Acronyms I dont know

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/72

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

73 Terms

1
New cards

Access control list (ACL)

A list of permissions assigned to objects, detailing which users or systems are granted access to which resources and what operations they can perform. Used in devices such file systems, firewalls, routers, and OS. ACLs help enhance security by ensuring only authorized entities can interact with specific resources.

2
New cards

Advanced control and power interface (ACPI)

A specification for hardware recognition and power management in computers, allowing the operating system to control the amount of power given to each device based on its activity levels. This helps improve energy efficiency and manage power consumption effectively.

3
New cards

Advanced encryption standard (AES)

A widely used symmetric encryption standard that specifies a secure encryption algorithm for encrypting and decrypting data in various applications. It is established by the U.S. National Institute of Standards and Technology (NIST) and supports key sizes of 128, 192, and 256 bits, making it suitable for government and commercial use.

4
New cards

Accelerated graphics port (AGP)

A high-speed point-to-point channel for attaching a graphics card to a computer's motherboard, allowing fast data transfer between the graphics card and the chipset. AGP was designed to improve graphics performance over the previous PCI standard. Was succeeded by PCIe.

5
New cards

Address resolution protocol (ARP)

A network protocol used to find a host's link-layer address (MAC address) given its Internet layer address (IP address). ARP is essential for enabling communication within local area networks.

6
New cards

Advanced technology attachment (ATA)

A standard interface for connecting storage devices like hard drives and CD-ROM drives to a computer's motherboard, providing fast data transfer rates. Graduated from PATA to SATA through the years.

7
New cards

Asynchronous transfer mode (ATM)

A telecommunication method that transmits data in fixed-size cells or packets, enabling efficient and reliable data transfer across various networks. ATM is used in both voice and video communications. This method allows better control over bandwidth and ensures low latency. Has been succeeded by IP, never got a foothold in wireless or mobile.

8
New cards

Compact disc file system (CDFS)

A file system for optical media like CDs and DVDs. It is designed for read-only access and cross platform use. It incorporates error checking mechanisms to ensure accuracy of data retrieval. commonly used for software distribution, media storage, data backups, and archiving.

9
New cards

Certificate revocation list (CRL)

A list of digital certificates that have been revoked before their scheduled expiration date. It is used to maintain the integrity of the public key infrastructure by ensuring that revoked certificates are not trusted.

10
New cards

Direct memory access (DMA)

A method that allows devices to transfer data to and from memory without involving the CPU, improving processing efficiency by offloading data handling tasks.

11
New cards

Digital rights management (DRM)

(DRM) is a set of technologies, policies, and processes used to protect digital content from unauthorized use, modification, and distribution. It enables content creators to control access and use of their works, ensuring that copyright and licensing agreements are enforced.

12
New cards

Encrypting file system (EFS)

A windows file system introduced in version 3.0 of NTFS that provides file level encryption. It is available in all versions of windows except home from windows 2000 onwards. Encrypts the file system on a per-file, per-folder, or per directory basis. Your windows password facilitates the unlock preventing unauthorized access to the encrypted files.

13
New cards

Embedded multimedia card (eMMC)

A type of NAND flash storage commonly used in mobile devices and embedded systems, providing a low-cost and compact storage solution for applications and operating systems. eMMC is usually soldered directly to the motherboard although some pluggable eMMC cards are available.

14
New cards

Extensible file allocation table (exFAT)

A file system optimized for flash memory, can support files up to 128 PB although 512 TB is recommended. A vast improvement over FAT32s 4 GB, has wide support for windows, mac, and Linux, not as wide as FAT32 especially in older devices. Lacks journaling also know as logging (a file system feature that maintains a separate log file of changes to the file system before they are written to the main file system structure) which increases data loss/corruption risk.

15
New cards

Extended file system (ext)

The first file system created specifically for the Linux kernel. It was the first implementation that used the virtual file system which was added in the Linux kernel version .96c and supported file systems up to 2 GB. The extended file system (ext) has several versions, with ext2, ext3, and ext4 being the most recent version, offering improvements in features like journaling and file handling.

