Documentation
A collection of vocabulary words and expansions on their definitions for the CompTIA certification shelf.
Lightweight Directory Access Protocol
A network protocol used to access network directory databases, which store information about auth...
Separation of Duties
A means of establishing checks and balances against the possibility that critical systems or proc...
Extensible Authentication Protocol
A framework for autonegotiation of secure authentication methods that use hardware identifiers li...
Attestation Report
A secure report that proves that a client is running an authorized OS and has up-to-date patches ...
Remote Authentication Dial In User Service
A client-server protocol that enables centralized management of user authentication and access co...
Perimeter Network
A type of network security zone where hosts that face the Internet are placed for secure external...
Screened Subnet
A network segment that's isolated from the rest of a private network by one or more firewalls tha...
Received Signal Strength Indicator
A measure of a wireless signal's strength as measured at the receiver, measured using either deci...
Dynamic Rate Selection
A mechanism used in wireless networks to select the data transmission rate at the physical layer ...
Service Set Identifier
A unique string used to identify wireless networks. SSIDs have a maximum length of 32 bytes, and ...
Temporal Key Integrity Protocol
A security protocol designed to enhance the security of WEP without introducing breaking changes.
Simultaneous Authentication of Equals
A password-based authentication and password-authenticated key agreement method. SAE is a variant...
IEEE 802.11r
An amendment to the normal 802.11 standard that enhances the ability of wireless devices to maint...
Internet Protocol Security
A network protocol suite used to secure data through authentication and encryption as the data tr...
Encapsulating Security Payload
aliases: ESP A core protocol of IPsec. ESP is used to encrypt only the payload, and do...
Application Header
aliases: AH A core protocol of IPSec. AH performs a cryptographic hash on the whole pa...
IEEE 802.11w
aliases: Management Frame Protection 802.11w MFP Management Frame Protection: a security feat...
Remote Desktop Protocol
aliases: RDP An application protocol for operating remote connections to a host using a graph...
Internet Key Exchange
A framework for creating a security association used with IPsec. Security associations (SAs) esta...
Request for Comment 1918
A standard defined by the IETF that defines private IPv4 address ranges.
Nmap Security Scanner
A widely used software tool used for IP scanning. Nmap requires at least the IP address or the su...
Discovery Protocols
An enumeration of some common host discovery protocols. Cisco Discovery Protocol Used in all Ci...
Cisco Discovery Protocol
A proprietary host discovery protocol used in all Cisco network appliances. CDP uses Data Link la...
Secure Erase
A command that sanitizes storage drives. SE has been a part of the SATA and SAS specifications si...
Logging Levels
An enumeration of the eight logging levels commonly used in computers. Name Description Level ...
Syslog
Application protocol and event logging format enabling different appliances and software applicat...
Simple Network Management Protocol
A commonly used framework for remote management and monitoring of servers and network appliances....
Management Information Base
A database that stores an SNMP agent's activity records and other parameters. Parameters are iden...
TCPDump
A Linux command-line packet capture utility. Basic Syntax tcpdump -i [eth0|any] Flags -w Write ou...
Random Early Detection
A packet dropping algorithm designed to avoid congestion and buffer filling using predictive mode...
Quality of Service
A traffic shaping mechanism that allows for fine-grained control over traffic parameters in a net...
IEEE 802.1p
A three-bit CoS priority field within the greater 802.1Q format running at layer 2. 802.1p can be...
Multiprotocol Label Switching
A routing technique that directs data based on labels rather than network addresses. Often used i...
Differentiated Service Framework
A header field used to indicate a priority value for an IP packet for QoS or CoS scheduling. Diff...
Honeypot
A host system or network (called a honeynet) to bait attackers into trying to exploit it. The att...
General Data Protection Regulation
Provisions and requirements protecting the personal data of EU citizens, disallowing the transfer...
John the Ripper Lab
Complete this lab as follows: Crack the root password on Support. From the Favorites bar, selec...
Zeroconf
A standards-based approach to technologies that allows hosts to obtain a usable network configura...
Terminal Access Controller Access Control System Plus
AAA protocol developed by Cisco used to authenticate to administrator accounts for network applia...
Security Assertion Markup Language
An XML-based data format used to exchange authentication information between a client and a servi...
Single Sign On
A networking mechanism that allows users to access multiple network resources while only having t...
MofN Control
M of N Control - An authorization method that requires $m$ amount of signatures from $n$ authoriz...
Precision Time Protocol
Higher accuracy network time synchronization protocol. Defined in IEEE 1588 standard. Designed f...
Digital Certificate
A set of authentication and identification information issued by a Certificate Authority. Digita...
Transport Layer Security
An authentication and encryption service for the TCP/IP stack. Developed from the now obsolete SS...
