1/66
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Acceptable Use Policies
A document that states constraints and practices that users must agree to follow to have access to a corporate network
Active Directory
A Windows general-purpose directory that stores network objectives such as users, accounts, and resources.
Administrator
An individual that has the highest level of control and access on a computer and can make changes that affect other users of the computer
Adware
Software that displays or downloads advertising material like pop-up ads
Antimalware Software
A type of security software used to detect remove, and prevent malware attacks on a computer. Antimalware is used to detect advanced forms of malware
Antivirus software
a type of security software used to detect and remove traditional computer viruses
APIPA
Automatic Private IP Addressing is a Windows function that provides a DHCP fail-safe autoconfiguration address that protects the computer from system failure
Authentication
Any process a system uses to verify a user's identity
Azure Remote App
An application that can be used to connect mobile devices to a corporate network
Biometrics
Any physical or behavioral characteristics used to identify a person: examples include fingerprints, retinal scans, voice readers, and facial recognition
Boot Logging
A computer startup method where Windows creates a special file that logs the list of drivers that are used during the startup process
BYOD
Bring your own device is a company practice that allows employees to bring and use their personal computers, phones, and other devices at work
Cloud Storage
A method used to store data. Data is kept in remote servers and the accessed through the internet
Command Prompt
A Windows application that allows users to input data in a text-based interface to execute commands
Computer Virus
A program or malicious code that runs on a computer without the user's knowledge. A computer virus copies itself to other devices with the purpose of damaging the device and/or stealing data.
Control Panel
A part of the Microsoft graphical user interface used to view and manage basic computer settings.
Custom Install
A type of installation that allows administrators to determine the components they want to install and where they want them stored.
Differential Backup
A backup type that only backs up data that has changed or been created since the initial full backup.
DisplayPort
A port commonly found on a PC that provides high-definition video and audio between a computer and monitor.
Driver
A software component that allows the operating system and a device to communicate with each other
File Sharing
A method used to transmit files from one computer to another or via a network or the internet.
Firewall
A network security system that controls incoming and outgoing network traffic
Full Backup
Making one or more copies of selected data on a hard drive
Group Policies
An infrastructure that allows network administrators to implement security policy settings for users and computers.
HDMI
High-definition multimedia interface is a standard for connecting and transmitting high-definition digital video and audio to the computer from another source
Incremental Backup
a backup type that backs up data that has changed from the last backup
Keyloggers
A type of spyware where a hacker captures keyboard keystrokes, including the keystrokes used to sign in to accounts.
Last Known Good Configuration
A boot-up option where Windows can be started if it is not starting normally. The drivers that successfully worked the last time Windows was started and shut down will be used to start the operating system.
Local Account
An account that exists on a single computer
Malware
Malicious software, including viruses, ransomware, and spyware
Memorandum of Understanding
A document outlining an agreement between parties
Microsoft Account
A single sign-on web service that allows users to synchronize devices, websites, and applications using one account
Microsoft Azure
A Microsoft cloud computing platform used to build, deploy, and manage applications.
Microsoft Intune
A cloud-based desktop management tool that allows organizations to provide employees with access to corporate resources.
Microsoft Store
A digital storefront that offers applications, games, and music to Windows users. Some content is free, and others cost money to download.
Mirror Backup
A backup that automatically creates copies of the data as it changes on the drive.
Mobile Device Management
A type of software that allows companies to control, secure, and automate policies on devices connected to the organization's network.
multifactor authentication
An authentication process that uses two or more forms of distinct authentication factors to authenticate the user.
NTFS
New Technology File System is a Windows file system that organizes, stores, and finds files on the hard disk
OneDrive
A Microsoft cloud-based file storage service used to store and share files.
Patches
A set of changes made to software and operating systems that provide an update that improves security and performance within a program or product
Permissions
The ability for a user to access a resource
Physical Attack
An attack where an individual steals valuable equipment or data or physically harms another individual.
PIN Lock
A screen lock security method used to protect a device from unauthorized access. The code must be entered any time the device is turned on to unlock it
Ransomware
A form of malware where malicious code is installed on a computer and the legitimate user to locked out of their sensitive data
Remote Wipe
A security feature for mobile devices that allows users to erase data remotely from a mobile device
Retention Policy
A policy that determines what data is stored and archived on a computer along with how long that data is stored and what happens to the data after the retention period is over
Roll Back
An operation that takes an operating system back to the previous version
Safe mode
A Windows boot option that starts the computer in a basic mode with limited files and drivers.
Safe Mode with Networking
A windows boot method that only loads the minimum amount of drivers required to connect the computer to other computers
Smart Card
A card with a microprocessor chip inside used as an authentication security token.
Social Engineering Attack
A type of malicious attack where individuals are tricked into providing confidential info.
Spyware
A type of malicious software designed to allow an individual to collect information about another user's computer activities
Start Menu
An interface tool used in Windows environments. It is used as the main launching point for computer applications and programs.
Taskbar
A bar provided on a Windows display that allows users quick access to applications in use and pinned to the taskbar.
Time Zone
A time assigned to a geographical region.
Trojan Horse
A type of malware that is not self-replicating. It presents a program that appears to be legitimate and harmless to trick users into clicking and launching the trojan horse
Troubleshoot
the process of locating and isolating a problem in a program, computer system, or network and resolving it
USB
Universal serial bus is an external interface that connects peripheral devices to a computer
USB-C
a type of USB connector used to connect devices like mobiles devices and game consoles
User Account Control
A Windows feature that sets user authentication levels that require the computer administrator to allow some or all changes made to Windows system settings.
VGA
a video graphics array is an analog connection used to link a computer to a projector or additional monitors
Virtual Machine
A virtual environment that is created on a computer using software that emulates a separate computer
Vishing
A social engineering attack where individuals make phone calls or leave voice messages to try and trick companies or individuals into revealing personal information.
Windows Safe Mode with Command Prompt
A method of Safe Mode that boots a computer with a limited amount of drivers and files, providing the user with access to a limited version of Windows.
Windows Troubleshooting Tools
A Windows built-in troubleshooter.
Worm
Malware that replicates and spread itself across devices within a network