Cybersecurity Principles and Technologies Quiz
96 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is a characteristic of a 'factory reset'?

  • It reinstates the device to its original shipped configuration, removing user customizations. (correct)
  • It saves user data to a hibernation file.
  • It uses an infrared camera to verify a user's face.
  • It progressively delays unlock attempts after multiple failures.
  • What is the primary function of the 'failed login attempts restriction'?

  • To create a template signature using a fingerprint scanner.
  • To restore the device to its original state.
  • To encrypt the disk using FileVault.
  • To progressively limit or block unlock attempts after multiple incorrect tries. (correct)
  • Which of the following best describes the purpose of 'fast startup'?

  • It searches the file system for specific files.
  • It manages files and folders in macOS.
  • It encrypts the disk using FileVault disk encryption.
  • It saves an image of system memory to a hibernation file, enabling swift resumption from sleep. (correct)
  • Which authentication mechanism relies on an infrared camera to verify a user's identity?

    <p>Facial recognition lock (D)</p> Signup and view all the answers

    What is specific to 'firmware'?

    <p>It is software instruction embedded within hardware, such as a computer motherboard. (A)</p> Signup and view all the answers

    What is a key function of a 'fingerprint scanner'?

    <p>To create a template signature from a fingerprint for comparison during login. (A)</p> Signup and view all the answers

    Which authentication method requires the user to scan their fingerprint?

    <p>Fingerprint lock (B)</p> Signup and view all the answers

    Which of these is an example of a command-line Linux tool, according to the text?

    <p>enrollment.nd command (D)</p> Signup and view all the answers

    What is the primary function of a GUID Partition Table (GPT)?

    <p>To enable the existence of a large number of partitions and accommodate very large partition sizes. (C)</p> Signup and view all the answers

    Which of the following would be categorized as a hardware-based authentication device?

    <p>A USB storage key with a cryptographic module. (C)</p> Signup and view all the answers

    What is the main purpose of checking the Hardware Compatibility List (HCL) before OS installation?

    <p>To guarantee that all PC components have been tested for compatibility with the OS. (C)</p> Signup and view all the answers

    The principle of 'implicit deny' in security means what?

    <p>All access requests are denied unless explicitly granted. (B)</p> Signup and view all the answers

    What is the key characteristic of a social engineering attack?

    <p>An attacker pretends to be someone they are not to gain access. (C)</p> Signup and view all the answers

    Which is NOT a direct consideration when planning the installation of new apps?

    <p>Hardware compatibility. (D)</p> Signup and view all the answers

    What does the acronym IRP stand for in the context of cybersecurity?

    <p>Incident Response Plan. (C)</p> Signup and view all the answers

    What is a cryptographic module's primary function within a hardware security device?

    <p>To hold authenticating encryption keys securely (B)</p> Signup and view all the answers

    Which security measure primarily aims to prevent the retrieval of data from storage media?

    <p>Physical destruction (D)</p> Signup and view all the answers

    What is the primary purpose of considering 'physical placement' in IT security?

    <p>To ensure reliable and secure operation of PC and network devices (A)</p> Signup and view all the answers

    Which of the following describes a method by which a threat actor might gain unauthorized access to a restricted area?

    <p>Piggybacking (B)</p> Signup and view all the answers

    Which authentication method is used on mobile devices to restrict access using a numeric code?

    <p>PIN code lock (C)</p> Signup and view all the answers

    What is the function of a preboot execution environment (PXE) in networking?

    <p>To enable a device to boot from a network server (D)</p> Signup and view all the answers

    Which of the following best describes the purpose of a pre-shared key (PSK)?

    <p>To enable group authentication to a wireless network (A)</p> Signup and view all the answers

    Which technology is described as a command shell and scripting language based on the .NET Framework?

    <p>PowerShell (D)</p> Signup and view all the answers

    Which of the following actions would help to mitigate the risk of data remnants being left behind after disposing of a storage device?

    <p>Implementing physical destruction (A)</p> Signup and view all the answers

    What is the primary function of a port triggering mechanism within a firewall?

    <p>To dynamically permit inbound traffic on a secondary port based on outbound activity on a primary port. (B)</p> Signup and view all the answers

    Which scenario best illustrates the concept of 'phishing' as described in the text?

