Mike Meyers Comptia Videos
609 questions across 0 topics. Use the find bar or section chips to jump to what you need.
System Unit (Chassis)
Case that contains the cpu, ram, and hard drives.
Operating System (OS)
Software used to control the computer and its peripheral equipment.
OS Core
kernel
Linus and macOS super user
root
Single sign-on
enables users to log in using their domain accounts anywhere on the network.
Linus is commonly packaged in distributions
distros such as Federa, Mint, Ubuntu.
CPU's take a system speed and multiple it to reach the
max cpu speed.
Single CPU's have multiple
cores.
CPU catching works between
RAM and the CPU.
Cache is built into the
CPU.
CPU's commonly have three caches consisting of
L1, L2 and L3.
32-bit CPU's cannot address more than
4 gigabytes of memory.
CPU sockets
Allows CPU to be removed from motherboard-LGA or PGA
Multiply a DDR speed by eight to get the
pc SPEED.
Parity and EEC RAM contain extra chips to check for
RAM errors.
SO-DIMMS
(Small Outline DIMMs) are used in Laptops and are smaller memory modules than DIMMs.
Almost all RAM has an SPD chip that
stores info about the RAM stick.
Tools like CPU-Z read
SPD information.
Virtual Memory
a portion of a storage medium functioning as additional RAM. All OS's allow adjustment.
BIOS
a set of computer instructions in firmware which control input and output operations.
BIOS programming enables
interaction with motherboard before OS loads.
BIOS is stored in
nonvolatile media, thus called firmware.
POST routines are built into
firmware.
POST runs at boot, requesting devices to
self check.
POST errors manifest as specific
beep codes or display text codes.
POST cards enable testing of
dead computers.
UEFI (Unified Extensible Firmware Interface)
An interface between firmware on the motherboard and the operating system that improves on legacy BIOS processes for booting, handing over the boot to the OS, and loading device drivers and applications before the OS loads.
UEFI replaces traditional
16bit BIOS in modern systems.
System Setup
This is the configurable aspect of the BIOS, enabling the changes from boot orders, to the system time.
Random Access Memory (RAM)
The fast, chip-based volatile storage in a computing device.
Motherboard
A circuit board that contains all of the computer system's main components.
Flash ROM chips to
update firmware.
ATX (Advanced Technology Extended)
The most common form factor for PC systems presently in use, originally introduced by Intel in 1995. ATX motherboards and cases make better use of space and resources than did the earlier AT form factor.
MicroATX
a version of the aTX form factor. MicroaTX addresses some new technologies that were developed after the original introduction of aTX.
MINI-ITX
A smaller version of the microATX form factor.
Chipset
A group of chips on the motherboard that controls the timing and flow of data and instructions to and from the CPU.
Northbridge Chipset
deals with the communication between the CPU, the memory.
Southbridge Chipset
manages all onboard peripheral devices. Any expansion cards that connect to the motherboard - with the exception of high-speed graphics cards - are managed.
Modern chipsets feature
Southbridge chipset, handling Northbridge functions.
Chipsets define
RAM capacity, USB capabilities, and much more.
PCIe (PCI Express)
interface standard for connecting high-speed components. Every desktop PC motherboard has a number of PCIe slots you can use to add GPUs (aka video cards aka graphics cards), RAID cards, Wi-Fi cards or SSD (solid-state drive) add-on cards.
Power Supplies transform
AC from wall outlet to DC for the computer.
Standard motherboard connectors are
20-24 PIN atc AND 4-8 PIN p4.
Use Molex and Sata connectors for
peripherals and drives.
Use UPS to protect against
brownouts and blackouts.
Heat Sink
A piece of metal, with cooling fins, that can be attached to or mounted on an integrated chip (such as the CPU) to dissipate heat.
Power Supply Tester (PSU)
A device that can test the output of each power cord coming from a power supply.
Multimeter
An instrument for measuring the properties of an electrical circuit..
Errors in system setup can cause a dead PC, try
clearing CMOS.
SSD
The type of hard drive that has no moving part, so they are more efficient, run with no noise, emit little heat, and require little power
Magnetic Disk Drives
Memory storage device that uses the magnetic state of ferrous coating to record data
hard disk drive (HDD)
A direct access storage device used to store and retrieve data from rapidly rotating disks coated with magnetic material.
serial ATA (SATA)
A drive interface for EIDE drives that transfers data serially at speeds between 150 MBps and 300 MBps and 6 Gbps, depending on the version of the standard. (1)
SSD data is stored in
blocks and pages.
NVMe (Non-Volatile Memory Express)
SSD tech that supports a communication between the operating system and the SSD directly through a PCIe bus lane, reducing latency and taking full advantage of the speeds high-end SSDs.
SCSI (Small Computer System Interface)
A fast interface between a host adapter and the CPU that can daisy chain as many as 7 or 15 devices on a single bus.
SAS (serial-attached SCSI)
A type of SCSI that uses serial signals to transfer data, instructions, and information.
A Partition is a
logical electronic device
Partitions define
the location of operating systems, swap files, and recovery partitions.
Partitions must be
created and mounted.
In Windows, partitions manifest as drive letters, in Linux/macOS,
partitions manifest as folders.
Master Boot Record (MBR)
The first sector on a hard drive, which contains the partition table and a program the BIOS uses to boot an OS from the drive.
GUID Partition Table (GPT)
The area of a large hard disk (> 2TB) outside a partition that stores partition information and boot loaders.
GPT supports up to
128 volumes on a partition.
A file system is applied to a partition by
formatting.
A partition must be
formatted before they are useable.
FAT16
File allocation table that uses 16 bits to address and index clusters. Used as the primary hard drive format on DOS and early Windows 95 machines; currently used with smaller-capacity (2 GB or less) flash media devices.
FAT32
File allocation table that uses 32 bits to address and index clusters. Commonly used with USB flash-media drives and versions of Windows prior to XP.
exFAT (Extended File Allocation Table)
a file system that is used primarily in flash storage applications and SD cards
NTFS (New Technology File System)
A file system used on Windows-based systems. It is more efficient and provides much more security than do FAT-based file systems.
NTFS supports
compression, encryption, and folder/file security.
CDFS (Compact Disc File System)
File structure, rules, and conventions used when organizing and storing files and data on a CD.
ext3 and ext4
File systems commonly used by Linux OS.
HFS+ file system
macOS X file system
Windows Disk Management
for partitioning and formatting disks.
Dynamic disk storage
Span multiple disks to create a large volume Split data across physical disks (striping) Duplicate data across physical disks (mirroring)
Drives must be converted from basic to
dyanmic in Disk Management.
Dynamic disks enable shrinking,extending, and
spanning volumes without losing the data on the disk.
RAID 1
Also called mirroring, this RAID array type provides fault tolerance because all the data is written identically to the two drives in the mirrored set. (2)
RAID 0 (striping)
breaks data into units and stores the units across a series of disks by reading and writing to all disks simultaneously.
RAID 4
Block-level striping with dedicated parity. Not often used, replaced with RAID 5.
RAID 5 & 6
Uses block-level and parity data striping. Requires three or more drives. Provides speed.
