Core 2 Vocabulary PDF
Document Details
![FeasibleJadeite5785](https://quizgecko.com/images/avatars/avatar-10.webp)
Uploaded by FeasibleJadeite5785
Scott Obsniuk
Tags
Summary
This document contains a glossary of computer terms and definitions. It provides explanations of various computer-related concepts and technologies.
Full Transcript
Glossary Core 2 accounts settings Windows Settings pages relating to user account creation 2-step verication Authentication and maintenance....
Glossary Core 2 accounts settings Windows Settings pages relating to user account creation 2-step verication Authentication and maintenance. mechanism that uses a separate active directory (AD) Network directory channel to authorize a sign-on attempt service for Microsoft Windows domain or to transmit an additional credential. networks that facilitates authentication This can use a registered email account and authorization of user and computer or a contact phone number for an SMS accounts. or voice call. active listening A technique in 3-2-1 backup rule Best practice maxim communications to ensure that you stating that at any given time there capture all the information that the should be at least three copies of data other person is “transmitting,” including stored on two media types, with one non-verbal cues such as tone of voice copy held of site. or gestures. There are various active 32-bit versus 64-bit Processing modes listening techniques for ensuring that referring to the size of each instruction you are “getting the right message,” such processed by the CPU. 32-bit CPUs as summarizing, reecting (matching replaced earlier 16-bit CPUs and were the speaker’s communication style), used through the 1990s to the present interpreting, and verbal attends (such as day, though most PC and laptop CPUs “Uh-huh,” or “I see.”) now work in 64-bit mode. The main 64 bit ad blocker Browser feature or add-in platform is called AMD64 or EM64T that prevents third-party content from (by Intel). Software can be compiled as being displayed when visiting a site. 32-bit or 64-bit. 64-bit CPUs can run most 32-bit sotware, but a 32 bit CPU cannot administrative tools Folder in Control execute 64-bit software. Panel containing default Microsoft management consoles used to congure 802.1X Standard for encapsulating EAP the local system. communications over a LAN (EAPoL) or WLAN (EAPoW) to implement port-based administrator Privileged user account authentication. that has been granted memberships of the Administrators security group. There acceptable use policy (AUP) Policy that is also an account named Administrator, governs employees’ use of company but this is usually disabled by default. equipment and Internet services. ISPs may also apply AUPs to their customers. Advanced Encryption Standard (AES) Symmetric 128-, 192-, or 256-bit block access control list (ACL) Collection cipher used for bulk encryption in of access control entries (ACEs) that modern security standards, such as determines which subjects (user WPA2, WPA3, and TLS. accounts, host IP addresses, and so on) are allowed or denied access to the AirDrop iOS eature or simple le object and the privileges given (read- sharing via Bluetooth. only, read/write, and so on). alarm system Physical intrusion access control vestibule Secure entry detection and warning that can use system with two gateways, only one of circuit, motion, proximity, and duress which is open at any one time. triggers. accessibility prepane macOS utility Android Cell phone/smartphone/tablet related to desktop and input/output OS developed by the Open Handset device accessibility conguration. Alliance (primarily driven by Google). LICENSED FOR USE ONLY BY: SCOTT OBSNIUK · 26636441 · MAY 18 2022 A+ Core2_220-1102_Glossary_G1-G20.indd 1 21/03/22 2:47 PM 2 | Glossary Unlike iOS, it is an open-source OS, derivable from the public one. An based on Linux. asymmetric key cannot reverse the operation it performs, so the public key antivirus scan (A-V) Software capable cannot decrypt what it has encrypted, of detecting and removing virus for example. infections and (in most cases) other types of malware, such as worms, authentication, authorization, and Trojans, rootkits, adware, spyware, accounting (AAA) Security concept password crackers, network mappers, where a centralized platorm veries DoS tools, and so on. subject identication, ensures the subject is assigned relevant permissions, APK Android app package format used and then logs these actions to create an when sideloading software from a audit trail. source other than a trusted store. authenticator app Software that allows APP Default extension for a macOS a smartphone to operate as a second app subdirectory when installed to the authentication factor or as a trusted Applications folder. channel or 2-step verication. Apple File System (APFS) Deault le automation Use of scripts to perform system for macOS-based computers and conguration steps without requiring laptops. manual intervention. Apple ID Cloud-based service allowing AutoRun/AutoPlay Windows users to synchronize settings and mechanisms for automatic actions to manage apps, le sharing, and backups occur when a peripheral storage device between multiple Apple devices. is attached. application programming interace backdoor Mechanism for gaining (API) Methods exposed by a script or access to a computer that bypasses program that allow other scripts or or subverts the normal method of programs to use it. For example, an API authentication. enables software developers to access functions of the TCP/IP network stack backup Security copy of production under a particular operating system. data made to removable media, typically