1/63
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
SPICE
.specifically for remote access to virtualized desktops, providing a seamless user experience with features such as audio support, USB redirection, and high-quality video. It is commonly used with Linux-based hypervisors like KV
Remote Desktop Protocol (RDP)
.proprietary Microsoft protocol mainly used for Windows remote desktop connections, making it less suitable for a Linux-based environment
Secure Shell (SSH)
a command-line protocol used for secure remote management rather than graphical desktop access.
virus
malicious software designed to infect computer files or disks when it is activated. A virus may be programmed to carry out other malicious actions, such as deleting files or changing system settings
trojan
malware that looks legitimate but can take control of your computer. A Trojan is designed to damage, disrupt, steal, or in general, inflict some other harmful action on your data or network. The most common form of a trojan is a Remote Access Trojan (RAT), which allows an attacker to control a workstation or steal information remotel
worm
standalone malware computer program that replicates itself to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. A worm can spread on its own, whereas a virus needs a host program or user interaction to propagate itself.
rootkit
clandestine computer program designed to provide continued privileged access to a computer while actively hiding its presence. A rootkit is generally a collection of tools that enabled administrator-level access to a computer or network. They can often disguise themselves from detection by the operating system and anti-malware solutions
repair installation
installation is a type of installation that attempts to replace the existing version of the operating system files with a new copy of the same version. A repair installation is useful when trying to repair a Windows computer that will not boot or when you believe the system files have become corrupted. A repair installation will only affect the system files and not any of the user's settings, customizations, or applications.
clean installation
installation of the new operating system on a new computer or a computer that has been recently formatted. A clean install will completely replace the operating system software on the computer with the new operating system. During a clean install, all of the user's data, settings, and applications will be deleted
in place upgrade
installation of the new operating system on top of an existing version of the operating system. An in-place upgrade will preserve the applications, user settings, and data files that already exist on the computer.
refresh install
installation that will recopy the system files and revert most system settings to their default configuration while preserving user personalization settings, data files, and applications installed through the Windows Store. Any applications installed outside of the Windows Store, though, will be deleted if you use a refresh installation.
constant
specific identifier that contains a value that cannot be changed within the program. For example, the value to convert a number from F to C is always 5/9 because the formula is C = (F -32) * 5/9. A comment is written into the code to help a human understand the initial programmer's logic.
character
stores a single character, such as J, D, or Z. A character data type usually consumes one byte (8 bits) of storage.
string
stores a group of characters, such as Hello, PYTHON, or JasonDion. A string data type usually consumes as much storage as necessary. Each character in the string usually requires 1 byte of storage.
Boolean
Istores a value of TRUE (1) or FALSE (0). It usually consumes only 1 bit of storage (a zero or a one).
integer
.stores a whole number, such as 21, 143, or 1024. An integer data type usually consumes 8 bytes of storage.
application integration
enables different software applications to communicate and share data, ensuring that systems such as CRM, billing, and inventory management work together seamlessly. This reduces the need for manual data entry and improves workflow automation. Virtualization allows multiple operating systems to run on a single physical machine but does not facilitate communication between different applications.
software patch management
ensures applications remain up-to-date and secure but does not integrate them
endpoint protection
focuses on securing devices against threats and is unrelated to linking business applications
RADIUS
.used to manage credentials for network devices centrally
.TACACS+
older username and login system that uses authentication to determine access, while RADIUS combines authorization AND authentication
Kerberos
.used in Windows Active Directory domains for authentication.
domain name system (DNS)
.protocol used to provide names for an IP address based on their mappings in a database using TCP/UDP port 53. The file transfer protocol (FTP) is the protocol used to transfer files across the internet over ports 20 and 21
WPS
created to ease the setup and configuration of new wireless devices by allowing the router to automatically configure them after a short eight-digit PIN was entered
chain of custody
chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of physical or electronic evidence. The chain of custody must be maintained from when you arrived at the laptop until you turn it over to law enforcement officials.
SQL injection
most direct and more impactful threat to an organization's database. A SQL injection could allow the attacker to execute remote commands on the database server and lead to sensitive information disclosure
buffer overflow attack
attack attempts to overwrite the memory buffer to send additional data into adjacent memory locations. A buffer overflow attack might target a database server, but it isn't intended to disclose information directly. Instead, a buffer overflow attack may be used to gain initial access to a server and allow for other malicious code running
denial of service
targets the availability of the information by attempting to take the server offline
cross-site scripting attack
typically is focused on the user, not the server or database.
acceptable use policy (AUP)
governs employees' use of company equipment and Internet services. Enforcing an acceptable use policy is important to protect the organization from the security and legal implications of employees (or customers) misusing its equipment. Typically, the policy will forbid the use of equipment to defraud, defame, or obtain illegal material
local security policy
set of policies relating to log on, passwords, and other security issues that can be enforced or disabled on the local machine.
password policy
set of rules designed to enhance computer security by encouraging users to employ strong passwords and use them properly. A password policy is often part of an organization's official regulations and may be taught as part of security awareness training. It contains items like password complexity, password age, and password history requirements
Group Policy
primary administrative tool for defining and controlling how programs, network resources, and the operating system operate for users and computers in an organization. In an active directory environment, Group Policy is applied to users or computers based on their membership in sites, domains, or organizational units
Rogue anti-virus
form of malicious software and internet fraud that misleads users into believing there is a virus on their computer and to pay money for a fake malware removal tool (that actually introduces malware to the computer). It is a form of scareware that manipulates users through fear and a form of ransomware
fast startup
mode in between a full shutdown and a hibernation mode. With a fast startup, the computer will log out of the computer close all of its open files when being shut down. Before the system powers off, though, a small hibernation file is created to help speed up the bootup process when the computer is powered on again.