File Transfer Protocol
Application protocol used to transfer files between network hosts over ports 20 and 21. FTP is mo...
Uniform Resource Locator
A logical reference to a resource stored on a computer network, serving as a mechanism to retriev...
Hypertext Transfer Protocol
The foundation of web technology that serves website content to client browsers. Clients connec...
Time Division Multiplexing
A mechanism that allowed multiple communication lines to work over a single physical communicatio...
Internet Message Access Protocol
Application protocol used for mail storage and retrieval on a server. IMAP is used on 143/tcp and...
Simple Mail Transfer Protocol
Application protocol used to send mail between hosts on the internet. SMTP uses 25/tcp for messa...
Structured Query Language
The programming and query language for relational databases.
Network Attached Storage
A dedicated hardware device that provides general storage for an entire network. Usually made wit...
Session Initiation Protocol
Application protocol that manages VoIP and conferencing communications. SIP is responsible for m...
Realtime Transport Protocol
Network protocol responsible for delivering audio and video data over IP-based networks. RTP doe...
RTP Control Protocol
Network protocol responsible for the monitoring and feedback of realtime data communications used...
Load Balancer
A hardware appliance or software program that distributes incoming client requests across a set o...
Gateway Load Balancing Protocol
Cisco proprietary protocol designed to provide both redundancy and load balancing for IP traffic.
First Hop Redundancy Protocols
aliases: FHRP Networking technique that configures failover routers that serve as the d...
Virtual Router Redundancy Protocol
aliases: VRRP Open-source standard protocol for configuring failover routers. VRRP is ...
Hot Standby Router Protocol
aliases: HSRP Proprietary protocol developed by Cisco. Allows multiple physical routers to se...
Virtual IP Address
The public address of a load balanced cluster that is shared among the nodes. Also called a float...
Internet Service Provider
aliases: ISP A commercial (often subscription-based) company that offers access to the Intern...
MAC Address
Media Access Control address: a 48-bit hexadecimal number used to identify computer systems by th...
OSI Data Link Layer
The data link layer of the OSI reference model is responsible for transferring data between nodes...
OSI Physical Layer
The physical layer of the OSI reference model is responsible for the transmission and receipt ana...
OSI Network Layer
The network layer of the OSI reference model handles the moving of data between networks of netwo...
OSI Upper Layers
The upper layers of the OSI model just store collections of functions used commonly to interface ...
Cat 8
An unshielded twisted pair cable category that supports up to 40 Gbps. Cat 8 also includes Cat 8....
Cat 7
An unshielded twisted pair cabling category that supports up to 10 Gbps. Description 600 MHz GG4...
MMF Cables
A type of fiber optic cable that uses multiple central cores in order to facilitate multiplex tra...
Bidirectional WDM
A form of WDM that transmit and receive data over the same strand of fiber cabling. It uses sligh...
Coarse WDM
A form of WDM that supports up to 16 different wavelengths, used to deploy four or eight bidirect...
Dense WDM
A type of WDM that provisions a bigger number of channels (20-160 in increments of 20). There is ...
Attenuation
The loss of signal strength over a network medium. Attenuation is measured in decibels (dB), whi...
Virtual LAN
A logical network segment configured on a managed network switch. VLAN membership is configured b...
Port Statuses
An enumeration of all the LED colors you might see on a switch or router. Color Status Sol...
Routing Information Protocol
aliases: RIP A distance-vector routing protocol. RIP only considers a single metric: the next...
Border Gateway Protocol
aliases: BGP A specialized dynamic routing protocol for use in routing domains, interne...
Enhanced Interior Gateway Routing Protocol
aliases: EIGRP A distance-vector dynamic routing protocol. Unlike RIP, EIGRP uses two ...
Open Shortest Path First
aliases: OSPF A link-state dynamic routing protocol. OSPF stores the entire network to...
Network Time Protocol
aliases: NTP Network clock synchronization protocol. Designed to be used in packet-swi...
DHCP Relay
A function on routers that allows them to forward DHCP discover broadcast packets to DHCP servers...
Slateless Address Autoconfiguration
aliases: SLAAC A simpler approach to automatic address assignment in IPv6.
DNS Security Extensions
aliases: DNSSEC A spoofing and poisoning mitigation toolset via DNS request validation....
Multimeter
An electronic measuring instrument that combines several measurement functions into one piece of...
NTFS Permissions
A cumulative permissions system for granular control over folder and files used in the New-Techno...
Domain Name System
aliases: DNS The naming system used by computer networks to match human-readable domain names...
Encryption File System
aliases: EFS An obscure file system only supported by NTFS used for specific file encry...
Apple macOS
A proprietary, Unix-based operating system. Nobody really likes this one. Apple designed macOS fo...