16
New cards

File allocation table (FAT)

A file system that manages how data is stored and retrieved on a disk. It organizes files into clusters and maintains a directory structure, allowing for efficient access to stored data. It was originally designed as an 8-bit file system, it had multiple version including FAT12, FAT16, and FAT32, the later supported a max file size of 4 GB and a max volume size of 2 TB. Originally developed for use on floppy disks, FAT16 and FAT32 were mostly used with larger media. Replaced with NTFS and other file systems.

17
New cards

Front side bus (FSB)

A computer communication interface that was used in Intel chip based computers in the 90 and 2000s. The EV6 bus served the same function for AMD CPUs. Both typically carry data between the CPU and a memory controller hub known as the northbride. Modern CPUs have moved away from using a dedicated FSB as the memory controller is now built into the CPU.

18
New cards

File transfer protocol secure (FTPS)

A secure version of FTP, it provides encryption and authentication though the use of username and passwords and certificates. It leverages SSL/TLS to provide secure connections.

19
New cards

Graphics DDR (GDDR)

A type of high performance memory primarily used in GPUs. GDDR is optimized for the high-bandwidth requirements of GPUs ensuring fast data transfer rates and efficient handling of graphical data.

20
New cards

GUID (globally unique identifier) partition table (GPT)

A standard for the layout of partition tables on a storage device, allowing for larger and more numerous partitions than the older Master Boot Record (MBR) format 32 bit vs 64 bit logical address blocks. GPT is part of the UEFI standard, which replaces the BIOS.

21
New cards

Hardware abstraction layer (HAL)

A layer of abstraction between the hardware and the operating system that allows software to interact with hardware in a standardized way. It enables portability of applications across different hardware platforms.

22
New cards

hardware assisted virtualization (HAV)

Uses computer physical components to support the software that manages VMs. This technology enhances the performance of virtual machines by leveraging CPU features (Intel VT-x and AMD-V), allowing multiple operating systems to run concurrently on a host machine.

23
New cards

Hardware compatibility list (HCL)

A list of hardware components and devices that are guaranteed to work with a specific software or operating system. HCL helps users ensure compatibility when purchasing or upgrading hardware.

24
New cards

High bandwidth digital content protection (HDCP)

A form of digital copy protection developed by Intel. It aims to prevent HDCP encrypted content from being played on unauthorized devices. HDCP authenticates, encrypts and revokes any devices that have been compromised to ensure the secure delivery of digital signals. Commonly use for HMDI, DisplayPort, and DVI connections to protect high-definition video and audio content.

25
New cards

Hybrid disk drive (HHD)

A type of storage device that combines traditional spinning hard disk drives (HDDs) with solid-state drives (SSDs). HHDs use the larger capacity of HDDs for data storage while leveraging the faster read/write speeds of SSDs to improve overall performance. This can be done is the OS through the creation of a “hybrid” logical device or by the end user, or a single integrated device such as a SSHD.

26
New cards

Hypertext markup language (HTML)

A standardized system for tagging text files to achieve font, color, graphic, and link effects on web pages. HTML forms the backbone of most websites and is used in conjunction with CSS and JavaScript.

27
New cards

Intelligent character recognition (ICR)

An AI and machine learning technology that converts handwritten or printed text into machine-encoded text, primarily used for digitizing documents and forms. ICR is an advanced form of optical character recognition (OCR) that adapts to varying handwriting styles, improving accuracy over time.

28
New cards

Internet message control protocol (ICMP)

A supporting protocol in the internet protocol suite (TCP/IP). It is used by network devices such as routers to send error messages and operational information indicating success or failure when communicating with anther IP address. ICMP differs from transport protocols such as TCP/UDP in that it is not typically used to exchange data between systems nor is it regularly employed by end user network applications.

