Vocabulary Flashcards

(77 cards)

1
Q

access control list (ACL)

A

The collection of access control entries (ACEs) that determines which subjects (user accounts, host IP addresses, and so on) are allowed or denied access to the object and the privileges given (read-only, read/write, and so on).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

access point (AP)

A

A device that provides a connection between wireless devices and can connect to wired networks, implementing an infrastructure mode WLAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

accounting

A

Tracking authorized usage of a resource or use of rights by a subject and alerting when unauthorized use is detected or attempted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

advanced encryption standard (AES)

A

Symmetric 128-, 192-, or 256-bit block cipher used for bulk encryption in modern security standards, such as WPA2, WPA3, and TLS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

advanced technology extended (ATX)

A

Standard PC case, motherboard, and power supply specification. Mini-, Micro-, and Flex-ATX specify smaller board designs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

air-gapped

A

A type of network isolation that physically separates a host from other hosts or a network from all other networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

algorithm

A

Operations that transform a plaintext into a ciphertext with cryptographic properties, also called a cipher. There are symmetric, asymmetric, and hash cipher types.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

algorithms

A

Operations that transform a plaintext into a ciphertext with cryptographic properties, also called a cipher. There are symmetric, asymmetric, and hash cipher types.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

american standard code for information interchange (ASCII)

A

7-bit code page mapping binary values to character glyphs. Standard ASCII can represent 127 characters, though some values are reserved for non-printing control characters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

antivirus software

A

Inspecting traffic to locate and block viruses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

array

A

Identifier for a group of variables of the same type. The number of possible elements in an array is fixed when the array is declared.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

artificial intelligence

A

The science of creating machines with the ability to develop problem-solving and analysis strategies without significant human direction or intervention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

assembly language

A

A compiled software program is converted to binary machine code using the instruction set of the CPU platform. Assembly language is this machine code represented in human-readable text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

attenuation

A

Attenuation, or degradation of a signal as it travels over media, determines the maximum distance for a particular media type at a given bit rate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

augmented reality (AR)

A

Using software and smartphone cameras or headsets to interact with real-world objects and images or change the way they appear in some way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

authentication

A

A method of validating a particular entity’s or individual’s unique credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

authorization

A

The process of determining what rights and privileges a particular entity has.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

availability

A

The fundamental security goal of ensuring that computer systems operate continuously and that authorized persons can access data that they need.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

backdoors

A

A mechanism for gaining access to a computer that bypasses or subverts the normal method of authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

bandwidth

A

Generally used to refer to the amount of data that can be transferred through a connection over a given period. Bandwidth more properly means the range of frequencies supported by transmission media, measured in Hertz.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

basic input/output system (BIOS)

A

Legacy 32-bit firmware type that initializes hardware and provides a system setup interface for configuring boot devices and other hardware settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

biometric authentication

A

An authentication mechanism that allows a user to perform a biometric scan to operate an entry or access system. Physical characteristics stored as a digital data template can be used to authenticate a user. Typical features used include facial pattern, iris, retina, fingerprint pattern, and signature recognition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

bit

A

The fundamental unit of data storage is the bit (b) which can represent 1 or 0.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

