IT Study Flashcards

(130 cards)

1
Q

Algorism

A

Operations that transform a plaintext into a ciphertext with cryptographic properties, also called a cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Artificial Intelligence (AI)

A

Creating machines to solve problems and analyze strategies without significant human interaction,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Attenuation

A

Degradation of a signal as it travels over media, determines the maximum distance for a particular media type at a given bit rate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Augmented Reality (AR)

A

Using software and smartphone cameras or headsets to interact with real world objects and images or change the way they appear in some way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Bandwidth

A

The amount of data that can be transferred through a connection over a given period. Frequencies supported by transmission media, measured in hertz.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cascading Style Sheets (CSS)

A

A simple language for adding style, such as different color fonts, spacing, and other formatting, to web documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CD - ROMs

A

Optical storage technology supporting up to 700 mb per disc with recordable and re-writable media also available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cellular Radio

A

Tech that lets you connect your device wirelessly to make calls and send texts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Certificate Authority (CA)

A

A server that guarantees subject identities by issuing signal digital certificate wrappers for their public keys..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ciphertext

A

Data that has been enciphered and cannot be read without the cipher key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Client Server Architecture

A

It’s a way computers talk to each other. One computer acts as the server, and others are clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Computing Cycle

A

The process that a device goes through to perform tasks. Four main steps. Input, process, storage, and output. IPSO for short.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Coaxial Cable

A

Is a copper based cable run from ISP. Its a media type using two separate conductors that share a common axis categorized using the Radio Grade (RG) specification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cookies

A

A text file used to store info about a user when they visit a website. Some sites use cookies to support user session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CPU (Central Processing Unit)

A

Microprocessor in a pc or mobile device responsible for running the firmware, OS, and application software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data at rest

A

Information that is primary stored on specific media, rather than moving from one medium to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data in transit

A

Info that is being transmitted between two hosts, such as over a private network or the internet. Also known as Data in Motion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Data Integrity

A

The idea that data is sent over the internet is accurate when it arrives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Digital Subscriber Line (DSL)

A

Type of internet connection that uses regular telephone lines to deliver internet service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Encryption

A

Scrambling the letters in a message, they will be seen but not understood. Uses different types of cypher and one or more keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Fiber Internet

A

Internet connection type that uses a fiber link between the subscriber premises and ISP network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Flash Memory

A

Non - Volatile storage that keeps data even when the device is turned off.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

File Transfer Protocol (FTP)

A

Application protocol used to transfer files between network hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Form Factors

