暗記メーカー
ログイン
ID: C2 Deep Pt.1
  • Mixtapes øf Hanna

  • 問題数 90 • 5/28/2024

    記憶度

    完璧

    13

    覚えた

    33

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    DEFINE: the application of an access control list to a switch or access point so that only clients with approved MAC addresses connect.

    MAC Filtering

  • 2

    DEFINE: exposes the disk to a powerful electromagnet that disrupts the magnetic pattern that stores the data on the disk surface.

    Degaussing

  • 3

    DEFINE: comment

    written into the code to help a human understand the initial programmer's logic.

  • 4

    DEFINE: RegEdit

    Registry Editor

  • 5

    DEFINE: is a security framework that requires all users, whether in or outside the organization's network, to be authenticated, authorized, and continuously validated for security configuration and posture before being granted or keeping access to applications and data.

    Zero-trust

  • 6

    DEFINE: The Microsoft Management Console (MMC)

    a utility that uses snap-ins for various Windows tools such as disk management, computer management, performance monitor, print management, and others to perform operations on a local or networked computer.

  • 7

    DEFINE: is an approach to cybersecurity in which a series of defensive mechanisms are layered to protect valuable data and information.

    Defense in Depth

  • 8

    DEFINE: type of malware designed to deny access to a computer system or data until a ransom is paid.

    Ransomware

  • 9

    DEFINE: Memorandum of Understanding

    a preliminary or exploratory agreement to express an intent to work together that is not legally binding and does not involve monetary exchange.

  • 10

    DEFINE: a placeholder in a script containing a number, character, or string of characters.

    variable

  • 11

    DEFINE: is a command-line utility for searching plain-text data sets for lines that match a regular expression.

    grep command

  • 12

    DEFINE: MSConfig

    a system utility to troubleshoot the Microsoft Windows startup processes.

  • 13

    What was the perimeter network formally called?

    The Demilitarized Zone or DMZ

  • 14

    What does NAT stand for?

    Network Address Translation

  • 15

    DEFINE: Zero-trust

    is a security framework that requires all users, whether in or outside the organization's network, to be authenticated, authorized, and continuously validated for security configuration and posture before being granted or keeping access to applications and data.

  • 16

    DEFINE: Virus

    malicious software designed to infect computer files or disks when it is activated.

  • 17

    DEFINE: Standard Formatting

    allows the data to be restored and make the data vulnerable to exposure.

  • 18

    DEFINE: Registry Editor (RegEdit)

    allows you to view and make changes to system files and programs that you wouldn't be able to access otherwise.

  • 19

    DEFINE: Acceptable Use Policy (AUP)

    is a set of rules applied by the owner, creator, or administrator of a network, website, or service, that restrict how the network, website, or system may be used and sets guidelines as to how it should be used.

  • 20

    DEFINE: Trojan

    type of malware that looks legitimate but can take control of your computer.

  • 21

    DEFINE: lists the files or directories in the current path of a Unix, Linux, or Mac operating system. When invoked without any arguments, this command lists the files in the current working directory.

    Is command

  • 22

    DEFINE: is a set of rules applied by the owner, creator, or administrator of a network, website, or service, that restrict how the network, website, or system may be used and sets guidelines as to how it should be used.

    Acceptable Use Policy (AUP)

  • 23

    DEFINE: AUP

    Acceptable Use Policy

  • 24

    Define NAT:

    a network service provided by a router or proxy server to map private local addresses to one or more publicly accessible IP addresses.

  • 25

    DEFINE: is the concept and practice of restricting access rights for users, accounts, and computing processes to only those resources absolutely required to perform routine, legitimate activities.

    Least privilege

  • 26

    Define: DHCP

    a protocol used to allocate IP addresses to a host when it joins a network.

  • 27

    Define Perimeter Network:

    a portion of a private network connected to the Internet and protected against intrusion.

  • 28

    DEFINE: allows the data to be restored and make the data vulnerable to exposure.