RAID 10
a combination of RaID 1 and RaID 0 that requires at least four disks to work as an array of drives and provides the best redundancy and performance.
Raid 5 can only lose
one drive in the array, RAID 6 can lose two.
Hardware RAID Controller
creating volumes from an array of physical disks is an operation supported by a plug-in controller card or by the motherboard, independently of the installed operating system.
Hardware RAID has its own
BIOS that comes with a special system setup to configure the array.
Storage Spaces
In Windows 8 and later, a software RAID solution that enables users to group multiple drives into a single storage pool
File-based encryption
encrypts files and folders, disk- based encryption encryption entire drives.
Encrypting File System (EFS)
A security feature of many Windows versions that allows it to encrypt files on an NTFS volume.
BitLocker Drive Encryption
Drive encryption software offered in high-end versions of Windows.. requires a special chip to validate hardware status and to ensure that the computer hasn't been hacked.
Compact discs store
650-700 mb of data.
Digital video/versatile disc (DVD's) store from
4.37 gb to 15.9 gb of data.
Blu-ray discs (DB's) store
25 GB to 50 gb.
All optical media comes in
read-only memory (ROM), write-once (R), and write-many (RW/RE) versions.
USB
Universal Serial Bus. A type of connection used to attach devices such as flash drives, scanners, cameras, and printers to a computer.
USB 1.1
max speed 1.5 megabits/sec.
USB 2.0
480 megabits/sec.
USB 3.0
A device that allows a user to copy multiple sheets at the same time without manually changing pages after each scan.
USB 3.1 Gen 1
5 Gigabits/sec.
USB 3.1 Gen 2
10 Gigabits/sec.
USB connector
5 Gbps
USB B connector
10 Gbps
USB 3 Micro connector
USB TYPE-B connectors plug into upstream ports on peripherals.
USB mini-B connector
up to 40 Gbps, mini displayport/ usb/c.
USB Micro-B connector
A device that switches a single keyboard/video/mouse set among multiple computer systems.
USB 3.1
Expansion card on the motherboard that provides a connection for the speakers and microphone
USB Type-A connectors plug into downstream ports and
USB expansion card.
Thunderbolt connector
An expansion card that enables a computer to connect other computers or to a cable modem to facilitate a high-speed Internet connection.
KVM switch
CompTIA's name for a standard desktop computer. Runs desktop appli- cations and meets recommended requirements for selected OS.
ADF (automatic document feeder)
a terminal that looks like a desktop but has limited capabilities and components
Soundcard
a network-connected computer dedicated to providing file-based data storage services to other network devices.
Alice needs to connect many external devices to her PC. Which of the following expansion cards would enable her to connect the largest number of devices?
1ghz, 16gb hdd, dx9 with wddm 1.0 driver, dispolay 800x600.
Network Interface Card (NIC)
A utility for migrating data from many computers, or if you need to perform what Microsoft calls a "wipe-and-load migration" from and to the same computer. Available in Windows XP, Vista, and Windows 7. (9)
Thick Client
OS installation in which multiple operating systems are installed on a single machine.
Thin client
A type of OS installation where special scripts perform all the OS setup duties without human intervention.
Network Attached Storage (NAS)
Computer with multimedia capabilities designed specifically for watching television and films.
Windows 10 Requirements
a database in Windows that stores user preferences, file locations, program configuration settings, startup information, hardware settings, and more.
Windiows
this type of application runs after the computer starts, has no user interface and can be paused or restarted.
User State Migration Tool (USMT)
A Windows utility that can identify what processes are launched at startup and can temporarily disable a process from loading.
Multiboot Installation
admin tools in the control panel.
Unattended Installation
ctrl + shift + escape.
HTPC (Home Theater PC)
ctrl + alt +delete.
Windows Registry
MMC snap-in that provides tools for analyzing how your system resources are used by processes and services
Windows Service Application
It shows all of the currently running process, services, performance, network connectivity, it also helps you close programs
System Configuration (Msconfig.exe)
A multi-core processor is a single computing component with two or more independent actual central processing units which are the units that read and execute program instructions.
Find system config in
Provides information about hardware resources, components, and the software environment. Also known as System Information.
Task Manager
Windows feature that uses a combination of software and hardware to prevent the execution of code in unintended areas of memory to protect against buffer overflow attacks.
Windows Resource Monitor
One of the primary administrative tools used to manage Windows and many of the network services provided by Windows.
Windows Task Manager
A Microsoft Management Console (MMC) snap-in that provides tools for analyzing system performance.
CPU Cores
utility can be used to view the messages in event logs.
msinfo32
access controls applied to all accounts of a given windows computer.
msconfig (System Configuration utility)
application, security, setup, and system.
Data Execution Prevention (DEP)
asks users to write lines of code to answer questions against a database
Microsoft Management Console (MMC)
An interface for accessing database management systems that can be ported to other systems by using a driver.
Windows Performance Monitor
Programming tools in Windows for the sharing of data objects between programs.
Windows Event Viewer
Allow you to control which users and groups can gain access to files and folders on an NTFS volume.
Local Security Policy
when a new folder or file gets the permissions of the folder in which it was created. Stopped with a Deny.
Event viewer logs
owner, group, and everyone. ( read, write, execute )
Structured Query Language (SQL)
A naming system used by Windows computers to locate network file shares and network printers. The format is \\servername\sharename
ODBC (Open Database Connectivity)
A method of creating a logical drive letter that allows easy access to a shared folder or drive on a computer.
Component Services
restores points before application installs, registry, and critical system files.
NTFS permissions
A diagnostic and recovery tool.
Inheritance
a bootable disc you create in Windows 7 that contains Windows system recovery tools.
Linus and macOS permissions use
Backs up important files, makes a complete mirror image of your current computer setup
Universal Naming Convention (UNC)
A Windows tool that can set a task or program to launch at a future time, including at startup.
Mapping a drive
fixes formatted partitions.
System Restore
Scans integrity of all protected system files and repairs files with problems when possible.
Windows Recovery Environment (Windows RE)
repairs critical windows files based online system stores. ( after sfc /scannow )
system repair disc
Command in the command-line interface used to copy multiple directories at once, which the copy command could not do.
File History, File Recovery
A Windows command that is similar to and more powerful than the xcopy command, used to copy files and folders.
Task Scheduler
End a running process
chkdsk (CheckDisk)
This command updates the repositories (libraries) on the raspberry pi.
sfc /scannow
A DVI (Digital Visual Interface) video port that works only with digital monitors.
dism
upgrade all software to latest vesrion.
xcopy
command line to remove a program.
robocopy (robust file copy)
displays all processes running on your terminal with user names.
TASKILL cmd
text editor.
sudo apt-get update
shutdown
sudo apt-get install
change permission modifiers (linux)
sudo apt-get update (upgrade)
changes the user and/or group ownership of a given file
sudo apt-get remove [package]
A text file containing a series of OS commands. Autoexec.bat is a batch file.
ps aux (linux terminal command)
is Microsoft's task automation framework, consisting of a command-line shell and associated scripting language built on top of, and integrated with, the .NET Framework
linux VI is a
The Microsoft graphical user interface (GUI) programming language used for developing Windows applications. A modified version of the BASIC programming language.
linux command
an object-oriented computer programming language commonly used to create interactive effects within web browsers.
chmod command (linux)
Windows Recovery Environment. A recovery platform based on the Windows Pre-installation Environment, which helps users troubleshoot operating system failures. System Restore, System images. CMD.
chown command (linux)
select option in system configuration for safe boot.
batch file
video driver problem.