29
New cards

Internet protocol (IP)

A network layer communications protocol in the internet protocol suite. It is responsible for relay datagrams across network boundaries, this routing function enables internetworking and essentially establishes the internet. It provides the addressing system necessary for identifying devices on the network and ensures data packets reach their intended destinations.

30
New cards

Internet protocol security (IPSec)

A suite of protocols designed to secure Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. IPSec is commonly used to establish Virtual Private Networks (VPNs) and secure data transfers over the internet.

31
New cards

Infrared

Electromagnetic radiation with wavelengths longer than that of visible light but shorter than microwaves. IR is generally understood to include wavelengths from around 780 nm to 1 mm, it begins with waves that are just longer than those of red light. IR has many applications, in IT it is often found in remote controls and some fiber communications.

32
New cards

infrared data association (irDA)

An industry driven interest group that was founded in 1994. IrDA provides specifications for a complete set of protocols for wireless infrared communications.

33
New cards

Incident response plan (IRP)

A documented strategy outlining the procedures for responding to and managing cybersecurity incidents. It includes roles and responsibilities, communication plans, and steps to minimize damage and recover business operations. Preparation, identification, containment, eradication, recovery, post incident analysis, communication.

34
New cards

international organization for standardization

(ISO) is an independent, non-governmental international organization that develops and publishes standards across various industries to ensure quality, safety, efficiency, and interoperability.

35
New cards

Layer 2 tunneling protocol (L2TP)

A tunneling protocol used to support VPNs or as part of the delivery of services by ISPs. it uses encryption (hiding) only for its own messages and does not provide any encryption or confidentiality of content by itself. It provides a tunnel for layer 2 and the tunnel itself may be passed over a layer 3 encryption protocol such as IPSec.

36
New cards

Master boot record (MBR)

A type of boot sector in the first block of partitioned computer mass storage devices like fixed disks or removable drives. The MBR holds the information on how the disc sectors are divided into partitions, each partition notionally containing a file system. It also contains executable code to function as a loader for the installed OS. It has a maximum allowable size of 2 TB and is in the process of being superseded by the GUID partition table. GPT can coexist with an MBT in order to provide some limited form of backward compatibility.

37
New cards

Microsoft management console (MMC)

A component of windows that provides system admins and advanced users an interface for configuring and monitoring the system. It allows for the use of snap-ins to manage hardware, software, and network resources.

38
New cards

memorandum of understanding (MOU)

A type of agreement between two or more parties. It outlines the intentions and commitments of each party, serving as a framework for cooperation without being legally binding. It is often used to establish a mutual understanding and can cover various aspects such as roles, responsibilities, and terms of collaboration.

39
New cards

Material safety data sheet (MSDS)

A document that lists information relating to occupational safety and health for the use of various substances and products. An SDS for a substance is not primarily intended for use by the general consumer focusing instead on the hazards of working with the material in an occupational setting.

40
New cards

Managed service provider (MSP)

A company that outsources the ongoing management, monitoring, and maintenance of a specific service to a client. MSP commonly focus on IT services like network, application, and infrastructure management, but they can also manage other areas like HR and marketing.

41
New cards

Microsoft remote assistance (MSRA)

A Microsoft tool that allows remote access to a computer for support purposes, enabling users to troubleshoot and resolve issues from a distance.

42
New cards

Mean time between failure (MTBF)

The average time that elapses between a system's failures, used to measure the reliability of a product or system over time.

43
New cards

Network access control (NAC)

A security approach the restricts access to a network based on defined policies and rules. NAC can be implemented in two way, pre-admission which controls initial access to the network and post-admission which restricts lateral movement within the network after initial access. NAC uses AAA, policy enforcement, and threat mitigation (identifying and isolating non-compliant devices) to achieve this.

44
New cards

Network file system (NFS)

A distributed file system (a file system that allows multiple computers on a network to access and share files) protocol that allows users to access files over a network as if they were stored locally. NFS enables seamless sharing of files between different operating systems.