according to a regular schedule. Apps settings Windows Settings pages Diferent backup types (ull, incremental, relating to conguration o Windows or diferential) balance media capacity, Features and third-party software apps. time required to backup, and time apt-get One of the package required to restore. management tools available in Linux for backup chain Sequence of jobs starting installing and updating software. with a full backup and followed by either asset Thing of economic value. For incremental or diferential backups to accounting purposes, assets are implement a media rotation scheme. classied in diferent ways, such as badge reader Authentication tangible and intangible or short term mechanism that allows a user to present and long term. Asset management a smart card to operate an entry system. means identifying each asset and recording its location, attributes, and bash Command interpreter and value in a database. scripting language for Unix-like systems. asset tagging Practice of assigning BAT Extension or the batch le ormat an ID to assets to associate them with that is used to execute a series of entries in an inventory database. Windows CMD shell commands. asymmetric encryption cipher Cipher BIOS/UEFI password Passwords that uses public and private keys. The set in system rmware to prevent keys are mathematically linked, using unauthorized booting of a computer either Rivel, Shamir, Adleman (RSA) (user password) or changes to system or elliptic curve cryptography (ECC) setup (supervisor password). alogrithms, but the private key is not Glossary LICENSED FOR USE ONLY BY: SCOTT OBSNIUK · 26636441 · MAY 18 2022 A+ Core2_220-1102_Glossary_G1-G20.indd 2 21/03/22 2:47 PM Glossary | 3 BitLocker Feature of Windows allowing brute orce attack Type of password for encryption of NTFS-formatted drives. attack where an attacker uses an The encryption key can be stored in a application to exhaustively try every TPM chip on the computer or on a USB possible alphanumeric combination to drive. crack encrypted passwords. blue screen o death (BSOD) Microsoft cache (browser) Cookies, site les, orm status screen that indicates an error data, passwords, and other information from which the system cannot recover stored by a browser. Caching behavior (also called a stop error). Blue screens can be enabled or disabled, and data are usually caused by bad driver can be cleared manually. software or hardware faults (memory cat command Linux command to view or disk). Other operating systems use and combine (concatenate) les. similar crash indicators, such as Apple’s pinwheel and Linux’s kernel panic cd command Command-line tool used message. to navigate the directory structure. bollards Sturdy vertical post installed Certicate Manager console (certmgr. to control road trac or designed msc) Console related to managing to prevent ram-raiding and vehicle- digital certicates or the current user ramming attacks. and trusted root certication authority certicates. Boot Conguration Data (BCD) Information about operating systems certicate o destruction Validation installed on the computer located from an outsourcing provider of in \boot\bcd on the system partition. recycling/repurposing services that The BCD can be modied using the media has been destroyed or sanitized bcedit command-line tool or mscong. to the agreed standard. boot method (OS setup) Device used to certicate warning Browser indication start the setup program and hold source that a site connection is not secure les or installing or upgrading an OS. because the certicate is invalid or the issuing CA is not trusted. boot sector virus Malicious code inserted into the boot sector code or chain o custody Record of evidence- partition table of a storage device that handling from collection to presentation attempts to execute when the device is in court to disposal. attached. change management Process bootleg app Software that illegally through which changes to the copies or imitates a commercial product conguration o inormation systems or brand. are implemented as part of the organization’s overall conguration bootrec command Windows command management eforts. in Windows allowing for the repair (or attempted repair) of the boot manager chkdsk command Command-line tool and boot loader. that veries the integrity o a disk’s le system. botnet Group of hosts or devices that has been infected by a control program chmod command Linux command for called a bot, which enables attackers to managing le permissions. exploit the hosts to mount attacks. chown command Linux command for branch In scripting and programming, managing the account owner or les control statement that uses a condition and directories. to determine which code block to Chrome OS Proprietary OS developed execute next. by Google to run on specic laptop bring your own device (BYOD) Security (chromebooks) and PC (chromeboxes) framework and tools to facilitate use hardware. of personally owned devices to access clean install OS setup method where corporate networks and data. the target disk is repartitioned and Glossary LICENSED FOR USE ONLY BY: SCOTT OBSNIUK · 26636441 · MAY 18 2022 A+ Core2_220-1102_Glossary_G1-G20.indd 3 21/03/22 2:47 PM 4 | Glossary formatted, removing any existing OS counter mode with cipher block and/or data les. chaining message authentication code protocol (CCMP) Encryption command and control (C2 or C&C) protocol used for wireless LANs that Infrastructure of hosts and services with addresses the vulnerabilities of the WEP which attackers direct, distribute, and protocol. control malware over botnets. cp command Command-line tool for command prompt (cmd.exe) Basic copying les in Linux. shell