Set 35 Flashcards
(28 cards)
Snapshot
A saved state of a virtual machine or system at a specific point in time that can be restored later to that exact state.
Social Engineering
A technique attackers use to manipulate or trick people into revealing confidential information or performing actions that compromise security.
SO-DIMM
(Small Outline Dual Inline Memory Module). A smaller, more compact type of RAM module used mainly in laptops and small form-factor computers.
Soft Power
The ability to power off a device gracefully through the operating system, allowing programs to close and save data before shutting down.
Soft Reset
Restarting a device or computer without cutting power, usually through a software command, to clear errors or refresh the system.
Soft Token
A software-based security token (often an app) that generates time-based codes for two-factor authentication (2FA).
Software
Programs and operating systems that tell the hardware what to do; intangible instructions executed by a computer.
Software Firewall
A firewall implemented through software on a device to control and filter network traffic and prevent unauthorized access.
SDN
(Software-Defined Networking). A network architecture that uses software-based controllers to manage and automate network hardware, making networks more flexible and easier to manage.
Solid Core
A term sometimes used to describe a solid-state CPU core or a processor core designed to be energy-efficient and powerful; more commonly, the phrase may refer to solid-core processors as opposed to virtual or emulated cores.
SSD
(Solid State Drive). A type of storage device that uses flash memory to store data, offering faster access speeds and greater durability than traditional hard drives.
Spam
Unsolicited, usually bulk, electronic messages typically sent via email, often containing advertising or malicious content.
Spam Gateway
A security system or service that filters and blocks unwanted or malicious email (spam) before it reaches a user’s inbox.
Spanned Volume
A type of disk volume that combines space from multiple physical drives into one large logical drive, allowing data to be stored across several disks.
SPD
(Serial Presence Detect). A small chip on RAM modules that stores information about the module’s size, speed, voltage, and timing, helping the system configure memory settings automatically.
Speaker
An output device that converts audio signals into sound.
Spear Phishing
A targeted form of phishing attack where attackers customize messages to specific individuals or organizations to trick them into revealing sensitive information.
Spindle Speed
The speed (measured in revolutions per minute, RPM) at which a hard disk drive’s platters spin, affecting how quickly data can be read or written.
SPoD
(Single Point of Defense). A security concept where a single device or system serves as the main point to defend a network or resource.
Spoofing
A technique where an attacker disguises themselves as a trusted entity by falsifying data like IP addresses, email addresses, or caller IDs to gain unauthorized access.
Spyware
Malicious software that secretly monitors and collects information about a user’s activities without their knowledge.
SQL Attack
An attack targeting databases by injecting malicious SQL code to manipulate, steal, or destroy data.
SRAM
(Static RAM). A type of high-speed memory used for cache, which retains data as long as power is supplied without needing to be refreshed.
SSID
(Service Set Identifier). The name of a wireless network broadcast to identify it to devices trying to connect.