A

Size and shape of a component, it can determine compatibility like PC Cases, Motherboards, and power supplies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
General Data Protection Regulations (GDPR)
Provision and requirements protecting the personal data for EU citizens
23
Graphical Process Unit (GPU)
Microprocessor used on dedicated video adapter cards or within a CPU with integrated graphics capability.
23
Hard Drive
Mass storage device that uses mechanical platters with magnetic coating that spun under disk heads that can read and write to locations on each platter (sector).
24
Information Technology (IT)
The use of computers and related devices to manage data.
24
Health Insurance Portability and Accountability Act (HIPAA)
US federal law that protects the storage, reading, modification, and transmission of personal Healthcare data.
24
Internet Of Things (IOT)
Devices that can report state and configuration data and be remotely managed over IP network
25
Identity Fraud
Fake personal info or the theft and misuse of an individual's personal information
25
Hypertext Markup Language (HTML)
A system of coded tags that identify the structure of the document files used for web pages.
25
Hypertext Transfer Protocol Secure (HTTPS)
Application protocol used to provide web content to browsers HTTP uses port 80. HTTPS(ecure) provides for encrypted transfer, using TLS and port 443.
26
Input Device
Things such as mouses, keyboards, controllers transmitting info into the device.
27
Internet Service Provider (ISP)
Provides internet connectivity and web services to its customer.
28
IP Address
Its your device's home address on the internet.
29
IPv4
An old format of IP addresses. Uses 32 bits (EX. 111.222.3.3), supports 4 billion addresses.
30
Latency
Known as ping rate is how long it takes for the signal to reach your device. Commonly known as lag.
30
Local Connector (LC)
Small form factor push pull fiber optic connector available in simplex and duplex versions
30
IPv6
A newer Format for IP addresses, uses 128 bits (EX. 2001:0db8:85a3::8a2e:0370:7334), supports trillions of addresses.
31
Machine Learning (ML)
Component of AI that enables a machine to develop strategies for solving a task given a label dataset where features have been manually identified but without further explicit instructions.
32
Modem
Takes the signal from your ISP that converts data so it can reach the house.
33
Motherboard
Also called a system board, it is the foundation for the computer's hardware.
34
Operating Systems (OS)
Software that control and configuration of the computer via driver, services, and one or more user interfaces.
35
Optical Drive
Mass storage device that supports CD, DVD, and/or Blue ray media.
36
Output Devices
Things such as Monitor screens, or speakers outputting info from the tech world to the real world.
37
Peer - to peer - architecture
Administration paradigm whereby any computer devices may be configured to operate as both server and client.
38
Peripherals
A device connected to a computer to provide communication, such as input and output... Or supplementary functions, such as additional storage.
39
Personally Identifiable Info (PII)
Data that can be used to identify or contact an individual or to steal identity.
40
Phishing
Email sent to someone to bait them out to giving info such as passwords
41
Plaintext
Unencrypted data that is meant to be encrypted.
42
Random Access Memory
Volatile storage devices that hold computer data and program instructions while the computer is turned on.
43
Read Only Memory (ROM)
A ROM chip is a special form of memory that has data written to it and it can't be altered.
44
Router
A device that sends signals, spreading out around your house.
45
Short Message Services (SMS)
System for sending text messages between cell phones
46
Small form factor pluggable (SFP)
Fiber optic transceiver module type type supporting duplex 1gbps (SFP) or 10 gbps (SFP+) links
47
Smishing
A text message made to look real. But its a scam like a link to scam or calling a fake number to gain info
48
Solid State Drive (SSD)
Persistent mass-storage device implemented using flash memory
49
Spoofed Websites
Attack technique where threat actor disguises his or her identity or impersonates another user or resource.
50
Subscriber Connector (SC)
Push/Pull connector used with fiber optic cabling
51
System Memory
Volatile storage devices that hold computer data and programs instructions while the computer is turned on.
52
Threat actors
A person or entity responsible for an event that has been identified as a security incident or as a risk.
53
Transmissions Control Protocol/Internet Protocol (TCP/IP)
Network protocol suite used to implement the internet and most WANs and LANs, 4 layers network model... Network Interface, Internet, Transport, Application..
54
Two-Factor Authentication (2FA)
Extra security such as an extra device or another account used to gain access to an account.
55
Virtual Private Network (VPN)
A secure tunnel created between two endpoints connected via an unsecure transport network (typically the internet)
56
Virtual Reality (VR)
A computer generated, simulated environment experiences via headset connected to a pc or powered by a smartphone.
57
Web Browser
Software designed to view HTML pages
58
Confidentiality
The fundamental security goal of keeping information and communications private and protecting them from unauthorized access.
59
Integrity
The information is stored and transferred as intended and that any modification is authorized.
60
Availability
The information is readily available and accessible to those authorized to view or modify it.
61
non-repudiation
The security goal of ensuring that the party that sent a transmission or created data remains associated with that data and cannot deny sending or creating that data.
62
cybersecurity
Protection of computer systems and digital information resources from unauthorized access, attack, theft, or data damage.
63
National Institute of Standards and Technology (NIST)
A nonregulatory government agency that develops computer security standards used by US federal agencies and publishes cybersecurity best practice guides and research.
64
Biometric authentication
a way to unlock devices or access accounts using something unique about your body
65
multi-factor authentication (MFA)
MFA is a way to protect your accounts by asking for more than just a password such as a personal question like your first dog's name.
66
Single Sign-On (SSO)
Authentication technology that enables a user to authenticate once and receive authorizations for multiple services
67
least privilege
A basic principle of security stating that something should be allocated the minimum necessary rights, privileges, or information to perform its role. Also referred to as the principle of least privilege
68
Accounting
Tracking authorized usage of a resource or use of rights by a subject and alerting when unauthorized use is detected or attempted.
69
Global Positioning System (GPS)
A means of determining a receiver's position on Earth based on information received from orbital satellites.
70
Geofencing
Security control that can enforce a virtual boundary based on real-world geography.
71