interpreter for Windows. credit card transactions Regulated compatibility concern Considerations data related to processing nancial that must be made when using an app transactions. in an environment with multiple device and OS platforms. cron job Scheduled task that is managed by the Linux cron daemon. complexity requirement Rules designed to enforce best-practice cross-site scripting (XSS) Malicious password selection, such as minimum script hosted on the attacker’s site or length and use of multiple character coded in a link injected onto a trusted types. site designed to compromise clients browsing the trusted site, circumventing computer security incident response the browser’s security model of trusted team (CSIRT) Team with responsibility zones. for incident response. The CSIRT must have expertise across a number of cryptominer Malware that hijacks business domains (IT, HR, legal, and computer resources to create marketing, for instance). cryptocurrency. condentiality, integrity, and cybersecurity Protection of computer availability (CIA triad) Three principles systems and digital information of security control and management. resources from unauthorized access, Also known as the information security attack, theft, or data damage. triad. Also referred to in reverse order denitions Information about new as the AIC triad. viruses and other malware used to conguration management Process update antivirus scanners. through which an organization’s Deragment and Optimize Drives tool information systems components are (drgui.exe) Fragmentation occurs when kept in a controlled state that meets a data le is not saved to contiguous the organization’s requirements, sectors on an HDD and reduces including those for security and performance. The defragmenter compliance. mitigates this and can also perform console Device that implements input optimization operations for SSDs. and output for a command shell. In denial o service attack (DoS) Any Linux, multiple virtual consoles support type of physical, application, or network use of a single host by multiple user attack that afects the availability o a sessions simultaneously. managed resource. content ltering Security measure desktop Graphical OS interface that performed on email and Internet allows programs to run within window trac to identiy and block suspicious, containers. Desktop styles include tools malicious, and/or inappropriate content for launching apps, such as the Windows in accordance with an organization’s Start Menu, and managing apps, such policies. as the Windows taskbar. Changes to the Control Panel Legacy management desktop style over the course of version interace or conguring user and and feature updates can be confusing system settings in Windows. for users. copy command Command-line tool for desktop management sotware copying les in Windows. General category of software designed Glossary LICENSED FOR USE ONLY BY: SCOTT OBSNIUK · 26636441 · MAY 18 2022 A+ Core2_220-1102_Glossary_G1-G20.indd 4 21/03/22 2:47 PM Glossary | 5 to facilitate remote support of desktops digital rights management (DRM) and mobile devices on a corporate Copyright protection technologies for network. digital media. DRM solutions usually try to restrict the number of devices developer mode Mobile-device allowed for playback of a licensed feature designed for testing apps digital le, such as a music track or during development that may weaken ebook. corporate security protections if misused. digital signature Message digest encrypted using the sender’s private Device Manager Primary interface for key that is appended to a message to conguring and managing hardware authenticate the sender and prove devices in Windows. Device Manager message integrity. enables the administrator to disable and remove devices, view hardware dir command Command-line utility that properties and system resources, and displays information about the contents update device drivers. of the current directory. device wipe Remote-initiated factory directory File system object used to reset of a mobile device that removes all organize other le system objects into user data and settings. containers. Devices and Printers Control Panel Disk Clean-up (cleanmgr.exe) app or using and conguring attached Windows utility for removing temporary hardware. les to reclaim disk space. Devices settings Windows Settings Disk Management console pages or using and conguring (diskmgmt.msc) Console related to attached hardware. initializing, partitioning, and formatting disk drives. d/du commands Command-line tools used to report storage usage in Linux. Disk Utility macOS tool or disk and le system support tasks. dictionary attack Type of password attack that compares encrypted diskpart command Command-line passwords against a predetermined list utility used to congure disk partitions. of possible password values. distributed denial o service attack diferential backup Job type in which (DDoS attack) An attack that uses all selected les that have changed since multiple compromised hosts (a botnet) the last full backup are backed up. to overwhelm a service with request or response trac. dig command Utility to query a DNS server and return information about distribution method Formats for a particular domain name or resource provisioning application installation les, record. such as via optical discs, downloads, and image les. digital certicate Identication and authentication information presented DMG macOS installer format that can in the X.509 format and issued by a be copied directly to the Applications Certicate Authority (CA) as a guarantee folder. that a key pair (as identied by the DMZ host Home router implementation public key