Thursday, February 27, 2020

Network+ Chapter 18 Power Words - Defined

Chapter 18 – Managing Risk
Blank
  1. Acceptable Group Policy - a feature of the Microsoft Windows NT family of operating systems that controls the working environment of user accounts and computer accounts
  2. Aircrack-ng - a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs. It works with any wireless network interface controller whose driver supports raw monitoring mode and can sniff 802.11a, 802.11b and 802.11g traffic
  3. Approval Process - the method an organization uses to approve anything from documents, invoices, budgets, and purchase orders, to a new process that a company wants to institute
  4. Archive - place or store (something)
  5. Backup - an extra copy of data from a computer
  6. Business Continuity Plan (BCP) - the process of creating systems of prevention and recovery to deal with potential threats to a company. In addition to prevention, the goal is to enable ongoing operations before and during execution of disaster recovery
  7. Chain of custody -  a document that is borrowed from law enforcement that tracks evidence from the time the Computer Forensics Examiner gains possession of the item until it is released back to the owner
  8. Change management - the control of the supply chain as a process from supplier to manufacturer to wholesaler to retailer to consumer. ... In computing, SCM typically is used in reference to software applications that enable more efficient management of the supply chain
  9. Change management team – Team that does change management
  10. Change request - a message sent between objects.
  11. Cold site -  a business location that is used for backup in the event of a disruptive operational disaster at the normal business site.
  12. Computer forensics – forensics on a computer
  13. Contingency plan - A plan involving suitable backups, immediate actions and longer term measures for responding to computer emergencies such as attacks or accidental disasters. ... Also called a "disaster plan," a contingency plan must be updated periodically
  14. Disaster recovery – Recovery for a disaster
  15. Documentation – Recording what has been done
  16. Electronic discovery - refers to any process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case
  17. Electrostatic discharge (ESD) – Discharge that can harm you from working on computers 
  18. Exit plan – Plan for exit
  19. Fail closed  - is when a device or system is set, either physically or via software, to shut down and prevent further operation when failure conditions are detected
  20. Fail open - does not shut down when failure conditions are present. Instead, the system remains “open” and operations continue as if the system were not even in place. This strategy is used when access is deemed more important that authentication
  21. First responder – First people to respond to an emergency
  22. Forensics report – Report from forensics
  23. Ground loop -  occurs when two points of a circuit both intended to be at ground reference potential have a potential between them.
  24. Heating, ventilation, and air conditioning (HVAC) – Cooling and heating systems
  25. High availability (HA) – Availability that is high
  26. Hot site -  a commercial disaster recovery service that allows a business to continue computer and network operations in the event of a computer or equipment disaster
  27. Incident - an event that is not part of normal operations that disrupts operational processes
  28. Incident response – Response to an incident 
  29. Legal hold -  a situation wherein a business or organization makes changes to its method of records management in order to preserve information because of a pending litigation
  30. Maintenance window – Windows for maintenance
  31. Material safety data sheet (MSDS) – Data sheet that shows safety for materials
  32. Memorandum of understanding (MOU) - A metric used to compute billing and/or statistics for telephone calls or other network use
  33. Metasploit - An open source attack framework 
  34. Microsoft baseline security analyzer (MBSA) – Baseline security analyzer developed by Microsoft
  35. Multi-source agreement (MSA) – Agreement with multiple sources
  36. Nessus - an open-source network vulnerability scanner that uses the Common Vulnerabilities and Exposures architecture for easy cross-linking between compliant security tools
  37. Network access policy – Access policy for a network
  38. Nmap -  a free and open-source network scanner
  39. Penetration testing (PENTEST) – testing on a device to see if it can be penetrated or not
  40. Recovery point objective (RPO) – Objective for recovery points
  41. Recovery time objective (RTO) – Objective for time points
  42. Risk management - the process of identifying, assessing and controlling threats to an organization's capital and earnings
  43. Security policy – Policy for security
  44. Service level agreement (SLA) – Level agreement for services 
  45. Single point of failure – Point where the failure occurs
  46. Statement of work (SOW) - a document that enables offeror's to clearly understand the government's needs for the work to be done in developing or producing the goods or services to be delivered by a contractor
  47. Succession planning – Planning for succession
  48. Virtual IP – Virtual Internet Protocol 
  49. Vulnerability management – Management for vulnerability 
  50. Vulnerability scanner – Scanner that scans for vulnerability in your device
  51. Warm site -  a type of facility an organization uses to recover its technology infrastructure when its primary data center goes down


