暗記メーカー
ログイン
ID: C2 Deep Pt.1
  • Mixtapes øf Hanna

  • 問題数 90 • 5/28/2024

    記憶度

    完璧

    13

    覚えた

    33

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    What does NAT stand for?

    Network Address Translation

  • 2

    Define NAT:

    a network service provided by a router or proxy server to map private local addresses to one or more publicly accessible IP addresses.

  • 3

    What does UPnp stand for?

    Universal plug-and-play

  • 4

    Define UPnp:

    a protocol framework allowing network devices to autoconfigure services, such as allowing a games console to request appropriate settings from a firewall.

  • 5

    What was the perimeter network formally called?

    The Demilitarized Zone or DMZ

  • 6

    Define Perimeter Network:

    a portion of a private network connected to the Internet and protected against intrusion.

  • 7

    Define: a network service provided by a router or proxy server to map private local addresses to one or more publicly accessible IP addresses.

    Network address translation (NAT)

  • 8

    Define: a protocol used to allocate IP addresses to a host when it joins a network.

    Dynamic Host Control Protocol (DHCP)

  • 9

    Define: a protocol framework allowing network devices to autoconfigure services, such as allowing a games console to request appropriate settings from a firewall.

    Universal plug-and-play (UPnP)

  • 10

    Define: a portion of a private network connected to the Internet and protected against intrusion.

    Perimeter Network

  • 11

    Define: DHCP

    a protocol used to allocate IP addresses to a host when it joins a network.

  • 12

    DEFINE: AUP

    Acceptable Use Policy

  • 13

    DEFINE: DRM

    Digital Rights Management

  • 14

    DEFINE: DMCA

    Digital Millennium Copyright Act

  • 15

    DEFINE: Acceptable Use Policy (AUP)

    a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet.

  • 16

    DEFINE: Digital Rights Management (DRM)

    a copyright protection technology for digital media.

  • 17

    DEFINE: The Digital Millennium Copyright Act (DMCA)

    a 1998 United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization that criminalizes production and dissemination of technology, devices, or services intended to circumvent measures that control access to copyrighted works.

  • 18

    DEFINE: Personally Identifiable Information (PII)

    data used to identify, contact, or locate an individual. Information such as social security number (SSN), name, date of birth, email address, telephone number, street address, and biometric data is considered PII.

  • 19

    DEFINE: a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet.

    Acceptable Use Policy (AUP)

  • 20

    DEFINE: a copyright protection technology for digital media.

    Digital Rights Management (DRM)

  • 21

    DEFINE: a 1998 United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization that criminalizes production and dissemination of technology, devices, or services intended to circumvent measures that control access to copyrighted works.

    The Digital Millennium Copyright Act (DMCA)

  • 22

    DEFINE: Degaussing

    exposes the disk to a powerful electromagnet that disrupts the magnetic pattern that stores the data on the disk surface.

  • 23

    DEFINE: Standard Formatting

    allows the data to be restored and make the data vulnerable to exposure.

  • 24

    DEFINE: Low-level Formatting

    hard disk operation that makes recovering data from your storage devices difficult once the operation is complete.

  • 25

    DEFINE: Drill Formatting

    operation that drills holes through the hard drive platters, making the recovery of data more difficult.

  • 26

    DEFINE: exposes the disk to a powerful electromagnet that disrupts the magnetic pattern that stores the data on the disk surface.

    Degaussing

  • 27

    DEFINE: allows the data to be restored and make the data vulnerable to exposure.

    Standard Formatting

  • 28

    DEFINE: hard disk operation that makes recovering data from your storage devices difficult once the operation is complete.

    Low-level Formatting

  • 29

    DEFINE: operation that drills holes through the hard drive platters, making the recovery of data more difficult.

    Drill Formatting

  • 30

    DEFINE: constant

    a specific identifier that contains a value that cannot be changed within the program.

  • 31

    DEFINE: comment

    written into the code to help a human understand the initial programmer's logic.

