A firewall implemented through software on a device to control and filter network traffic and prevent unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SDN

A

(Software-Defined Networking). A network architecture that uses software-based controllers to manage and automate network hardware, making networks more flexible and easier to manage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Solid Core

A

A term sometimes used to describe a solid-state CPU core or a processor core designed to be energy-efficient and powerful; more commonly, the phrase may refer to solid-core processors as opposed to virtual or emulated cores.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SSD

A

(Solid State Drive). A type of storage device that uses flash memory to store data, offering faster access speeds and greater durability than traditional hard drives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Spam

A

Unsolicited, usually bulk, electronic messages typically sent via email, often containing advertising or malicious content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Spam Gateway

A

A security system or service that filters and blocks unwanted or malicious email (spam) before it reaches a user’s inbox.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Spanned Volume

A

A type of disk volume that combines space from multiple physical drives into one large logical drive, allowing data to be stored across several disks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SPD

A

(Serial Presence Detect). A small chip on RAM modules that stores information about the module’s size, speed, voltage, and timing, helping the system configure memory settings automatically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Speaker

A

An output device that converts audio signals into sound.

17
Q

Spear Phishing

A

A targeted form of phishing attack where attackers customize messages to specific individuals or organizations to trick them into revealing sensitive information.

18
Q

Spindle Speed

A

The speed (measured in revolutions per minute, RPM) at which a hard disk drive’s platters spin, affecting how quickly data can be read or written.

19
Q

SPoD

A

(Single Point of Defense). A security concept where a single device or system serves as the main point to defend a network or resource.

20
Q

Spoofing

A

A technique where an attacker disguises themselves as a trusted entity by falsifying data like IP addresses, email addresses, or caller IDs to gain unauthorized access.

21
Q

Spyware

A

Malicious software that secretly monitors and collects information about a user’s activities without their knowledge.

22
Q

SQL Attack

A

An attack targeting databases by injecting malicious SQL code to manipulate, steal, or destroy data.

23
Q

SRAM

A

(Static RAM). A type of high-speed memory used for cache, which retains data as long as power is supplied without needing to be refreshed.

24
Q

SSID

A

(Service Set Identifier). The name of a wireless network broadcast to identify it to devices trying to connect.

25
SSL ST
(Secure Sockets Layer Secure Tunneling). A protocol for establishing encrypted links between a web server and a browser to secure data transmission.
26
26
Standard User Account
A user account with limited privileges to prevent system-wide changes, enhancing security by restricting access to sensitive settings.
27
Standby
A low-power state where a device or computer reduces power consumption but can quickly resume full operation when needed.