PowerShell
roll back Driver or Update Driver in Device manager.
Visual Basic
boot order in System setup.
JavaScript
create a new user account and copy old profile to try to recover the corrupted profile.
WinRE
open it manually in Services Administrative Tool, or check Event Viewer for details.
Safe boot
Scans integrity of all protected system files and repairs files with problems when possible in com Command prompt.
To get to Safe mode options in Windows 8/10,
A flat-panel monitor that creates an image when liquid crystals become electronically charged.
A black screen on a booted computer often indicates a
LED lights and shine through the liquid crystals.
In the event of a black screen, get to Safe mode and try to
backlight, as the pixels make their own light.
In the event of errors like no boot device or no OS, check
Technology that bounces light off microscopic mirrors on a computer chip used by small computer projectors.
If a windows profile is corrupted,
Standard for the video graphics adapter that was built into IBM's PS/2 computer. It supports 16 colors in a 640 × 480 pixel video display.
With services that fail to start,
Port that enables digital signals to transmit directly to the LCD monitor
liquid crystal display (LCD)
A DVI (Digital Visual Interface) video port that supports both analog and digital monitors.
LCD backlights are flourescent or
A display device resolution of 800 × 600.
OLED does not use a
A display device resolution of 1280 × 1024.
Digital Light Processing (DLP)
1600x1200.
VGA (Video Graphics Array)
1680 x 1050 resolution
DVI
1920 x 1200 resolution ( 16:10 ratio )
DVI-D
2560X1440.
DVI-I
A card that plugs into a motherboard and allows for expansion cards to be mounted parallel to the motherboard. Expansion cards are plugged into slots on the riser card.
SVGA (super video graphics array)
LCD technology.
SXGA (Super Extended Graphics Array)
brightness of the projector.
UXGA (ultra extended graphics array)
distance to screen.
WSXGA+ Resolution
A shutdown of this sort could be due to problems with the video card or blocked airways for ventilation. ( move video card around for better airway )
WUXGA Resolution
Replace the LCD.
WQHD
pieces of stuff show up on screen that are from previous images. ( take a look at video ram by using a different video card to test current card )
riser card
Problems with the colors in a projector or screen. ( check VGA cable, check a different video card )
Projectors usually have DLP or
A low light image; symptom of a possible failing CCFL backlight or may simply indicate the brightness is set too low. ( buy new CCFL, turn brightness back up)
Lumens define the
A screen image that goes in and out; can be caused by a failing CCFL backlight or by certain settings on mobile devices. ( reseat HDMI cables )
projector throw
Check native resolution. ( with projectors, adjust geometry )
Overheat shutdown
When a static image stays on a monitor for many hours, leaving a permanent impression of that image on the monitor.. ( change image on screen )
Dead Pixels on LCD monitor ( black or white spots)
If the resolution of the monitor does not match the system settings. ( adjust text size on windows )
Artifacts
Connects a group of computers in close proximity, such as in an office building, school, or home.
Incorrect color patterns
A device that provides a connection between wireless devices and can connect to wired networks.
Dim image
The process by which devices determine which device may access the network at any given time.
flickering image
ethernet.
distorted image
1500 bytes.
Burn in
host on a LAN
Oversized images and icons
ifconfig (Linux) to view a MAC.
Local Area Network (LAN)
A network device that connects several nodes of a local area network.
WAP (Wireless Access Point)
network controller which connects network devices and allows effective communication between these devices
Media Access Control (MAC)
traffic on the LAN to all nodes.
LAN computers connect with
traffic based on MAC address.
Ethernet frames standardized as
full bandwidth for all nodes.
A MAC address uniquely identifies a
Spans a large geographic area such as a state, province, or country
Use ipconfig (Windows) or
A number that uniquely identifies each computer or device connected to the Internet.
Network Hub
A network service that provides automatic assignment of IP addresses and other TCP /IP configuration information.
Network Switch
1024 computers in a LAN.
Hubs repeat all
in a WAN.
Switches filter
determine local vs. remote traffic.
Switches provide
one central wire surrounded by insulation, a metallic shield, and a covering of insulation
Wide Area Network (WAN)
A coaxial cable that uses BNC connectors. It is used for analog data and can be used between a TV and DVD player.
IP Address (Internet Protocol Address)
Coaxial Cable used for connecting homes to cable networks. Larger conductor and higher frequencies than RG-59.
DHCP (Dynamic Host Configuration Protocol)
port numbers in the range of 1-1024 that identify network applications that are well known such as web, email, and remote login applications
Switches connect up to
Category 5 wire, a TIA/EIA standard for UTP wiring that can operate at up to 100 Mbps.
Routers connect multiple LAN's together
A higher-grade version of wiring that contains highquality copper, offers a high twist ratio, and uses advanced methods for reducing cross talk. It can support a signaling rate of up to 350 MHz
Routers use logical addressing ( ip addressing) to
Twisted-pair cables capable of carrying up to 1000Mbps (1 gigabit) of data up to a length of 100 meters
Coaxial cable (coax)
a rating used for UTP cables that is thicker than CaT-6 and used by 10GBase-T (10-Gigabit Ethernet).
RG-59
Fire-resistant cable designed for airways, conduits, and areas sprinklers cannot reach.
RG-6 Cable
It provides less protection than plenum cable, so most installations today use plenum for runs between floors.
RJ-11
category CAT ratings.
Cat 5
electrical pulses.
Cat 5e (Enhanced Category 5)
F-Type connectors.
CAT6 (category 6)
The room in a building that stores the demarc, telephone cross-connects, and LAN cross-connects.
Cat 6a
-network/telephone cabling runs from closets to workstations -always use solid cord (less flexible)
Plenum-rated cable
A wall-mounted panel of data receptors into which cross-connect patch cables from the punch-down block are inserted.
Riser-Rated Cable
Consists of a group of wires twisted to form metallic string.
Twisted pair cabling have different
A measuring tool that transmits an electrical pulse on a cable and measures the way the signal reflects back on the TDR to determine network issues. ( use for testing runs )
Fiber optic cables use light, rather than
A tool used to punch individual wires from a network cable into their slots to terminate the cable.
Coax cables use RG ratings and
patch panel through walls/ ceilings.
Main Distribution Frame (MDF)
An expansion card that enables a computer to connect other computers or to a cable modem to facilitate a high-speed Internet connection.
Horizontal Runs
Communication that happens in two directions at the same time.
Patch Panel
Communication between two devices whereby transmission takes place in only one direction at a time.
Stranded Wire
Configuring a computer so that it will respond to network activity when the computer is in a sleep state.
TDR (Time-Domain Reflectometer)
a packet that triggers a computer to wake up from a low power state
Punchdown tool
Information/configuration. ( change duplex and wake-on LAN settings here )
Horizontal runs from wall outlet to
show connectivity, activity, and sometimes speed.