    <p>A user receiving a suspicious email that asks for their banking credentials, from a source pretending to be their bank. (D)</p> Signup and view all the answers

    What is the main purpose of the 'Power Options' control panel app mentioned here?

    <p>To configure power-saving modes and button/lid behavior. (B)</p> Signup and view all the answers

    What type of data is referred to as 'Personally Identifiable Information (PII)'?

    <p>Data that can be used to contact or identify an individual. (B)</p> Signup and view all the answers

    The term 'power users' in this context refers to what?

    <p>Users with the ability to change system policies and settings. (A)</p> Signup and view all the answers

    Which of the following is NOT a function of the 'Windows Settings' pages mentioned in context?

    <p>Configuring access through a firewall using port triggering. (C)</p> Signup and view all the answers

    What does 'power failure', as used in the text, refer to?

    <p>A complete loss of building-wide power. (C)</p> Signup and view all the answers

    Which of the following best describes the use of 'themes' for a desktop environment?

    <p>They change the appearance and aesthetics of the desktop. (A)</p> Signup and view all the answers

    What occurs when a data file is not saved to contiguous sectors on a hard disk drive (HDD)?

    <p>Fragmentation (A)</p> Signup and view all the answers

    Which tool is used to mitigate fragmentation on hard drives?

    <p>Defragment and Optimize Drives (D)</p> Signup and view all the answers

    In Linux, what allows multiple user sessions to be supported on a single host?

    <p>Virtual Consoles (D)</p> Signup and view all the answers

    What is a denial of service (DoS) attack primarily concerned with?

    <p>Resource availability (A)</p> Signup and view all the answers

    What security measure is performed on email and Internet traffic to identify and block suspicious content?

    <p>Content Filtering (B)</p> Signup and view all the answers

    Which of the following is NOT an advantage of using a command shell in system management?

    <p>Graphical User Interface (B)</p> Signup and view all the answers

    What type of attack can affect the availability of a managed resource through various means?

    <p>Denial of Service (C)</p> Signup and view all the answers

    What does performance optimization on solid-state drives (SSDs) involve?

    <p>Optimization operations (B)</p> Signup and view all the answers

    What is the primary responsibility of a Computer Security Incident Response Team (CSIRT)?

    <p>Managing responses to security breaches and incidents. (D)</p> Signup and view all the answers

    Which of the following best describes 'cross-site scripting' (XSS)?

    <p>A vulnerability that allows attackers to run scripts in a user’s browser. (B)</p> Signup and view all the answers

    What are the three principles of the CIA triad in cybersecurity?

    <p>Confidentiality, Integrity, Availability. (C)</p> Signup and view all the answers

    Which description accurately represents cryptominer malware?

    <p>Malware that hijacks computer resources for cryptocurrency mining. (C)</p> Signup and view all the answers

    What is commonly referred to as the AIC triad in cybersecurity?

    <p>Availability, Integrity, Confidentiality. (B)</p> Signup and view all the answers

    What is a primary goal of implementing password complexity requirements?

    <p>To prevent unauthorized access through weak passwords. (A)</p> Signup and view all the answers

    Which of the following best defines configuration management in cybersecurity?

    <p>A practice for maintaining systems and software in secure and compliant states. (A)</p> Signup and view all the answers

    What is the intended effect of the CIA triad on cybersecurity practices?

    <p>To provide a framework for assessing security needs. (A)</p> Signup and view all the answers

    What happens to the existing operating system and data files when a target disk is repartitioned and formatted?

    <p>They are completely removed. (B)</p> Signup and view all the answers

    What is the primary function of a 'cron job' in a Linux environment?

    <p>To execute scheduled tasks automatically. (A)</p> Signup and view all the answers

    Which statement best describes the 'command and control' (C2 or C&C) infrastructure?

    <p>It is used by attackers to manage malware across botnets. (D)</p> Signup and view all the answers

    What does 'CCMP' stand for in the context of wireless LAN security?

    <p>Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (B)</p> Signup and view all the answers

    What is a primary concern when ensuring compatibility across multiple device and OS platforms?

    <p>Data processing regulations (A)</p> Signup and view all the answers

    What does the command 'cp' accomplish in a Linux command line?

    <p>Copies files and directories. (A)</p> Signup and view all the answers

    Which of the following statements accurately defines a compatibility concern in application use?