embedded in the certicate) of DMZ where all ports with no existing is valid for a particular subject (user or forwarding rules are opened and host). directed to a single LAN host. digital orensics Process of gathering Dock macOS feature for managing and submitting computer evidence to applications from the desktop; similar to trial. Digital evidence is latent, meaning the Windows taskbar. that it must be interpreted. This means that great care must be taken to domain Group of hosts that is within prove that the evidence has not been the same namespace and administered tampered with or alsied. by the same authority. Glossary LICENSED FOR USE ONLY BY: SCOTT OBSNIUK · 26636441 · MAY 18 2022 A+ Core2_220-1102_Glossary_G1-G20.indd 5 21/03/22 2:47 PM 6 | Glossary domain name system (DNS) Service equipment lock Physical security that maps ully qualied domain name device that restricts access to ports and labels to IP addresses on most TCP/IP internal components to key holders. networks, including the Internet. erasing/wiping Using a third-party drive navigation input (x:) Command- tool to fully erase storage media before line utility used to select the working drive. recycling or repurposing, minimizing the risk of leaving persistent data remnants. dumpster diving The social engineering technique of discovering things about escalation In the context of support an organization (or person) based on procedures, incident response, and what it throws away. breach-reporting, escalation is the process of involving expert and senior dynamic host conguration protocol staf to assist in problem management. (DHCP) Protocol used to automatically assign IP addressing information to event viewer (eventvwr.msc) Windows hosts that have not been congured console related to viewing and exporting manually. events in the Windows logging le format. ease o access Windows Settings pages related to desktop and input/output everyone System security group that device accessibility conguration. represents any account, including unauthenticated users. electrostatic discharge (ESD) Metal and plastic surfaces can allow a charge evil twin Wireless access point that to build up. This can discharge if a deceives users into believing that it is a potential diference is ormed between legitimate network access point. the charged object and an oppositely execution control Process of charged conductive object. This determining what additional software electrical discharge can damage silicon may be installed on a client or server chips and computer components if they computer beyond its baseline to prevent are exposed to it. the use of unauthorized software. encrypting le system (EFS) Microsoft’s expiration requirement Rules le-level encryption eature available or designed to enforce best-practice use on NTFS. password use by forcing regular end o lie (EOL) Product life cycle selection of new passwords. phase where mainstream vendor exploit Specic method by which support is no longer available. malware code infects a target host, endpoint detection and response often via some vulnerability in a (EDR) Software agent that collects software process. system data and logs for analysis by ext3 Standard Linux le system that a monitoring system to provide early includes journaling and has since been detection of threats. replaced with ext4. end-user license agreement (EULA) ext4 One o the deault le systems in Contract governing the installation and modern Linux versions that supports use of software. journaling and large volumes. enterprise wipe Remote-initiated extended le allocation table (exFAT) wipe of a mobile device that removes 64-bit version o the FAT le system corporate apps and data only. with support or larger partition and le equipment grounding Wire that sizes. provides a return path for electrical Extensible Authentication Protocol current as a safety feature; if an (EAP) Framework for negotiating electrical connection short circuits authentication methods that enables into the metal chassis, a ground wire systems to use hardware-based ensures that the current ows to ground identiers, such as ngerprint rather than electrocuting someone scanners or smart card readers, for handling the faulty device. Glossary LICENSED FOR USE ONLY BY: SCOTT OBSNIUK · 26636441 · MAY 18 2022 A+ Core2_220-1102_Glossary_G1-G20.indd 6 21/03/22 2:47 PM Glossary | 7 authentication and establish secure process of formatting a partition that tunnels through which to submit allows an OS to make use of a mass credentials. storage device, such as an HDD, SSD, or thumb drive. extension (browser) Add-on that uses the browser API to implement new leless malware Exploit techniques functionality. that use the host’s scripting environment to create malicious acial recognition Biometric processes. authentication mechanism that uses an infrared camera to verify that the user’s FileVault macOS disk encryption face matches a 3D model recorded at product. enrollment. nd command Command-line Linux acial recognition lock Mobile-device tool used to search the le system. bio-gesture authentication mechanism Finder File management app in macOS. that requires the user to scan his or her face to unlock the device. ngerprint lock Mobile-device bio- gesture authentication mechanism that actory reset Standard routine created requires the user to scan his or her by manufacturer that can be invoked ngerprint to unlock the device. to restore an appliance to its shipped state, clearing any user customization, ngerprint scanner Biometric conguration, or modication. authentication device that can produce a template signature of a user’s ailed login attempts restriction ngerprint and then subsequently