Full Duplex
Built-in TV tuner with a cable TV connector on the Video Card.
Half Duplex
a port that looks like a large phone jack and is used by twisted-pair cable to connect to a wired network adapter or other hardware device. RJ stands for registered jack.
Wake on LAN
In IPv4 addressing, a 32-bit number that, when combined with a device's IP address, indicates what kind of subnet the device belongs to.
Magic Packet
identifies the device that the computer uses to access the Internet or another network
Use Device Manager > NIC Properties for
A defense-related computer network that was the precursor to the internet.
Link Lights
Transmission Control Protocol/Internet Protocol. Protocol that connects computers to the Internet. Tells computers how to exchange information over the Internet.
F-type
The Internet Protocol version 4 is the dominant protocol for routing traffic on the Internet, specifying "to" and "from" addresses using a dotted decimal such as "122.45.255.0".
RJ-45
The Internet Protocol version 6 provides a large number of new addresses to route Internet traffic, using "from" and "to" addresses written as colon-hexadecimal notation, such as "fe80::42:acff:feaa:1bf0".
subnet mask
An IP address that is manually assigned to a device and remains constant until it is manually changed.
default gateway
The utility used to display TCP/IP addressing and domain name information in the Windows client operating systems.
ARPANET
Enables the MAC address information to be displayed from the command prompt
TCP/IP
A block of IP addresses from 224.0.0.0 to 239.255.255.255 used to support multicast sessions.
IP addresses have four octects between
A block of IP addresses from 240.0.0.0 to 255.255.255.255 used for research and experimentation purposes.
IPv4
10.x.x.x 192.168.x.x. 172.16.x.x.
IPv6
Protocol that operates instead of TCP in applications where delivery speed is important and quality can be sacrificed.
static IP address
internal networks use private IP addresses and share a public address.
ipconfig
by default.
ipconfig /all
invisible to the public internet.
Class D addresses
A network service that provides automatic assignment of IP addresses and other TCP /IP configuration information.
Class E addresses
A service available on computers running one of the Windows operating systems that automatically assigns the computer's network interface a link-local IP address. 169.264.0.0 ( CLASS B )
Three sets of private IP Address range
The IT director has asked you set up a computer to acquire an IP address from a newly configured DHCP server. Which is the best command to use?
loopback address
command releases any IP configurations received from DHCP server
NAT addresses
The Internet Protocol version 4 is the dominant protocol for routing traffic on the Internet, specifying "to" and "from" addresses using a dotted decimal such as "122.45.255.0".
All gateway routers are NAT enabled
The Internet Protocol version 6 provides a large number of new addresses to route Internet traffic, using "from" and "to" addresses written as colon-hexadecimal notation, such as "fe80::42:acff:feaa:1bf0".
Networks that use NAT are
A second IPv6 address that every system needs in order to get on the Internet.
APIPA (Automatic Private IP Addressing)
Ports ranging from 1024 to 49151; accessible to network users and processes that do not have special administrative privileges.
ipconfig /renew
ports that are dynamically assigned to communication sessions as needed and are typically in the numerical range of 1024 to 65535
ipconfig /release
application.
global unicast address
A core protocol in the TCP/IP suite that notifies the sender that something has gone wrong in the transmission process and that packets were not delivered.
Well Known Ports
provides reliable, ordered, and error-checked delivery of a stream of packets on the internet. TCP is tightly linked with IP and usually seen as TCP/IP in writing.
Registered Ports
A generic term referring to the header defined by some layer of a networking model, and the data encapsulated by the header (and possibly trailer) of that layer, but specifically not including any lower-layer headers and trailers.
Dynamic Ports
A data packet that has been encoded on the Data Link layer for transmission from one node to another on an Ethernet network.
Port numbers get data to the correct
The IP portion of a TCP/IP frame that acts as an envelope for data, holding information necessary for routers to transfer data between subnets.
Resource monitor shows
Can display a variety of information about IP-based connections on a Windows or UNIX host.
UDP (User Datagram Protocol)
The Internet's system for converting alphabetic names into numeric IP addresses.
ICMP (Internet Control Message Protocol)
A plaintext file configured on a client machine containing a list of IP addresses and their associated host names, which can be used for host name resolution as an alternative to DNS.
TCP (Transmission Control Protocol)
Displays information about DNS names and their corresponding IP addresses, and it can be used to diagnose DNS servers.
Protocol Data Unit (PDU)
Protocol that operates at the Session layer of the OSI seven-layer model. This protocol creates and manages connections based on the names of the computers involved.
Ethernet frame
The Active Directory service that manages the process that allows a user to sign on to a network from any computer on the network and get access to the resources that Active Directory allows.
IP packet
When all users on a network require the same access to all resources. more secure. ( replaced with workgroup )
netstat -n command
In Windows, a logical group of computers and users in which administration, resources, and security are distributed throughout the network, without centralized management or security.
DNS (Domain Name System)
A Microsoft developed protocol used to provide shared access to files printers and other network resources. It runs on port 445.
HOSTS file
command to find out which user is logged in.
nslookup command
A Windows server that has Active Directory installed and is responsible for allowing client computers access to domain resources.
NetBIOS (Network Basic Input/Output System)
linux and macs to connect to windows networks.
Active Directory Domain Services (AD DS)
A command that can display all kinds of important networking data and allows you to configure various networking options such as services.
Homegroup
Shows the computers on your immediate network, whether they operate as a workgroup or a domain.
Workgroup
shares folders or views shared folders.
Server Message Block (SMB)
accesses shared folders.
whoami command
creates and deletes user accounts.
Domain Controller
Data over Cable Service Interface Specification. The main link layer standard for transmitting data via a cable modem. Used by most vendors of HFC networks.
Samba comes with
The type of port on a router used to communicate with the router itself, such as when making programming changes to the device.
net command
ometimes used by routers for management and configuration purposes.
net view command
A small network that can comprise up to 10 nodes. DHCP range. 192.168.0.1.
net share command
generated automatically by software, is used to determine the best possible route for a packet
net use command
You need to configure DHCP to deliver a specific IP address to a specific network printer. What should you configure?
net user command
A security discipline that requires that a particular user, system, or application be given no more privilege than necessary to perform its function or job.
DOCIS
A list of addresses, ports, or applications that should be denied (blacklist) or allowed (whitelist) by a firewall, spam filter, or other software.
Console Port
A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls, but are not as sophisticated.
DB9 port
A flrewall that monitors communication paths and data flow on the network. Block on fixed criteria such as port number, time of day, URL, ect. Block based on actions taking place at that moment.
SOHO (Small office/home office)
SNMP Security concepts where agent may wish to give different access privileges to different managers.
routing table
A small section of a private network that is located between two firewalls and made available for public access.
DHCP reservation
defines what may or may not forward orfilter.
Principle of Least Privilege
A type of software firewall installed on a host and used to protect the host from network-based attacks. Protects systems using file names or process ID's.
