A+ CORE2 Flashcards

0.0(0)
studied byStudied by 7 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/451

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 6:49 PM on 9/24/23
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

452 Terms

1
New cards

2-step verification

Authentication mechanism that uses a separate channel to authorize a sign-on attempt or to transmit an additional credential. This can use a registered email account or a contact phone number for an SMS or voice call.

2
New cards

3-2-1 backup rule

Best practice maxim stating that at any given time there should be at least three copies of data stored on two media types, with one copy held off site.

3
New cards

32-bit versus 64-bit

Processing modes referring to the size of each instruction processed by the CPU. 32-bit CPUs replaced earlier 16-bit CPUs and were used through the 1990s to the present day, though most PC and laptop CPUs now work in 64-bit mode. The main 64 bit platform is called AMD64 or EM64T (by Intel). Software can be compiled as 32-bit or 64-bit. 64-bit CPUs can run most 32-bit software, but a 32 bit CPU cannot execute 64-bit software.

4
New cards

802.1X

Standard for encapsulating EAP communications over a LAN (EAPoL) or WLAN (EAPoW) to implement port-based authentication.

5
New cards

access control list (ACL)

Collection of access control entries (ACEs) that determines which subjects (user accounts, host IP addresses, and so on) are allowed or denied access to the object and the privileges given (readonly, read/write, and so on).

6
New cards

access control vestibule

Secure entry system with two gateways, only one of which is open at any one time.

7
New cards

accessibility prefpane

macOS utility related to desktop and input/output device accessibility configuration.

8
New cards

accounts settings

Windows Settings pages relating to user account creation and maintenance.

9
New cards

active directory (AD)

Network directory service for Microsoft Windows domain networks that facilitates authentication and authorization of user and computer accounts.

10
New cards

active listening

A technique in communications to ensure that you capture all the information that the other person is "transmitting," including non-verbal cues such as tone of voice or gestures. There are various active listening techniques for ensuring that you are "getting the right message," such as summarizing, reflecting (matching the speaker's communication style), interpreting, and verbal attends (such as "Uh-huh," or "I see.")

11
New cards

ad blocker

Browser feature or add-in that prevents third-party content from being displayed when visiting a site.

12
New cards

administrative tools

Folder in Control Panel containing default Microsoft management consoles used to configure the local system.

13
New cards

administrator

Privileged user account that has been granted memberships of the Administrators security group. There is also an account named Administrator, but this is usually disabled by default.

14
New cards

Advanced Encryption Standard (AES)

Symmetric 128-, 192-, or 256-bit block cipher used for bulk encryption in modern security standards, such as WPA2, WPA3, and TLS.

15
New cards

AirDrop

iOS feature for simple file sharing via Bluetooth.

16
New cards

alarm system

Physical intrusion detection and warning that can use circuit, motion, proximity, and duress triggers.

17
New cards

Android

Cell phone/smartphone/tablet OS developed by the Open Handset Alliance (primarily driven by Google). Unlike iOS, it is an open-source OS, based on Linux.

18
New cards

antivirus scan (A-V)

Software capable of detecting and removing virus infections and (in most cases) other types of malware, such as worms, Trojans, rootkits, adware, spyware, password crackers, network mappers, DoS tools, and so on.

19
New cards

APK

Android app package format used when sideloading software from a source other than a trusted store.

20
New cards

.app

Default extension for a macOS app subdirectory when installed to the Applications folder.

21
New cards

Apple File System (APFS)

Default file system for macOS-based computers and laptops.

22
New cards

Apple ID

Cloud-based service allowing users to synchronize settings and manage apps, file sharing, and backups between multiple Apple devices.

23
New cards

application programming interface (API)

Methods exposed by a script or program that allow other scripts or programs to use it. For example, an API enables software developers to access functions of the TCP/IP network stack under a particular operating system.

24
New cards

Apps settings

Windows Settings pages relating to configuration of Windows Features and third-party software apps.

25
New cards

apt-get

One of the package management tools available in Linux for installing and updating software.

26
New cards

asset

Thing of economic value. For accounting purposes, assets are classified in different ways, such as tangible and intangible or short term and long term. Asset management means identifying each asset and recording its location, attributes, and value in a database.

27
New cards

asset tagging

Practice of assigning an ID to assets to associate them with entries in an inventory database.

28
New cards

asymmetric encryption cipher

Cipher that uses public and private keys. The keys are mathematically linked, using either Rivel, Shamir, Adleman (RSA) or elliptic curve cryptography (ECC) algorithms, but the private key is not derivable from the public one. An asymmetric key cannot reverse the operation it performs, so the public key cannot decrypt what it has encrypted, for example.