Active Directory
A Windows 10 Pro feature that grants access to a program (of the same name) that'll manage user a...
Key Distribution Center
aliases: KDC A server agent that facilitates the distribution of cryptographic keys, often us...
Ticket Granting Ticket
aliases: TGT An access key granted to approved hosts to access network services or reso...
Kerberos
A network authentication protocol designed to provide secure authentication over unsecured networ...
GUID Partition Table
aliases: GPT A hard disk partition style that works by assigning UUIDs to partitions on...
Realtime OS
A type of operating system often used in embedded systems. Features: different algorithms embedd...
Application Specific Integrated Circuit
aliases: ASIC A type of microprocessor used in embedded systems designed to perform a single ...
Field Programable Gate Array
aliases: FPGA A type of microprocessor used in embedded systems that is configured by t...
SCADA Controller
Supervisory Control and Data Acquisition: a hardware device that monitors and controls PLC system...
Human Machine Interface
aliases: HMI A hardware device responsible for facilitating interaction between human users a...
Distributed Control System
A customizable set of packages that contain the needed components of an ICS. #XI
Modbus
A special network protocol that enables controller systems to communicate with one another. Modbu...
Programmable Logic Controller
aliases: PLC A core component of ICSs, a specialized controller programmed to perform specifi...
Bound Media
A form of networking medium that contains the communicated data stream within some sort of cable....
ext4
Fourth Extended File Table: an advanced Linux file system. Features: everything from ext2 and ex...
Microsoft Windows
aliases: Windows An operating system. Arguably the most known one. The GOAT, greatest of all ...
Local Area Network
aliases: LAN A small computer network confined to a specific geographical location. All of th...
Wide Area Network
aliases: WAN A network made up of smaller computer networks connected via long-distance links...
Master Boot Record
aliases: MBR A hard disk partition style that holds information about how the disk has it's p...
Windows Advanced Boot Options
An enumeration of the advanced boot options for Microsoft-Windows. Option Description Enab...
Unified Extensible Firmware Interface
aliases: UEFI The modern firmware developed to replace BIOS. Also responsible for managing th...
Radio Frequency Interference
aliases: RFI A form of interference that interfere with wireless networking. It's usually cau...
FAT32
File Allocation Table 32: file system introduced with Windows 95, replacing FAT16. Mainly used to...
Windows Workgroups
A Windows 10 feature that enables data transfer capabilities for workstations part of a small pri...
CDfs
A virtual Linux file system that enables the system to access individual data and audio tracks st...
Linux Supported File Systems
An enumeration of the common file systems used in Linux or Unix-based systems. File Systems ext2...
Extended File System
Extended File System: a file system originally designed for the Silicon Graphics IRIX OS, but sup...
VFAT
Virtual File Allocation Table: a FAT32-based file system for Linux. Features: no support for jou...
Network File System
aliases: NFS A distributed network file system protocol used in Linux or Unix-based systems. ...
ext3
Third Extended File Table an updated version of ext2 that supports journaling. #IX
ext2
Second Extended File Table: the oldest Linux file system. Features uses standard file hierarchy ...
B Tree File System
aliases: BTRFS B-Tree File System: a Linux file system with specialized features not found in...
Journaling
A mechanism in which file systems will log incomplete write operations into a "journal" file befo...
Windows File and Folder Attributes
An enumeration of the different flags and properties files can take in Windows-based systems. ...
Linux Change Mode
A specialized command-line utility in the Linux terminal used to edit permissions for files and d...
Linux Shell Commands
An enumeration of some commonly used shell commands in Linux or Unix-based systems. Command De...
Windows Share Permissions
An enumeration of the permission system Microsoft-Windows supports for files shared over a networ...
New Technology File System
aliases: NTFS The default file system used in Microsoft-Windows. Features larger partition s...
Rootkit
A malware program designed to give the attacker remote access and administrator privileges on Lin...
Clamav
An external, supplementary antivirus software program for Linux systems. Not generally needed sin...
Certificate of Destruction
aliases: COD A document that states a storage disk was properly destroyed by an outsourced, l...
Dumpster Diving
In this case, dumpster diving is when an attacker attempts to find sensitive data by going throug...
Windows Task Manager
A system utility on Windows-based systems that allows the user to monitor running programs and vi...
Windows System Information
A system utility on Windows-based systems that allows the user to view information about the hard...
Time Drift
A Windows condition where the system time is out of sync with the time server. There are several ...
Windows Control Panel
A system utility on Windows-based systems that allows the user to customize features of devices a...
DRM License Types
An enumeration of the different types of licenses people use to protect their digital property. ...
Windows Domains
A Windows 10 feature that enables groups of workstations to be connected and managed from a speci...
Domain Controller
A specialized server used to handle authentication requests and enforce security policies on work...