Blacklist and Whitelist
Anti-malware software embedded in Windows 8 that can detect, prevent, and clean up a system infected with viruses and other malware. domain, public, private.
stateless firewall
A setting that when turned on allows a computer to see other computers on a network and to be seen by those other computers.
stateful firewall ( soho )
Preventing the passage of any IP packets through any ports other than the ones prescribed by the system administrator.
Access Policy
A DNS name-registering process whereby computers in the domain can register or update their own DNS records. gives DNS names to port forwarded devices.
DMZ (demilitarized zone)
NAT router opens incoming traffic on a certain port access to a single system on the internal network.
The Firewalls access contro list ( ACL ),
Policies that control how much bandwidth a protocol, PC, user, VLAN, or IP address may use. makes a game for example run faster.
host firewall
A set of protocols that enable networked devices to automatically discover each other's presence.
Windows Defender
A protocol used to monitor and manage network devices, such as routers, switches, and servers. How much bandwidth is going through.
Network Discovery
A protocol that identifies devices connected on the local area network and allows them to automatically exchange information.
Port Forwarding
Groups ports on a switch so that some of the local traffic on the switch is forced to go through a router
Dynamic DNS (DDNS)
Allows the network administrator to monitor, configure, and manage select network features
A port foward is when a
Disabling unused application/service ports to reduce the number of threat vectors.
Quality of Service (QoS)
check cables, patch cable connected to back of computer, check link lights, check ip addressing.
Universal Plug and Play (UPnP)
Ping Localhost, then move outward and use ipconfig/all.
Simple Network Management Protocol (SNMP)
DHCP requests are answered with bogus IP addresses from rogue server setup by an attacker
Link Layer Discovery Protocol (LLDP)
Check the system tray for broken LAN icons or messages. May be a problem with the switch or wireless access point
VLAN (Virtual Local Area Network)
check processes for bandwidth usage. QoS.
Managed Switch
A wireless standard used to ensure compatibility between devices.
Port Security
A device that provides a connection between wireless devices and can connect to wired networks.
No connectivity
A wireless configuration that uses one or more WAPs to connect wireless workstations to the cable backbone. uses wireless access point.
Limited connectivity
A network name that wireless routers use to identify themselves.
Rogue DHCP Server Attack
no wireless access point. otherwise known as peer-to-peer mode, where each wireless node is in meshed contact with every other node.
intermittent connectivity
A directional antenna that has a planar surface and is usually mounted on a wall or column.
Slow transfer speeds
An antenna that sends a narrowly focused signal beam long distances.
IEEE 802.11
The band of radio frequencies associated with industrial, scientific, and medical devices.
infrastructure mode
11 Mbps, 2.4 GHz
Service Set Identifier (SSID)
54 Mbps, 2.4 GHz
ad hoc mode
100mbps, 2.4ghz 5ghz
Patch Antenna
A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.
highly-directional antenna
A security protocol created by the IEEE 802.11i task group to replace WEP.
ISM band 2.4, 2.5ghz bands
also referred to as personal mode, is a type of WPA used on most home networks. All workstation has the same key to connect to the network.
802.11a
WiFi protected access strong authentication and data encryption replaced WEP
802.11b
A network that uses multiple access points to link a series of devices that speak to each other to form a network connection across a large area such as a SOHO environment.
802.11g ( backward compatible with 802.11b)
A device that adds power to an Ethernet cable so the cable can provide power to a device.
802.11n
An unauthorized Access point that allows an attacker to bypass many of the network security configurations and opens the network and its users to attacks.
WEP (Wired Equivalent Privacy)
an Access Point that requires users to agree to some condition before that can use the network / internet
TKIP (Temporal Key Integrity Protocol) -WPA
power over internet poe.
PSK (pre-shared key) -WPA
RADIUS or TACACS + protocols for authentication.
WPA encryption
ESSID's.
Mesh Network
uses radio signals to communicate with a tag placed in or attached to an object
PoE injector
A set of standards primarily for smartphones and smart cards that can be used to establish communication between devices in close proximity.
Rogue AP
provides communication for devices owned by a single user that work over a short distance
Captive Portal
100 meters
Enterprise WAP's use
10 meters
Enterprise networks often use
1 meter
Two or more WAP's sharing the same SSID are known as
ssid or passcode may be changed. forget network profile, get new pass code.
RFID (radio frequency identification)
get closer to SSID. check antennas. ( must be pointing up on router / wap ) get closer.
Near Field Communication (NFC) or (RFID)
check for nearby interference.
Personal Area Network (PAN)
A network that solely purchases transit/peering from other networks to participate in the Internet. comcast, at & t. ect. no peering agreements. pay tier 1 or tier 2 providers.
Class 1 Bluetooth
A large computer network usually spanning a city
Class 2 Bluetooth
provides communication for bluetooth devices owned by a single user that work over a short distance
Class 3 Bluetooth
network ID.
No wireless connectivity in saved network
LAN's interconnected by one or more routers
low RF radio frequency signal
network that can connect to every part of the Internet without paying for access
Limited wireless connectivity / slow transfer speeds
carriers freely exchange traffic amongst themselves without paying access fees
intermittent wireless connectivity
A centralized location for techs and administrators to manage all aspects of a network.
Metropolitan Area Network (MAN)
providers that pay some tier 1s but also peer with tier 1 and tier 2.
LAN local area network computers share the same
Communications hardware device that facilitates the transmission of data.
a wide area network WAN is two or more
Connector type used with the LPT printer port and with the 25-pin serial port ( modem )
Tier 1 Network
56kbps limit . An inexpensive WAN option available to anyone with a phone line and a standard modem
peering agreements
A digital circuit switching technology that carries both voice and data.
Network Operations Center (NOC)
An Internet connection such as DSL or cable modem that offers higher bandwidth, and therefore faster transmission speed, than standard modem connections.
Tier 2 Network
A high-speed direct Internet connection that uses all-digital networks.
Tier 3 Network
A variation of DSL that provides equal throughput both upstream and downstream between the customer and the carrier.
Modems ( connect using phone # )
a protocol used to connect multiple network users on an Ethernet local area network to a remote site through a common device.
DB25 serial connection
A security technology used for filtering packets and maintaining customer privacy on cable Internet services
dail-up ( POTS )
ethernet for an isp
ISDN (Integrated Services Digital Network)
remote locations
broadband connection
high speed.
Digital Subscriber Line (DSL)
firewalls.
symmetrical DSL
incoming vs outgoing concept.
PPPoE (Point-to-Point Protocol over Ethernet)
ports on the ports to which they listen.
DOCSIS (Data Over Cable Service)
client and a server.
many metro areas provide native
TCP port 23. a remote command line tool. no security.
satellites are handy for
a remote command line tool for port 23.
broadband connections are
port 22. secure remote command line tool.
client and server networks use
TCP UDP 3389 . A protocol that allows for separate channels for carrying presentation data, serial device communication, licensing information, and highly encrypted data (keyboard, mouse activity).
firewalls block ports on an
an open source system designed to allow one workstation to remotely manipulate and receive screen updates from another workstation. for linux and mac.
servers must not block incoming
insecure TCP 80 Hypertext Transfer Protocol
all internet connections require a
Provided by a certification authority to ensure an online organisation is legitimate.
telnet
A Protocol developed by Netscape for securely transmitting documents over the Internet that uses a private key to encrypt data.
