1/67
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Acceptable Use Policies
A document that states constraints and practices that users must agree to follow to have access to a corporate network.
Active Directory
A Windows general-purpose directory that stores network objectives such as users, accounts, and resources.
Administrator
An individual that has the highest level of control and access on a computer and can make changes that affect other users of that computer.
Adware
Software that displays or downloads advertising material like pop-up ads.
Antimalware
A type of security software used to detect, remove, and prevent malware attacks on a computer. Antimalware is used to detect advanced forms of malware.
Antivirus Software
A type of security software used to detect and remove traditional computer viruses.
APIPA
Automatic Private IP Addressing (APIPA) is a Windows function that provides a DHCP fail-safe autoconfiguration address that protects the computer from system failure.
Authentication
Any process a system uses to verify a user's identity.
Azure Remote App
An application that can be used to connect mobile devices to a corporate network.
Biometrics
Any physical or behavioral characteristics used to identify a person—examples of biometrics include fingerprints, retinal scans, voice readers, and facial recognition.
Boot Logging
A computer startup method where Windows creates a special file that logs the list of drivers that are used during the startup process.
BYOD
Bring your own device (BYOD) is a company practice that allows employees to bring and use their personal computers, phones, and other devices at work.
Cloud Storage
A method used to store data. Data is kept in remote servers and then accessed through the internet.
Command Prompt
A Windows application that allows users to input data in a text-based interface to execute commands.
Computer Virus
A program or malicious code that runs on a computer without the user's knowledge. A computer virus copies itself to other devices with the purpose of damaging the device and/or stealing data.
Control Panel
A part of the Microsoft graphical user interface used to view and manage basic computer settings.
Custom Install
A type of installation that allows administrators to determine the components they want to install and where they want them stored.
Differential Backup
A backup type that only backs up data that has changed or been created since the initial full backup.
DisplayPort
A port commonly found on a PC that provides high-definition video and audio between a computer and monitor.
Driver
A software component that allows the operating system and a device to communicate with each other.
File Sharing
A method used to transmit files from one computer to another or via a network or the internet.
Firewall
A network security system that controls incoming and outgoing network traffic.
Full Backup
Making one or more copies of selected data on a hard drive.
Group Policies
An infrastructure that allows network administrators to implement security policy settings for users and computers.
HDMI
High-definition multimedia interface (HDMI) is a standard for connecting and transmitting high-definition digital video and audio to the computer from another source.
Incremental Backup
A backup type that backs up data that has changed from the last backup.
Keyloggers
A type of spyware where a hacker captures keyboard keystrokes, including the keystrokes used to sign in to accounts.
Last Known Good Configuration
A boot-up option where Windows can be started if it is not starting normally. The drivers that successfully worked the last time Windows was started and shut down will be used to start the operating system.
Local Account
An account that exists on a single computer.
Malware
Malicious software, including viruses, ransomware, and spyware.
Memorandum of Understanding
A document outlining an agreement between parties.
Microsoft Account
A single sign-on web service that allows users to synchronize devices, websites, and applications using one account.
Microsoft Azure
A Microsoft cloud computing platform used to build, deploy, and manage applications.
Microsoft Intune
A cloud-based desktop management tool that allows organizations to provide employees with access to corporate resources.
Microsoft Store
A digital storefront that offers applications, games, and music to Windows users. Some content is free, and others cost money to download.
Mirror Backup
A backup that automatically creates copies of the data as it changes on the drive.
Mobile Device Management
A type of software that allows companies to control, secure, and automate policies on devices connected to the organization's network.
Multifactor Authentication
An authentication process that uses two or more forms of distinct authentication factors to authenticate the user.
NTFS
New Technology File System (NTFS) is a Windows file system that organizes, stores, and finds files on the hard disk.
OneDrive
A Microsoft cloud-based file storage service used to store and share files.
Patches
A set of changes made to software and operating systems that provide an update that improves security and performance within a program or product.
Permissions
The ability for a user to access a resource.
Physical Attack
An attack where an individual steals valuable equipment or data or physically harms another individual.
PIN Lock
A screen lock security method used to protect a device from unauthorized access. The PIN code must be entered any time the device is turned on to unlock it.
Ransomware
A form of malware where malicious code is installed on a computer and the legitimate user is locked out of their sensitive data.
Remote Wipe
A security feature for mobile devices that allows users to erase data remotely from a mobile device.
Retention Policy
A policy that determines what data is stored and archived on a computer along with how long that data is stored and what happens to the data after the retention period is over.
Roll Back
An operation that takes an operating system back to the previous version.
Safe Mode
A Windows boot option that starts the computer in a basic mode with limited files and drivers.
Safe Mode with Networking
A Windows boot method that only loads the minimum amount of drivers required to connect the computer to other computers.
Smart Card
A card with a microprocessor chip inside used as an authentication security token.
Social Engineering Attack
A type of malicious attack where individuals are tricked into providing confidential info.
Spyware
A type of malicious software designed to allow an individual to collect information about another user's computer activities.
Start Menu
An interface tool used in Windows environments. It is used as the main launching point for computer applications and programs.
Taskbar
A bar provided on a Windows display that allows users quick access to applications in use and pinned to the taskbar.
Time Zone
A time assigned to a geographical region.
Trojan Horse
A type of malware that is not self-replicating. It presents a program that appears to be legitimate and harmless to trick users into clicking and launching the trojan horse.
Troubleshoot
The process of locating and isolating a problem in a program, computer system, or network and resolving it.
USB
Universal serial bus (USB) is an external interface that connects peripheral devices to a computer.
USB-C
A type of USB connector used to connect devices like mobile devices and game consoles.
User Account Control
A Windows feature that sets user authentication levels that require the computer administrator to allow some or all changes made to Windows system settings.
VGA
A video graphics array (VGA) is an analog connection used to link a computer to a projector or additional monitors.
Virtual Machine
A virtual environment that is created on a computer using software that emulates a separate computer.
Vishing
A social engineering attack where individuals make phone calls or leave voice messages to try and trick companies or individuals into revealing personal information.
Windows Safe Mode with Command Prompt
A method of Safe Mode that boots a computer with a limited amount of drivers and files, providing the user with access to a limited version of Windows.
Windows Troubleshooting Tools
A Windows built-in troubleshooter.
Windows Update
A Microsoft service that updates and fixes known flaws in Microsoft applications and the operating systems.
Worm
Malware that replicates and spreads itself across devices within a network.