User Access Control
A Windows 10 feature that requests credentials for tasks that require privilege elevation from th...
Secure Shell
aliases: SSH A network protocol that enables the secure transfer of data between two clients ...
Windows Remote Desktop
A Windows 10 Pro feature that allows the user to take control of another workstation remotely ove...
Windows Remote Assistance
A Windows 10 Pro feature that allows users to gain limited remote access to another system with t...
macOS Screen Share
A feature on Apple-macOS versions X and later that allows for screen sharing between two Mac devi...
321 Backup Rule
A rule when performing system backups that states that an organization should keep three copies o...
Software
Software refers to the electronic instructions and data that will be used by the hardware. Softwa...
Basic Input Output System
aliases: BIOS A legacy firmware program stored in the Read-Only Memory of a computer system. ...
Windows Bootrec
A command-line utility used to help fix startup issues on Windows-based systems. Bootrec can be a...
Windows BCD
Boot Configuration Database: A detailed list of the programs the Windows OS is to load at boot ti...
Tailgating
A social engineering attack where the attacker gains access to a secured place simply by closely ...
Shoulder Surfing
A type of social engineering that allows the attacker to gain critical and/or sensitive informati...
Impersonation
A social engineering attack where the attacker attempts to gain access to secured data by pretend...
Evil Twin Attack
A type of social engineering attack where the attacker configures a rogue access point designed t...
Vishing
A type of social engineering attack where the attacker attempts to gain secured data or informati...
Denial of Service
aliases: DoS DDoS A type of web server threat that overwhelms the target server with loads of...
Cross site Scripting
A type of web server attack where the attacker exploits misconfigured input fields, inputting mal...
SQL Injection
A type of web server attack where the injects malicious SQL code into an input field in order to ...
On Path Attack
A type of web server attack where the attacker intercepts comms between two devices and modifies ...
Brute Force Attack
A password attack method where the attacker attempts to guess the password through trial and erro...
Insider Attack
A type of network attack where an active or former employee of an organization still has access t...
MAC Spoofing
A type of network attack where the attacker scans the network for valid MAC addresses, matches th...
Zero Day Attack
A type of network attack where the attacker exploits a vulnerability previously unknown to the ne...
Principle of Least Privilege
This principle states that users should only have enough permissions to do their job effectively,...
Master File Table
A database that stores information about all files and directories in the NTFS file system. It al...
Virus
A self-replicating type of malware that often mimic or attach to legitimate programs and hide ins...
Trojan Horse
A type of malware that provides an attacker remote access to an infected system. This program is ...
Keylogger
A type of malware that logs every keystroke a user makes and sends it back to the attacker. This ...
Spyware
A type of malware that's designed to collect information about the victim who's system got infect...
Ransomware
A malware program that forces the victim to either send a form of payment in order to decrypt the...
Cryptominer
A malware program that uses the resources of a system to mine cryptocurrency for the attacker.
Transparent Data Encryption
A form of database encryption that encrypts the entire database and all of its backups. TDE is ty...
Column Level Encryption
A form of database encryption that allows the database administrator to encrypt each column or se...
Application Level Encryption
A form of database encryption where the program that's used to create and manage the stored data ...
Personally Identifiable Information
aliases: PII Information about a person that can be used to compromise computer systems simpl...
BitLocker ToGo
A version of Windows-BitLocker that can be used for USB drives. #XIV
Windows BitLocker
A Windows 10 Pro feature that allows for the encryption of entire hard drives. BitLocker utilizes...
Standard ATX
A form factor specification for motherboards, defining them as 9.6 x 12 inch motherboards, and th...
NLX
An uncommon form factor specification for defining motherboard sizes, using a unique back panel d...
Riser Card
A hardware extension to a motherboard that allows for more expansion slots to be installed and co...
Hardware
A reference to the physical devices and circuits that make up the different parts of a computer s...
Multifactor Authentication
A form of user authentication that requires several methods instead of just one in order to grant...
Password Policy
A document that defines password requirements on company-owned systems. It specifies: Minimum le...
Physical Security Policy
A document that defines restricted areas within company premises, identifies which employees are ...
Network Medium
The physical channel through which data communications travel; the connecting method between netw...
Intrusion Detection System
A hardware device designed to monitor and protect computer networks from suspicious, malicious, a...
Liquid Crystal Display Monitor
A type of monitor that produces image by moving liquid crystals that block or allow light to pass...
Chain of Custody
A set of procedures defining how evidence is handled after a security breach in an enterprise set...
Payment Card Industry Data Security Standards
aliases: PCI DSS The legal standards for financial data storage at enterprise levels. There a...
Sarbanes Oxley Act of 2002
A congressional act that forces public companies to be transparent in regards to creating and mai...