PuTTY
A certificate that lacks a third-party signature.
Secure Shell (SSH)
port 443. uses certs to make a secure connection.
Remote Desktop Protocol (RDP)
A communications method for transferring data between computers on the Internet
VNC (Virtual Network Computing)
send email from a client to an e=mail server.
HTTP
pull email down from email server.
Website Certificate
IP addresses or DNS name for the different servers.
Secure Sockets Layer (SSL)
A form of network security that acts as a go-between a client and a server.
self-signed certificate
firewalling, check for malware, ban bad URL's.
HTTPS
a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization's network
File Transfer Protocol (FTP)
The secure connection created between user's computer and a company's network.
Email uses Simple Mail Transfer Protocol SMTP to
vpn feature that allows Internet traffic and local LAN/WAN traffic to use the same network connection.
Use post office protocol v3 POP3 or internet message access protocol IMAP to
private connection to a remote network. needs IP address to connect.
setting up an email account requires knowledge of the
A form of wireless communications frequently used in security systems and heating and cooling control systems. 2.4ghz
proxy server
A short-range low-power network technology used for the Internet of Things. 900 mghz
proxy servers provide
the network of products embedded with connectivity-enabled electronics. 802.11, zigbee, z-wave. requires hub. google home, amazon alexa, apple siri / voice capabilities.
VPN (Virtual Private Network)
physical connections, check connectivity on windows/ linux / macos. know network id, router, and dns server. use IPCONFIG/ALL . run tracert command look for hops.
VPN Tunnel
It can check IP connectivity between two network devices. Multiple platforms (for example, routers, switches, and hosts) support the ping command.
split tunneling
the ipconfig /all command.
VPN's use the internet to create a
test internet connectivity before you have problems.
ZigBee
The illusion created by a timesharing system that each user has a dedicated machine
Z-Wave
running multiple systems simultaneously on one physical computer
Internet of Things (IoT)
Software that enables a single computer to run multiple operating systems simultaneously.
If you think there is a problem with network, check
runs directly on top of the hardware as an OS.
ping command
runs as an app in an OS.
You are troubleshooting a network connectivity problem on a Windows 7 Enterprise computer, and you need to view the MAC address for the NIC installed in the computer. Which command should you use?
A technique often used to conserve IP addresses by maps devices on a private network to single Internet-connected device that acts on their behalf.
run traceroute/tracert to
the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.
Virtual Machine
A cloud computing service that is capable of scaling up or down as a customer's need level changes.
Virtualization
Cloud computing services to multiple customers that are hosted on shared physical resources and dynamically allocated to meet customer demand.
Hypervisor
moves network tasks such as firewalls into the cloud.
Type 1 hypervisor
moves the machines into the cloud so you can concentrate on apps.
Type 2 hypervisor
moves apps to the cloud, such as google docs.
NAT (Network Address Translation)
owned and used only by a single organization.
Cloud Computing
are privately owned but are available for public use.
Rapid Elasticity
both private are public aspects.
Resource pooling
owned by multiple organizations for their own private use.
Infrastructure as a Service (IaaS)
Internet service that provides storage to computer users
Platform as a Service (PaaS)
a storage service (sometimes referred to as an online backup service) that is frequently used for file sharing and collaboration
Software as a Service (SaaS)
access to synchronized saved files from any device.
Private clouds are
management to the cloud or email and more.
public clouds
consistent workspace in the cloud accessible from any device.
hybrid clouds have
access to apps without installing them locally.
community clouds are
special keys located at the top of the keyboard (F1, F2, F3, etc.) that are used alone or with the Ctrl, Alt, and Shift keys to execute software commands
cloud storage
allows the user to switch, or toggle, between two different modes
Dropbox
An external device that attaches to a mobile computer or device and contains a power connection and provides connections to peripheral devices. extend capabilities.
cloud storage enables
single, sealed unit. runs specific mobile OS. embedded system. fixed components. smartphones, tablets, wearable, gps.
cloud based applications move
An operating system that combines processors and software in a device.
PVirtual desktops provide a
A storage device with nonvolatile flash memory used for mobile devices.
virtual application streaming provides
A set of standards primarily for smartphones and smart cards that can be used to establish communication between devices in close proximity.
Function Keys (F Keys)
A line-of-sight wireless standard. It allows devices to transmit and receive data using LEDs and IR sensors, similarly to how TV remote controllers work.
toggle key
A computer-simulated environment that can be a simulation of the real world or an imaginary world
docking station / port replicator
the viewing of the physical world with computer-generated layers of information/ objects added to it
mobile devices
A protocol standard used by cellular WANs and cell phones.
Embedded System
An update to a mobile phones baseband OS which manages all wireless communication.
mini-SD
A list of prefered service providers or radio frequencies your carrier wants a mobile device to use and is stored on a Removable User Identity Module (R-UIM) card installed on the device.
mobile device
a 15-digit number used to uniquely identify a mobile device, typically a smartphone or other device that connects to a cellular network.
Near Field Communication (NFC)
A unique number that represents the actual user associated with a particular SIM card. The IMSI is usually available from the carrier, to ensure that stolen phones are not misused. The IMSI number can be used to unlock a phone as well
IR (infrared)
1. give it a name. 2. set up VPN. 3. know thje server IP address.
virtual reality
those that have not been verified and approved by the app service. While it's possible that an untrusted app could be entirely safe, it's just too risky to install one. In fact, most devices won't allow them to be installed by default. Software for mobile devices should be restricted to trusted app stores such as Google Play, the Microsoft Store, or Apple App Store.
augmented reality
those that have been reviewed and approved by the device's app service. When approved, the app is signed with a certificate that identifies it as a trusted app. For the most part, this means the app is safe to install and does not contain malicious code.
CDMA (Code Division Multiple Access)
SIM cards, GSM phones use SIM cards.
Baseband Update
IMEI defines the phone itself.
Preferred Roaming List (PRL)
VPN and backup software.
IMEI (International Mobile Equipment Identity)
The complete domain name of an Internet computer, such as www.CIWcertified.com.
IMSI (International Mobile Subscriber Identity)
encryption of extensions/ attachments.
VPN
a code that defines how keyboard characters are encoded into digital strings of ones and zeros
untrusted apps.
update two or more data stores so that their info is identical. location, ebooks, social media, apps.
trusted apps
desktops, automobiles, or to the cloud.
CDMA phones do not use
The practice of allowing users to use their own personal devices to connect to an organizational network.
IMSI defines critical SIM information and
Prevents someone from easily accessing the device and the data it contains
all mobile OSes have built in
the use of two or more types of authentication credentials in conjunction to achieve a greater level of security
fully qualified domain name (FQDN)
turn phone off. run anti-malware. change passwords. factory reset.
S/MIME Secure/Multipurpose Internet Mail Extensions
change passwords. factory reset.
ASCII code
ram overload, restart phone. too many apps.
synchronization means to
turn up brightness. turn off auto brightness.
we synchronize our devices to
needs to be on same wireless network. reassure you are broadcasting to correct monitor. check with manufacter.
BYOD (bring your own device)
check for bluetooth pairing to depair.