Network+ Chapter 21 Power Words - Blank


 Network+ Chapter 21 Power Words - Network Troubleshooting

Defined

ARP
Arping
Broadcast Storm
Cable Stripper
Cable Tester
Certifier
Dig
End-to-end principle
EoP
Hardware Tool
HEC
Hostname
IEEE 1905.1-
Ifconfig
IoT
Ip- Linux 
Ipconfig-
Light Meter
Line Tester
Link Aggregation
Looking Glass Site
Multimeter
Mtr
Nbtstat
Netstat
Network Appliance
NIC teaming
NSlookup
nVoy
Optical Power Meter
Packet Sniffer
Pathping
Ping
Ping -6
Ping6
Port Scanner
Protocol Analyzer
Proxy ARP
Punchdown Tool
Route
Routing Loop
Snip
Speed-test Site
Switching Loop
Temperature Monitor
Tone Generator
Tone Probe
Traceroute
Traceroute6
Tracert
Tracert-6
Voltage Event Recorder
Wireshark


Network+ Chapter 11B Power Words - Blank

Network+ Chapter 11B Power Words

Defined
  1. Integrity
  2. IAS
  3. IPsec
  4. Kerberos
  5. KDC
  6. Key pair
  7. LDAP
  8. LEAP
  9. MIB
  10. MAC
  11. MD5
  12. MS-CHAP
  13. Multifactor Authentication
  14. NAS
  15. NCP
  16. NTP
  17. Nonrepudiation
  18. OpenSSH
  19. PAP
  20. Plaintext
  21. PPP
  22. PEAP
  23. SSL
  24. SNMP
  25. Single Sign-on
  26. Stream Cipher
  27. Symmetric-key Algorithm
  28. TACACS+-
  29. TGT
  30. TLS
  31. Tunnel
  32. Two-factor Authorization




Network+ Chapter 6B Power Words - Blank

Network+ Chapter 6B
  1. Near End Crosswalk 
  2. Race way 
  3. Run 
  4. Solid Core 
  5. Split Pair
  6. Punch down tool 
  7. Wire map 
  8. Work Area 
  9. Patch panel 
  10. Patch Cables 
  11. Smart Jacks 
  12. Stranded core –
  13. Solid Core 
  14. Near End Crosswalk 
  15. Unit 
  16. Split Paire.
  17. Punch down tool 
  18. Wire map 
  19. Work Area 
  20. Near End Crosswalk 



Network+ Chapter 13 Power Words - Blank

Chapter 13- IPv6
  1. 4to6 
  2. 6in4
  3. 6to4 
  4. Aggregation
  5. Anycast
  6. EUI-64 
  7. Global Unicast broadcast 
  8. IPV4 
  9. IPV6 
  10. Interface identifier
  11.  Mired

Network+ Chapter 12B Power Words - Blank

Chapter 12b – Advanced Networking Devices
Defined
  1. Out-of-brand Management
  2. Peer-to-Peer
  3. Point-To-Point Tunneling Protocol (PPTP)
  4. Port Authentication
  5. Port Mirroring
  6. Proxy Server
  7. Quality of Service (QoS)
  8. Reverse Proxy Server
  9. Routing and Remote Access Service (RRAS)
  10. Site-to-Site
  11. SSL VPN
  12. Traffic Shaping
  13. Trunk Port
  14. Trunking
  15. Virtual Local Area Network (VLAN)
  16. Virtual Private Network (VPN)
  17. VLAN Trunking Protocol (VTP)
  18. VPN Concentrator

Network + Chapter 11A Power Words - Blank

Network + Chapter 11A


  1. 802.1x
  2. access control list (ACL)
  3. Advanced Encryption Standard (AES)
  4. Algorithm
  5. asymmetric-key algorithm
  6. Authentication
  7. Authenticating, Authorization, and Accounting (AAA)
  8. Authentication Server (AS)
  9. Authorization
  10. block Cipher
  11. Certificate:
  12. Challenge Handshake Authentication Protocol (CHAP)
  13. Cipher: 
  14. Ciphertext: 
  15. Cleartext: 
  16. Data Encryption Standard (DES)
  17. digital signature
  18. Discretionary Access Control (DAC)

