IT Power Words
Butler Tech IT Lab
Thursday, October 15, 2020
Spaceman
Rules
Spaceman Rules - Alternative to Hangman1 - Draw Spaceship Base
2,3,4 - Draw 3 engines
5 - Draw Spaceship Top
6,7,8 - Draw 3 Windows
9 - Finally Draw Antennae to allow the spaceship to radio home and fly away
Pictionary
Website
https://quickdraw.withgoogle.com/
Rules
- Take turns assigning a player that will be asked to draw the image on the board
- Teammates now can start guessing the word
- The other teammates have to guess the right word in the stipulated time to get a point.
- Once the answer is guessed the next player will draw the image
Tuesday, April 7, 2020
Index
A+
Chapter 1 - The Path of the PC TechDefined
Blank
Chapter 2 - Operational Procedures
Defined
Blank
Chapter 3 - The Visible Computer
Defined
Blank
Chapter 4 - Microprocessors
Defined
Blank
Chapter 5 - RAM
Defined
Blank
Chapter 6 - BIOS
Defined
Blank
Chapter 7 - Motherboards
Defined
Blank
Chapter 8 - Power Supplies
Defined
Blank
Chapter 9 - Hard Drive Technologies
Defined
Blank
Chapter 10 - Implementing Hard Drives
Defined
Blank
Chapter 11 - Essential Peripherals
Defined
Blank
Chapter 12 - Building a PC
Defined
Blank
Chapter 13 - Windows Under the Hood
Defined
Blank
Chapter 14 - Users, Groups. and Permissions
Defined
Blank
Chapter 15 - Maintaining and Optimizing Operating Systems
Defined
Blank
Chapter 16 - Working with the Command-Line Interface
Defined
Blank
Chapter 17 - Troubleshooting Operating Systems
Defined
Blank
Chapter 18 - Virtualization
Defined
Blank
Chapter 19 - Display Technologies
Defined
Blank
Chapter 20 - Essentials of Networking
Defined
Blank
Chapter 21 - Local Area Networking
Defined
Blank
Chapter 22 - Wireless Networking
Defined
Blank
Chapter 23 - The Internet
Defined
Blank
Chapter 24 - Portable Computing
Defined
Blank
Chapter 25 - Understanding Mobile Devices
Defined
Blank
Chapter 26 - Care and Feeding of Mobile Devices
Defined Coming Soon
Blank Coming Soon
Chapter 27 - Printers and Multi-function Devices
Defined
Blank
Chapter 28 - Securing Computers
Defined
Blank
Network+
Chapter 3
Defined
Blank
Chapter 4A
Defined
Blank
Chapter 4B
Defined
Blank
Chapter 5A
Defined
Blank
Chapter 5B
Defined
Blank
Chapter 6A
Defined
Blank
Chapter 6B
Defined
Blank
Chapter 7A
Defined
Blank
Chapter 7B
Defined
Blank
Chapter 8A
Defined
Blank
Chapter 8B
Defined
Blank
Chapter 9A
Defined
Blank
Chapter 9B
Defined
Blank
Chapter 10
Defined
Blank
Chapter 11A
Defined
Blank
Chapter 11B
Defined
Blank
Chapter 12A
Defined
Blank
Chapter 12B
Defined
Blank
Chapter 13
Defined
Blank
Chapter 14
Defined
Blank
Chapter 15
Defined
Blank
Chapter 16
Defined
Blank
Chapter 17
Defined
Blank
Chapter 18
Defined
Blank
Chapter 19
Defined
Blank
Chapter 20
Defined
Blank
Chapter 21
Defined
Blank
Defined
Blank
Chapter 4A
Defined
Blank
Chapter 4B
Defined
Blank
Chapter 5A
Defined
Blank
Chapter 5B
Defined
Blank
Chapter 6A
Defined
Blank
Chapter 6B
Defined
Blank
Chapter 7A
Defined
Blank
Chapter 7B
Defined
Blank
Chapter 8A
Defined
Blank
Chapter 8B