  • 32

    DEFINE: variable

    a placeholder in a script containing a number, character, or string of characters.

  • 33

    DEFINE: loop

    deviates from the initial program path to some sort of logic condition, the computer repeats the task until a condition is met. Often implemented with For or While statements.

  • 34

    DEFINE: a specific identifier that contains a value that cannot be changed within the program.

    constant

  • 35

    DEFINE: written into the code to help a human understand the initial programmer's logic.

    comment

  • 36

    DEFINE: a placeholder in a script containing a number, character, or string of characters.

    variable

  • 37

    DEFINE: deviates from the initial program path to some sort of logic condition, the computer repeats the task until a condition is met. Often implemented with For or While statements.

    loop

  • 38

    DEFINE: SLA

    Service Level Agreement

  • 39

    DEFINE: SOW

    Statement of Work, Scope of Work

  • 40

    DEFINE: MOU

    Memorandum of Understanding

  • 41

    DEFINE: Service Level Agreement (SLA)

    a contract that outlines the detailed terms under which a service is provided, including reasons the contract may be terminated.

  • 42

    DEFINE: Statement of Work / Scope of Work (SOW)

    a document that outlines all the work that is to be performed, as well as the agreed-upon deliverables and timelines.

  • 43

    DEFINE: Memorandum of Understanding

    a preliminary or exploratory agreement to express an intent to work together that is not legally binding and does not involve monetary exchange.

  • 44

    DEFINE: a contract that outlines the detailed terms under which a service is provided, including reasons the contract may be terminated.

    Service Level Agreement (SLA)

  • 45

    DEFINE: a document that outlines all the work that is to be performed, as well as the agreed-upon deliverables and timelines.

    Statement of Work / Scope of Work (SOW)

  • 46

    DEFINE: a preliminary or exploratory agreement to express an intent to work together that is not legally binding and does not involve monetary exchange.

    Memorandum of Understanding (MOU)

  • 47

    DEFINE: in-place upgrade

    will preserve all of the user's files and applications during the upgrade process from Windows 10 to Windows 11.

  • 48

    DEFINE: a software or operating system installation where the configuration information is derived from an input file.

    unattended installation

  • 49

    DEFINE: a type of installation that attempts to replace the existing version of the operating system files with a new copy of the same version. A repair installation is useful when trying to repair a Windows computer that will not boot or when you believe the system files have become corrupted.

    Repair installation

  • 50

    DEFINE: RegEdit

    Registry Editor

  • 51

    DEFINE: Registry Editor (RegEdit)

    allows you to view and make changes to system files and programs that you wouldn't be able to access otherwise.

  • 52

    DEFINE: MSConfig

    a system utility to troubleshoot the Microsoft Windows startup processes.

  • 53

    DEFINE: Remote Desktop Services (RDS)

    used to connect to a remote desktop session host servers or other remote computers, edit an existing remote desktop connection (rdp) configuration file, and migrate legacy connection files that were created with the client connection manager to the newer .rap connection file type.

  • 54

    DEFINE: MMC

    Microsoft Management Console

  • 55

    DEFINE: The Microsoft Management Console (MMC)

    a utility that uses snap-ins for various Windows tools such as disk management, computer management, performance monitor, print management, and others to perform operations on a local or networked computer.

  • 56

    DEFINE: RDS

    Remote Desktop Services

  • 57

    DEFINE: Least privilege

    is the concept and practice of restricting access rights for users, accounts, and computing processes to only those resources absolutely required to perform routine, legitimate activities.

  • 58

    DEFINE: Zero-trust

    is a security framework that requires all users, whether in or outside the organization's network, to be authenticated, authorized, and continuously validated for security configuration and posture before being granted or keeping access to applications and data.

  • 59

    DEFINE: Defense in Depth

    is an approach to cybersecurity in which a series of defensive mechanisms are layered to protect valuable data and information.

