Shared Flashcard Set

Details

CompTia A+
Chapter 19 - Guide to Managing and Maintaining Your PC
55
Computer Networking
Professional
02/28/2013

Additional Computer Networking Flashcards

 


 

Cards

Term
administrator account
Definition
In Windows 2000/XP/Vista, an account that grants to the administrator(s) rights and permissions to all hardware and software resources, such as the right to add, delete, and change accounts and to change hardware configurations.
Term
adware
Definition
Software installed on a computer that produces pop-up ads using your browser; the ads are often based on your browsing habits.
Term
antivirus (AV) software
Definition
Utility programs that prevent infection or scan a system to detect and remove viruses. McAfee Associates' VirusScan and Norton AntiVirus are two popular AV packages.
Term
authentication
Definition
The process of proving an individual is who they say they are before they are allowed access to a computer, file, folder, or network. The process might use a password, PIN, smart card, or biometric data.
Term
authorization
Definition
Controlling what an individual can or cannot do with resources on a computer network. Using Windows, authorization is granted by the rights assigned to user accounts and permissions assigned to computer resources.
Term
backdoor
Definition
A hidden way to allow malware to reach the system in secret even after the malware has been removed.
Term
backup operator
Definition
A Windows user account that can back up and restore any files on the system regardless of its having access to these files.
Term
BitLocker Encryption
Definition
A utility in Windows Vista Ultimate and Enterprise editions that is used to lock down a hard drive by encrypting the entire Vista volume and any other volume on the drive.
Term
boot sector virus
Definition
An infectious program that can replace the boot program with a modified, infected version, often causing boot and data retrieval problems.
Term
browser hijacker
Definition
A malicious program that infects your Web browser and can change your home page or browser settings. It can also redirect your browser to unwanted sites, produce pop-up ads, and set unwanted bookmarks. Also called a home page hijacker.
Term
CHAP (Challenge Handshake Authentication Protocol)
Definition
A protocol used to encrypt account names and passwords that are sent to a network controller for validation.
Term
data classifications
Definition
Categories of data used to determine who owns the data and who needs what type of access to it.
Term
digital certificate
Definition
A code used to authenticate the source of a file or document or to identify and authenticate a person or organization sending data over a network. The code is assigned by a certificate authority such as VeriSign and includes a public key for encryption. Also called digital ID or digital signature.
Term
drive lock password
Definition
A password stored on a hard drive. You must enter the password at startup before you can access data on the drive. The password is set using BIOS setup screens.
Term
Encrypted File System (EFS)
Definition
A way to use a key to encode a file or folder on an NTFS volume to protect sensitive data. Because it is an integrated system service, EFS is transparent to users and applications.
Term
encryption
Definition
The process of putting readable data into an encoded form that can only be decoded
(or decrypted) through use of a key.
Term
file virus
Definition
A virus that inserts virus code into an executable program file and can spread whenever that program is executed.
Term
grayware
Definition
A program that AV software recognizes to be potentially harmful or potentially unwanted.
Term
guest account
Definition
A user account that has limited permissions on a system and cannot make changes to it. Guest user accounts are intended for onetime or infrequent users of a workstation.
Term
incident report
Definition
A report your organization might require to report unusual or atypical events.
Term
infestation
Definition
Any unwanted program that is transmitted to a computer without the user's knowledge and that is designed to do varying degrees of damage to data and software. There are a number of different types of infestations, including viruses, Trojan horses, worms, and logic bombs. See malicious software.
Term
Kerberos
Definition
A protocol used to encrypt account names and passwords that are sent to a network controller for validation. Kerberos is the default protocol used by Windows 2000/XP/Vista.
Term
key fob
Definition
A device, such as a type of smart card, that can fit conveniently on a key chain.
Term
keylogger
Definition
A type of spyware that tracks your keystrokes, including passwords, chat room sessions, e-mail messages, documents, online purchases, and anything else you type on your PC. Text is logged to a text file and transmitted over the Internet without your knowledge.
Term
limited account
Definition
Windows XP user accounts known as Users in Windows 2000, which have read-write access only on their own folders, read-only access to most system folders, and no access to other users' data. In Windows Vista, a standard account is a limited account
Term
logic bomb
Definition
A type of malicious software that is dormant code added to software and triggered at a predetermined time or by a predetermined event.
Term
macro
Definition
A small sequence of commands, contained
within a document, that can be automatically executed when the document is loaded, or