Mobile-device authentication compare the template to the digit mechanism that progressively delays or submitted for authentication. blocks unlock attempts after multiple failures. rmware Software instructions embedded on a hardware device such ast startup Power-saving option as a computer motherboard. Modern allowing swift resume from sleep via types o rmware are stored in ash an image of system memory contents memory and can be updated more saved to a hibernation le. easily than legacy programmable FAT32 (le allocation table) 32-bit read-only memory (ROM) types. le system used principally or system older redirection In Windows, partitions and removable media. redirecting an individual user prole eature update Release paradigm folder, such as Documents or Pictures, introduced for Windows 10 where to a network share. signicant changes and new eatures ootprinting Phase in an attack or a are distributed via Windows Update on penetration test in which the attacker a semiannual schedule. or tester gathers information about the encing Security barrier designed to target before attacking it. prevent unauthorized access to a site orce quit macOS tool for halting a perimeter. process; equivalent to the process File Explorer Options Control Panel management functionality in Task app related to view and browsing Manager. settings for File Explorer. ormat command Command-line utility File History Windows feature for or creating a le system on a partition. backing up user data. ull backup Job type in which all le sharing Windows rewall selected les, regardless o prior state, conguration that opens the network are backed up. ports required to operate as a le/print use Circuit breaker designed to protect server. the device and users of the device le system Structure or le data from faulty wiring or supply of power indexing and storage created by a (overcurrent protection). Glossary LICENSED FOR USE ONLY BY: SCOTT OBSNIUK · 26636441 · MAY 18 2022 A+ Core2_220-1102_Glossary_G1-G20.indd 7 21/03/22 2:47 PM 8 | Glossary Gaming settings Windows Settings reduces the chance of collisions, where pages related to game mode settings two diferent inputs produce the same and Xbox integration. output. gpupdate/gpresult commands hibernate Power-saving state where the Command-line tools to apply and contents of memory are saved to hard analyze group policies. Group policies disk (hiberl.sys) and the computer is are a means o conguring registry powered of. Restarting the computer settings. restores the desktop. grandather-ather-son (GFS) hive File storing conguration data Media rotation scheme that labels corresponding to a section of the tapes/devices used for backup jobs Windows registry. in generations, with the youngest home older Default local or network generation having a shorter retention older or users to save data les to. period than the oldest. home router SOHO device providing grep command Linux command for Internet routing via a ull ber, DSL, searching and ltering input. This can cable, or satellite link. These appliances be used as a le search tool when also provide a 4-port LAN switch and combined with ls. Wi-Fi plus a rewall. group policy editor (gpedit.msc) iCloud Mobile/cloud computing Console related to conguring detailed oce-productivity and data-storage user and system registry settings via suite operated by Apple and closely policies. integrated with macOS and iOS. group policy object (GPO) On a icong command Deprecated Windows domain, a way to deploy per- Linux command tool used to gather user and per-computer settings such as inormation about the IP conguration password policy, account restrictions, o the network adapter or to congure rewall status, and so on. the network adapter. guest Non-privileged account that is image deployment Deployment permitted to access the computer/ method where the target disk is written network without authenticating. with an image of the new OS. GUID partition table (GPT) Modern impact to business/operation/ disk partitioning system allowing large network/device Considerations that numbers of partitions and very large should be made when planning the partition sizes. installation or upgrade of new apps. hard token USB storage key or smart impersonation Social engineering card with a cryptographic module that attack where an attacker pretends to be can hold authenticating encryption keys someone he or she is not. securely. implicit deny Basic principle of security hardware compatibility list (HCL) stating that unless something has Before installing an OS, it is vital to explicitly been granted access, it should check that all the PC components have be denied access. been tested for compatibility with the OS (that they are on the Hardware incident response plan (IRP) Compatibility List [HCL] or Windows Procedures and guidelines covering Logo’d Product List). Incompatible appropriate priorities, actions, and hardware may not work or may even responsibilities in the event of security prevent the installation from completing incidents, divided into preparation, successfully. detection/analysis, containment, eradication/recovery, and post-incident hash Function that converts an stages. arbitrary-length string input to a xed- length string output. A cryptographic incremental backup Job type in which hash function does this in a way that all selected les that have changed Glossary LICENSED FOR USE ONLY BY: SCOTT OBSNIUK · 26636441 · MAY 18 2022 A+ Core2_220-1102_Glossary_G1-G20.indd 8 21/03/22 2:47 PM Glossary | 9 since the last full or incremental backup ipcong command Command tool (whichever was most recent) are used to gather information about the IP backed up. conguration o a Windows host. indexing