1/64
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Shell
The Portion of an OS that relates to the user and to applications.
User mode
A restricted mode designed to protect the OS and its core functions from harmful user applications. In this environment, applications run with limited privileges, preventing them from directly accessing or modifying system resources or hardware.
Kernel
The core of an Operating system. Fundamental layer that exists between hardware and software.
HAL (Hardware Abstraction Layer)
The layer closest to hardware.
Executive Services Interface.
A group of services that operate in kernel mode between the user mode subsystems and the HAL.
Registry
A Windows database that stores hardware and software configuration information, user preferences, and application settings.
Initialization Settings
Plain text files used to store configuration settings for the OS and applications.
Process
A program that is running under the authority of the shell, together with the system resources assigned to it.
Thread
A single task, such as printing a file, that mkaes a request for resources to the Win32 subsystem.
Multithreading
A process with more than one thread.
Task Manager
A Windows utility that allows you to monitor and manage processes and applications running on your computer. Can also be used to check system performance.
Time Drift
Also known as clock Drift, happens when a Windows system does not report accurate time to time-sensitive applications.
booting
refers to the computer bringing itself up to a working state.
Hard Boot (Cold Boot)
Involves turning on the power with the on/off switch. Takes more time than a soft boot.
Soft Boot (Warm Boot)
Involves using the OS to reboot. in Window, also is known as a Restart.
Recovery Drive
A bootable USB flash drive that can access Windows Repair Tools.
System Repair Disc
Bootable DVD with Windows repair tools that can start the system and fix problems.
Startup Repair
Built-in Windows diagnostic and repair tool. Can fix system files without changing Windows settings, user data, or applications.
rstrui.exe
A command prompt command that can be used to perform System Restore.
Command prompt
Text-based interface in Windows that allows users to interact with the OS using commands.
Repair Installation
A Non-destructive installation of Windows 10/11 over an existing Windows installation.
BSOD (Blue Screen of Death)
Also known as a stop error. Happens when processes running in kernel mode encounter a problem and must shut down Windows.
MFA (MultiFactor Authentication)
Security measure that enforces more than one required factor or action to authenticate someone.
2FA (Two Factor Authentication)
A version of MFA that requires two factors to authenticate such as Windows Password, Token, Biometrics, etc.
Hard Token
A physical hardware device used to restrict who can access a secured location.
Soft Token
Data that you can retrieve; used to restrict who can access a secured location.
Email Filtering
A security feature that filters out suspicious message based on databases of known scams, spammers, and malware.
Anti-Phishing Training
Security awareness training that helps employees recognize common threats and social engineering situations.
Tailgating
When an unauthorized person follows an employee through a secured entrance to a room or building or continues a Windows session after the user has stepped away.
Dumpster Diving
Looking for useful information in someone’s trash.
Phishing
A type of data identity theft where the sender of an email scams you into responding with personal data.
Whaling
A phishing attack that targets a high-profile employee
Spear Phishing
A hoax email that appears to come from companies you already do business with.
Spoofing
A scam where the artist makes both the email, and the website look like the real thing.
Malware
Any unwanted program that means harm and is transmitted to a computer without the user’s knowledge.
Grayware
Any annoying and unwanted program that might or might not intend harm.
Virus
A program that replicates by attaching itself to other programs.
Spyware
Spies on a user and collects personal information. An example would be a keylogger.
Worm
A program that copies itself throughout a network or the internet without a host program
Trojan
Does not need a host program to work; it substitutes itself for a legitimate program.
Rootkit Virus
Loads itself before the OS boot is complete and can hide in boot managers, boot loader programs, or kernel mode device drivers.
Boot Sector Virus
A virus that infects the first sector on an MBR hard drive and can infect the partition table in that sector.
Ransomware
Holds your computer system hostage until you pay money.
On-Path Attack (Man-in-The-Middle Attack)
An attacker intercepts communication between two parties and reads and/or alters the content of messages.
Zero-Day Attack
Can happen when a hacker discovers a security hole in software that is unknown to the developer, or a hacker takes advantage of a recently reported gap in software security before users apply patches.
Denial-of-Service (DoS)
An attack that overwhelms a computer or network with requests or traffic until new connections can no longer be accepted.
Distributed Denial-of-Service (DDoS)
An attack that happens when multiple computers are involved in an attack that overwhelms computers or networks with requests or traffic.
Zombie
A computer that has been hacked.
Botnet
An entire network of computers that have been hacked.
Dictionary Attack
Used to crack a long password by trying words in a dictionary.
Rainbow Tables
Contains a long list of plaintext passwords and the password hash list (after it is encrypted). These tables make cracking passwords faster than dictionary cracking or brute force attacking.
Quarantined computer
A computer not allowed to use the regular network. Typically, unplugged or wireless adapter turned off.
License
Gives the user the right to use software.
Copyright
The right to copy work. Belongs to the creator of the work or others to whom the creator transfers this right.
EULA (End User License Agreement)
Your right to use or copy software that is typically stated in this article when you agree to install a software.
Software Piracy
Making unauthorized copies of original software that violates the Federal Copyright Act of 1976.
DRM (Digital Rights Management)
The practice of implementing measures to control the use of software.
Regulated Data
Certain types of data that are protected by special government regulations.
Regulatory and Compliance Policies
A collection of regulation, policies, and laws that each industry must comply with.
Personally Identifiable Information (PII)
Any regulated data that can be used to identify a specific individual.
Protected Health Information (PHI)
Any regulated data that can contain health information for a specific individual.
Payment Card Industry (PCI)
Any regulated data that pertains to an individual’s payment card.
General Data Protection Regulation (GDPR)
A group of regulations implements in 2018 in the EU.
Degausser
A device that exposes a storage device to strong electromagnetic field to completely erase the data on a magnetic hard drive or tape drive.
Incident
When an employee or other person has negatively affected safety or corporate resources, violated the code of conduct for the organization, or committed a crime.