    <p>It involves ensuring functionality within diverse user environments. (D)</p> Signup and view all the answers

    What task does the Linux cron daemon primarily perform?

    <p>Scheduling and executing automated tasks. (D)</p> Signup and view all the answers

    What is the primary function of desktop management software as described?

    <p>To provide remote support for desktops and mobile devices. (A)</p> Signup and view all the answers

    What might be a consequence of the developer mode feature in mobile devices?

    <p>Weakening of corporate security protections when misused. (B)</p> Signup and view all the answers

    Which of the following is a characteristic of digital rights management (DRM)?

    <p>It aims to restrict the number of devices for playback. (C)</p> Signup and view all the answers

    What does the Control Panel Legacy management interface predominantly manage?

    <p>User and system settings in Windows. (A)</p> Signup and view all the answers

    How do changes to desktop styles over updates typically affect users?

    <p>They often lead to confusion in usage. (B)</p> Signup and view all the answers

    What is one of the primary purposes of digital media DRM solutions?

    <p>To prevent unauthorized copying of digital files. (A)</p> Signup and view all the answers

    Which command is primarily associated with desktop management tasks?

    <p>Copy command for duplicating files. (D)</p> Signup and view all the answers

    What is a potential risk associated with using developer mode on mobile devices?

    <p>It can expose the device to corporate security vulnerabilities. (A)</p> Signup and view all the answers

    What does the Apple File System (APFS) primarily serve as?

    <p>The default file system for macOS-based computers (A)</p> Signup and view all the answers

    What is the purpose of an authenticator app in the context of security?

    <p>To provide an additional layer of two-step verification (B)</p> Signup and view all the answers

    Which of the following actions does subject identification typically involve?

    <p>Assigning relevant permissions to a user (A)</p> Signup and view all the answers

    What function does the AutoRun/AutoPlay feature serve in Windows operating systems?

    <p>To enable automatic actions when peripheral storage is connected (A)</p> Signup and view all the answers

    How does automation benefit configuration steps in technology?

    <p>By using scripts to perform tasks without user intervention (A)</p> Signup and view all the answers

    In what way does Apple ID function as a cloud-based service?

    <p>It manages files and shares content across multiple Apple devices. (C)</p> Signup and view all the answers

    What is a characteristic feature of the APK Android app package format?

    <p>It enables installation of apps from sources outside of official app stores. (B)</p> Signup and view all the answers

    What is the significance of creating an audit trail during subject identification?

    <p>To track permission changes and user interactions. (D)</p> Signup and view all the answers

    What is the primary function of the group policy editor (gpedit.msc)?

    <p>To configure user and system registry settings through policies. (D)</p> Signup and view all the answers

    How does a guest account function within a network environment?

    <p>It permits access without authentication as a non-privileged account. (A)</p> Signup and view all the answers

    What does the term 'image deployment' refer to?

    <p>A method where a target disk is written with an image of a new OS. (D)</p> Signup and view all the answers

    Which command tool is primarily used to gather information about the IP configuration?

    <p>ipconfig (C)</p> Signup and view all the answers

    What does a 4-port LAN switch allow for in a network setup?

    <p>Simultaneous connection of multiple devices to a network. (B)</p> Signup and view all the answers

    What is a key function of a firewall in a networking context?

    <p>To monitor and restrict incoming and outgoing network traffic. (C)</p> Signup and view all the answers

    Which features are integrated with iCloud in terms of user experience?

    <p>Cloud-based file storage and synchronization across devices. (B)</p> Signup and view all the answers

    What is the purpose of implementing group policy objects (GPO) in a Windows domain?

    <p>To enforce security settings and configurations across users and computers. (C)</p> Signup and view all the answers

    What role does a ground wire play in an electrical system?

    <p>It provides a return path for electrical current as a safety feature. (D)</p> Signup and view all the answers

    Which of the following best describes Extensible Authentication Protocol (EAP)?

    <p>A protocol that enables the use of hardware-based identifiers for authentication. (B)</p> Signup and view all the answers

    What is a primary characteristic of fileless malware?

    <p>It exploits the host's scripting environment to create malicious processes. (D)</p> Signup and view all the answers

    Which technology allows an operating system to utilize a mass storage device?

    <p>Partition formatting. (B)</p> Signup and view all the answers

    How does facial recognition function as an authentication method?

