1/49
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Fragmentation occurs when ________________.
___________ occurs when a data file is not saved to contiguous sectors on an HDD and reduces performance.
Escape Character
A character that is used to remove the special meaning from another character so it can be interpreted literally.
eXtensible Markup Language (XML)
A system for structuring documents so that they are human and machine readable. Information within the document is placed within tags, which describe how information within the document is structured.
Factors
In authentication design, different technologies for implementing authentication, such as knowledge, ownership/token, and biometric/inherence. These are characterized as something you know/have/are.
Fiber Internet Connection
Internet connection type that uses a fiber link between the subscriber premises and ISP network.
Fiber to the premises (FTTP)
Uses a full fiber link
Fiber to the curb (FTTC)
Retains a short segment of copper wire between the subscriber premises and a street cabinet
File Transfer Protocol (FTP)
Application protocol used to transfer files between network hosts.
FTP = Ports ___ and ___
Ports 20 and 21 = ___
User Datagram Protocol (UDP)
Application protocol used to send messages to other hosts on an Internet Protocol network.
Flash Memory
Retains information even when power is removed, but it adds flexibility in that it can be reprogrammed with new contents quickly.
Flowchart
A diagram that shows the relationships of various elements in a system or process.
Foreign Key
A field in one database table that is linked to a field in a different table. A _____ in one table refers to the primary key in a different table.
Form Factor
Size and shape of a component, determining its compatibility. Is most closely associated with PC motherboard, case, and power supply designs.
Function
A block of code that can be reused to perform a specific task.
Geofencing
Security control that can enforce a virtual boundary based on real-world geography.
Graphical User Interface (GUI)
An environment for passing commands to a computer by using a graphical, mouse-driven interface rather than by using text-based commands.
Graphics Processing Unit (GPU)
Type of microprocessor used on dedicated video adapter cards or within a CPU with integrated graphics capability.
Hard Disk Drive (HDD)
Mass storage device that uses mechanical platters with a magnetic coating that are spun under disk heads that can read and write to locations on each platter (sectors).
Heat Sink
Cooling device fitted to PC components to optimize heat transfer.
Hexadecimal
Notational system with 16 values per digit. Values above 9 are represented by the letters A, B, C, D, E, and F. Are a compact way of referring to long byte values, such as MAC and IPv6 addresses.
Hot-Swappable
A device that can be added or removed without having to restart the operating system.
HyperText Transfer Protocol/HTTP Secure (HTTP / HTTPS)
Application protocol used to provide web content to browsers.
HTTP = Port ___
Port 80 = ___
HTTPS(ecure) provides for encrypted transfers, using ___________
___________ uses TLS and port 443
Image
Clone copy of an operating system installation (including installed software, settings, and user data) stored as a file on disk. VMs use ____ to store persistent data, and the technology is also used to make system backups.
Incremental Backup
Job type in which all selected files that have changed since the last full (whichever was most recent) are backed up.
Instant Messaging (IM)
Real-time text communications products that also support file exchange and remote desktop. Also called chat or chat messaging.
Integrity
The fundamental security goal of keeping organizational information accurate, free of errors, and without unauthorized modifications.
Internet Protocol (IP)
Network (Internet) layer protocol in the TCP/IP suite providing packet addressing and routing for all higher-level protocols in the suite.
Internet Protocol Address
Format for logical host and network addressing.
IPv4
A 32-bit binary address is expressed in dotted decimal notation, such as 192.168.1.1.
IPv6
Addresses are 128-bit expressed as hexadecimal (for example, 2001:db8::0bcd:abcd:ef12:1234).
Keylogger
Malicious software or hardware that can record user keystrokes.
Land Grid Array (LGA)
CPU socket form factor used predominantly by Intel where connector pins are located on the socket.
Latency
Time taken for a signal to reach the recipient, measured in milliseconds.
Layered Security
An approach that incorporates many different avenues of defense when securing systems and their data against attack. Also known as defense in depth.
Least Privilege
A basic principle of security stating that something should be allocated the minimum necessary rights, privileges, or information to perform its role.
Local Area Network (LAN)
Network scope restricted to a single geographic location and owned/managed by a single organization.
Local Connector (LC)
Small form factor push-pull fiber optic connector; available in simplex and duplex versions. Also called lucent connector.
Loop
In scripting and programming, control statement that executes code repeatedly based on a condition.
Lunchtime Attack
A malicious action that takes place when a threat actor exploits an unlocked and unattended desktop or mobile device to gain unauthorized access.
M.2
Hardware specification for internal adapter cards. Often used for PCIe-based SSDs.
Machine Code
Software that has been assembled into the binary instructions (expressed as hexadecimal) native to the processor platform. This is also known as machine language.
Machine Learning (ML)
A component of AI that enables a machine to develop strategies for solving a task given a labeled dataset where features have been manually identified but without further explicit instructions.
Media Access Control (MAC)
Hardware address that uniquely identifies each network interface at layer 2 (Data Link). A ____ address is 48 bits long with the first half representing the manufacturer's organizationally unique identifier (OUI). Also known as a client identifier.
Memory Card (SD)
Solid state flash memory provisioned as a peripheral device in a proprietary adapter card form factors, such as Secure Digital and microSD.
Metropolitan Area Network (MAN)
Network scope covers the area of a city (that is, no more than tens of kilometers).
Modulator/Demodulator (MODEM)
An analog or dial-up modem is used to interface a computer with the telephone network for data and fax communications, modulating digital data for transmission as an analog signal and demodulating incoming analog transmissions. Broadband ______ are used to transmit signals over telephone (DSL) or cable TV networks.
National Institute of Standards and Technology (NIST)
Develops computer security standards used by US federal agencies and publishes cybersecurity best practice guides and research.