  • 60

    DEFINE: AUP

    Acceptable Use Policy

  • 61

    DEFINE: Acceptable Use Policy (AUP)

    is a set of rules applied by the owner, creator, or administrator of a network, website, or service, that restrict how the network, website, or system may be used and sets guidelines as to how it should be used.

  • 62

    DEFINE: is the concept and practice of restricting access rights for users, accounts, and computing processes to only those resources absolutely required to perform routine, legitimate activities.

    Least privilege

  • 63

    DEFINE: is a security framework that requires all users, whether in or outside the organization's network, to be authenticated, authorized, and continuously validated for security configuration and posture before being granted or keeping access to applications and data.

    Zero-trust

  • 64

    DEFINE: is an approach to cybersecurity in which a series of defensive mechanisms are layered to protect valuable data and information.

    Defense in Depth

  • 65

    DEFINE: is a set of rules applied by the owner, creator, or administrator of a network, website, or service, that restrict how the network, website, or system may be used and sets guidelines as to how it should be used.

    Acceptable Use Policy (AUP)

  • 66

    DEFINE: MAC Filtering

    the application of an access control list to a switch or access point so that only clients with approved MAC addresses connect.

  • 67

    DEFINE: Port Forwarding

    allows a router to take requests from the Internet for a particular application and send them to a designated host on the LAN.

  • 68

    DEFINE: Allow List

    a form of protection where only the items identified specifically on the list are allowed, whereas all others are denied.

  • 69

    DEFINE: Blocklist

    contains every address or port that is blocked from accessing the network.

  • 70

    DEFINE: the application of an access control list to a switch or access point so that only clients with approved MAC addresses connect.

    MAC Filtering

  • 71

    DEFINE: allows a router to take requests from the Internet for a particular application and send them to a designated host on the LAN.

    Port Forwarding

  • 72

    DEFINE: a form of protection where only the items identified specifically on the list are allowed, whereas all others are denied.

    Allow List

  • 73

    DEFINE: contains every address or port that is blocked from accessing the network.

    Blocklist

  • 74

    What is the “cat command” short for:

    Concatenate

  • 75

    DEFINE: cat command

    allows the creation of single or multiple files, view file contents, concatenate files, and redirect output in the terminal to a file.

  • 76

    DEFINE: grep command

    is a command-line utility for searching plain-text data sets for lines that match a regular expression.

  • 77

    DEFINE: dig command

    is used to query the domain name system (DNS) to obtain information about host addresses, mail exchanges, nameservers, and related information.

  • 78

    DEFINE: Is command

    lists the files or directories in the current path of a Unix, Linux, or Mac operating system. When invoked without any arguments, Is lists the files in the current working directory.

  • 79

    DEFINE: allows the creation of single or multiple files, view file contents, concatenate files, and redirect output in the terminal to a file.

    cat command

  • 80

    DEFINE: is a command-line utility for searching plain-text data sets for lines that match a regular expression.

    grep command

  • 81

    DEFINE: is used to query the domain name system (DNS) to obtain information about host addresses, mail exchanges, nameservers, and related information.

    dig command

  • 82

    DEFINE: lists the files or directories in the current path of a Unix, Linux, or Mac operating system. When invoked without any arguments, this command lists the files in the current working directory.

    Is command

  • 83

    DEFINE: Worm

    a standalone malware computer program that replicates itself to spread to other computers.

  • 84

    DEFINE: Virus

    malicious software designed to infect computer files or disks when it is activated.

  • 85

    DEFINE: Trojan

    type of malware that looks legitimate but can take control of your computer.

  • 86

    DEFINE: Ransomware

    type of malware designed to deny access to a computer system or data until a ransom is paid.

  • 87

    DEFINE: a standalone malware computer program that replicates itself to spread to other computers.

    Worm

  • 88

    DEFINE: malicious software designed to infect computer files or disks when it is activated.

    Virus

  • 89

    DEFINE: type of malware that looks legitimate but can take control of your computer.

    Trojan

  • 90

    DEFINE: type of malware designed to deny access to a computer system or data until a ransom is paid.

    Ransomware