Wednesday, February 26, 2020

Network+ Chapter 8B Power Words - Blank


Network+ Chapter 8B - Routing

Defined

  1. Metric 
  2. My traceroute 
  3. NAT translation table 
  4. Network Address Transmission (NAT)
  5. Network Management Software (NMS)
  6. next hop 
  7. Open Shortest Path First (OSPF) 
  8. Path vector
  9. Port Address Translation (PAT) 
  10. Port forwarding 
  11. RIPv1
  12. RIPv2 
  13. Routing Information Protocol (RIP) 
  14. Routing table
  15. Static routes 
  16. Traceroute
  17. Yost cable 

Network+ Chapter 7B Power Words - Blank



         Network+ Chapter 7B

Defined



  1.          IPv4
  2.      IP Addressing-
  3.           Ipconfig 
  4.      Loopback address 
  5.      Multicast 
  6.      Network Blocks
  7.      Network ID
  8.      Protocols 
  9.      Protocol Suite 
  10.      Routing Table
  11.      Segments
  12.      Static Addressing
  13.      Subnet Mask
  14.      Subnetting
  15.      TCP
  16.      Unicast 
  17.      UDP




Network+ Chapter 7A Power Words - Blank

Power Words Chapter 7 Defined
  1. ARP 
  2. APIPA
  3. Blocks
  4. BOOTP .
  5. Broadcast
  6. CIDR
  7. Datagram.
  8. Default Gateway
  9. DHCP lease
  10. Dotted Decimal Notationp.
  11. Dynamic Addressing
  12. DHCP
  13. Host ID 
  14. Ifconfig 
  15. IANA 
  16. ICMP 
  17. IP

Network+ Chapter 6 Power Words - Blank

Chapter 6 - Installing a Physical Network
  1. 110 block
  2. Activity light 
  3. Attenuation 
  4. Bonding 
  5. Cable Certifier  
  6. Cable Drop 
  7. Cable Tester 
  8. Cable Tray
  9. Collison Light
  10. Continuity 
  11. Continuity Tester 
  12. Crosstalk
  13. Demarc .
  14. Demarc Extension
  15. Equipment Rack 
  16. Horizontal Cabling
  17. Intermediate Distribution Frame (IDF) 
  18. Link Light 
  19. Loopback Plug
  20. Loopback Test
  21. Main Distribution Frame (MDF)
  22. Mounting Bracket 
  23. Multiplexer 



Network+ Chapter 4A Power Words - Blank


Network + Chapter 4A 
10base2 
10baseFL 
10baseT
802.3
BNC Connector 
Bnc coupler 
bridge 
bridging loop 
broadcast domain 
CSMA/CD 
collision domain 
crimper 
crossover cable
Ethernet 
frame
frame check sequence 
full duplex 
half duplex
hub 
MAC address 
media converter 

Network+ Chapter 5B Power Words - Blank


Chapter 5 - Modern Ethernet

Defined
  1. APC Connector
  2. Baseband 
  3. Broadband 
  4. EMI
  5. Fast Ethernet 
  6. Flat-surface Connector
  7. Full-duplex 
  8. Gigabit Ethernet 
  9. GBIC
  10. Half-duplex 
  11. LC- Circuit
  12. MT-RJ
  13. MSAt
  14. PC Connector
  15. SFF
  16. SFP
  17. S0NET
  18. UPC Connector
  19. Wavelength 



Network+ Chapter 5A Power Words - Blank

Network+ Chapter 5A Power Words
Defined
  1. 10GBaseER 
  2. 10GBaseEW
  3. 10GBaseLR 
  4. 10GBaseLW
  5. 10GBaseSR 
  6. 10GBaseSW 
  7. 10GBaseT .
  8. Gigabit Ethernet (10 GbE) 
  9. 100Base FX
  10. 100BaseT
  11. 100BaseT4
  12. 100BaseTX 
  13. 1000BaseCX 
  14. 1000BaseLX 
  15. 1000BaseT 
  16. 1000BaseTX
  17. 1000BaseX 
  18. 802.3ab 
  19. 802.3z 