    Standard Formatting

  • 29

    What is the “cat command” short for:

    Concatenate

  • 30

    DEFINE: MOU

    Memorandum of Understanding

  • 31

    DEFINE: SLA

    Service Level Agreement

  • 32

    DEFINE: a specific identifier that contains a value that cannot be changed within the program.

    constant

  • 33

    DEFINE: Is command

    lists the files or directories in the current path of a Unix, Linux, or Mac operating system. When invoked without any arguments, Is lists the files in the current working directory.

  • 34

    DEFINE: Defense in Depth

    is an approach to cybersecurity in which a series of defensive mechanisms are layered to protect valuable data and information.

  • 35

    DEFINE: The Digital Millennium Copyright Act (DMCA)

    a 1998 United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization that criminalizes production and dissemination of technology, devices, or services intended to circumvent measures that control access to copyrighted works.

  • 36

    DEFINE: a standalone malware computer program that replicates itself to spread to other computers.

    Worm

  • 37

    DEFINE: written into the code to help a human understand the initial programmer's logic.

    comment

  • 38

    DEFINE: Low-level Formatting

    hard disk operation that makes recovering data from your storage devices difficult once the operation is complete.

  • 39

    DEFINE: grep command

    is a command-line utility for searching plain-text data sets for lines that match a regular expression.

  • 40

    DEFINE: variable

    a placeholder in a script containing a number, character, or string of characters.

  • 41

    DEFINE: Digital Rights Management (DRM)

    a copyright protection technology for digital media.

  • 42

    DEFINE: RDS

    Remote Desktop Services

  • 43

    DEFINE: AUP

    Acceptable Use Policy

  • 44

    DEFINE: SOW

    Statement of Work, Scope of Work

  • 45

    DEFINE: dig command

    is used to query the domain name system (DNS) to obtain information about host addresses, mail exchanges, nameservers, and related information.

  • 46

    DEFINE: type of malware that looks legitimate but can take control of your computer.

    Trojan

  • 47

    DEFINE: operation that drills holes through the hard drive platters, making the recovery of data more difficult.

    Drill Formatting

  • 48

    DEFINE: deviates from the initial program path to some sort of logic condition, the computer repeats the task until a condition is met. Often implemented with For or While statements.

    loop

  • 49

    DEFINE: Worm

    a standalone malware computer program that replicates itself to spread to other computers.

  • 50

    DEFINE: Drill Formatting

    operation that drills holes through the hard drive platters, making the recovery of data more difficult.

  • 51

    DEFINE: a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet.

    Acceptable Use Policy (AUP)

  • 52

    DEFINE: DMCA

    Digital Millennium Copyright Act

  • 53

    DEFINE: DRM

    Digital Rights Management

  • 54

    DEFINE: cat command

    allows the creation of single or multiple files, view file contents, concatenate files, and redirect output in the terminal to a file.

  • 55

    DEFINE: a type of installation that attempts to replace the existing version of the operating system files with a new copy of the same version. A repair installation is useful when trying to repair a Windows computer that will not boot or when you believe the system files have become corrupted.

    Repair installation

  • 56

    DEFINE: Service Level Agreement (SLA)

    a contract that outlines the detailed terms under which a service is provided, including reasons the contract may be terminated.

  • 57

    DEFINE: Acceptable Use Policy (AUP)

    a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet.

  • 58

    DEFINE: loop

    deviates from the initial program path to some sort of logic condition, the computer repeats the task until a condition is met. Often implemented with For or While statements.

  • 59

    DEFINE: a 1998 United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization that criminalizes production and dissemination of technology, devices, or services intended to circumvent measures that control access to copyrighted works.

    The Digital Millennium Copyright Act (DMCA)

  • 60

    DEFINE: MAC Filtering

    the application of an access control list to a switch or access point so that only clients with approved MAC addresses connect.

  • 61

    DEFINE: Ransomware

    type of malware designed to deny access to a computer system or data until a ransom is paid.

  • 62

    DEFINE: Blocklist

    contains every address or port that is blocked from accessing the network.