executed later by using a predetermined
keystroke.
Term
macro viruses
Definition
A virus that can hide in the macros of a document file.
Term
malicious software
Definition
Any unwanted program that is transmitted to a computer without the user's knowledge and that is designed to do varying degrees of damage to data and software. Types of infestations include viruses, Trojan horses, worms, adware, spyware, keyloggers, browser hijackers, dialers, and downloaders. Also called malware or an infestation.
Term
malware
Definition
See malicious software. Any unwanted program that is transmitted to a computer without the user's knowledge and that is designed to do varying degrees of damage to data and software. Types of infestations include viruses, Trojan horses, worms, adware, spyware, keyloggers, browser hijackers, dialers, and downloaders. Also called malware or an infestation.
Term
multipartite virus
Definition
A combination of a boot sector virus and a file virus. It can hide in either type of program.
Term
network drive map
Definition
Mounting a drive to a computer, such as drive E, that is actually hard drive space on another host computer on the network.
Term
passphrase
Definition
A type of password that can contain a phrase where spaces are allowed. A passphrase is stronger than a one-word password.
Term
password reset disk
Definition
A device that holds a copy of the Windows password. Vista allows the device to be a flash media, but XP expects the device to be a floppy disk.
Term
permissions
Definition
Refer to the user accounts or user groups allowed to access data. Varying degrees of access can be assigned to a folder or file including full control, write, delete, or read-only.
Term
phishing - (1)
Definition
A type of identity theft where a person is baited into giving personal data to a Web site that appears to be the Web site of a reputable company with which the person has an account. (2) Sending an e-mail message with the intent of getting the user to reveal private information that can be used for identify theft.
Term
PKI (Public-key Infrastructure
Definition
The standards used to encrypt, transport, and validate digital certificates over the Internet.
Term
power user account
Definition
A Windows XP account type that can read from and write to parts of the system other than the user's own folders, install applications, and perform limited administrative tasks.
Term
Public Key Encryption
Definition
An encryption technology that uses a public key and private key. The public key must be shared with others so they can use it to encrypt data that you can later decrypt by using your private key.
Term
rootkit
Definition
A type of malicious software that loads itself
before the OS boot is complete and can hijack internal Windows components so that it masks information Windows provides to user-mode utilities such as Windows Explorer or Task Manager.
Term
scam e-mail
Definition
E-mail sent by a scam artist intended to lure you into a scheme.
Term
script virus
Definition
A type of virus that hides in a script which might execute when you click a link on a Web page or in an HTML e-mail message, or when you attempt to open an e-mail attachment.
Term
smart card
Definition
Any small device that contains authentication information that can be keyed into a logon window or read by a reader to authenticate a user on a network.
Term
smart card reader
Definition
A device that can read a smart card used to authenticate a person onto a network.
Term
social engineering
Definition
The practice of tricking people into giving out private information or allowing unsafe programs into the network or computer.
Term
spam
Definition
Junk e-mail you don't ask for, don't want, and
that gets in your way.
Term
spyware
Definition
Malicious software that installs itself on your computer to spy on you. It collects personal information about you that it transmits over the Internet to Web-hosting sites that intend to use your personal data for harm.
Term
standard account
Definition
The Vista user account type that can use software and hardware and make some system changes, but cannot make changes that affect the security of the system or other users.
Term
strong password
Definition
A password that is not easy to guess.
Term
TPM (Trusted Platform Module) chip
Definition
A chip on a motherboard that holds an encryption key required at startup to access encrypted data on the hard drive. Vista BitLocker Encryption can use the TPM chip
Term
Trojan horse
Definition
A type of infestation that hides or disguises itself as a useful program, yet is designed to cause damage when executed.
Term
virus
Definition
A program that often has an incubation period, is infectious, and is intended to cause damage. A virus program might destroy data and programs or damage a disk drive's boot sector.
Term
virus hoax
Definition
E-mail that does damage by tempting you to forward it to everyone in your e-mail address book with the intent of clogging up e-mail systems or by persuading you to delete a critical Windows system file by convincing you the file is malicious.
Term
worm
Definition
An infestation designed to copy itself repeatedly to memory, on drive space or on a network, until little memory, disk space, or
network bandwidth remains.
Term
zero-fill utility
Definition
A utility provided by a hard drive manufacturer that fills every sector on the drive with zeroes.
Supporting users have an ad free experience!