Gramm Leach Bliley Act of 1999
A Congressional act that forces companies that offer loans, investment advice, or loans to adhere...
Port
A hardware piece on a computer where an electrical connector can be used to link the device to ot...
Phishing
The act of sending malicious messages intended to fool and/or manipulate a victim into giving up ...
Whaling
A specific type of phishing that targets high-value individuals within an organization, such as t...
Spear Phishing
A type of phishing where the attacker researches the target extensively to craft a personalized m...
Edge Technology
The first IoT layer. Refers to all the hardware parts in the IoT system. Primary Sensors These in...
RFID
A location service that triangulates a device's position relative to other radio sources (e.g. ce...
Network Tap
A hardware device used to collect data travelling across the network its connected to. The data c...
Cat 5
An unshielded twisted pair cable category that supports up to 100 Mbps Ethernet. Description RJ1...
Cat 6 Augmented
The better version of Cat-6. Provides better shielding and tighter cable twists, which reduces cr...
Serial Advanced Technology Attachment
aliases: SATA A type of port used to connect internal hard drives to the motherboard. It's da...
POST Beeps
Power-On Self Test: A legacy firmware system used to detect and inform the user of problems that ...
Patch Cable
A network cable used to connect computer systems to a network through a hub or switch. #III
T568B
A wiring standard for the RJ45 connector as defined by the order of the wires that connect to the...
ST Connector
A type of connector used to connect computer systems using fiber optic cabling. An ST connector: ...
Connector
An enumeration of all the different types of connectors listed in the A+ course. Connector Types ...
Interference
An analog signal that corrupts or destroys regular signals used by communicating devices on netwo...
Electromagnetic Interference
aliases: EMI A type of interference that affects wired network signals. EMI signals are emitt...
Random Access Memory
A storage sector in the computers hardware that houses stuff that the processor is immediately wo...
Mouse
A hardware device used to get input from the user, usually to interact with the GUI. A mouse can ...
Thunderbolt
A proprietary video port connector designed by Intel and Apple. It provides video, audio, DC powe...
PPPoE
Point-to-Point Protocol over Ethernet: an Internet protocol designed for Digital-Subscriber-Line ...
Digital Subscriber Line
aliases: DSL A service that provides Internet over telephone lines. There are two types of DS...
Crosstalk
A form of interference where signals transmitted on one cable escape and damage signals being tra...
Virtual Container
An alternative to virtual machines, which runs consistent runtime environments for specific progr...
Capacitor
A hardware device that stores an electrical charge. The basis for all computer systems. #II
Virtual Desktop Infrastructure
aliases: VDI A type of virtualization that uses remote connection to run multiple operating s...
Knowledge Base
A web-based collection of articles and documents related to an organization's FAQ. This collectio...
Acceptable Use Policy
aliases: AUP A security policy that dictates how an employee is permitted to use company prop...
User Education & Awareness Policy
A security policy that dictates a set of Internet safety guidelines that employees should follow ...
Network Node
Any hardware device that can connect to a computer network and interact with other devices connec...
Common Internet File System
aliases: CIFS A network file system protocol that allows user to access files and printers ov...
Electrostatic Discharge
aliases: ESD The discharge of accumulated static electricity from a non-grounded object to a ...
Private IP Ranges
An enumeration of the private IP addresses. Class A 10.0.0.0 - 10.255.255.255 Class B 172.16.0.0 ...
Public IP Ranges
An enumeration of all the public IP addresses. Class A 1.0.0.0 - 126.255.255.255 Class B 128.0.0....
Universal Serial Bus
aliases: USB A hardware port designed to be universal for anything and everything. USB provid...
Zigbee
A common short-range IoT communication protocol. Features open standard max distance of 60 feet ...
Z Wave
A common short-range IoT communication protocol. Features: closed standard, devices must meet se...
DisplayPort
aliases: DP A royalty-free, modern video connection port standard found mostly on PCs. Featur...
DIMM
The default Random-Access-Memory module used in desktops. DIMM RAM modules store data using a sin...
Electrically Erasable Programmable ROM
aliases: EEPROM Electrically Erasable Programmable Read-Only Memory: non-volatile memory that...
Unbound Media
A form of networking medium that doesn't physically contain the communicated data stream (e.g. wi...
Fiber Optic Media
An unbound networking medium that uses light waves and fiber optic cabling to transmit data. #III
Material Safety Datasheet
aliases: MSD A document that explains how to properly handle certain dangerous materials and ...
Asset
An item or piece of information that is valuable and is important to keep for an organization. #II
Magnetic Interference
A type of interference that's caused by strong magnetic impulses. It affects hard drives the most...
Organic Light Emitting Diodes
aliases: OLED A variant of LED that uses a different type of technology to produce a higher r...