Network+ Chapter 8A Power Words - Blank

Network+ Chapter 8A Power Words

  1. Lan Areas
  2. Area ID 
  3. AS 
  4. Basic NAT
  5. bpg4 
  6. Cisco IOS 
  7. Convergence
  8. Cost 
  9. Distance vector 
  10. DNAT 
  11. Dynamic routing .
  12. Edge Routers 
  13. EIGRP
  14. Gateway Router 
  15. Hop 
  16. Hop Count 
  17. IS-IS
  18. Link State
  19. Managed device 

Network+ Chapter 14 Power Words - Blank

Network+ Chapter 14 - Remote Connectivity
  1. 3G
  2. 4G
  3. ADSL
  4. ATM
  5. BRI
  6. Baud
  7. Baud rate
  8. B Channel
  9. BERT
  10. Bridged Connection
  11. CCITT
  12. Central Office
  13. CSU/DSU
  14. Circuit Switching
  15. CWDM
  16. DOCSIS
  17. dB
  18. Dedicated Line
  19. D Channel
  20. Demultiplexer
  21. DWDM
  22. Dial-Up Line


Network+ Chapter 9B Power Words - Defined

Chapter 9B - TCP/IP Applications
Blank

1. Open port- Socket that is prepared to respond to IP packets destined to the packet's port number
2. POP3 - Post Office Protocol Version 3
3. Private Port Number- Web client's source number ranging from 49152 to 65535
4. Registered Port- Port numbers 1024 to 49151
5. SSH- Secure Shell
6. SSL- Secure Sockets Layer
7. Sendmail- Linux/UNIX method to send emails
8. Session- Communication between two or more computers
9. SMTP- Simple Mail Transfer Protocol
10. Socket-Session information stored in RAM
11. Socket Pairs- Data stored between two computer's TCP/IP applications
12. TCP/IP Suite- All aspects and protocols that make up TCP/IP
13. TCP Three-Way Handshake- Session information sent to two other computers from one server
14. Telnet- Protocol that can access different protocols
15. TLS- Transport Layer Security
16. TCP-- Transmission Control Protocol
17. TFTP- Trivial File Transfer Protocol
18. Unsecure Protocol- Common network vulnerabilities or threats, ex. HTTP
19. UDP- User Datagram Protocol
20. Web Services- Applications accessed on the Internet
21. Well-Known Port Number- Port numbers ranging from 0 to 1023

Network+ Chapter 16 Power Words - Blank

Network+ Chapter 16- Virtualization and Cloud Computing
Defined

Community cloud
Emulator
FC
guest
host hybrid cloud
hypervisor
IAAS e
ISCS
Jumbo Frame
NAS
PAAS
private cloud
public cloud
Snapshot
SAAS
SDN
SAN
VF
VM
VS

Network+ Chapter 9B Power Words - Blank

Chapter 9B - TCP/IP Applications
Defined

1. Open port
2. POP3
3. Private Port Number
4. Registered Port
5. SSH
6. SSL
7. Sendmail
8. Session
9. SMTP
10. Socket
11. Socket Pairs
12. TCP/IP Suite
13. TCP Three-Way Handshake
14. Telnet
15. TLS
16. TCP
17. TFTP
18. Unsecure Protocol
19. UDP
20. Web Services
21. Well-Known Port Number