45
New cards

Network time protocol (NTP)

A networking protocol used to synchronize the clocks of computers to a few milliseconds of Coordinated Universal Time (UTC) over packet-switched, variable-latency data networks.

46
New cards

Optical character recognition (OCR)

A technology that converts different types of documents, such as scanned paper documents and PDFs, into editable and searchable data formats. OCR uses machine learning algorithms to recognize text within images.

47
New cards

Power distribution unit (PDU)

A device that distributes electrical power to various components in a data center or IT equipment, often including features for monitoring and management of power usage. There are two main categories of PDUs, basic and intelligent. Basic PDUs simply distribute power, while intelligent PDUs offer monitoring capabilities.

48
New cards

Preinstallation environment

(Windows PE) is a lightweight version of Windows used for deploying workstations and servers. It provides a minimal environment for installation, troubleshooting, and recovery of Windows operating systems. its essentially a lightweight version of windows that runs before the main OS is loaded.

49
New cards

Public key infrastructure (PKI)

A framework that manages digital certificates and public-key encryption. It ensures secure communications and authentication over networks. It involves the use of digital certificates to verify the identity of individuals, devices or services, enabling secure online transactions, access to resources, and data protection.

50
New cards

point to point protocol (PPP)

A data link layer protocol used to establish a direct connection between two network nodes, providing means for encapsulating multiple network protocols. PPP supports features like error detection, link quality monitoring, and the use of various authentication methods.

51
New cards

point to point tunneling protocol (PPTP)

A network protocol that creates VPN tunnels between public networks. Its a relatively old VPN protocol known for simplicity and speed. PPTP is also considered insecure due to weak encryption and authentication methods

52
New cards

Preboot execution environment (PXE)

A specification describing a standardized client-server environment that boots a software assembly, retrieved from a network on PXE enabled clients. On the client side it requires only a PXE capable NIC, and uses a small set of industry standard network protocols such as DHCP and TFTP. The process start with a client request, followed by a DHCP response with its IP address and where to find the boot file on a TFTP server, the client then downloads the file using TFTP, then boots from the file. This could be an OS installation image or a small utility for troubleshooting.

53
New cards

Remote monitoring and management (RMM)

A technology that enables IT professionals to oversee and manage infrastructure from a remote location. It utilizes software and agents to provide remote access, monitoring, automation, and the ability to perform proactive maintenance. This approach streamline IT operations.

54
New cards

Recovery time objective (RTO)

The maximum amount of time an organization can tolerate having a system or app down before it experiences unacceptable business consequences. RTO is measured in seconds, minutes, hours, or days, RTO focuses on the time to restore functionality rather than the amount of data lost, RTO is determined by the potential impact of downtime such as revenue loss, reputational damage, or legal consequences.

55
New cards

secure/multipurpose internet mail extensions (S/MIME)

A standard that provides encryption and digital signatures for email ensuring confidentiality, authentication, and integrity. It uses PKI to encrypt and digitally sign messages making them secure and verifiable.

56
New cards

Serial attached SCSI (SAS)

A point to point serial protocol that moves data to and from computer storage devices. Its designed for enterprise applications, SAS is an evolution of the parallel SCSI interface, offering faster speeds and more flexible connection options. SAS has higher speed compared to PATA and SATA, SAS interfaces are designed to support both SAS and SATA devices.

57
New cards

Secure copy protection (SCP)

A method for safely transferring files between computer systems, primarily leveraging SSH for encryption and authentication. A client can send or request data files to or from a server. According to OpenSSH SCP is outdated, inflexible and not readily fixed, they recommend the use of more modern protocols like SFTP. SFTP also offers more advanced features and functionalities.

58
New cards

Secure FTP

SFTP is a network protocol that provides file access, transfer, and management over any reliable data stream. It was designed as an extension of SSH v2 and is seen as a replacement of FTP due to superior security. Compared to SCP which only allows file transfers, SFTP allows for a range of operations such as resuming interrupted transfers, directory listings, and remote file removal. SFTP is not FTP run over SSH but rather a new protocol.