    <p>By matching a live image to stored images for verification. (A)</p> Signup and view all the answers

    What does the process of negotiating authentication methods encompass in an EAP framework?

    <p>Enabling a user to select an authentication method compatible with the server. (A)</p> Signup and view all the answers

    What is a primary function of a ground wire when a short circuit occurs?

    <p>To ensure current flows to ground rather than through a person. (D)</p> Signup and view all the answers

    Which of the following accurately describes a benefit of using hardware-based identifiers in authentication?

    <p>They enhance the security of authentication processes. (D)</p> Signup and view all the answers

    What is the main purpose of the least privilege principle in security?

    <p>To allocate the minimum rights necessary for performing a role (D)</p> Signup and view all the answers

    Which format is used to express an IPv4 address?

    <p>Dotted decimal notation, like 192.168.1.1 (C)</p> Signup and view all the answers

    What role does the 'ip' command play in Linux networking?

    <p>To gather information about network configuration (A)</p> Signup and view all the answers

    What is the purpose of a lessons learned report (LLR)?

    <p>To analyze events and improve future response processes (B)</p> Signup and view all the answers

    How are IPv6 addresses typically represented?

    <p>In hexadecimal notation with colons (A)</p> Signup and view all the answers

    What is a key aspect of physical security mechanisms concerning lighting?

    <p>To ensure safety and support surveillance systems (A)</p> Signup and view all the answers

    What does the term 'configuration' refer to when discussing network settings?

    <p>The process of adjusting software settings to optimize performance (A)</p> Signup and view all the answers

    Which of the following best describes the role of an Internet Protocol (IP) address?

    <p>A unique identifier for a device on a network (D)</p> Signup and view all the answers

    Flashcards

    Complexity Requirement Rules

    Guidelines for creating strong passwords to enhance security.

    Cross-Site Scripting (XSS)

    A type of attack where malicious scripts are injected into trusted websites.

    Computer Security Incident Response Team (CSIRT)

    A group responsible for responding to security incidents across various domains.

    Cryptominer

    Malware that utilizes a computer's resources to mine cryptocurrency.

    Signup and view all the flashcards

    CIA Triad

    Three principles of cybersecurity: Confidentiality, Integrity, and Availability.

    Signup and view all the flashcards

    Information Security Triad (AIC Triad)

    Refers to Confidentiality, Integrity, and Availability, often listed in reverse order.

    Signup and view all the flashcards

    Malware

    Software designed to disrupt, damage, or gain unauthorized access to systems.

    Signup and view all the flashcards

    Configuration Management

    The process of maintaining computer systems in a desired, consistent state.

    Signup and view all the flashcards

    Face Recognition Lock

    An authentication mechanism using infrared camera to verify user’s face against a 3D model.

    Signup and view all the flashcards

    Fingerprint Lock

    A mobile device security that unlocks by scanning a user's fingerprint.

    Signup and view all the flashcards

    Factory Reset

    A standard procedure by manufacturers to restore devices to original settings, erasing all customizations.

    Signup and view all the flashcards

    Failed Login Attempts Restriction

    An authentication mechanism that blocks after multiple failed unlock attempts.

    Signup and view all the flashcards

    Firmware

    Software instructions embedded on hardware devices like motherboards, can be updated.

    Signup and view all the flashcards

    Bio-Gesture Authentication

    A security mechanism requiring users to perform gestures for access, like face or fingerprint scans.

    Signup and view all the flashcards

    Fast Startup

    A power-saving option that enables quick resume from sleep using saved memory contents.

    Signup and view all the flashcards

    Command-Line Tool

    A command line Linux tool used to search the file system.

    Signup and view all the flashcards

    Defragmentation

    The process of reorganizing data on a hard drive to improve performance.

    Signup and view all the flashcards

    Optimization Operations

    Methods used to enhance the performance of SSDs and HDDs.

    Signup and view all the flashcards

    Denial of Service Attack (DoS)

    An attack that disrupts services to make them unavailable.

    Signup and view all the flashcards

    Content Filtering

    A security measure that blocks suspicious email and internet traffic.

    Signup and view all the flashcards

    Graphical OS Interface

    A user-friendly display that allows interaction using windows and icons.

    Signup and view all the flashcards

    Linux Virtual Console

    A feature that allows multiple user sessions on a single Linux host.