Network+ Chapter 15 Power Words - Blank


Chapter 15 Blank
Defined
  1. 802.1X
  2. 802.11
  3. 802.11a
  4. 802.11a-ht
  5. 802.11b
  6. 802.11g
  7. 802.11g-ht
  8. 802.11i
  9. 802.11n
  10. Ad hoc mode
  11. AES
  12. Bandwidth saturation
  13. BSS
  14. BSSID
  15. Bounce
  16. BYOD
  17. CSMA/CA
  18. Channel
  19. Channel bonding
  20. Dead spot
  21. Dipole Antenna
  22. DSSS
  23. DCF
  24. Encryption
  25. Evil Twin
  26. ESS
  27. ESSID
  28. EAP
  29. FHSS
  30. Gain
  31. Greenfield Mode
  32. IBSS
  33. Infrastructure Mode
  34. IFG
  35. Latency
  36. Legacy Mode
  37. Link State
  38. MAC addressing filtering
  39. Mixed Mode
  40. MIMO
  41. NAS
  42. Network Name
  43. OFDM
  44. Peer-to-peer mode
  45. PAN
  46. PCF
  47. Point-to-multipoint
  48. Point-to-point
  49. PoE
  50. RFI
  51. RADIUS server
  52. Roaming
  53. Rouge AP
  54. SSID
  55. Signal Strength
  56. Site Survey
  57. SSID broadcast
  58. Supplicant
  59. TKIP
  60. Thick client
  61. Thin Client
  62. Transmit beamforming
  63. Unidirectional antenna
  64. VLAN pooling
  65. Wi-Fi
  66. Wi-Fi analyzer
  67. WPA
  68. WPA2
  69. WPS
  70. WEP
  71. WAP
  72. Wireless analyzer
  73. Wireless bridge
  74. Wireless controller
  75. WLAN
  76. Wireless Network
  77. Wireless Survey tool
  78. WPA2-Enterprise

Network+ Chapter 4B Power Words - Blank

Network Plus chapter 4 words

Defined
  1. Multimode
  2. Node
  3. Pad
  4. Ports
  5. Preamble
  6. Promiscuous mode
  7. Repeater
  8. RG 58
  9. RJ 45
  10. Segment
  11. Sneakernet
  12. Sniffer
  13. SAT
  14. STP
  15. Straight Though
  16. Switch
  17. T connector
  18. Thinnet
  19. TIA/EIA 568A
  20. TIA/EIA 568B
  21. Uplink Port
  22. UTP coupler

Network+ Chapter 3 Power Words - Blank

Network + Chapter 3 Cabling and Topology

Defined
  1. Bandwidth
  2. Bus Topology 
  3. Cladding
  4. Coaxial Cable
  5. Core
  6. Crosstalk
  7. Electromagnetic Interference (EMI)
  8. RJ 45
  9. RJ 11 
  10. RS 232
  11. Physical Topology
  12. Plenum 
  13. Ring Topology
  14. BNC connector
  15. EMI
  16. BD 25
  17. BD 9
  18. Fault tolerance 
  19. Mesh topology 
  20. Segment
  21. UTP
  22. SMF
  23. STP 
  24. Signaling topology
  25. Star Topology
  26. Star-Bus topology
  27. Star-Ring topology  
  28. MMF 


Network+ Chapter 2 Power Words - Blank

Chapter 2 – Network Models

Define
  1. Network Interface Layer 
  2. Network Layer
  3. Network Protocol 
  4. Open Systems Interconnection (OSI) seven-layer model
  5. Organizationally Unique Identifier (OUI)
  6. packet
  7. payload 
  8. physical address 
  9. Physical Layer
  10. Presentation Layer 
  11. protocol
  12. router
  13. segment
  14. Session Layer
  15. session software
  16. subnet
  17. switch 
  18. TCP segment
  19. Transmission Control Protocol (TCP)
  20. Transmission Control Protocol/Internet Protocol (TCP/IP) model
  21. Transport Layer
  22. UDP datagram
  23. Unshielded Twisted Pair (UTP)
  24. User Datagram Protocol (UDP)


Monday, February 24, 2020

A+ Chapter 7 Power Words - Blank

Chapter 7 - Motherboards
Defined
  1. Motherboard
  2. Motherboard book
  3. Transfer rate
  4. Traces
  5. Device driver
  6. Mini PCI
  7. Chipset
  8. Nano ITX
  9. AT
  10. ATX
  11. Burn in failure
  12. Catastrophic failure
  13. Component failure
  14. Distended capacitors
  15. Expansion bus
  16. Expansion slots
  17. FlexATX
  18. Form factor  
  19. ITX
  20. Micro ATX
  21. Windows hardware certification program






    A+ Chapter 3 Power Words - Blank

    Chapter 3 - The Visible Computer
    1. App 
    2. Control Panel 
    3. File Extension
    4. Gadget 
    5. Hardware
    6. User interface 
    7. Task bar 
    8. File explorer 
    9. Desktop 
    10. PC 
    11. Windows explorer 
    12. System tool 
    13. Settings app 
    14. Administrative tools
    15. Start button 
    16. Network connection 
    17. Metro UI 
    18. Charm 
    19. Charm bar 
    20. Processing