Global System for Mobile Communication
aliases: GSM A mobile device authentication system that allows cellular network subscribers t...
Code Division Multiple Access
aliases: CDMA A mobile network authentication system that allows cellular network providers t...
Effective Isotropic Radiated Power
A measurement of the max amount of power an antenna can radiate in a specific direction.
User Datagram Protocol
aliases: UDP A connectionless protocol that sends packets to the receiver regardless of check...
Transmission Control Protocol
aliases: TCP Transmission Control Protocol: connection oriented data transfer protocol that e...
Internet Assigned Numbers Authority
The international governing body that manages all IP addresses used ever. IANA is owned by the In...
Automatic Private IP Addressing
An addressing system in place to use special IP addresses when something goes wrong with the DHCP...
Security Policy
A document or collection of documents that provide information about how the organization structu...
Top Level Domain
aliases: TLD The ending of most web domain names. Domain Purpose .org Non-Profit Organ...
DomainKeys Identified Mail
aliases: DKIM An email authentication protocol that detects and blocks spoofed emails by vali...
Sender Policy Framework
aliases: SPF An email authentication protocol detects and blocks spoofed emails by validating...
Domain based Message Authentication, Reporting, and Conformance
aliases: DMARC An email authentication protocol that combines the functionality of DKIM and S...
Mail Protocols
An enumeration and description of the three major email protocols. Sending and receiving emails i...
Dynamic Host Configuration Protocol
aliases: DHCP A system that automatically sets and manages network connection configuration s...
Access Gateway
The second IoT layer. Refers to the point where the analog/physical data captured by the edge tec...
Internet
The global computer network that communicates via standardized protocols. The third IoT layer. Re...
Middleware
The fourth IoT layer. Refers to the processing that happens after data captured and prepared by t...
Printer
A type of hardware that converts image and text files on a system and prints them onto a piece of...
Access Control List
aliases: ACL The most basic rulebook used in firewalls. Note: access control lists process r...
Firewall
A hardware device or software program that monitors and filters incoming and outgoing network tra...
Windows Network Locations
An enumeration of the network location profiles used in Microsoft Windows. They're used to set de...
Network Address Translation
A network protocol that is used to allow multiple computers to share a single public IP address f...
Backup Policy
The type of security policy that dictates how data backups are run at an organization. This inclu...
Asset Management Database
A database that stores information about assets procured and owned by an organization. Asset mana...
Brownout
Undervoltage that lasts seconds (lights may dim)
Blackout
Complete power failure.
Virtual Machine
A software implementation of a computer that executes programs just like a physical machine.
Hypervisor
A software layer used to run multiple operating systems concurrently on a single machine. It allo...
vRouter
Specialized software that assumes the responsibilities of a physical router for virtual machines.
vSwitch
Specialized software that enables communication between virtual machines by first checking the da...
Virtual Hard Disk
A file created within the host OS of a virtual machine that assumes the responsibilities of a phy...
Virtual Firewall Application
Specialized software that acts as a network firewall device for virtual machines. It provides pac...
Hyper V
A Windows 10 Pro feature that allows for virtual machines to be created on Windows, each running ...
Virtual Memory Manager
A mechanism in Microsoft Windows that automatically manages the swapping of data between physical...
Peripheral Devices
External components that send and/or retrieve data from a computer. Categories Input Output Inpu...
Keyboard
A hardware device used to receive (mostly) text-based input from the user. Keyboards connect thro...
Digitizer
A hardware device that captures an analog signal and turns it into digital data. Examples include...
Scanner
A hardware device used to scan hard-copy images and documents and convert them into digital files...
KVM Switch
A hardware device that allows multiple computer systems to be used with only one keyboard, mouse,...
Motion Sensor
A hardware device that's able to detect the slightest of movements within a preset area. Motion s...
Microphone
A hardware device that converts sound into an electrical signal.
Second Impact Dot Printers
A type of printer that converts text and image files and prints it onto a sheet of paper using so...
Near Field Communication
A communication protocol for mobile devices that facilitate data transfers. NFC is typically used...
(Evolved) High Speed Packet Access
Evolved High Speed Packet Access (HSPA+). An extension of the 3G cellular network technology. It ...
Multiple Input Multiple Output
An extension of the 3G cellular network technology, which uses smart antennas to improve the perf...
Long Term Evolution
An extension of the 3G cellular network technology. It increased downlink/uplink speeds to 100/50...
Long Term Evolution (Advanced)
Successor to LTE. Increased downlink/uplink speeds to 1 Gbps/500 Mbps.
Internet Assigned Numbers Authority
The international governing body that manages all IP addresses used ever. IANA is owned by the In...
Operating System
A collection of software on a computer that allows the user to access and use the computer's memo...