Defined
Blank
Chapter 9A
Defined
Blank
Chapter 9B
Defined
Blank
Chapter 10
Defined
Blank
Chapter 11A
Defined
Blank
Chapter 11B
Defined
Blank
Chapter 12A
Defined
Blank
Chapter 12B
Defined
Blank
Chapter 13
Defined
Blank
Chapter 14
Defined
Blank
Chapter 15
Defined
Blank
Chapter 16
Defined
Blank
Chapter 17
Defined
Blank
Chapter 18
Defined
Blank
Chapter 19
Defined
Blank
Chapter 20
Defined
Blank
Chapter 21
Defined
Blank
Thursday, March 12, 2020
Network+ Chapter 19 Power Words - Defined
Chapter 19 - Protecting Your Network
1. Mantrap: A mantrap is a small room with an entry door on one wall and an exit door on the opposite wall.
2. Monlist: A debugging command that allows to retrieve information from the monitoring facility about traffic associated with the NTP service.
3. NAC: An approach to computer security that attempts to unify endpoint security technology.
4. Network-Based anti-malware: The broadening use of social media, messaging and other, non-work related applications introduces a variety of vectors that can be used to propagate viruses, spyware, worms and other types of malware.
5. Network-based firewall: controls traffic going in and out of a network.
6. Network Closet: a closet or a small room where electrical wiring and computer networking hardware is installed.
7. Non-persistent agent: a software the client runs as they are connecting so the agent can perform the checks, but the software does not permanently stay with the client after they disconnect.
8. Ntpdc: used to query the ntpd daemon about its current state and to request changes in that state.
9. OUI: the first 24 bits of a MAC address for a network-connected device, which indicate the specific vendor for that device.
10. Outbound traffic: In the view of a server firewall, inbound means other server or client in front of the wall, initiate connection with own server.
11. PDos: an attack that damages a system so badly that it requires replacement or reinstallation of hardware.
12. Persistent agent: a software updater utility designed to keep the program up to date.
13. Phishing: the fraudulent use of electronic communications to deceive and take advantage of users.
14. Posture Assessment: refers to the act of applying a set of rules to the posture data to provide an assessment of the level of trust that you can place in that endpoint.
15. Proximity Reader: transmit a low-level fixed radio frequency (RF) signal that provides energy to the card.
16. Quarantine Network: a set of services and utilities available for Windows Server 2003 that lets you prevent remote users from connecting to your network with machines that aren't up to date and secure by quarantining them in a secured area
17. Reddit Effect: more users on each side result in more possible network connections the platform can provide.
18. Reflection: the process of accessing information about loaded assemblies and the types defined therein to create, invoke and access type instances at run time programmatically.