29
New cards

authentication, authorization, and accounting (AAA)

Security concept where a centralized platform verifies subject identification, ensures the subject is assigned relevant permissions, and then logs these actions to create an audit trail.

30
New cards

authenticator app

Software that allows a smartphone to operate as a second authentication factor or as a trusted channel for 2-step verification.

31
New cards

automation

Use of scripts to perform configuration steps without requiring manual intervention.

32
New cards

AutoRun/AutoPlay

Windows mechanisms for automatic actions to occur when a peripheral storage device is attached.

33
New cards

backdoor

Mechanism for gaining access to a computer that bypasses or subverts the normal method of authentication.

34
New cards

backup

Security copy of production data made to removable media, typically according to a regular schedule. Different backup types (full, incremental, or differential) balance media capacity, time required to backup, and time required to restore.

35
New cards

acceptable use policy (AUP)

Policy that governs employees' use of company equipment and Internet services. ISPs may also apply AUPs to their customers.

36
New cards

backup chain

Sequence of jobs starting with a full backup and followed by either incremental or differential backups to implement a media rotation scheme.

37
New cards

badge reader

Authentication mechanism that allows a user to present a smart card to operate an entry system.

38
New cards

bash

Command interpreter and scripting language for Unix-like systems.

39
New cards

.bat

Extension for the batch file format that is used to execute a series of Windows CMD shell commands.

40
New cards

BIOS/UEFI password

Passwords set in system firmware to prevent unauthorized booting of a computer (user password) or changes to system setup (supervisor password).

41
New cards

BitLocker

Feature of Windows allowing for encryption of NTFS-formatted drives. The encryption key can be stored in a TPM chip on the computer or on a USB drive.

42
New cards

blue screen of death (BSOD)

Microsoft status screen that indicates an error from which the system cannot recover (also called a stop error). Blue screens are usually caused by bad driver software or hardware faults (memory or disk). Other operating systems use similar crash indicators, such as Apple's pinwheel and Linux's kernel panic message.

43
New cards

bollards

Sturdy vertical post installed to control road traffic or designed to prevent ram-raiding and vehicle ramming attacks.

44
New cards

Boot Configuration Data (BCD)

Information about operating systems installed on the computer located in \boot\bcd on the system partition. The BCD can be modified using the bcedit command-line tool or msconfig.

45
New cards

boot method (OS setup)

Device used to start the setup program and hold source files for installing or upgrading an OS.

46
New cards

boot sector virus

Malicious code inserted into the boot sector code or partition table of a storage device that attempts to execute when the device is attached.

47
New cards

bootleg app

Software that illegally copies or imitates a commercial product or brand.

48
New cards

bootrec command

Windows command in Windows allowing for the repair (or attempted repair) of the boot manager and boot loader.

49
New cards

botnet

Group of hosts or devices that has been infected by a control program called a bot, which enables attackers to exploit the hosts to mount attacks.

50
New cards

branch

In scripting and programming, control statement that uses a condition to determine which code block to execute next.

51
New cards

bring your own device (BYOD)

Security framework and tools to facilitate use of personally owned devices to access corporate networks and data.

52
New cards

brute force attack

Type of password attack where an attacker uses an application to exhaustively try every possible alphanumeric combination to crack encrypted passwords.

53
New cards

cache (browser)

Cookies, site files, form data, passwords, and other information stored by a browser. Caching behavior can be enabled or disabled, and data can be cleared manually.

54
New cards

cat command

Linux command to view and combine (concatenate) files.

55
New cards

cd command

Command-line tool used to navigate the directory structure.

56
New cards

Certificate Manager console (certmgr. msc)

Console related to managing digital certificates for the current user and trusted root certification authority certificates.

57
New cards

certificate of destruction

Validation from an outsourcing provider of recycling/repurposing services that media has been destroyed or sanitized to the agreed standard.

58
New cards

certificate warning

Browser indication that a site connection is not secure because the certificate is invalid or the issuing CA is not trusted.

59
New cards

chain of custody

Record of evidence handling from collection to presentation in court to disposal.

60
New cards

change management

Process through which changes to the configuration of information systems are implemented as part of the organization's overall configuration management efforts.

61
New cards

chkdsk command

Command-line tool that verifies the integrity of a disk's file system.

62
New cards

chmod command

Linux command for managing file permissions.

63
New cards

chown command

Linux command for managing the account owner for files and directories.

64
New cards

Chrome OS

Proprietary OS developed by Google to run on specific laptop (chromebooks) and PC (chromeboxes) hardware.