Interfaces
An OS component responsible for handling interaction between the user and the system. Command-Lin...
Group Policy Management
A Windows 10 Pro feature that enables administrative management features for use in an enterprise...
Group Policy Editor
A specialized software program installed on Microsoft-Windows machines, used to edit internal sys...
Samba
The Samba Project is the standard Windows interop suite for Linux and other Unix-based operating ...
Chrome OS
A proprietary operating system developed and owned by Google, based on Linux. Chrome OS offers a ...
Apple Keychain
The main password management tool used in macOS. Features: passwords for websites for system lo...
Universally Unique Identifier
aliases: UUID A 128-bit label used to identify objects in computer systems. Also known as Glo...
exFAT
A special file system designed for flash drives with large storage capacities (greater than 32 GB...
Graphical User Interface
aliases: GUI A software program that uses icons, menus, and other visual components to intera...
Policies
Rules and procedures that have been set by an organization to address a particular problem or con...
Procedure
A procedure defines a desired outcome, and outlines the steps that, when taken, should lead towar...
Purchase Order
A document that states a representative of an organization has permission to place an order and t...
Routers
An ethernet router is a device that connects two or more network segments or subnets. Common rout...
Server
Servers provide file storage, manage Active Directory, provide IP addresses using DHCP, and more....
Partitions
A logical division of the available space on a hard disk drive, carved out to save data. It can t...
Disk Status
An enumeration of all the disk and volume stati hehe fnuuy that can be displayed in the Disk Mana...
Cyclic Redundancy Check
A form of error-correcting code that's used to detect accidental changes or corruption in digital...
Filament
A 3D printing material made of a thermoplastic polymer. It comes in spools of different thickness...
Server Message Block
aliases: SMB A data transfer protocol that is responsible for client-server communications fo...
Windows Storage Spaces
A modern way of utilizing multiple physical storage devices to manage storage of large amounts of...
Mount Point
A directory used to add space to a storage device that is at it's maximum capacity, partitioned u...
Volumes
A single storage space within a computer, used to link multiple partitions together. The partitio...
Windows Installation Types
An enumeration of the different ways a user can install Microsoft-Windows onto their system. Ther...
Plenum
The spaces above false ceilings and below raised floors, usually used to wire electrical wiring f...
Standard Operating Procedure
Organizations establish a general procedure that overarches into most departments. It provides em...
Punch Down Tool
A tool that is used to secure cable wiring to a punch-down block or a patch panel. #I
Standby Power Supply
An offline hardware device that goes online to provide power when an undervoltage event occurs. #II
Offboarding
The process that is followed when an organization ends a partnership with an employee. This inclu...
Riser
A rating level for twisted-pair cables, designed to run between floors through open vertical shaf...
Non Disclosure Agreement
aliases: NDA A document that, when signed, restricts an employee from sharing sensitive infor...
SCSI Parallel Interface
A variation of the SCSI port that uses a parallel bus. It has 50, 60, and 80 pin connectors on ri...
Support Ticket
Tickets are digital files that record issues and their resolutions for organizations to solve and...
POST Card
A hardware extension used to troubleshoot motherboard issues when video displays are down. L bozo...
SRAM
A type of Random-Access-Memory that stores data using four transistors for every bit of data. #III
ROM
Readonly version of RAM. Stores important functions for the computer.
Throttling
The process of modifying the operating characteristics of a processor based on current conditions...
Overclocking
An act that pushes a processor beyond it's designed specifications. #III
Serial Attached SCSI Ports
A serial protocol for SCSI commands, the replacement for Parallel SCSI. It has throughput speeds ...
SODIMM
Small Outline Dual Inline Memory Module: A smaller type of Random-Access-Memory module that has u...
Sampling Rate
The sampling rate is the number of analog signal samples taken over a period of time. Measured in...
Power Inverter
A form of power supply that converts the DC power in a computer to AC power for a screen. #XII
PCI Express
aliases: PCIe One of the faster expansion bus types, one of the children of Peripheral-Compon...
Ink Cartridge
The main consumable component in any printer. It's a reservoir that carries ink or toner for use ...
Firmware
Software written to the Read-Only Memory of a PC. Used to help the system start up, help manage c...
End of Life
aliases: EOL A term used to describe software that will no longer be maintained or updated by...
Kernel
The most basic component of an operating system, serving as the core of the OS. Responsible for r...
Content Addressable Memory
A table stored in network switches that stores information about the MAC addresses of the hosts i...
Cat 6
A unshielded twisted pair cable category that supports up to 10 Gbps. Description RJ45-Connector...
SMF Cables
A type of fiber optic cable that transfers data only using a single light ray, used for high tran...
RG 59 Coaxial Cable
A type of coaxial cable that is used for video transmission in CCTV systems, formerly used to tra...