options Control Panel jailbreak Removes the protective seal app related to search database and any OS-specic restrictions to give maintenance. users greater control over the device. inheritance File system access- JavaScript Scripting language used control-concept where child objects to add interactivity to web pages and are automatically assigned the same HTML-format email. permissions as their parent object. JS Extension or the JavaScript le ormat. in-place upgrade OS installation key (registry) In the Windows registry, method where the setup program is a key is analogous to a folder on the launched from an existing OS. This can le system. Keys are used to group like typically retain user data les, settings, settings together in a hierarchy that is and third-party apps. logical to navigate. insider threat Type of threat actor who key exchange Any method by which is assigned privileges on the system and cryptographic keys are transferred causes an intentional or unintentional among users, thus enabling the use of a incident. cryptographic algorithm. instant search Windows feature Keychain macOS app for managing allowing rapid search of apps, data passwords cached by the OS and folders, messages, and the web. supported browser/web applications. instant secure erase (ISE) Media keylogger Malicious software or sanitization command built into HDDs hardware that can record user and SSDs that are self-encrypting that keystrokes. works by erasing the encryption key, leaving remnants unrecoverable. knowledge base (KB) Searchable database of product FAQs (Frequently Internet o Things (IoT) Devices that Asked Questions), advice, and known can report state and conguration troubleshooting issues. The Microsoft data and be remotely managed over IP KB is ound at support.microsot.com. networks. least privilege Basic principle of Internet Options Control Panel applet security stating that something should allowing conguration o the Internet be allocated the minimum necessary Explorer web browser. rights, privileges, or information to Internet Protocol address (IP) perform its role. Format for logical host and network lessons learned report (LLR) An addressing. In IPv4, a 32-bit binary analysis of events that can provide address is expressed in dotted decimal insight into how to improve response notation, such as 192.168.1.1. In IPv6, and support processes in the future. addresses are 128-bit expressed as hexadecimal (for example, lighting Physical security mechanisms 2001:db8::0bcd:abcd:ef12:1234). that ensure a site is suciently illuminated for employees and guests iOS OS for Apple’s iPhone smartphone to feel safe and for camera-based and most iPad tablet models. surveillance systems to work well. ip command Linux command tool Linux Open-source OS packaged in used to gather information about distributions supported by a wide range the IP conguration o the network of hardware and software vendors. adapter or to congure the network adapter. local account User account that can be authenticated again and allocated iPadOS OS for some models of the permissions for the computer that hosts Apple iPad tablet. the account only. Glossary LICENSED FOR USE ONLY BY: SCOTT OBSNIUK · 26636441 · MAY 18 2022 A+ Core2_220-1102_Glossary_G1-G20.indd 9 21/03/22 2:47 PM 10 | Glossary Local Users and Groups console md command Command-line tool for (lusrmgr.msc) Console for creating and creating directories. managing user and group accounts with member server Any application server the authentication and permissions computer that has joined a domain but scope of the local system. does not maintain a copy of the Active locator app Cloud app that uses mobile- Directory database. device location service to identify its metered connection Windows feature current position on a map and enable for indicating that network data transfer security features to mitigate theft or loss. is billable and for setting warnings and login script Code that performs a series caps to avoid unexpected charges from of tasks automatically when a user the provider. account is authenticated. Microsot account Cloud-based SSO loop In scripting and programming, service allowing users to synchronize control statement that executes code settings between multiple Windows repeatedly based on a condition. devices. low level ormat Using a vendor tool Microsot Management Console to fully erase storage media before (MMC) Utility allowing Windows recycling or repurposing, minimizing the administrative tools to be added as risk of leaving persistent data remnants. snap-ins to a single interface. ls command Linux command for listing Mission Control App facilitating le system objects. multiple desktops in macOS. lunchtime attack A malicious action mobile device management (MDM) that takes place when a threat actor Process and supporting technologies for exploits an unlocked and unattended tracking, controlling, and securing the desktop or mobile device to gain organization’s mobile infrastructure. unauthorized access. motion sensor Alarm system triggered macOS Proprietary OS designed by by movement as detected by microwave Apple for their range of iMac computers, radio reection or passive inrared Mac workstations, and MacBook sensors. portables. move command Command-line tool for Magic Mouse/Trackpad Touch-enabled moving les in Windows. mouse and trackpad hardware for Apple multiactor authentication (MFA) computers. Authentication scheme that requires the magnetometer Handheld or walk- user to present at least two diferent through metal detector designed to factors as credentials; for example, detect concealed weapons. something you know, something you have, something you are, something you