19. Cipher lock – Used to limit control accesses
20. Cleartext credential – A password stored in clear text.
21. Closed circuit television – Used as security cameras that can send information between each other.
22. Cloud - virtual server run in a cloud environment
23. DZ - Demilitarized zone
24. DOS – Denial of service
25. DHCP snooping – Layer 2 technology used to prevent unauthorized access.
26. DDOS – Distributed denial of service
27. DAC – Door access control
28. DAI – Dynamic ARP inspection
29. Edge – The limit that can be set for browsing.
30. Effective permission – Set of permissions to access a file in particular.
31. External firewall – Used to block access from the external instead of the internal
32. Fail close – The valve will close when signal is lost.
33. Fail open – The valve will remain open when the signal is lost.
34. Fault tolerance – How much impact the fault can take.
35. Firewall - Used to block out unauthorized connections.
36. Guest network – A Access point for your router.
37. Hardening – Reduces security risk by eliminating surface of vulnerability
38. Hardware Appliance – A device that has a specific purpose or use.
39. Honeynet – A network set up with intentional vulnerabilities
40. Honeypot – A place to which people are attracted
41. Host-Based Anti-Malware – A two component product used to detect threats and malware
42. Host-Based Firewall – A product used to prevent viruses.
43. Implicit Deny Any – When a user or group is not given specific permissions
44. Inbound Traffic – Internet traffic coming into a machine
45. Inheritance – A feature that represents the “is a” relationship between classes
46. Internal Firewall – An anti-malware system put in place on the inside of a machine
47. IP Camera – A camera that receives control data
48. Key Fob – Displays a randomly generated access code, which changes periodically
49. Keypad – A pad that has keys on it, usually numerical or alphabetical
50. Macro – A single instruction that expands automatically into a set of instruction to do something
51. Malicious Employee – An employee that improperly uses a computer in the network
52. Malicious User – An end user with a malicious intent or with a malicious program attached to their machine
53. Malware – A malicious software, program, or virus
54. Man-In-The-Middle – like monkey in the middle, but with emails and data, but the man in the middle is hidden, usually
55. Reddit effect – state of mind of short time
56. Quarantine network – set of services for windows services
57. Proximity reader – it reads proximities in a lot of different ways
58. Posture assessment – a assessment for your posture
59. Pashing – it’s a type of security
60. Persistent agent – a agent that helps you and is persistent
61. Permanent dos – it slows down the systems hardware
62. Outbound traffic – things not going well and aren’t moving in the right direction and it backed up
63. OUI – it identifies any problems or any sort of help you may need
64. Ntpdc – a certain command that you will need to use often
65. Non-persistent agent – a agent that isn’t very persistent and isn’t very useful and you won’t need it
66. Network closet – a closet of electrical wiring and servers
67.Network based firewall – it blocks viruses from harming your computer
68. Anti-malware – detects malicious software
69. Nac – controls the network access
70. Mon list – it means to be alone
71. Mantrap – a trap for catching and giving viruses
77. Reflection: the process of accessing information about loaded assemblies and the types defined therein to create, invoke and access type instances at run time programmatically.
73. Threat – a POTENTIAL attack against the network.
74. TEMPEST – standards developed by the NSA for defining how to protect signals being sent and received.
75. Tail gating – when an unauthorized person enters the building by pretending to be an employee.
76. Stateless inspection - An older firewall where the packets were looked at but not in relation to one another.
77. Stateful inspection – capability to tell if a packet has relations to others being sent.
78. Spyware – any program that sends information about your computer.
79. Spoofing – the process of pretending to be someone else by sending false information in one or more packets.
80. Reflection – A mirror of one component or another
81. RF emanation – Any modulated signal (sound or electromagnetic radiation) leaking from a device that may be used to reconstruct information being processed or transmitted by that device.
82. Rootkit – software used by a hacker to gain constant administrator-level access to a computer or network.
83. Security Guard – an organization's strategy that enables guaranteeing the security of its assets including all network traffic.
84. Services – a structure that brings together several entities to deliver a particular service.
85. Session Hijacking – the exploitation of a valid computer session—sometimes also called a session key- to gain unauthorized access to information or services in a computer system.
86. Signature – a process that guarantees that the contents of a message have not been altered in transit.
87. Slash dotting – occurs when a popular website links to a smaller website, causing a massive increase in traffic.
88. Social Engineering – an attack vector that relies heavily on human interaction and often involves manipulating people into breaking normal security procedures and best practices in order to gain access to systems, networks or physical locations, or for financial gain.
89. SOHO firewall – designed for small company or home networks, typically less than 25 computers.
90. Smurf attack - An early form of a DoS attack.
91. Traffic spike – A spike in traffic
92. Trojan horse - A type of malware that is often disguised as legitimate software.
93. Trusted user – A user that is trusted
94. Unencrypted user - A user that is unencrypted
95. Unified Threat Management (UTM) - a term first used by IDC to describe a category of security appliances which integrates a range of security features into a single appliance
96. Untrusted user – A user that is untrusted
97. Video monitoring – Monitoring video
98. Virus - a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code
99. Virus shield – A shield for a virus
100. VLAN hopping – Virtual Local Area Network hopping
101. Vulnerability - A weakness which can be exploited by a threat actor, such as an attacker, to perform unauthorized actions within a computer system
102. Worm - A standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers
103. Zero-day attack - A computer-software vulnerability that is unknown to, or unaddressed by, those who should be interested in mitigating the vulnerability
104. zombie - A computer connected to the Internet that has been compromised by a hacker, computer virus or trojan horse program and can be used to perform malicious tasks of one sort or another under remote direction.