Network Hub
The predecessor to the network switch. A network hub only works at the Physical layer. It forward...
RG 6 Coaxial Cable
A coaxial cable specification used for cable TV, satellite TV, and broadband cable internet. They...
Containment Cladding Layer
A special layer used in fiber optic cabling used to prevent stray light waves from exiting the ca...
Patch Panel
A patch panel provides an easy way to connect devices and accommodate different types of cabling,...
SC Connector
A type of connector used to connect computer systems using fiber optic cabling. An SC connector: ...
Coaxial Cables
An EMI resistant, sturdy cable type used to transmit radio signals, digital audio, TV cabling, ph...
Network Switch
An ethernet switch lets you connect multiple devices to the same network segment, but does NOT co...
Fiber Optic Cable
A type of network cable that uses light to transmit data in a glass or plastic cable. Wavelength ...
IPv6 Address Prefixes
An enumeration of the most common v6 address prefixes and their uses. Type Prefix Leading Hex ...
T568A
A wiring standard for the RJ45 connector as defined by the order of the wires that connect to the...
OSI Transport Layer
The transport layer is responsible for organizing incoming data packets using their content, and ...
Power Surge
A moment of increased voltage being provided to the systems connected to a power supply, lasting ...
Power Spike
A moment of increased voltage being provided to the systems connected to a power supply, lasting ...
Power Sag
A moment of decreased voltage being provided to the systems connected to a power supply. e.g. 110...
Surge Protector
A piece of hardware that filters power surges before they reach connected systems, along with pow...
Surge Suppressor
A piece of hardware that filters power surges before they reach connected systems, along with con...
Time Domain Reflectometer
A type of cable tester that uses time domain reflectometry to characterize and locate faults on m...
RJ45 Connector
A common type of connector used to connect devices to twisted pair cables. RJ45 Connectors: have...
Serial Port
A type of port used to connect serial devices to a computer system, like a barcode scanner. Also ...
Linux IP Address Config Example
Step-by-step tutorial for Linux static IP configuration. View the current state of the network ...
Address Resolution Protocol
A Layer 2 protocol that enables hosts to map IP addresses to MAC addresses in their local network...
Virtual Private Network
A type of network that uses encryption to forward IP traffic over a TCP/IP network. Tunneling pr...
Network Interface Card
aliases: NIC A hardware device responsible for managing the communication between a PC system...
Onboarding
The process that is followed when an organization enters a partnership with a new employee. This ...
Optical Time Domain Reflectometer
A type of time domain reflectometer that is used with optical fiber. #II
Network Rack
#I Component Visualization A = Ethernet routerB = Ethernet switchC = Ethernet patch panelD...
Peripheral Component Interconnect
aliases: PCI The most common expansion bus type, with three generations, PCIe x16 being the f...
Linux
An operating system. The grandfather of the Big Three. An open-source, Unix-like OS. Anyone is fr...
Small Computer System Interface Port
aliases: SCSI A type of port used to connect internal hard drives to the computer system. It'...
Cat 5 Enhanced
The better version of Cat-5, since it provides better EMI protection. Description RJ45-Connector...
Cable
An enumeration every single cable type listed in the A+ course. Network Cables Copper Cabling C...
RJ11 Connector
A deprecated type of connector used to connect devices to twisted pair cables. RJ11 Connectors: ...
Twisted Pair Cable
A type of network cable that twists the wires in order to achieve better performance. There are t...
Rivest-Shamir-Adleman
A commonly used asymmetric encryption algorithm used for creating digital signatures.
Elliptic Curve Cryptography
A more modern asymmetric encryption algorithm. ECC is able to generate smaller keys and is more ...
Diffie-Hellman
An asymmetric encryption algorithm created to let two users that are stranger to each other to sa...
Digital Signature Algorithm
A more modern asymmetric encryption algorithm.
Fast Identity Online
An open standard for passwordless authentication. The latest version of FIDO (FIDO2) relies on W...
Windows Software Update Services
A patch management tool that allows client on a network to download software updates from an inte...
Identity Services Engine
A Cisco-owned NAC solution that uses policy-driven decision making to authenticate and authorize ...
OSINT
Open Source Intelligence A collection of resources and tools that are separated by common catego...
theHarvester
A passive reconnaissance tool. theHarvester is used to gather information from a variety of publ...
Shodan
A popular search engine for IoT devices. Users are able to search for specific types off devices...
Dnsenum
A reconnaissance tool that performs DNS enumeration, and can find records and entries for a speci...
Scanless
A method of port scanning that uses publicly available exploitation detection sites to preserve a...
Sn1per
An automated scanner that can be used to enumerate and search for specific vulnerabilities. Sn1p...
Nessus
A proprietary vulnerability scanner developed by Tenable.