Screen Locks (Device Security)
may need site survey to check neighbors connection possibly interfering. check password.
multifactor authentication
A small hardware device or a program that monitors each keystroke a user types on the computer's keyboard. every button you press is being sent to someone else ex. (passwords )
Signal drop/weak signal ( security breach )
clear app caches. force stop. shut down phone, log back in. uninstall, reinstall app.
Unintended WiFi /bluetooth connections ( security breach )
running too many apps.
Inaccurate phone touch screen response
turn off gps, location, turn off real time apps possibly syncing.
dim phone display
find app causing problem.
cannot connect phone display to external monitor
factory reset, reinstall.
no sound from phone speakers.
a laser hits the photosensitive drum to create an image. same for copy machines.
no phone wireless connectivity/ intermittent
Object used to store the toner in a laser printer. (See also laser printer, toner.)
no bluetooth connectivity.
Aluminum cylinder coated with particles of photosensitive compounds. Used in a laser printer and often contained within the toner cartridge.
phone apps not loading/ app log errors
Wire set close to the photosensitive drum that imparts a high negative charge on the drum.
slow phone performance
A color mode that is optimized for printing purposes.
extremely short phone battery life
Processing, charging, exposing, developing, transferring, fusing, cleaning
frozen phone system or ( black screen of death )
Replace the toner cartridge.
phone system lockout
Replacement feed rollers, new fuser unit, etc. Based on the printer's page counter Reset the page counter when kit is installed
laser printer
Adjusting the alignment and accuracy of color and monochrome output.
toner cartridge
replacing the toner cartridge and applying maintenance kits.
laser printer photosensitive drum
A type of printer that uses a nonimpact process. Ink is squirted from nozzles as they pass over the media. Uses heat or mechanical to push ink through the print heads to the paper.
laser printer primary corona
The part in an inkjet or impact printer that moves across the paper, creating one line of the image with each pass.
CYMK (Cyan,Yellow, Magenta, Black)
A device that combines two or more devices, such as a printer, scanner, and fax machine. (12)
Laser Printer Process
clean heads, replace cartridges, calibrate, and clear jams.
Last month, you installed a laser printer in your organization. The printer has been working properly since it was installed. Recently, you noticed that the laser printer is printing blank documents with no text or images. What should you do first?
forms characters and graphics on a piece of paper by striking a mechanism against an inked ribbon that physically contacts the paper
Laser Printer Maintenance Kit
replace the ribbon / keeping it clean.
laser printer calibration
The part in an inkjet or impact printer that moves across the paper, creating one line of the image with each pass.
laser printer maintenance
paper with holes on their sides that are engaged by meta sprockets to pull the paper through
inkjet printer
Paper used by impact printers and comes as a box of fanfold paper or in rolls (used with receipt printers).
print head
an ink ribbon to write to paper.
multifunction device (MFD)
useful for printing on multipart forms.
Inkjet Printer Maintenance
use heat elements to produce images on heat-sensitive paper and are used at ATMs and gasoline pumps. Can print to multipart ( thermal ) forms.
impact printer / .matrix
feed assembly and heating element.
Impact Printer Maintenance
frequent paper changes, keeping the heating element clean.
Tractor-Feed Paper
A program that helps coordinate all print jobs being sent to the printer at the same time.
impact printers use impact paper which is
Organizing printing job
impact printers strike
able to print on both sides of the paper.
impact printers are
not enough permissions.
Thermal printers
The print software either sends the job to a file or transmits the information to a remote destination in the cloud for printing.
A thermal printer has the following components
connecting to workstation via USB or serial.
Thermal Printer Maintenance
map the printer. cmd net use lpt1: \\desktop-5fp1527\brother/presistent:yes
point of sale systems use
requires sharing enabled and a sharename.
printer spooler
local control over the print spooler.
Collate Printing
add a printer but select the shared printer rather than a local printer.
duplex print
A set of standards used for automatically configuring and allocating IP address on Ethernet as well as wireless networks.
cannot pause printing jobs
A technology by Apple that allows Apple computers and mobile devices to print to an AirPrint-capable printer without first installing the printer.
Virtual Printer
Printing to a printer anywhere on the Internet from a personal computer or mobile device connected to the Internet.
Installing a local printer means
an ethernet NIC and plugs in directly to the network.
A user is unable to find the preferred default network printer in the printers list in the user profile. Which is the FIRST step that should be taken?
configuration to get on an 802.11 network.
sharing a local printer over a network
help troubleshoot any connectivity issues.
security options enable
mobile devices to print to a printer associated with an online account, such as a google account.
to connect to a shared printer,
you don't have rights to install printer.
Zeroconf (Zero Configuration Networking)
are you physiqually connected? is it getting good DCHP ? are others able to connect to it. most of the time its a network issue and nothing to do with printer itself.
AirPrint
is it turned on ? is the printer in sleep mode ? has an admin mode locked out ? possible bad display.
cloud printing
must have permission
a wired network printer has
need maintenance kit.
a wireless network printer requires
Problems caused by attempting to print a document that will not fit in the laser printer's onboard ram. buy more ram.
wireless print utilities can
discard toner cartride replace.
cloud printing enables
bad drivers, corrupted drivers. hard reset printer.
unable to install printer
This is usually the result of a dirty print head. Clean the print head first. If the problem persists, replace the toner cartridge or ink cartridge. Calibrating the cartridge may also help.
no connectivity with printer
printer is out of ink or toner. It can also be caused by clog print nozzles in an ink jet printer. For a laser printer, the toner cartridge has sealant tape over the toner dispenser. If this tape is not removed, pages will be blank.
no image on printer display
-Clean print heads (Inkjet) -Check drum (Laser)
printer access denied
• Low toner and low ink • Poor quality toner or ink
printer paper jam/ paper not feeding
Print shows ghost or "shadow" from previous drum rotation . The laser printer optical drum may not be cleaning properly. replace toner.
printer low memory errors
replace toner.
vertical lines on page for laser printer
maintenance kit.
Garbled characters on paper
cable connections, print server disabled, device drivers lacking, wireless configuration problems.
Color prints in wrong print color
no display, paper jams, insufficient memory, corrupted drivers.
Printing blank pages
requires preheating the various print elements, such as the filament, extruder, and bed. uses specialized software to create 3d image. melts material such as forms of plastic.
Printer Streaks and Blurs
-Protects every server, workstation, or laptop -Enables system administrators to have complete visibility to what is happening on their networks though pre-defined reports -System admins easy, centralized management of system security tools though a console -provides a common tool suite that can be used throughout DoD enabling synergy in training, equipment, and processess
Faded prints
A hacker placing himself between a client and a host to intercept network traffic; also called session hijacking.
ghost images printing on paper
A situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage.
toner not fused to printer
a cyber attack in which an attacker sends a flood of data packets to the target computer, with the aim of overloading its resources
creased printer paper
An attack that uses multiple zombie computers (even hundreds or thousands) in a botnet to flood a device with requests.
lack of printer connectivity can refer to
Attack between the time a software vulnerability is discovered and a patch to fix the problem is released.
physical print problems can manifest as
Renamed system files, files disappearing, file permission changes, and more.