2. Monlist: A debugging command that allows to retrieve information from the monitoring facility about traffic associated with the NTP service.
3. NAC: An approach to computer security that attempts to unify endpoint security technology.
4. Network-Based anti-malware: The broadening use of social media, messaging and other, non-work related applications introduces a variety of vectors that can be used to propagate viruses, spyware, worms and other types of malware.
5. Network-based firewall: controls traffic going in and out of a network.
6. Network Closet: a closet or a small room where electrical wiring and computer networking hardware is installed.
7. Non-persistent agent: a software the client runs as they are connecting so the agent can perform the checks, but the software does not permanently stay with the client after they disconnect.
8. Ntpdc: used to query the ntpd daemon about its current state and to request changes in that state.
9. OUI: the first 24 bits of a MAC address for a network-connected device, which indicate the specific vendor for that device.
10. Outbound traffic: In the view of a server firewall, inbound means other server or client in front of the wall, initiate connection with own server.
11. PDos: an attack that damages a system so badly that it requires replacement or reinstallation of hardware.
12. Persistent agent: a software updater utility designed to keep the program up to date.
13. Phishing: the fraudulent use of electronic communications to deceive and take advantage of users.
14. Posture Assessment: refers to the act of applying a set of rules to the posture data to provide an assessment of the level of trust that you can place in that endpoint.
15. Proximity Reader: transmit a low-level fixed radio frequency (RF) signal that provides energy to the card.
16. Quarantine Network: a set of services and utilities available for Windows Server 2003 that lets you prevent remote users from connecting to your network with machines that aren't up to date and secure by quarantining them in a secured area
17. Reddit Effect: more users on each side result in more possible network connections the platform can provide.
18. Reflection: the process of accessing information about loaded assemblies and the types defined therein to create, invoke and access type instances at run time programmatically.
