Cybersecurity Course 4 Glossary

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/64

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards based on the Cybersecurity Course 4 glossary, covering fundamental computer components, Linux terminology, and database concepts.

Last updated 7:42 AM on 5/19/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

65 Terms

1
New cards

Central Processing Unit (CPU)

A computer’s main processor, which is used to perform general computing tasks on a computer

2
New cards

Absolute file path

The full file path, which starts from the root

3
New cards

Application

A program that performs a specific task

4
New cards

Argument (Linux)

Specific information needed by a command

5
New cards

Authentication

The process of verifying who someone is

6
New cards

Authorization

The concept of granting access to specific resources in a system

7
New cards

Bash

The default shell in most Linux distributions

8
New cards

Basic Input/Output System (BIOS)

A microchip that contains loading instructions for the computer and is prevalent in older systems

9
New cards

Bootloader

A software program that boots the operating system

10
New cards

CentOS

An open-source distribution that is closely related to Red Hat

11
New cards

Command

An instruction telling the computer to do something

12
New cards

Graphical user interface (GUI)

A user interface that uses icons on the screen to manage different tasks on the computer

13
New cards

Hard drive

A hardware component used for long-term memory

14
New cards

Command-line interface (CLI)

A text-based user interface that uses commands to interact with the computer

15
New cards

Database

An organized collection of information or data

16
New cards

Date and time data

Data representing a date and/or time

17
New cards

Digital forensics

The practice of collecting and analyzing data to determine what has happened after an attack

18
New cards

Directory

A file that organizes where other files are stored

19
New cards

Distributions

The different versions of Linux

20
New cards

Exclusive operator

An operator that does not include the value of comparison

21
New cards

File path

The location of a file or directory

22
New cards

Filesystem Hierarchy Standard (FHS)

The component of the Linux OS that organizes data

23
New cards

Filtering

Selecting data that match a certain condition

24
New cards

Foreign key

A column in a table that is a primary key in another table

25
New cards

Inclusive operator

An operator that includes the value of comparison

26
New cards

Internal hardware

The components required to run the computer

27
New cards

Legacy operating system

An operating system that is outdated but still being used

28
New cards

Log

A record of events that occur within an organization's systems

29
New cards

Operating system (OS)

The interface between computer hardware and the user

30
New cards

Hardware

The physical components of a computer

31
New cards

Kali Linux ™

An open-source distribution of Linux that is widely used in the security industry

32
New cards

Kernel

The component of the Linux OS that manages processes and memory

33
New cards

Linux

An open-source operating system

34
New cards

nano

A command-line file editor that is available by default in many Linux distributions

35
New cards

Numeric data

Data consisting of numbers

36
New cards

Operator

A symbol or keyword that represents an operation

37
New cards

Options

Input that modifies the behavior of a command

38
New cards

Package

A piece of software that can be combined with other packages to form an application

39
New cards

Random Access Memory (RAM)

A hardware component used for short-term memory

40
New cards

Relative file path

A file path that starts from the user's current directory

41
New cards

Package manager

A tool that helps users install, manage, and remove packages or applications

42
New cards

Parrot

An open-source distribution that is commonly used for security

43
New cards

Penetration test (pen test)

A simulated attack that helps identify vulnerabilities in systems, networks, websites, applications, and processes

44
New cards

Peripheral devices

Hardware components that are attached and controlled by the computer system

45
New cards

Permissions

The type of access granted for a file or directory

46
New cards

Primary key

A column where every row has a unique entry

47
New cards

Principle of least privilege

The concept of granting only the minimal access and authorization required to complete a task or function

48
New cards

Query

A request for data from a database table or a combination of tables

49
New cards

Red Hat® Enterprise Linux®

A subscription-based distribution of Linux built for enterprise use

50
New cards

Relational database

A structured database containing tables that are related to each other

51
New cards

Root directory

The highest-level directory in Linux

52
New cards

Root user (or superuser)

A user with elevated privileges to modify the system

53
New cards

Ubuntu

An open-source, user-friendly distribution that is widely used in security and other industries

54
New cards

Shell

The command-line interpreter

55
New cards

SQL (Structured Query Language)

A programming language used to create, interact with, and request information from a database

56
New cards

Standard error

An error message returned by the OS through the shell

57
New cards

Standard input

Information received by the OS via the command line

58
New cards

Standard output

Information returned by the OS through the shell

59
New cards

String data

Data consisting of an ordered sequence of characters

60
New cards

Syntax

The rules that determine what is correctly structured in a computing language

61
New cards

Unified Extensible Firmware Interface (UEFI)

A microchip that contains loading instructions for the computer and replaces BIOS on more modern systems

62
New cards

User

The person interacting with a computer

63
New cards

User interface

A program that allows the user to control the functions of the operating system

64
New cards

Virtual machine (VM)

A virtual version of a physical computer

65
New cards

Wildcard

A special character that can be substituted with any other character