    Signup and view all the flashcards

    Command Shell

    A console device for input and output commands in a computing environment.

    Signup and view all the flashcards

    Fragmentation

    Occurs when data is not stored in contiguous sectors on a HDD, reducing performance.

    Signup and view all the flashcards

    GUID Partition Table (GPT)

    A modern disk partitioning system that supports many partitions and very large partition sizes.

    Signup and view all the flashcards

    Hardware Compatibility List (HCL)

    A list of PC components tested for compatibility with an operating system before installation.

    Signup and view all the flashcards

    Implicit Deny

    A security principle stating that all access should be denied unless explicitly granted.

    Signup and view all the flashcards

    Incident Response Plan (IRP)

    Guidelines and procedures established for responding to security incidents.

    Signup and view all the flashcards

    Social Engineering

    An attack that manipulates individuals into divulging confidential information by pretending to be someone else.

    Signup and view all the flashcards

    Cryptographic Module

    A component that securely holds encryption keys for authentication.

    Signup and view all the flashcards

    Smart Card

    A card with a cryptographic module capable of holding authenticating keys securely.

    Signup and view all the flashcards

    USB Token Storage Key

    A USB device that securely stores cryptographic authentication keys.

    Signup and view all the flashcards

    Physical Data Destruction

    Methods like drilling or shredding used to destroy storage media to prevent data recovery.

    Signup and view all the flashcards

    PowerShell (PS)

    A command shell and scripting language for Windows based on the .NET Framework, utilizing cmdlets.

    Signup and view all the flashcards

    Preboot Execution Environment (PXE)

    Feature that allows a computer to boot from a network server, rather than local storage.

    Signup and view all the flashcards

    Piggybacking in Security

    Unauthorized entry into a location by using someone else's access credentials or permissions.

    Signup and view all the flashcards

    Pre-shared Key (PSK)

    A passphrase used for wireless network authentication, allowing client devices to connect.

    Signup and view all the flashcards

    Physical Placement Considerations

    Factors to ensure secure and reliable installation of PC and network devices.

    Signup and view all the flashcards

    Degaussing

    A method of data destruction that uses magnetic fields to disrupt stored data on storage devices.

    Signup and view all the flashcards

    Incineration of Data Media

    Burning of storage devices to destroy data beyond recovery.

    Signup and view all the flashcards

    PII

    Personally Identifiable Information that can identify an individual.

    Signup and view all the flashcards

    Port Triggering

    A firewall mechanism that opens inbound ports based on outbound traffic.

    Signup and view all the flashcards

    Phishing

    An email-based attack to elicit private information by posing as a trusted source.

    Signup and view all the flashcards

    Power Failure

    Complete loss of power to a building or facility.

    Signup and view all the flashcards

    Power Options

    Settings for configuring power button actions and saving power modes.

    Signup and view all the flashcards

    Phone Settings

    Configuration options available in Windows for managing smartphones.

    Signup and view all the flashcards

    Inbound Access

    Permission for external devices to connect to a device on a network.

    Signup and view all the flashcards

    Subject Identification

    The process of assigning relevant permissions to a subject in a system.

    Signup and view all the flashcards

    APK

    Android app package format used for installing applications on Android devices.

    Signup and view all the flashcards

    Authenticator App

    A software that allows a smartphone to serve as a second authentication factor.

    Signup and view all the flashcards

    Apple File System (APFS)

    The default file system for macOS devices, optimizing storage management.

    Signup and view all the flashcards

    Apple ID

    A cloud-based service for synchronizing settings, apps, and files among Apple devices.

    Signup and view all the flashcards

    AutoRun/AutoPlay

    Windows feature for automatic actions upon connecting a storage device.

    Signup and view all the flashcards

    File Sharing

    The practice enabling users to access and exchange files over a network.

    Signup and view all the flashcards

    Backup Synchronization

    The process of copying data to maintain consistency across devices.

    Signup and view all the flashcards

    Counter Mode

    A mode of operation for encryption that enhances security by chaining blocks together.

    Signup and view all the flashcards

    Command and Control (C2)

    Infrastructure enabling attackers to control malware on infected devices.

    Signup and view all the flashcards

    CP Command

    A command-line tool in Linux for copying files.