    A+ Chapter 3 Power Words - Defined

    Chapter 3 - The Visible Computer
    Blank
    1. App – Downloaded application
    2. Control Panel – motherboard of windows
    3. File Extension – Letter occurring after period in file name
    4. Gadget – small electronic tool
    5. Hardware – Physical elements that make up a computer
    6. User interface – the way the user and computer interact
    7. Task bar – allows quick access
    8. File explorer – file manager
    9. Desktop  - working area on your computer screen
    10. PC – Computer assigned to you
    11. Windows explorer – windows manager
    12. System tool – used to do tasks on the system
    13. Settings app – controls how the computer works
    14. Administrative tools – tools for administrator
    15. Start button – turns on computer
    16. Network connection – connects computers to the internet
    17. Metro UI – user interface
    18. Charm – control
    19. Charm bar – control bar
    20. Processing – how long it takes to happen or to finish  

    A+ Chapter 1 Power Words - Blank


    Chapter 1 - Path of the PC Tech

    Defined
    1. Certification 
    2. CCNA 
    3. CompTIA A+ 220-901 
    4. CompTIA A+ 220-902
    5. CompTIA Network+ Certification 
    6. CompTIA 
    7. IT
    8. MCSE 
    9. Network 
    10. PC Tech
    11. Pearson VUE
    12. Voucher
    13. www.comptia.org 



    A+ Chapter 6 Power Words - Blank


    Chapter 6 - BIOS
    1. chipset
    2. beep code
    3. CMOS clear 
    4. Bootable disk
    5. Flash ROM 
    6. System bios
    7. device drivers
    8. ROM
    9. Installation disc 
    10. System disk
    11. secure 
    12. LoJack 
    13. POST card
    14. bootstrap loader 
    15. nonvolatile
    16. firmware 
    17. Power on self-test 
    18. (CMOS)
    19. Scan Code
    20. Registry  




    A+ Chapter 5 Power Words - Blank


    Chapter 5 - RAM
    Defined
    1. BSoD 
    2. DDRSD RAM 
    3. Dual Channel Architecture 
    4. DRAM 
    5. ECCRAM
    6. Pinwheel of Death 
    7. Buffered RAM 
    8. Unbuffered RAM 
    9. DDR2
    10. DDR3
    11. DDR3L 
    12. DDR3U 
    13. DDR4 
    14. Single Sided RAM 
    15. Double Sided RAM 
    16. Quad channel Architecture 
    17. Parody RAM 
    18. SIMM
    19. SODIMM 
    20. Triple channel architecture 





    A+ Chapter 4 Power Words - Blank

    Chapter 4 - Microprocessors
    Defined
    1. 64-bit Processing
    2. Binary
    3. Graphics Processing Unit 
    4. Heat Sink 
    5. Hyperthreading
    6. Overclocking
    7. Program 
    8. Dual Core 
    9. Code Name 
    10. RAM 
    11. Frontside Bus 
    12. Address Bus 
    13. Registers
    14. Clock Cycle 
    15. Clock speed 
    16. CPU 
    17. Liquid Cooling 
    18. Discharge
    19. Machine Language
    20. Memory 




      A+ Chapter 2 Power Words - Blank

      Chapter 2 - Operational Procedures
      Defined
      1. Integrity 
      2. Password 
      3. EDS 
      4. EMU 
      5. FIR 
      6. Anti Static wrist strap 
      7. Phillips head Screwdriver
      8. Safety Goggles 
      9. Anti Static bag 
      10. Trouble Shooting 
      11. Computing Process 
      12. Activity listen 
      13. Verify 
      14. Test 
      15. Honesty 
      16. Escalate 
      17. Resistor 
      18. Self Grounding 
      19. Incident Report 

      A+ Chapter 18 Power Words - Blank

      Chapter 18 - Virtualization
      Defined
      1. Checkpoint
      2. Client-side virtualization
      3. Community cloud
      4. Emulator
      5. Guest
      6. Hardware virtualization support
      7. Host
      8. Hybrid cloud
      9. Hypervisor
      10. IaaS 
      11. Measured service
      12. On demand
      13. PaaS
      14. Private cloud
      15. Public cloud
      16. Rapid elasticity
      17. Snapshot
      18. SaaS
      19. Thin client
      20. Virtual desktop