59
New cards

Self monitoring, analysis, and reporting technology (SMART)

A monitoring system included in HDD and SSD. it primary function is to detect and report various indicators of drive reliability. When SMART data indicates a possible imminent drive failure software running on the host system may notify the user so action can be taken to prevent data loss.

60
New cards

Simple network time protocol (SNTP)

A simplified version of NTP used for synchronizing computer clocks over a network. SNTP is a client only protocol, it is less demanding than NTP making it good for devices with limited resources like microcontrollers or embedded systems.

61
New cards

Structured query language (SQL)

A domain specific language used to manage data especially in a relational database management system. It is particularly useful in handling structured data i.e. data incorporating relations among entities and variables.

62
New cards

Secure sockets layer (SSL)

A protocol that creates an encrypted connection between a web server and a browser ensuring secure data transmission. SSL encrypts data, authenticates the server, SSL certificates verify the identity of a website. While commonly used SSL has been largely replaced by transport layer security (TLS) which offers enhanced security and is the current standard.

63
New cards

Secure socket tunneling protocol (SSTP)

A form of VPN tunnel that provides a mechanism to transport PPP traffic through an SSL/TLS channel. SSL/TLS provides transport level security with key negotiation, encryption and traffic integrity checking.

64
New cards

Terminal access controller access control system (TACACS)

A family of related protocols handling remote authentication and related services for network access control through a centralized server. The original TACACS protocol was used for communicating with an authentication server, which spawned related protocols: extended TACACS (XTACACS) a proprietary extension to TACACS by cisco systems and TACACS+ a protocol also developed by cisco and released as an open standard in 1993. TACACS+ handles AAA services.

65
New cards

Temporal key integrity protocol (TKIP)

A wifi encryption method used in older WPA and WPA2 standards to enhance the security of wired equivalent privacy (WEP). It was designed to address vulnerabilities in WAP which relied on a shared encryption key for all packets. TKIP achieves this by generating a unique encryption key for each data packet. TKIP also includes a message integrity check, used a hashed initialization vector compared to WEP plaintext transmission. TKIP also generates new keys every 10,000 packets, and include a sequence counter to prevent replay attacks.

66
New cards

Transport layer security (TLS)

A cryptographic protocol designed to provide communications security over a computer network such as the internet. The protocol is widely used in applications such as email, IM, VoIP, but is most commonly seen in HTTPS.

67
New cards

User account control (UAC)

A mandatory access control enforcement feature. It aims to improve the security of windows by limiting application software to standard user privileges until and admin authorizes an increase or elevation. UAC uses mandatory integrity control to isolate running processes with different privileges. User interface privilege isolation (a technology used to combat shatter attack exploits by using mandatory integrity control to prevent processes with a lower integrity level from sending messages to higher IL processes) is used in conjunction with UAC to isolate these processes from each other.

68
New cards

Universal naming convention (UNC)

A standard way to name resources like files and devices on a network. it uses a specific format (\\\server-name\\share-name\path) to uniquely identify network resources. this convention is widely used in Microsoft windows for accessing shared network folders and printers.

69
New cards

Virtual desktop infrastructure (VDI)

A technology that allows users to access their full desktop environment from any device by running their desktop OS and applications on a centralized server in a data center.

70
New cards

Virtual network computing (VNC)

A graphical desktop sharing system that uses the remote frame buffer protocol (RFB) to remotely control another computer.

71
New cards

Web application firewall (WAF)

A specific form of application firewall that filters, monitors, and blocks HTTP traffic to and from a web service. It inspects traffic to prevent SQL injection, cross site scripting (XSS), file inclusion, and improper system configuration.

72
New cards

Wired equivalent privacy (WEP)

An obsolete security algorithm for 802.11 networks.

73
New cards

Cross site scripting (XSS)