    Signup and view all the flashcards

    Credit Card Transactions

    Data regulations dictate how financial transactions are processed responsibly.

    Signup and view all the flashcards

    Cron Job

    A scheduled task managed through the Linux cron daemon to automatically run scripts or commands.

    Signup and view all the flashcards

    CCMP Protocol

    An encryption protocol used in wireless LANs to address vulnerabilities of WEP.

    Signup and view all the flashcards

    Compatibility Concerns

    Issues that arise when using applications across different device and OS platforms.

    Signup and view all the flashcards

    Formatted Disk

    A disk that has been prepared for use by erasing existing data and creating a file structure.

    Signup and view all the flashcards

    Desktop Styles

    Tools for launching apps and managing them in Windows.

    Signup and view all the flashcards

    Control Panel

    The interface for configuring user and system settings in Windows.

    Signup and view all the flashcards

    Digital Rights Management (DRM)

    Technologies that protect copyright of digital media.

    Signup and view all the flashcards

    Developer Mode

    A feature that allows app testing on mobile devices.

    Signup and view all the flashcards

    Remote Support Software

    Tools designed for facilitating remote access to desktops.

    Signup and view all the flashcards

    Malicious Content

    Unwanted software or data that can harm systems.

    Signup and view all the flashcards

    Inappropriate Content

    Material deemed unsuitable, often subject to filtering.

    Signup and view all the flashcards

    Group Policy Object (GPO)

    A feature in Windows to manage settings and policies for users and computers in a domain.

    Signup and view all the flashcards

    iCloud

    Apple's cloud storage service for syncing data across macOS and iOS devices.

    Signup and view all the flashcards

    Guest Account

    A non-privileged user account allowing limited access to a computer or network without authentication.

    Signup and view all the flashcards

    Deployment Method

    A process for writing a target disk with an image of a new operating system.

    Signup and view all the flashcards

    Firewall

    A security system that monitors and controls incoming and outgoing network traffic.

    Signup and view all the flashcards

    LAN Switch

    A device that connects multiple devices in a Local Area Network (LAN) to communicate with each other.

    Signup and view all the flashcards

    Policy Editor (gpedit.msc)

    A Microsoft tool to manage group policies and user settings on a Windows computer.

    Signup and view all the flashcards

    Network Configuration

    Settings that determine how a device connects to and communicates on a network.

    Signup and view all the flashcards

    Ground Wire

    A wire providing a return path for electrical current to prevent electric shock.

    Signup and view all the flashcards

    Extensible Authentication Protocol (EAP)

    A framework for negotiating authentication methods to secure network connections.

    Signup and view all the flashcards

    Biometric Authentication

    Using biological traits like fingerprints or facial recognition for user verification.

    Signup and view all the flashcards

    Fileless Malware

    Malware that operates in-memory using host scripting to avoid detection.

    Signup and view all the flashcards

    Mass Storage Devices

    Devices like HDDs, SSDs, or thumb drives that store large amounts of data.

    Signup and view all the flashcards

    Partition Formatting

    The process of preparing a disk partition for an operating system's use.

    Signup and view all the flashcards

    Secure Tunnels

    Virtual pathways for secure data communication between devices.

    Signup and view all the flashcards

    Browser Add-on

    Extensions that enhance browser functionality by adding new features.

    Signup and view all the flashcards

    Least Privilege

    The principle of granting the minimum necessary access rights or privileges to users.

    Signup and view all the flashcards

    IP Address (IPv4)

    A 32-bit numerical label used to identify devices on a network, shown in dotted decimal format like 192.168.1.1.

    Signup and view all the flashcards

    IP Address (IPv6)

    A 128-bit address allocated for devices, represented in hexadecimal format, such as 2001:db8::0bcd:abcd:ef12:1234.

    Signup and view all the flashcards

    iOS

    The operating system used for Apple's iPhone and most iPad devices.

    Signup and view all the flashcards

    Lighting in Security

    Physical security measures ensuring sufficient illumination for safety and surveillance effectiveness.

    Signup and view all the flashcards

    Logical Host Addressing

    The format for assigning and identifying devices on a network through IP addressing.

    Signup and view all the flashcards

    Lessons Learned Report (LLR)

    An analysis of past events to identify insights for improving future responses and processes.