65
New cards

clean install

OS setup method where the target disk is repartitioned and formatted, removing any existing OS and/or data files.

66
New cards

command and control (C2 or C&C)

Infrastructure of hosts and services with which attackers direct, distribute, and control malware over botnets.

67
New cards

command prompt (cmd.exe)

Basic shell interpreter for Windows.

68
New cards

compatibility concern

Considerations that must be made when using an app in an environment with multiple device and OS platforms.

69
New cards

complexity requirement

Rules designed to enforce best-practice password selection, such as minimum length and use of multiple character types.

70
New cards

computer security incident response team (CSIRT)

Team with responsibility for incident response. The CSIRT must have expertise across a number of business domains (IT, HR, legal, and marketing, for instance).

71
New cards

confidentiality, integrity, and availability (CIA triad)

Three principles of security control and management. Also known as the information security triad. Also referred to in reverse order as the AIC triad.

72
New cards

configuration management

Process through which an organization's information systems components are kept in a controlled state that meets the organization's requirements, including those for security and compliance.

73
New cards

console

Device that implements input and output for a command shell. In Linux, multiple virtual consoles support use of a single host by multiple user sessions simultaneously.

74
New cards

content filtering

Security measure performed on email and Internet traffic to identify and block suspicious, malicious, and/or inappropriate content in accordance with an organization's policies.

75
New cards

Control Panel

Legacy management interface for configuring user and system settings in Windows.

76
New cards

copy command

Command-line tool for copying files in Windows.

77
New cards

counter mode with cipher block chaining message authentication code protocol (CCMP)

Encryption protocol used for wireless LANs that addresses the vulnerabilities of the WEP protocol.

78
New cards

cp command

Command-line tool for copying files in Linux.

79
New cards

credit card transactions

Regulated data related to processing financial transactions.

80
New cards

cron job

Scheduled task that is managed by the Linux cron daemon.

81
New cards

cross-site scripting (XSS)

Malicious script hosted on the attacker's site or coded in a link injected onto a trusted site designed to compromise clients browsing the trusted site, circumventing the browser's security model of trusted zones.

82
New cards

cryptominer

Malware that hijacks computer resources to create cryptocurrency.

83
New cards

cybersecurity

Protection of computer systems and digital information resources from unauthorized access, attack, theft, or data damage.

84
New cards

definitions

Information about new viruses and other malware used to update antivirus scanners.

85
New cards

Defragment and Optimize Drives tool (dfrgui.exe)

Fragmentation occurs when a data file is not saved to contiguous sectors on an HDD and reduces performance. The defragmenter mitigates this and can also perform optimization operations for SSDs.

86
New cards

denial of service attack (DoS)

Any type of physical, application, or network attack that affects the availability of a managed resource.

87
New cards

desktop

Graphical OS interface that allows programs to run within window containers. Desktop styles include tools for launching apps, such as the Windows Start Menu, and managing apps, such as the Windows taskbar. Changes to the desktop style over the course of version and feature updates can be confusing for users.

88
New cards

desktop management software

General category of software designed to facilitate remote support of desktops and mobile devices on a corporate network.

89
New cards

developer mode

Mobile-device feature designed for testing apps during development that may weaken corporate security protections if misused.

90
New cards

Device Manager

Primary interface for configuring and managing hardware devices in Windows. Device Manager enables the administrator to disable and remove devices, view hardware properties and system resources, and update device drivers.

91
New cards

device wipe

Remote-initiated factory reset of a mobile device that removes all user data and settings.

92
New cards

Devices and Printers

Control Panel app for using and configuring attached hardware.

93
New cards

Devices settings

Windows Settings pages for using and configuring attached hardware.

94
New cards

df/du commands

Command-line tools used to report storage usage in Linux.

95
New cards

dictionary attack

Type of password attack that compares encrypted passwords against a predetermined list of possible password values.

96
New cards

differential backup

Job type in which all selected files that have changed since the last full backup are backed up.

97
New cards

dig command

Utility to query a DNS server and return information about a particular domain name or resource record.

98
New cards

digital certificate

Identification and authentication information presented in the X.509 format and issued by a Certificate Authority (CA) as a guarantee that a key pair (as identified by the public key embedded in the certificate) is valid for a particular subject (user or host).

99
New cards

digital forensics

Process of gathering and submitting computer evidence to trial. Digital evidence is latent, meaning that it must be interpreted. This means that great care must be taken to prove that the evidence has not been tampered with or falsified.

100
New cards

digital rights management (DRM)

Copyright protection technologies for digital media. DRM solutions usually try to restrict the number of devices allowed for playback of a licensed digital file, such as a music track or ebook.