記憶度
13問
33問
0問
0問
0問
アカウント登録して、解答結果を保存しよう
問題一覧
1
DEFINE: the application of an access control list to a switch or access point so that only clients with approved MAC addresses connect.
MAC Filtering
2
DEFINE: exposes the disk to a powerful electromagnet that disrupts the magnetic pattern that stores the data on the disk surface.
Degaussing
3
DEFINE: comment
written into the code to help a human understand the initial programmer's logic.
4
DEFINE: RegEdit
Registry Editor
5
DEFINE: is a security framework that requires all users, whether in or outside the organization's network, to be authenticated, authorized, and continuously validated for security configuration and posture before being granted or keeping access to applications and data.
Zero-trust
6
DEFINE: The Microsoft Management Console (MMC)
a utility that uses snap-ins for various Windows tools such as disk management, computer management, performance monitor, print management, and others to perform operations on a local or networked computer.
7
DEFINE: is an approach to cybersecurity in which a series of defensive mechanisms are layered to protect valuable data and information.
Defense in Depth
8
DEFINE: type of malware designed to deny access to a computer system or data until a ransom is paid.
Ransomware
9
DEFINE: Memorandum of Understanding
a preliminary or exploratory agreement to express an intent to work together that is not legally binding and does not involve monetary exchange.
10
DEFINE: a placeholder in a script containing a number, character, or string of characters.
variable
11
DEFINE: is a command-line utility for searching plain-text data sets for lines that match a regular expression.
grep command
12
DEFINE: MSConfig
a system utility to troubleshoot the Microsoft Windows startup processes.
13
What was the perimeter network formally called?
The Demilitarized Zone or DMZ
14
What does NAT stand for?
Network Address Translation
15
DEFINE: Zero-trust
is a security framework that requires all users, whether in or outside the organization's network, to be authenticated, authorized, and continuously validated for security configuration and posture before being granted or keeping access to applications and data.
16
DEFINE: Virus
malicious software designed to infect computer files or disks when it is activated.
17
DEFINE: Standard Formatting
allows the data to be restored and make the data vulnerable to exposure.
18
DEFINE: Registry Editor (RegEdit)
allows you to view and make changes to system files and programs that you wouldn't be able to access otherwise.
19
DEFINE: Acceptable Use Policy (AUP)
is a set of rules applied by the owner, creator, or administrator of a network, website, or service, that restrict how the network, website, or system may be used and sets guidelines as to how it should be used.
20
DEFINE: Trojan
type of malware that looks legitimate but can take control of your computer.
21
DEFINE: lists the files or directories in the current path of a Unix, Linux, or Mac operating system. When invoked without any arguments, this command lists the files in the current working directory.
Is command
22
DEFINE: is a set of rules applied by the owner, creator, or administrator of a network, website, or service, that restrict how the network, website, or system may be used and sets guidelines as to how it should be used.
Acceptable Use Policy (AUP)
23
DEFINE: AUP
Acceptable Use Policy
24
Define NAT:
a network service provided by a router or proxy server to map private local addresses to one or more publicly accessible IP addresses.
25
DEFINE: is the concept and practice of restricting access rights for users, accounts, and computing processes to only those resources absolutely required to perform routine, legitimate activities.
Least privilege
26
Define: DHCP
a protocol used to allocate IP addresses to a host when it joins a network.
27
Define Perimeter Network:
a portion of a private network connected to the Internet and protected against intrusion.
28
DEFINE: allows the data to be restored and make the data vulnerable to exposure.
Standard Formatting
29
What is the “cat command” short for:
Concatenate
30
DEFINE: MOU
Memorandum of Understanding
31
DEFINE: SLA
Service Level Agreement
32
DEFINE: a specific identifier that contains a value that cannot be changed within the program.
constant
33
DEFINE: Is command
lists the files or directories in the current path of a Unix, Linux, or Mac operating system. When invoked without any arguments, Is lists the files in the current working directory.
34
DEFINE: Defense in Depth
is an approach to cybersecurity in which a series of defensive mechanisms are layered to protect valuable data and information.
35
DEFINE: The Digital Millennium Copyright Act (DMCA)
a 1998 United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization that criminalizes production and dissemination of technology, devices, or services intended to circumvent measures that control access to copyrighted works.
36
DEFINE: a standalone malware computer program that replicates itself to spread to other computers.
Worm
37
DEFINE: written into the code to help a human understand the initial programmer's logic.
comment
38
DEFINE: Low-level Formatting
hard disk operation that makes recovering data from your storage devices difficult once the operation is complete.
39
DEFINE: grep command
is a command-line utility for searching plain-text data sets for lines that match a regular expression.
40
DEFINE: variable
a placeholder in a script containing a number, character, or string of characters.
41
DEFINE: Digital Rights Management (DRM)
a copyright protection technology for digital media.
42
DEFINE: RDS
Remote Desktop Services
43
DEFINE: AUP
Acceptable Use Policy
44
DEFINE: SOW
Statement of Work, Scope of Work
45
DEFINE: dig command
is used to query the domain name system (DNS) to obtain information about host addresses, mail exchanges, nameservers, and related information.
46
DEFINE: type of malware that looks legitimate but can take control of your computer.
Trojan
47
DEFINE: operation that drills holes through the hard drive platters, making the recovery of data more difficult.
Drill Formatting
48
DEFINE: deviates from the initial program path to some sort of logic condition, the computer repeats the task until a condition is met. Often implemented with For or While statements.
loop
49
DEFINE: Worm
a standalone malware computer program that replicates itself to spread to other computers.
50
DEFINE: Drill Formatting
operation that drills holes through the hard drive platters, making the recovery of data more difficult.
51
DEFINE: a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet.
Acceptable Use Policy (AUP)
52
DEFINE: DMCA
Digital Millennium Copyright Act
53
DEFINE: DRM
Digital Rights Management
54
DEFINE: cat command
allows the creation of single or multiple files, view file contents, concatenate files, and redirect output in the terminal to a file.
55
DEFINE: a type of installation that attempts to replace the existing version of the operating system files with a new copy of the same version. A repair installation is useful when trying to repair a Windows computer that will not boot or when you believe the system files have become corrupted.
Repair installation
56
DEFINE: Service Level Agreement (SLA)
a contract that outlines the detailed terms under which a service is provided, including reasons the contract may be terminated.
57
DEFINE: Acceptable Use Policy (AUP)
a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet.
58
DEFINE: loop
deviates from the initial program path to some sort of logic condition, the computer repeats the task until a condition is met. Often implemented with For or While statements.
59
DEFINE: a 1998 United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization that criminalizes production and dissemination of technology, devices, or services intended to circumvent measures that control access to copyrighted works.
The Digital Millennium Copyright Act (DMCA)
60
DEFINE: MAC Filtering
the application of an access control list to a switch or access point so that only clients with approved MAC addresses connect.
61
DEFINE: Ransomware
type of malware designed to deny access to a computer system or data until a ransom is paid.
62
DEFINE: Blocklist
contains every address or port that is blocked from accessing the network.
63
DEFINE: allows the creation of single or multiple files, view file contents, concatenate files, and redirect output in the terminal to a file.
cat command
64
DEFINE: Personally Identifiable Information (PII)
data used to identify, contact, or locate an individual. Information such as social security number (SSN), name, date of birth, email address, telephone number, street address, and biometric data is considered PII.
65
DEFINE: a contract that outlines the detailed terms under which a service is provided, including reasons the contract may be terminated.
Service Level Agreement (SLA)
66
DEFINE: a copyright protection technology for digital media.
Digital Rights Management (DRM)
67
DEFINE: is used to query the domain name system (DNS) to obtain information about host addresses, mail exchanges, nameservers, and related information.
dig command
68
DEFINE: Statement of Work / Scope of Work (SOW)
a document that outlines all the work that is to be performed, as well as the agreed-upon deliverables and timelines.
69
Define: a portion of a private network connected to the Internet and protected against intrusion.
Perimeter Network
70
Define: a network service provided by a router or proxy server to map private local addresses to one or more publicly accessible IP addresses.
Network address translation (NAT)
71
DEFINE: a form of protection where only the items identified specifically on the list are allowed, whereas all others are denied.
Allow List
72
DEFINE: in-place upgrade
will preserve all of the user's files and applications during the upgrade process from Windows 10 to Windows 11.
73
Define: a protocol framework allowing network devices to autoconfigure services, such as allowing a games console to request appropriate settings from a firewall.
Universal plug-and-play (UPnP)
74
DEFINE: Allow List
a form of protection where only the items identified specifically on the list are allowed, whereas all others are denied.
75
Define UPnp:
a protocol framework allowing network devices to autoconfigure services, such as allowing a games console to request appropriate settings from a firewall.
76
DEFINE: hard disk operation that makes recovering data from your storage devices difficult once the operation is complete.
Low-level Formatting
77
DEFINE: Port Forwarding
allows a router to take requests from the Internet for a particular application and send them to a designated host on the LAN.
78
DEFINE: a document that outlines all the work that is to be performed, as well as the agreed-upon deliverables and timelines.
Statement of Work / Scope of Work (SOW)
79
DEFINE: constant
a specific identifier that contains a value that cannot be changed within the program.
80
DEFINE: a software or operating system installation where the configuration information is derived from an input file.
unattended installation
81
DEFINE: a preliminary or exploratory agreement to express an intent to work together that is not legally binding and does not involve monetary exchange.
Memorandum of Understanding (MOU)
82
What does UPnp stand for?
Universal plug-and-play
83
DEFINE: allows a router to take requests from the Internet for a particular application and send them to a designated host on the LAN.
Port Forwarding
84
DEFINE: contains every address or port that is blocked from accessing the network.
Blocklist
85
DEFINE: Remote Desktop Services (RDS)
used to connect to a remote desktop session host servers or other remote computers, edit an existing remote desktop connection (rdp) configuration file, and migrate legacy connection files that were created with the client connection manager to the newer .rap connection file type.
86
DEFINE: malicious software designed to infect computer files or disks when it is activated.
Virus
87
DEFINE: Degaussing
exposes the disk to a powerful electromagnet that disrupts the magnetic pattern that stores the data on the disk surface.
88
DEFINE: MMC
Microsoft Management Console
89
DEFINE: Least privilege
is the concept and practice of restricting access rights for users, accounts, and computing processes to only those resources absolutely required to perform routine, legitimate activities.
90
Define: a protocol used to allocate IP addresses to a host when it joins a network.
Dynamic Host Control Protocol (DHCP)