Comp. Hardware & Troubleshooting Modules 4-6

0.0(0)
studied byStudied by 15 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/64

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

65 Terms

1
New cards

Shell

The Portion of an OS that relates to the user and to applications.

2
New cards

User mode

A restricted mode designed to protect the OS and its core functions from harmful user applications. In this environment, applications run with limited privileges, preventing them from directly accessing or modifying system resources or hardware.

3
New cards

Kernel

The core of an Operating system. Fundamental layer that exists between hardware and software.

4
New cards

HAL (Hardware Abstraction Layer)

The layer closest to hardware.

5
New cards

Executive Services Interface.

A group of services that operate in kernel mode between the user mode subsystems and the HAL.

6
New cards

Registry

A Windows database that stores hardware and software configuration information, user preferences, and application settings.

7
New cards

Initialization Settings

Plain text files used to store configuration settings for the OS and applications.

8
New cards

Process

A program that is running under the authority of the shell, together with the system resources assigned to it.

9
New cards

Thread

A single task, such as printing a file, that mkaes a request for resources to the Win32 subsystem.

10
New cards

Multithreading

A process with more than one thread.

11
New cards

Task Manager

A Windows utility that allows you to monitor and manage processes and applications running on your computer. Can also be used to check system performance.

12
New cards

Time Drift

Also known as clock Drift, happens when a Windows system does not report accurate time to time-sensitive applications.

13
New cards

booting

refers to the computer bringing itself up to a working state.

14
New cards

Hard Boot (Cold Boot)

Involves turning on the power with the on/off switch. Takes more time than a soft boot.

15
New cards

Soft Boot (Warm Boot)

Involves using the OS to reboot. in Window, also is known as a Restart.

16
New cards

Recovery Drive

A bootable USB flash drive that can access Windows Repair Tools.

17
New cards

System Repair Disc

Bootable DVD with Windows repair tools that can start the system and fix problems.

18
New cards

Startup Repair

Built-in Windows diagnostic and repair tool. Can fix system files without changing Windows settings, user data, or applications.

19
New cards

rstrui.exe

A command prompt command that can be used to perform System Restore.

20
New cards

Command prompt

Text-based interface in Windows that allows users to interact with the OS using commands.

21
New cards

Repair Installation

A Non-destructive installation of Windows 10/11 over an existing Windows installation.

22
New cards

BSOD (Blue Screen of Death)

Also known as a stop error. Happens when processes running in kernel mode encounter a problem and must shut down Windows.

23
New cards

MFA (MultiFactor Authentication)

Security measure that enforces more than one required factor or action to authenticate someone.

24
New cards

2FA (Two Factor Authentication)

A version of MFA that requires two factors to authenticate such as Windows Password, Token, Biometrics, etc.

25
New cards

Hard Token

A physical hardware device used to restrict who can access a secured location.

26
New cards

Soft Token

Data that you can retrieve; used to restrict who can access a secured location.

27
New cards

Email Filtering

A security feature that filters out suspicious message based on databases of known scams, spammers, and malware.

28
New cards

Anti-Phishing Training

Security awareness training that helps employees recognize common threats and social engineering situations.

29
New cards

Tailgating

When an unauthorized person follows an employee through a secured entrance to a room or building or continues a Windows session after the user has stepped away.

30
New cards

Dumpster Diving

Looking for useful information in someone’s trash.

31
New cards

Phishing

A type of data identity theft where the sender of an email scams you into responding with personal data.

32
New cards

Whaling

A phishing attack that targets a high-profile employee

33
New cards

Spear Phishing

A hoax email that appears to come from companies you already do business with.

34
New cards

Spoofing

A scam where the artist makes both the email, and the website look like the real thing.

35
New cards

Malware

Any unwanted program that means harm and is transmitted to a computer without the user’s knowledge.

36
New cards

Grayware

Any annoying and unwanted program that might or might not intend harm.

37
New cards

Virus

A program that replicates by attaching itself to other programs.

38
New cards

Spyware

Spies on a user and collects personal information. An example would be a keylogger.

39
New cards

Worm

A program that copies itself throughout a network or the internet without a host program

40
New cards

Trojan

Does not need a host program to work; it substitutes itself for a legitimate program.

41
New cards

Rootkit Virus

Loads itself before the OS boot is complete and can hide in boot managers, boot loader programs, or kernel mode device drivers.

42
New cards

Boot Sector Virus

A virus that infects the first sector on an MBR hard drive and can infect the partition table in that sector.

43
New cards

Ransomware

Holds your computer system hostage until you pay money.

44
New cards

On-Path Attack (Man-in-The-Middle Attack)

An attacker intercepts communication between two parties and reads and/or alters the content of messages.

45
New cards

Zero-Day Attack

Can happen when a hacker discovers a security hole in software that is unknown to the developer, or a hacker takes advantage of a recently reported gap in software security before users apply patches.

46
New cards

Denial-of-Service (DoS)

An attack that overwhelms a computer or network with requests or traffic until new connections can no longer be accepted.

47
New cards

Distributed Denial-of-Service (DDoS)

An attack that happens when multiple computers are involved in an attack that overwhelms computers or networks with requests or traffic.

48
New cards

Zombie

A computer that has been hacked.

49
New cards

Botnet

An entire network of computers that have been hacked.

50
New cards

Dictionary Attack

Used to crack a long password by trying words in a dictionary.

51
New cards

Rainbow Tables

Contains a long list of plaintext passwords and the password hash list (after it is encrypted). These tables make cracking passwords faster than dictionary cracking or brute force attacking.

52
New cards

Quarantined computer

A computer not allowed to use the regular network. Typically, unplugged or wireless adapter turned off.

53
New cards

License

Gives the user the right to use software.

54
New cards

Copyright

The right to copy work. Belongs to the creator of the work or others to whom the creator transfers this right.

55
New cards

EULA (End User License Agreement)

Your right to use or copy software that is typically stated in this article when you agree to install a software.

56
New cards

Software Piracy

Making unauthorized copies of original software that violates the Federal Copyright Act of 1976.

57
New cards

DRM (Digital Rights Management)

The practice of implementing measures to control the use of software.

58
New cards

Regulated Data

Certain types of data that are protected by special government regulations.

59
New cards

Regulatory and Compliance Policies

A collection of regulation, policies, and laws that each industry must comply with.

60
New cards

Personally Identifiable Information (PII)

Any regulated data that can be used to identify a specific individual.

61
New cards

Protected Health Information (PHI)

Any regulated data that can contain health information for a specific individual.

62
New cards

Payment Card Industry (PCI)

Any regulated data that pertains to an individual’s payment card.

63
New cards

General Data Protection Regulation (GDPR)

A group of regulations implements in 2018 in the EU.

64
New cards

Degausser

A device that exposes a storage device to strong electromagnetic field to completely erase the data on a magnetic hard drive or tape drive.

65
New cards

Incident

When an employee or other person has negatively affected safety or corporate resources, violated the code of conduct for the organization, or committed a crime.