    Signup and view all the flashcards

    Study Notes

    Core Glossary

    • 2-step verification: Authentication mechanism using a separate channel for sign-on attempts or to transmit an additional credential. This can use email, SMS, or voice calls.
    • 3-2-1 backup rule: Best practice for data backups. Maintaining three copies of data on two types of media, with one copy stored off-site.
    • 32-bit versus 64-bit: Processing modes referring to CPU instruction size. 32-bit CPUs were common earlier but 64-bit CPUs are now more common in PCs. 64-bit software can typically run on 64-bit CPUs, but 32-bit software can often run on 64-bit CPUs.
    • 802.1X: Standard for encapsulating EAP communications over LAN or WLAN to implement port-based authentication.
    • Acceptable Use Policy (AUP): Policy governing employee computer and internet use. Internet Service Providers (ISPs) can also implement AUPs.
    • Access Control List (ACL): Collection of access control entries that determine which subjects (user accounts, IPs, etc.) can access objects and their privileges.
    • Access Control Vestibule: Security system with two gateways, only one open at a time.
    • Accessibility Prefpane: macOS utility for desktop and input/output accessibility configuration.
    • Accounts settings: Windows settings for user account creation and maintenance.
    • Active Directory (AD): Network directory service for Microsoft Windows domain networks. Facilitates authentication and authorization of user and computer accounts.
    • Active listening: Technique in communication to ensure all information, including nonverbal cues, is captured from the other person. This includes summarizing, reflecting, interpreting and attending to the speaker.

    Additional Glossary Terms

    • Ad blocker: Browser feature preventing third-party content display.
    • Administrative tools: Folder in Control Panel containing default Microsoft management consoles for local system configuration.
    • Administrator: Privileged account with membership in the Administrators security group.
    • Advanced Encryption Standard (AES): Symmetric 128-, 192-, or 256-bit block cipher.
    • AirDrop: iOS feature for simple file sharing via Bluetooth.
    • Alarm system: Physical intrusion detection system with triggers like circuit, motion, proximity, or duress.
    • Android: Open-source mobile operating system developed by the Open Handset Alliance (primarily Google).
    • Antivirus scan (A-V): Software detecting and removing virus infections and malware.
    • APK: Android app package format.
    • App: Default extension for a macOS app subdirectory within Applications folder.
    • Apple File System (APFS): Default file system for macOS computers.
    • Apple ID: Cloud-based service for synchronizing settings, manage apps, and backups.
    • Application programming interface (API): Methods that allow programs to interact with each other, for example interactions with TCP/IP or networking functions.
    • Apps settings: Windows Settings pages for configuring Windows Features and third-party software apps.
    • apt-get: Linux package management tool for installing and updating software.
    • Asset: Item of economic value. Businesses manage these with location, attributes, and value tracked in a database.
    • Asset tagging: Assigning an ID to assets to link them with inventory databases.
    • Asymmetric encryption cipher: Cipher using public and private keys, linked mathematically. The private key is not created from the public key. For example, RSA or ECC algorithms.
    • Authentication, authorization, and accounting (AAA): Security concept for identifying users, ensuring permissions and recording actions.
    • Authenticator app: Software that acts as a second authentication factor.
    • Automation: Use of scripts to perform configuration steps, avoiding manual intervention.
    • AutoRun/AutoPlay: Windows mechanisms for automatic actions when peripheral storage devices are connected.
    • Backdoor: Accessing a computer bypassing normal authentication, typically for malicious purposes.
    • Backup: Security copy of data (often scheduled). Examples include full, incremental, or differential back ups.
    • Backup chain: Backup sequence consisting of a full backup and incremental or differential backups following it.
    • Badge reader: Authentication mechanism using smart cards for access control.
    • Bash: Command interpreter and scripting language for Unix-like systems.
    • BAT: Extension for batch files (containing Windows CMD commands).
    • BIOS/UEFI password: Passwords set in system firmware to protect against unauthorized booting or configuration changes. and many more... (too many to list here)

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Core 2 Vocabulary PDF

    Description

    Test your knowledge on various cybersecurity concepts, including authentication methods, system security features, and hardware considerations. This quiz covers crucial topics related to factory resets, fingerprint scanning, firmware, and more. Perfect for students and professionals looking to enhance their understanding of cybersecurity.

    More Like This

    Use Quizgecko on...
    Browser
    Browser