social engineering
Social engineering is when someone tricks you into giving away private information or doing something unsafe — like clicking a bad link or sharing a password.
72
Lunchtime Attack
A malicious action that takes place when a threat actor exploits an unlocked and unattended desktop or mobile device to gain unauthorized access.
73
Shoulder Surfing
Social engineering tactic to obtain someone's password or PIN by observing him or her as he or she types it in.
74
Tailgating
Social engineering technique in which a person gains access to a building by following someone who is unaware of his or her presence
75
Spear phishing
Email-based or web-based form of phishing that targets specific individuals.
76
Malware
Software that serves a malicious purpose, typically installed without the user's consent (or knowledge)
77
Virus
Malicious code inserted into an executable file image. The malicious code is executed when the file is run and can deliver a payload, such as attempting to infect other files.
78
Ransomware
Malware that tries to extort money from the victim by blocking normal operation of a computer and/or encrypting the victim's files and demanding payment.
79
Air Gapped
A type of network isolation that physically separates a host from other hosts or a network from all other networks.
80
Worms
A type of malware that replicates between processes in system memory and can spread over client/server network connections.
81
Backdoor
A mechanism for gaining access to a computer that bypasses or subverts the normal method of authentication.
82
Spyware
Software that records information about a PC and its users, often installed without the user's consent.
83
keylogger
Malicious software or hardware that can record user keystrokes.
84
defense in depth
Security strategy that positions the layers of diverse security control categories and functions as opposed to relying on perimeter controls.
85
Separation of duties
Security policy concept that states that duties and responsibilities should be divided among individuals to prevent ethical conflicts or abuse of powers.
86
Network segmentation
Network segmentation means breaking a big network into smaller parts so that devices and data are better protected and easier to manage.
87
Firewall
Software or hardware device that protects a network segment or individual host by filtering packets to an access control list.
88
antivirus software
Inspecting traffic to locate and block viruses.
89
Server
A server is a special computer that shares data or services with other computers.
90
Patches
A small unit of supplemental code meant to address either a security problem or a functionality flaw in a software package or operating system.
91
Patch management
Identifying, testing, and deploying OS and application updates. Patches are often classified as critical, security-critical, recommended, and optional.
92
Byte
A byte is made of 8 bits, and each bit is either 0 or 1.
93
American Standard Code for Information Interchange (ASCII)
7-bit code page mapping binary values to character glyphs. Standard ASCII can represent 127 characters, though some values are reserved for non-printing control characters.
94
Hexadecimal
Notational system with 16 values per digit. Values above 9 are represented by the letters A,B,C,D,E,F. Hex is a compact way of referring to long byte values, such as MAC and IPv6 addresses.
95
Octal Numbering
The octal system is a base-8 numbering system that uses the digits 0 - 7. Just like hexadecimal, octal can represent binary numbers in much smaller spaces.
96
networks
a network consists of two or more computers connected to each other by an appropriate transmission medium which allows them to share data.
97
personal area network (PAN)
A network scope that uses close-range wireless technologies (usually based on Bluetooth or NFC) to establish communications between personal devices, such as smartphones, laptops, and printers/peripheral devices.
98
network interface card (NIC)
Adapter card that provides one or more Ethernet ports for connecting hosts to a network so that they can exchange data over a link.
99
registered jack type 45
Series of jack/plug types used with twisted-pair cabling, such as RJ45 and RJ11
100
remote desktop protocol (RDP)
Application protocol for operating remote connections to a host using a graphical interface. The protocol sends screen data from the remote host to the client and transfers mouse and keyboard input from the client to the remote host. It uses TCP port 3389.
101
graphical user interface (GUI)
An environment for passing commands to a computer by using a graphical, mouse-driven interface rather than by using text-based commands.
102
media access control (MAC)
Hardware address that uniquely identifies each network interface at layer 2 (Data Link). A MAC address is 48 bits long with the first half representing the manufacturer's organizationally unique identifier (OUI). Also called a client identifier.
103
local area network (LAN)
Network scope restricted to a single geographic location and owned/managed by a single organization.
104
dynamic host configuration protocol (DHCP)
Protocol used to automatically assign IP addressing information to hosts that have not been configured manually. Also known as "DHCP."
105
dotted decimal notation.
Format for expressing IPv4 addresses using four decimal values from 0 to 255 for each octet.
106
client-server
Administration paradigm where some host machines are designated as providing server and services and other machines are designated as client devices that only consume server services.
107
peer-to-peer
File sharing networks where data is distributed around the clients that use the network. Apart from consuming bandwidth and disk space, P2P sites are associated with hosting malware and illegal material.
108
Intranet
A private network that is only accessible by the organization's own personnel.
109
small office, home office (SOHO)
Category of network type and products that are used to implement small-scale LANs and off-the-shelf Internet connection types.
110
Near Field Communication (NFC)
A standard for two-way radio communications over very short (around four inches) distances, facilitating contactless payment and similar technologies. NFC is based on RFID.
111
Wired Equivalent Privacy (WEP)
A legacy mechanism for encrypting data sent over a wireless connection.
112
Wi-Fi Protected Access (WPA)
Standards for authenticating and encrypting access to Wi-Fi networks. Also called WPA2 and WPA3
113
Virtualization
A computing environment where multiple independent operating systems can be installed to a single hardware platform and run simultaneously.
114
on-premises
Software or services installed and managed on a customer's computing infrastructure rather than in the cloud or hosted by a third-party provider
115
Software as a Service (SaaS)
A cloud service model that provisions fully developed application services to users.
116
Platform as a Service (PaaS)
A cloud service model that provisions application and database services as a platform for the development of apps.
117
Infrastructure as a Service (IaaS)
A cloud service model that provisions virtual machines and network infrastructure
118
119
120