3D printing
host and network based security, and physical security.
Host Based Security System
A piece of software running on a single host that can restrict incoming and outgoing network activity for that host only.
Man-in-the-middle (MITM) attack
a computer program that senses when another computer is attempting to scan or access a computer or network
Spoofing Attack
A technology that monitors activity like an IDS but will automatically take proactive preventative action if it detects unacceptable activity.
denial of service attack
An end user's host becomes infected with a virus because the end user browsed to a malicious website. Which endpoint security technology can be used to best prevent such an incident?
Distributed Denial of Service (DDoS)
A firewall or gateway that attempts to bundle multiple security functions into a single physical or logical device.
zero-day attack
patching, anti malware, and a firewall.
symptoms of attacks
IDS intrusion detection system, IPS intrusion prevention system, and firewalls.
the term "security" encompasses
IDS/IPS, firewalls, anti malware, available on the cloud.
host-based firewall
A physical enclosure for verifying identity before entry to a facility
Intrusion Detection System (IDS)
A list of people allowed into a restricted area and a log of any approved visitors that is used and maintained by security guards.
Intrusion Prevention System (IPS)
A machine that reads employee badges and records the time
endpoint malware protection
uses radio signals to communicate with a tag placed in or attached to an object
Unified Threat Management (UTM)
A lock that reads a unique biological attribute such as a fingerprint, iris, retina, or palm and then uses that input as a key.
host based security includes
A device that can be inserted into the security slot of a portable device and rotated so that the cable lock is secured to the device to prevent it from being stolen.
network based security includes
- A cover that prevents onlookers from peeking at the information on your screen.
Unified threat management UTM includes
A device held by a user that displays a number or a password that changes frequently, such as every 60 seconds. The number is synchronized with a server and used as a onetime password.
Mantrap (Double Door System)
perimeter security, room locks, and individual server locks, usb locks, and screen filters.
entry control roster
locks, badges, smart cards, and biometric readers.
Badge reader
a unique number derived from encoding one or more data sets, such as names, serial numbers, and validation codes
biometric lock
A password attack that creates encrypted versions of common dictionary words and compares them against those in a stolen password file.
cable lock
attempts to discover the password from the hash using databases of precomputed hashes; countermeasure is salting
privacy screen
For computers needing an extra layer of security, a password can be set in the BIOS or UEFI to force
Hardware Token
the use of two or more types of authentication credentials in conjunction to achieve a greater level of security
Physical security includes
A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
room-level security
A destructive computer program that bores its way through a computer's files or through a computer's network.
hash value
a program that appears desirable but actually contains something harmful
brute force attack
program that hides in a computer and allows someone from a remote location to take full control of the computer
dictionary attack
Software that encrypts programs and data or entire systems until a ransom is paid to remove it.
Rainbow Table Attack
usually begins with a virus warning to call a number or an offer to disinfect the infected device.
BIOS/UEFI passwords
A logical computer network of zombies under the control of an attacker.
Virus
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
worm
slow performance. page changes to a different website. popups. browser redirection. security alerts. app crashes. OS update failure. spam. hijacked email. automated replies. invalid website certificates.
Trojan Horse
Command-line interface boot mode for Windows that is used to repair a Windows XP system suffering from massive OS corruption or other problems.
Rootkit
a program that runs on a computer to allow or deny traffic between the computer and other computers to which it is connected
Ransomware
1. identify and research malware symptoms. 2. quarantine the infected systems. 3. disable system restore. 4. re mediate the infected systems. 4a. update the anti malware software. 4b. scan process. 5. educate end user.
rogue antivirus
good backups, end user education, and firewalls.
Botnet
a trusted third party site and encryption.
Keylogger
An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
Spyware
a phishing expedition in which the emails are carefully designed to target a particular person or organization
Symptoms of Malware
bad people to use info from people inside to gain access to sensitive info such as phone scams, tailgating, shoulder surfing, and dumpster diving.
Recovery Console
A legal contract between the author of software and the end user that defines how the software can be used. describes what users can do with licensed software.
software firewall
various technologies or security codes used to protect copyrighted works from being illegally copied. controls what users can do with some content.
malware 7 step process
A copyright licence that allows the user to modify the source code.
prepare for malware attacks with
producers can retain all rights.
use secure DNS options, such as
A policy that specifies polices about creating open-source software, including that source code has to be made available to all users and developers.
Phishing
A license to use software that gives the right to install one instance of the software.
spear phishing
A type of software license that is usually negotiated and covers all users within an organization. Also known as a "volume license."
social engineering enables
The initial response to a computer-related event that seeks to verify an incident, triage the incident, and gather necessary evidence while minimizing data and evidence loss.
End User License Agreement (EULA)
1. know your responsibility. 2. identify the problem, report through proper channels, data / device preservation. use of documentation. document changes. 3. keep chain of custody, tracking evidence, document process.
Digital Rights Management (DRM)
Provides communication to workers regarding chemicals used in the office
Open Source Licensing
temp and humidity levels, proper ventilation, surge supressors and UPS backup devices. clean systems with compressed air and specialized vacuums.
Commercial License
refers to the layout of the computers and devices in a communications network
GNU General Public License
A graphical representation of a circuit; each type of gate has its own symbol
personal license
floor plan of cable runs, distribution frame ect.
enterprise license
a body of knowledge in a particular area that makes it easier to master new information in that area. ex. Microsoft knowledge base.
Incident Response
the guidelines and goals set for different entertainment industries
MSDS (Material Safety Data Sheet)
the most successful solutions or problem-solving methods that have been developed by a specific organization or industry
For computer safely and optimization, check
Requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet
network topology
Ensures that users create strong passwords and change them periodically
logical diagram topology
the name, postal address, or any other information that allows tracking down the specific person who owns a device
Physical Diagram topology
Individually identifiable health information that is transmitted or maintained by electronic media.
knowledge base
this law governs how information should be handled, protected, and accessed in the European Union. It provides a one-stop-shop for data practices in the EU
Regulatory Compliance
A set of security standards that all U.S. companies processing, storing, or transmitting credit card information must follow.
Industry Standards
Process of making sure changes are made smoothly and efficiently and do not negatively affect systems reliability, security, confidentiality, integrity, and availability.
best practices
An initial reflection that identifies the possible risks of entering a business, performed before the business plan is completed.
Acceptable Use Policy (AUP)
The policies and procedures that a company or organisation has in place so it can carry on with normal business after a disaster, such as a major ICT failure, a fire etc
Password Policy
The combination of procedures that can restore lost data in the event of hardware or software failure
Personally Identifiable Information (PII)
Makes a copy of the virtual disk and configuration associated with a particular VM. Backup is saved as a singled entity called as a VM Image. Also supports file-level recovery.
Protected Health Information (PHI)
Type of desktop monitor that contains a cathode-ray tube.
EU General Data Protection Regulation
A process (usually performed at the factory) that electronically creates the hard drive tracks and sectors and tests for bad spots on the disk surface.
Payment Card Industry Data Security Standard
A technique used to eradicate personal or corporate data from a hard drive before donating or re-using a computer. Sometimes called overwriting.
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials