記憶度
13問
33問
0問
0問
0問
アカウント登録して、解答結果を保存しよう
問題一覧
1
What does NAT stand for?
Network Address Translation
2
Define NAT:
a network service provided by a router or proxy server to map private local addresses to one or more publicly accessible IP addresses.
3
What does UPnp stand for?
Universal plug-and-play
4
Define UPnp:
a protocol framework allowing network devices to autoconfigure services, such as allowing a games console to request appropriate settings from a firewall.
5
What was the perimeter network formally called?
The Demilitarized Zone or DMZ
6
Define Perimeter Network:
a portion of a private network connected to the Internet and protected against intrusion.
7
Define: a network service provided by a router or proxy server to map private local addresses to one or more publicly accessible IP addresses.
Network address translation (NAT)
8
Define: a protocol used to allocate IP addresses to a host when it joins a network.
Dynamic Host Control Protocol (DHCP)
9
Define: a protocol framework allowing network devices to autoconfigure services, such as allowing a games console to request appropriate settings from a firewall.
Universal plug-and-play (UPnP)
10
Define: a portion of a private network connected to the Internet and protected against intrusion.
Perimeter Network
11
Define: DHCP
a protocol used to allocate IP addresses to a host when it joins a network.
12
DEFINE: AUP
Acceptable Use Policy
13
DEFINE: DRM
Digital Rights Management
14
DEFINE: DMCA
Digital Millennium Copyright Act
15
DEFINE: Acceptable Use Policy (AUP)
a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet.
16
DEFINE: Digital Rights Management (DRM)
a copyright protection technology for digital media.
17
DEFINE: The Digital Millennium Copyright Act (DMCA)
a 1998 United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization that criminalizes production and dissemination of technology, devices, or services intended to circumvent measures that control access to copyrighted works.
18
DEFINE: Personally Identifiable Information (PII)
data used to identify, contact, or locate an individual. Information such as social security number (SSN), name, date of birth, email address, telephone number, street address, and biometric data is considered PII.
19
DEFINE: a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet.
Acceptable Use Policy (AUP)
20
DEFINE: a copyright protection technology for digital media.
Digital Rights Management (DRM)
21
DEFINE: a 1998 United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization that criminalizes production and dissemination of technology, devices, or services intended to circumvent measures that control access to copyrighted works.
The Digital Millennium Copyright Act (DMCA)
22
DEFINE: Degaussing
exposes the disk to a powerful electromagnet that disrupts the magnetic pattern that stores the data on the disk surface.
23
DEFINE: Standard Formatting
allows the data to be restored and make the data vulnerable to exposure.
24
DEFINE: Low-level Formatting
hard disk operation that makes recovering data from your storage devices difficult once the operation is complete.
25
DEFINE: Drill Formatting
operation that drills holes through the hard drive platters, making the recovery of data more difficult.
26
DEFINE: exposes the disk to a powerful electromagnet that disrupts the magnetic pattern that stores the data on the disk surface.
Degaussing
27
DEFINE: allows the data to be restored and make the data vulnerable to exposure.
Standard Formatting
28
DEFINE: hard disk operation that makes recovering data from your storage devices difficult once the operation is complete.
Low-level Formatting
29
DEFINE: operation that drills holes through the hard drive platters, making the recovery of data more difficult.
Drill Formatting
30
DEFINE: constant
a specific identifier that contains a value that cannot be changed within the program.
31
DEFINE: comment
written into the code to help a human understand the initial programmer's logic.
32
DEFINE: variable
a placeholder in a script containing a number, character, or string of characters.
33
DEFINE: loop
deviates from the initial program path to some sort of logic condition, the computer repeats the task until a condition is met. Often implemented with For or While statements.
34
DEFINE: a specific identifier that contains a value that cannot be changed within the program.
constant
35
DEFINE: written into the code to help a human understand the initial programmer's logic.
comment
36
DEFINE: a placeholder in a script containing a number, character, or string of characters.
variable
37
DEFINE: deviates from the initial program path to some sort of logic condition, the computer repeats the task until a condition is met. Often implemented with For or While statements.
loop
38
DEFINE: SLA
Service Level Agreement
39
DEFINE: SOW
Statement of Work, Scope of Work
40
DEFINE: MOU
Memorandum of Understanding
41
DEFINE: Service Level Agreement (SLA)
a contract that outlines the detailed terms under which a service is provided, including reasons the contract may be terminated.
42
DEFINE: Statement of Work / Scope of Work (SOW)
a document that outlines all the work that is to be performed, as well as the agreed-upon deliverables and timelines.
43
DEFINE: Memorandum of Understanding
a preliminary or exploratory agreement to express an intent to work together that is not legally binding and does not involve monetary exchange.
44
DEFINE: a contract that outlines the detailed terms under which a service is provided, including reasons the contract may be terminated.
Service Level Agreement (SLA)
45
DEFINE: a document that outlines all the work that is to be performed, as well as the agreed-upon deliverables and timelines.
Statement of Work / Scope of Work (SOW)
46
DEFINE: a preliminary or exploratory agreement to express an intent to work together that is not legally binding and does not involve monetary exchange.
Memorandum of Understanding (MOU)
47
DEFINE: in-place upgrade
will preserve all of the user's files and applications during the upgrade process from Windows 10 to Windows 11.
48
DEFINE: a software or operating system installation where the configuration information is derived from an input file.
unattended installation
49
DEFINE: a type of installation that attempts to replace the existing version of the operating system files with a new copy of the same version. A repair installation is useful when trying to repair a Windows computer that will not boot or when you believe the system files have become corrupted.
Repair installation
50
DEFINE: RegEdit
Registry Editor
51
DEFINE: Registry Editor (RegEdit)
allows you to view and make changes to system files and programs that you wouldn't be able to access otherwise.
52
DEFINE: MSConfig
a system utility to troubleshoot the Microsoft Windows startup processes.
53
DEFINE: Remote Desktop Services (RDS)
used to connect to a remote desktop session host servers or other remote computers, edit an existing remote desktop connection (rdp) configuration file, and migrate legacy connection files that were created with the client connection manager to the newer .rap connection file type.
54
DEFINE: MMC
Microsoft Management Console
55
DEFINE: The Microsoft Management Console (MMC)
a utility that uses snap-ins for various Windows tools such as disk management, computer management, performance monitor, print management, and others to perform operations on a local or networked computer.
56
DEFINE: RDS
Remote Desktop Services
57
DEFINE: Least privilege
is the concept and practice of restricting access rights for users, accounts, and computing processes to only those resources absolutely required to perform routine, legitimate activities.
58
DEFINE: Zero-trust
is a security framework that requires all users, whether in or outside the organization's network, to be authenticated, authorized, and continuously validated for security configuration and posture before being granted or keeping access to applications and data.
59
DEFINE: Defense in Depth
is an approach to cybersecurity in which a series of defensive mechanisms are layered to protect valuable data and information.
60
DEFINE: AUP
Acceptable Use Policy
61
DEFINE: Acceptable Use Policy (AUP)
is a set of rules applied by the owner, creator, or administrator of a network, website, or service, that restrict how the network, website, or system may be used and sets guidelines as to how it should be used.
62
DEFINE: is the concept and practice of restricting access rights for users, accounts, and computing processes to only those resources absolutely required to perform routine, legitimate activities.
Least privilege
63
DEFINE: is a security framework that requires all users, whether in or outside the organization's network, to be authenticated, authorized, and continuously validated for security configuration and posture before being granted or keeping access to applications and data.
Zero-trust
64
DEFINE: is an approach to cybersecurity in which a series of defensive mechanisms are layered to protect valuable data and information.
Defense in Depth
65
DEFINE: is a set of rules applied by the owner, creator, or administrator of a network, website, or service, that restrict how the network, website, or system may be used and sets guidelines as to how it should be used.
Acceptable Use Policy (AUP)
66
DEFINE: MAC Filtering
the application of an access control list to a switch or access point so that only clients with approved MAC addresses connect.
67
DEFINE: Port Forwarding
allows a router to take requests from the Internet for a particular application and send them to a designated host on the LAN.
68
DEFINE: Allow List
a form of protection where only the items identified specifically on the list are allowed, whereas all others are denied.
69
DEFINE: Blocklist
contains every address or port that is blocked from accessing the network.
70
DEFINE: the application of an access control list to a switch or access point so that only clients with approved MAC addresses connect.
MAC Filtering
71
DEFINE: allows a router to take requests from the Internet for a particular application and send them to a designated host on the LAN.
Port Forwarding
72
DEFINE: a form of protection where only the items identified specifically on the list are allowed, whereas all others are denied.
Allow List
73
DEFINE: contains every address or port that is blocked from accessing the network.
Blocklist
74
What is the “cat command” short for:
Concatenate
75
DEFINE: cat command
allows the creation of single or multiple files, view file contents, concatenate files, and redirect output in the terminal to a file.
76
DEFINE: grep command
is a command-line utility for searching plain-text data sets for lines that match a regular expression.
77
DEFINE: dig command
is used to query the domain name system (DNS) to obtain information about host addresses, mail exchanges, nameservers, and related information.
78
DEFINE: Is command
lists the files or directories in the current path of a Unix, Linux, or Mac operating system. When invoked without any arguments, Is lists the files in the current working directory.
79
DEFINE: allows the creation of single or multiple files, view file contents, concatenate files, and redirect output in the terminal to a file.
cat command
80
DEFINE: is a command-line utility for searching plain-text data sets for lines that match a regular expression.
grep command
81
DEFINE: is used to query the domain name system (DNS) to obtain information about host addresses, mail exchanges, nameservers, and related information.
dig command
82
DEFINE: lists the files or directories in the current path of a Unix, Linux, or Mac operating system. When invoked without any arguments, this command lists the files in the current working directory.
Is command
83
DEFINE: Worm
a standalone malware computer program that replicates itself to spread to other computers.
84
DEFINE: Virus
malicious software designed to infect computer files or disks when it is activated.
85
DEFINE: Trojan
type of malware that looks legitimate but can take control of your computer.
86
DEFINE: Ransomware
type of malware designed to deny access to a computer system or data until a ransom is paid.
87
DEFINE: a standalone malware computer program that replicates itself to spread to other computers.
Worm
88
DEFINE: malicious software designed to infect computer files or disks when it is activated.
Virus
89
DEFINE: type of malware that looks legitimate but can take control of your computer.
Trojan
90
DEFINE: type of malware designed to deny access to a computer system or data until a ransom is paid.
Ransomware