  • 63

    DEFINE: allows the creation of single or multiple files, view file contents, concatenate files, and redirect output in the terminal to a file.

    cat command

  • 64

    DEFINE: Personally Identifiable Information (PII)

    data used to identify, contact, or locate an individual. Information such as social security number (SSN), name, date of birth, email address, telephone number, street address, and biometric data is considered PII.

  • 65

    DEFINE: a contract that outlines the detailed terms under which a service is provided, including reasons the contract may be terminated.

    Service Level Agreement (SLA)

  • 66

    DEFINE: a copyright protection technology for digital media.

    Digital Rights Management (DRM)

  • 67

    DEFINE: is used to query the domain name system (DNS) to obtain information about host addresses, mail exchanges, nameservers, and related information.

    dig command

  • 68

    DEFINE: Statement of Work / Scope of Work (SOW)

    a document that outlines all the work that is to be performed, as well as the agreed-upon deliverables and timelines.

  • 69

    Define: a portion of a private network connected to the Internet and protected against intrusion.

    Perimeter Network

  • 70

    Define: a network service provided by a router or proxy server to map private local addresses to one or more publicly accessible IP addresses.

    Network address translation (NAT)

  • 71

    DEFINE: a form of protection where only the items identified specifically on the list are allowed, whereas all others are denied.

    Allow List

  • 72

    DEFINE: in-place upgrade

    will preserve all of the user's files and applications during the upgrade process from Windows 10 to Windows 11.

  • 73

    Define: a protocol framework allowing network devices to autoconfigure services, such as allowing a games console to request appropriate settings from a firewall.

    Universal plug-and-play (UPnP)

  • 74

    DEFINE: Allow List

    a form of protection where only the items identified specifically on the list are allowed, whereas all others are denied.

  • 75

    Define UPnp:

    a protocol framework allowing network devices to autoconfigure services, such as allowing a games console to request appropriate settings from a firewall.

  • 76

    DEFINE: hard disk operation that makes recovering data from your storage devices difficult once the operation is complete.

    Low-level Formatting

  • 77

    DEFINE: Port Forwarding

    allows a router to take requests from the Internet for a particular application and send them to a designated host on the LAN.

  • 78

    DEFINE: a document that outlines all the work that is to be performed, as well as the agreed-upon deliverables and timelines.

    Statement of Work / Scope of Work (SOW)

  • 79

    DEFINE: constant

    a specific identifier that contains a value that cannot be changed within the program.

  • 80

    DEFINE: a software or operating system installation where the configuration information is derived from an input file.

    unattended installation

  • 81

    DEFINE: a preliminary or exploratory agreement to express an intent to work together that is not legally binding and does not involve monetary exchange.

    Memorandum of Understanding (MOU)

  • 82

    What does UPnp stand for?

    Universal plug-and-play

  • 83

    DEFINE: allows a router to take requests from the Internet for a particular application and send them to a designated host on the LAN.

    Port Forwarding

  • 84

    DEFINE: contains every address or port that is blocked from accessing the network.

    Blocklist

  • 85

    DEFINE: Remote Desktop Services (RDS)

    used to connect to a remote desktop session host servers or other remote computers, edit an existing remote desktop connection (rdp) configuration file, and migrate legacy connection files that were created with the client connection manager to the newer .rap connection file type.

  • 86

    DEFINE: malicious software designed to infect computer files or disks when it is activated.

    Virus

  • 87

    DEFINE: Degaussing

    exposes the disk to a powerful electromagnet that disrupts the magnetic pattern that stores the data on the disk surface.

  • 88

    DEFINE: MMC

    Microsoft Management Console

  • 89

    DEFINE: Least privilege

    is the concept and practice of restricting access rights for users, accounts, and computing processes to only those resources absolutely required to perform routine, legitimate activities.

  • 90

    Define: a protocol used to allocate IP addresses to a host when it joins a network.

    Dynamic Host Control Protocol (DHCP)