19. Cipher lock – Used to limit control accesses
20. Cleartext credential – A password stored in clear text.
21. Closed circuit television – Used as security cameras that can send information between each other.
22. Cloud - virtual server run in a cloud environment
23. DZ - Demilitarized zone
24. DOS – Denial of service
25. DHCP snooping – Layer 2 technology used to prevent unauthorized access.
26. DDOS – Distributed denial of service
27. DAC – Door access control
28. DAI – Dynamic ARP inspection
29. Edge – The limit that can be set for browsing.
30. Effective permission – Set of permissions to access a file in particular.
31. External firewall – Used to block access from the external instead of the internal
32. Fail close – The valve will close when signal is lost.
33. Fail open – The valve will remain open when the signal is lost.
34. Fault tolerance – How much impact the fault can take.
35. Firewall - Used to block out unauthorized connections.
36. Guest network – A Access point for your router.
37. Hardening – Reduces security risk by eliminating surface of vulnerability
38. Hardware Appliance – A device that has a specific purpose or use.
39. Honeynet – A network set up with intentional vulnerabilities
40. Honeypot – A place to which people are attracted
41. Host-Based Anti-Malware – A two component product used to detect threats and malware
42. Host-Based Firewall – A product used to prevent viruses.
43. Implicit Deny Any – When a user or group is not given specific permissions
44. Inbound Traffic – Internet traffic coming into a machine
45. Inheritance – A feature that represents the “is a” relationship between classes
46. Internal Firewall – An anti-malware system put in place on the inside of a machine
47. IP Camera – A camera that receives control data
48. Key Fob – Displays a randomly generated access code, which changes periodically
49. Keypad – A pad that has keys on it, usually numerical or alphabetical
50. Macro – A single instruction that expands automatically into a set of instruction to do something
51. Malicious Employee – An employee that improperly uses a computer in the network
52. Malicious User – An end user with a malicious intent or with a malicious program attached to their machine
53. Malware – A malicious software, program, or virus
54. Man-In-The-Middle – like monkey in the middle, but with emails and data, but the man in the middle is hidden, usually
55. Reddit effect – state of mind of short time
56. Quarantine network – set of services for windows services
57. Proximity reader – it reads proximities in a lot of different ways
58. Posture assessment – a assessment for your posture
59. Pashing – it’s a type of security
60. Persistent agent – a agent that helps you and is persistent
61. Permanent dos – it slows down the systems hardware
62. Outbound traffic – things not going well and aren’t moving in the right direction and it backed up
63. OUI – it identifies any problems or any sort of help you may need
64. Ntpdc – a certain command that you will need to use often
65. Non-persistent agent – a agent that isn’t very persistent and isn’t very useful and you won’t need it
66. Network closet – a closet of electrical wiring and servers
67.Network based firewall – it blocks viruses from harming your computer
68. Anti-malware – detects malicious software
69. Nac – controls the network access
70. Mon list – it means to be alone
71. Mantrap – a trap for catching and giving viruses
77. Reflection: the process of accessing information about loaded assemblies and the types defined therein to create, invoke and access type instances at run time programmatically.
73. Threat – a POTENTIAL attack against the network.
74. TEMPEST – standards developed by the NSA for defining how to protect signals being sent and received.
75. Tail gating – when an unauthorized person enters the building by pretending to be an employee.
76. Stateless inspection - An older firewall where the packets were looked at but not in relation to one another.
77. Stateful inspection – capability to tell if a packet has relations to others being sent.
78. Spyware – any program that sends information about your computer.
79. Spoofing – the process of pretending to be someone else by sending false information in one or more packets.
80. Reflection – A mirror of one component or another
81. RF emanation – Any modulated signal (sound or electromagnetic radiation) leaking from a device that may be used to reconstruct information being processed or transmitted by that device.
82. Rootkit – software used by a hacker to gain constant administrator-level access to a computer or network.
83. Security Guard – an organization's strategy that enables guaranteeing the security of its assets including all network traffic.
84. Services – a structure that brings together several entities to deliver a particular service.
85. Session Hijacking – the exploitation of a valid computer session—sometimes also called a session key- to gain unauthorized access to information or services in a computer system.
86. Signature – a process that guarantees that the contents of a message have not been altered in transit.
87. Slash dotting – occurs when a popular website links to a smaller website, causing a massive increase in traffic.
88. Social Engineering – an attack vector that relies heavily on human interaction and often involves manipulating people into breaking normal security procedures and best practices in order to gain access to systems, networks or physical locations, or for financial gain.
89. SOHO firewall – designed for small company or home networks, typically less than 25 computers.
90. Smurf attack - An early form of a DoS attack.
91. Traffic spike – A spike in traffic
92. Trojan horse - A type of malware that is often disguised as legitimate software.
93. Trusted user – A user that is trusted
94. Unencrypted user - A user that is unencrypted
95. Unified Threat Management (UTM) - a term first used by IDC to describe a category of security appliances which integrates a range of security features into a single appliance
96. Untrusted user – A user that is untrusted
97. Video monitoring – Monitoring video
98. Virus - a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code
99. Virus shield – A shield for a virus
100. VLAN hopping – Virtual Local Area Network hopping
101. Vulnerability - A weakness which can be exploited by a threat actor, such as an attacker, to perform unauthorized actions within a computer system
102. Worm - A standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers
103. Zero-day attack - A computer-software vulnerability that is unknown to, or unaddressed by, those who should be interested in mitigating the vulnerability
104. zombie - A computer connected to the Internet that has been compromised by a hacker, computer virus or trojan horse program and can be used to perform malicious tasks of one sort or another under remote direction.
Subscribe to:
Posts (Atom)