Mail applet Control Panel applet related do, and somewhere you are. Specifying to conguration o Microsot Outlook two factors is known as 2FA. email accounts and storage les. mv command Command-line tool for mapped drive Windows mechanism for moving les in Linux. navigating shared network folders by assigning them with drive letters. Nano Command-line text editor operated by CTRL key combinations. master boot record (MBR) Sector on a mass storage device that holds Nearby Share Android feature for information about partitions and the OS simple le sharing via Bluetooth. boot loader. net commands Windows command material saety data sheet (MSDS) suite for managing user/group accounts Information sheet accompanying and shares. hazardous products or substances that netstat command Cross-platform explains the proper procedures for command tool to show network handling and disposal. Glossary LICENSED FOR USE ONLY BY: SCOTT OBSNIUK · 26636441 · MAY 18 2022 A+ Core2_220-1102_Glossary_G1-G20.indd 10 21/03/22 2:47 PM Glossary | 11 information on a machine running on site versus of site Media rotation TCP/IP, notably active connections, and scheme that ensures at least one copy the routing table. o data is held at a diferent location to mitigate the risk of a disaster that Network & Internet settings Windows destroys all storage at a single site. Settings pages related to interface conguration, network proles, and OneDrive Cloud storage service proxy conguration. operated by Microsoft and closely integrated with Windows. Network and Sharing Center Control Panel related to interace conguration, on-path attack Attack where the threat network proles, and discovery/le actor makes an independent connection sharing settings. between two victims and is able to read and possibly modiy trac. network discovery Windows rewall conguration that makes a host visible open-source Licensing model that to network browsers. grants permissive rights to end-users, such as to install, use, modify, and network interace card (NIC) Adapter distribute a software product and its card that provides one or more Ethernet source code, as long as redistribution ports for connecting hosts to a network so permits the same rights. that they can exchange data over a link. operator Programming object that can network location awareness (NLA) resolve the truth value of a condition, Windows feature that categorizes such as whether one variable is equal to network prole as public or private. another. Each prole can have a diferent rewall conguration, with public network types organizational unit (OU) Structural being more restricted, by default. feature of a network directory that can be used to group objects that should network mask Number of bits applied share a common conguration or to an IP address to mask the network ID organizing principle, such as accounts portion from the host/interface ID portion. within the same business department. network topology diagram original equipment manuacturer Documentation showing how network (OEM) In PC terms, companies that sell nodes are connected by cabling or Windows co-branded under their own how they are logically identied and logo. OEM Windows licenses are valid connected, such as in IP networks. only on the system that the software New Technology Filing System (NTFS) was installed on, and the OEM must 64-bit deault le system or Windows, provide support. with le-by-le compression and palmprint scanner Biometric camera- RAID support as well as advanced le based scanner that uses unique features attribute management tools, encryption, of a palm shown by visible and infrared and disk quotas. light. non-compliant system System whose password attack Any attack where conguration is diferent rom its secure the attacker tries to gain unauthorized baseline. access to and use of passwords. nslookup command Cross-platform password manager Software that can command tool for querying DNS suggest and store site and app passwords resource records. to reduce risks from poor user choices NTFS permissions ACL that mediates and behavior. Most browsers have a local and network access to a le system built-in password manager. object under Windows when the volume pathping command Windows utility is formatted with NTFS. for measuring latency and packet loss octal notation Linux le-permission across an internetwork. mode that uses numeric values to pattern lock Mobile-device represent permissions. authentication mechanism that requires Glossary LICENSED FOR USE ONLY BY: SCOTT OBSNIUK · 26636441 · MAY 18 2022 A+ Core2_220-1102_Glossary_G1-G20.indd 11 21/03/22 2:47 PM 12 | Glossary the user to input a join-the-dots pattern ping command Cross-platform to unlock the device. command tool for testing IP packet transmission. perormance monitor (permon.msc) Console for reporting and recording PKG macOS installer format that resource utilization via counter data for supports complex setup tasks. object instances. plug-in (browser) Software personal government-issued installed to a web browser to handle inormation Data related to identity multimedia objects embedded in web documents issued by governments, pages. Use of most plug-in types is such as passports, social security IDs, now deprecated. and driving licenses, that is liable to be pop-up blocker Browser feature or subject to strict legal and regulatory extension that prevents sites from compliance requirements. creating new browser windows. personal identication number port orwarding Process in which a (PIN) Number used in conjunction with router takes requests from the Internet authentication devices such as smart for a particular application (such as cards; as the PIN should be known HTTP) and