blu-ray

A

Latest generation of optical drive technology, with disc capacity of 25 GB per layer. Transfer rates are measured in multiples of 36 MB/s.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
branching
In scripting and programming, control statement that uses a condition to determine which code block to execute next.
26
buses
Connections between components on the motherboard and peripheral devices providing data pathways, memory addressing, power supply, timing, and connector/port form factor.
27
byte
8 bits form a byte (B), a unit that describes file sizes and memory capacity.
28
cascading style sheets (CSS)
A simple language for adding style, such as different colors, fonts, spacing, and other formatting, to Web documents.
29
cathode ray tube (CRT)
A CRT receives an analog signal from the graphics adapter and forms a color image on the screen by illuminating red, green, and blue dots (triads). CRTs are no longer mass-manufactured and modern systems use LCD panels.
30
cd-rom
A type of read-only memory consisting of a pre-pressed optical compact disc that contains data. Computers can read—but not write or erase—this type of storage.
31
cd-rw
Optical storage technology supporting up to 700 MB per disc with recordable and re-writable media also available.
32
cellular radio
Standards for implementing data access over cellular networks are implemented as successive generations. For 2G (up to about 48 Kb/s) and 3G (up to about 42 Mb/s), there are competing GSM and CDMA provider networks. Standards for 4G (up to about 90 Mb/s) and 5G (up to about 300 Mb/s) are developed under converged LTE standards.
33
central processing unit (CPU)
Principal microprocessor in a PC or mobile device responsible for running firmware, operating system, and applications software.
34
certificate
Issued by a Certificate Authority (CA) as a guarantee that a public key it has issued to an organization to encrypt messages sent to it genuinely belongs to that organization.
35
certificate authority (CA)
A server that guarantees subject identities by issuing signed digital certificate wrappers for their public keys.
36
ciphertext
Data that has been enciphered and cannot be read without the cipher key.
37
client-server
Administration paradigm where some host machines are designated as providing server and services, and other machines are designated as client devices that only consume server services.
38
client-server architecture
Administration paradigm where some host machines are designated as providing server and services, and other machines are designated as client devices that only consume server services.
39
coaxial cable
Media type using two separate conductors that share a common axis categorized using the Radio Grade (RG) specifications.
40
command line interface (CLI)
A text-based interface between the user and the operating system that accepts input in the form of commands.
41
comma-separated value (CSV)
A comma-separated value file type uses commas and new lines to organize information into cells in a table format, and stores the table as a text file. This file type uses the extension ".csv" and is one of the most common outputs for any spreadsheet program.
42
compiler
A type of software that translates code written in one programming language (the source language) into another language (the target language). "Compiler" is not one piece of software, but refers to a variety of types of programs that translate source code from high-level programming language to a low-level programming language (such as assembly language, object code, or machine code) to create an executable program.
43
computing cycle
The sequence of actions that a device goes through to process instructions and perform tasks. The four main steps of the computing cycle are input, process, storage, and output.
44
confidentiality
The fundamental security goal of keeping information and communications private and protecting them from unauthorized access.
45
cookies
A text file used to store information about a user when they visit a website. Some sites use cookies to support user sessions.
46
cybersecurity
Protection of computer systems and digital information resources from unauthorized access, attack, theft, or data damage.
47
data at rest
Information that is primarily stored on specific media, rather than moving from one medium to another.
48
data in transit
Information that is being transmitted between two hosts, such as over a private network or the Internet.
49
database
Data storage systems that organize electronic information into structured tables, allowing for the easy retrieval and interpretation of data. Many databases are operated using Structured Query Language (SQL, pronounced "sequel"). Database design, programming, and administration is complex and security should be considered as a critical requirement.
50
database administrators (DBAs)
The IT role responsible for the configuration, management, and support of database applications.
51
defense in depth
Security strategy that positions the layers of diverse security control categories and functions as opposed to lying on perimeter controls.
52
defragmentation
Fragmentation occurs when a data file is not saved to contiguous sectors on an HDD and reduces performance. The defragmenter mitigates this and can also perform optimization operations for SSDs.
53
digital subscriber line (DSL)
Carrier technology to implement broadband Internet access for subscribers by transferring data over voice-grade telephone lines. There are various "flavors" of DSL, notably S(ymmetric)DSL, A(symmetric)DSL, and V(ery High Bit Rate)DSL.
54
digital visual interface (DVI)
Legacy video interface that supports digital only or digital and analog signaling.
55
displayport
Digital audio/video interface developed by VESA. DisplayPort supports some cross-compatibility with DVI and HDMI devices.
56
dotted decimal notation
Format for expressing IPv4 addresses using four decimal values from 0 to 255 for each octet.
57
double data rate (DDR)
Series of high-bandwidth system-memory standards (DDR3/DDR4/DDR5) where data is transferred twice per clock cycle.
58
dual inline memory module (DIMM)
Standard form factor for system memory. There are different pin configurations for different DDR-SDRAM RAM types.
59
dvd
Optical storage technology supporting up to 4.7 GB per layer per disc with recordable and re-writable media also available.
60
dynamic host configuration protocol (DHCP)
Protocol used to automatically assign IP addressing information to hosts that have not been configured manually.
61
elasticity
Property by which a computing environment can add or remove resources in response to increasing and decreasing demands in workload.
62
encrypted, encryption
Scrambling the characters used in a message so that the message can be seen but not understood or modified unless it can be deciphered. Encryption provides for a secure means of transmitting data and authenticating users. It is also used to store data securely. Encryption uses different types of algorithm/cipher and one or more keys. The size of the key is one factor in determining the strength of the encryption product.
63
end user license agreement (EULA)
Contract governing the installation and use of software.
64
escape character
A character that is used to remove the special meaning from another character so it can be interpreted literally.
65
extensible markup language (XML)
A system for structuring documents so that they are human and machine readable. Information within the document is placed within tags, which describe how information within the document is structured
66
factors
In authentication design, different technologies for implementing authentication, such as knowledge, ownership/token, and biometric/inherence. These are characterized as something you know/have/are.
67
fiber internet
Internet connection type that uses a fiber link between the subscriber premises and ISP network. Fiber to the premises (FTTP) uses a full fiber link, while fiber to the curb (FTTC) retains a short segment of copper wire between the subscriber premises and a street cabinet.
68
file transfer protocol (FTP)
Application protocol used to transfer files between network hosts. Variants include S(ecure)FTP, FTP with SSL (FTPS and FTPES), and T(rivial)FTP. FTP utilizes ports 20 and 21
69
firewall
Software or hardware device that protects a network segment or individual host by filtering packets to an access control list.
70
flash memory
Flash RAM is similar to a ROM chip in that it retains information even when power is removed, but it adds flexibility in that it can be reprogrammed with new contents quickly. Flash memory is used in USB thumb drives and memory cards for removable storage and in Solid State Drives (SSDs), designed to replicate the function of hard drives.
71
flowchart
A diagram that shows the relationships of various elements in a system or process.
72
foreign key
Structured database in which information is stored in tables where columns represent typed data fields and rows represent records. Tables can have relationships, established by linking a unique primary key field in one table with the same value in a foreign key field in another table. The overall structure of a particular database and its relations is called a schema.
73
form factors
Size and shape of a component, determining its compatibility. Form factor is most closely associated with PC motherboard, case, and power supply designs.
74
function
A block of code that can be reused to perform a specific task.
75
general data protection regulation (GDPR)
Provisions and requirements protecting the personal data of European Union (EU) citizens. Transfers of personal data outside the EU Single Market are restricted unless protected by like-for-like regulations, such as the US's Privacy Shield requirements.
76
geofencing
Security control that can enforce a virtual boundary based on real-world geography.
77