USB selective suspend
feature allows the hub driver to suspend an individual port without affecting the operation of the other ports on the hub. Selective suspension of USB devices is helpful when using a laptop computer as it helps to conserve battery power by powering off USB ports that are not needed at the time.
sleep or stanby
used to save the current session to memory and put the computer into a minimal power state to save battery life when the system is not being used. The computer takes less time to start up again from the sleep or standby mode than it does from the hibernate mode.
lock
.secure the desktop with a password while leaving programs running.
Network File System (NFS)
used to mount remote storage devices into the local file system on a Linux system. It allows you to mount your local file systems over a network and remote hosts to interact with them while mounted locally on the same system
The extensible file allocation table (exFAT)
file system optimized for external flash memory storage devices such as USB flash drives and SD cards. exFAT supports a maximum volume size of up to 128 PB with a recommended maximum volume size of 512 TB for the best reliability.
Apple File System(APFS)
default file system for Mac computers using macOS 10.13 or later and features strong encryption, space sharing, snapshots, fast directory sizing, and improved file system fundamentals.
New Technology file system(NTFS)
Windows file system that supports a 64-bit address space and can provide extra features such as file-by-file compression and RAID support as well as advanced file attribute management tools, encryption, and disk quotas. NTFS can support a maximum volume size of up to 8 PB.
Firewall
integral part of creating a screened subnet. If configured correctly, it can regulate exactly what traffic and users are allowed to access the server. This is different from a content filter because a content filter denies traffic to a user based on content, but not access to a server. If the firewall ruleset was not configured to allow external users to access the application remotely, the default condition is to "deny by default".
Thin Client
small device that can operate with or without an operating system installed on the client device. Instead, it can boot directly from a network-based operating system on a common server and access applications on the company's application server. This type of architecture can drastically reduce the need for operating system licenses and reduce deployment costs
Grandfather-father-son
uses daily, weekly, and monthly backups, with the monthly version usually kept off-site for extra protection.
Tower of Hanoi
rotation pattern but doesn't include off-site or monthly backups by default
3-2-1 backup
not a rotation schedule, and while it includes off-site storage, it doesn't specify how often backups happen.
FIFO backup
replaces the oldest backup with the newest and doesn't include long-term or off-site storage.
brute force attack
consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. In a traditional brute-force attack, the passcode or password is incrementally increased by one letter/number each time until the right passcode/password is found.
Dictionary Attack
technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by trying hundreds or sometimes millions of likely possibilities, such as words in a dictionary
Rainbow table attack
precomputed list of possible hashes used when trying to speed up the process of password cracking
WPA2 with AES encryption
most secure wireless network configuration utilizes
RFC change's scope
defines the area, number, size, or scale of a particular change. The change request documentation should define the exact scope of the change. In this example, only some of the Windows 2019 servers will receive the patch. If 50% of them are listed by their asset tracking number will receive the patch, this would clearly define this change's scop
RFC Plan
Ihow the change or installation will occur. The change request documentation should define the 5 W's (who, what, when, where, why, and how), with the plan documentation covering how the change is implemented. For example, the plan might say that the installation will be performed manually or through an automated patching process.
RFC risk analysis
portion of the change request documentation provides the risk levels of carrying out the change, or not performing the requested change at this time. Risk is the likelihood and impact (or consequence) of a given action. It is important to understand the risk involved with a change before deciding to proceed with implementing the change
RFC purpose of change
defines why the change or installation will occur. The change request documentation should define the 5 W's (who, what, when, where, why, and how) to define the why behind the change. For example, the purpose might be "to remediate several category one vulnerabilities so that our security is improved."
Captive portals
usually rely on 802.1x, and 802.1x uses RADIUS for authentication
domain-based email filter
all emails from the spamyou.com domain could be blocked and prevented from being delivered to the user
Wi-Fi protected access version 3 (WPA3)
replaced WPA2 as the most secure wireless encryption method. WPA3 uses the simultaneous authentication of equals (SAE) to increase the security of preshared keys. WPA3 provides the enhanced open mode that encrypts transmissions from a client to the access point when using an open network.
cross-site scripting (XSS)
website's HTML code does not perform input validation to remove scripts that may be entered by a user, then an attacker can create a popup window that collects passwords and uses that information to compromise other accounts further.
standard operating procedure (SOP)
.standard operating procedure (SOP)
scope of work, is a document that outlines all the work that is to be performed, as well as the agreed-upon deliverables and timelines
.Material Safety Data Sheet (MSDS)
.contains information on the potential hazards (health, fire, reactivity, and environmental) and how to work safely with the chemical product. The MSDS is an essential starting point for the development of a complete health and safety program that includes the directions for proper handling and disposal of the chemicals.
Configuration Management Database (CMDB)
solution because it provides a centralized repository for tracking IT assets, configurations, and relationships, ensuring that all changes are documented and can be reviewed for compliance and troubleshooting.