sends them to a designated only to the user, loss of the smart card host on the LAN. should not represent a security risk. port mapping Type of port forwarding personalization settings Windows where the external port is forwarded to Settings pages related to customizing a diferent internal port on the LAN host. the appearance of the desktop using themes. port triggering Mechanism to congure access through a rewall or personally identiable inormation applications that require more than one (PII) Data that can be used to identify port. Basically, when the rewall detects or contact an individual (or in the case activity on outbound port A destined of identity theft, to impersonate him for a given external IP address, it opens or her). inbound access for the external IP phishing Email-based social engineering address on port B for a set period. attack, in which the attacker sends email power ailure Complete loss of building from a supposedly reputable source, power. such as a bank, to try to elicit private information from the victim. Power Options Control Panel app related to conguring power button/lid phone settings Windows Settings events and power-saving modes. pages for associating a smartphone with Windows. power users One of the default Windows group accounts. Its use is physical destruction Using drilling, deprecated, but it is still included with shredding, incineration, or degaussing Windows to support legacy applications. of storage media before recycling or repurposing to minimize the risk of PowerShell (PS) Command shell leaving persistent data remnants. and scripting language built on the.NET Framework that use cmdlets for physical placement Considerations for Windows automation. installation location for PC and network devices to ensure reliable and secure preboot execution environment (PXE) operation. Feature of a network adapter that allows the computer to boot by contacting piggybacking Allowing a threat actor a suitably congured server over the to enter a site or controlled location network. without authorization. pre-shared key (PSK) Wireless PIN code lock Basic mobile-device network authentication mode where a authentication mechanism that requires passphrase-based mechanism is used to the correct number or passcode to allow group authentication to a wireless unlock the device. Glossary LICENSED FOR USE ONLY BY: SCOTT OBSNIUK · 26636441 · MAY 18 2022 A+ Core2_220-1102_Glossary_G1-G20.indd 12 21/03/22 2:47 PM Glossary | 13 network. The passphrase is used to public key During asymmetric derive an encryption key. encryption, this key is freely distributed and can be used to perform the reverse pretexting Social engineering tactic encryption or decryption operation of where a team will communicate, the linked private key in the pair. whether directly or indirectly, a lie or half-truth in order to get someone to pwd command Linux command for believe a falsehood. showing the current directory (“Print Working Directory”). privacy settings Windows Settings pages related to personal data collection PY Extension for a script written in the and use. Python programming language. private browsing Browser mode in Python High-level programming which all session data and cache is language that is widely used for discarded and tracking protection automation. features are enabled by default. quarantine The process of isolating private key In asymmetric encryption, a le, computer system, or computer the private key is known only to the network to prevent the spread of a virus holder and is linked to, but not derivable or another cybersecurity incident. from, a public key distributed to Quick Assist Windows support feature those with whom the holder wants to allowing remote screen-sharing over the communicate securely. A private key Internet. can be used to encrypt data that can be decrypted by the linked public key or ransomware Malware that tries vice versa. to extort money from the victim by blocking normal operation of a process Software program that has computer and/or encrypting the victim’s been executed and is running in system les and demanding payment. memory. recovery Operation to recover system programs and eatures Control functionality and/or data integrity using Panel applet allowing management backup media. of Windows Features and third-party software. recovery partition OEM recovery media enabling the user to reset the prohibited content Data found on a system to its actory conguration. computer system that is not permitted by policy or that is not compliant with recycle bin When les are deleted rom relevant legislation or regulations. a local hard disk, they are stored in the Recycle Bin. They can be recovered from protected health inormation (PHI) here if so desired. Data that can be used to identify an individual and includes information redirection Consequence of malware about past, present, or future health infection where DNS and/or search as well as related payments and data results are corrupted to redirect used in the operation of a healthcare requests from legitimate site hosts to business. spoofed sites or ads. proxy server Server that mediates registry editor (regedit) Tool for the communications between a client making direct edits to the registry and another server. It can lter and database, such as adding or modifying often modify communications as well keys or values. The Registry Editor as provide caching services to improve can be used to make backups of the performance. registry. ps command Linux command for regulated data Information that has retrieving process information. storage and handling compliance requirements dened by national PS1 Extension for the PowerShell script