      A+ Chapter 24 Power Words - Blank

      Chapter 24 - Portable Computing
      Defined
      1. Laptop
      2. Touchpad
      3. Hibernation
      4. M.2
      5. Hybrid
      6. Tablet PC
      7. Desktop Replacement
      8. Aspect ratio
      9. Matte
      10. Mini-PCIe
      11. Stylus
      12. Function (FN) Key
      13. Shared Memory
      14. Notebook
      15. ExpressCard
      16. Gesture
      17. Power Management
      18. SMM
      19. ACPI
      20. APM

      A+ Chapter 23 Power Words - Blank

      Chapter 23 - The Internet
      Defined
      1. 4G  
      2. cable internet 
      3. default gate way 
      4. hotspot
      5. modem 
      6. LTE
      7. HTTP
      8.  FTP 
      9. content Filtering 
      10. proxy server 
      11. Simple mail transfer protocol
      12. NFS
      13. satellite
      14. Voice over IP 
      15. AFP 
      16. SMTP 
      17. telnet 
      18. VPN 
      19. SLP 
      20. RDP 

      Enigma - Cipher

      The enigma machine was used in World War II to encrypt secret messages.


      Emulator
       https://www.101computing.net/enigma-machine-emulator/


      History
      https://www.iwm.org.uk/history/how-alan-turing-cracked-the-enigma-code

      A+ Chapter 17 Power Words - Blank

      Chapter 17 - Troubleshooting Operating Systems
      Defined
      1. action center
      2. Advanced Startup Options
      3. bcdedit
      4. Blue Screen of Death
      5. bootrec
      6. compatibility mode
      7. diskpart
      8. event viewer
      9. kernel panic
      10. Last known Good configuration
      11. live dvd
      12. Performance and Tools
      13. problem reports
      14. recovery console
      15. restore point
      16. safe mode
      17. startup repair
      18. task manager
      19. WinRE
      20. WinPE

      A+ Chapter 16 Power Words - Blank


      Chapter 16- Working With The Command Line Interface
      Defined
      1. Prompt
      2. Command move
      3. Command line interface
      4. Iwconfig
      5. Working directory
      6. robocopy
      7. Subfolder
      8. Terminal
      9. Extention
      10. Ifconfig
      11. Insert mode
      12. Switch
      13. Wildcard
      14. Xcopy
      15. Path
      16. Pipe
      17. System file checker
      18. Shutdown
      19. Shll
      20. password


      A+ Chapter 15 Power Words - Blank

      Chapter 15 - Maintaining and Optimizing Operating Systems
      Defined
      1. App Store
      2. AutoPlay
      3. Auto Run
      4. Backup and restore
      5. Backup and restore center
      6. cron
      7. device manager
      8. disk cleanup
      9. file history
      10. launchd
      11. maintenance
      12. Microsoft management console
      13. optimization
      14. patch management
      15. performance options
      16. programs and features
      17. restore point
      18. service pack
      19. system config utility
      20. System information tool
      21. System restore
      22. Task manager
      23. Task scheduler
      24. Time machine
      25. update
      26. windows





      A+ Chapter 13 Power Words - Blank


      Chapter 13 - Windows Under The Hood
      Defined
      1. Networking
      2. Regedit
      3. Details
      4. BCD
      5. Counters
      6. Root keys
      7. Performance monitor
      8. Bootmgr
      9. Performance
      10. Task manager
      11. Processes
      12. Object
      13. Reliability and performance monitor
      14. Registry
      15. Reg
      16. Regsvr32
      17. Taskkill
      18. Tasklist
      19. Applications
      20. Users


      A+ Chapter 14 Power Words - Blank


      Chapter 14 Users, Groups, and Permissions.
      Defined
      1. Group
      2. User Account Control
      3. NTFS Permissions
      4. Local Security Policy
      5. Chown
      6. Encryption
      7. Guests group
      8. Parental Controls
      9. Local Users and Groups
      10. Authorization
      11. Chmod
      12. Local User Account
      13. Inheritance
      14. Owner
      15. Ownership
      16. Permission Propagation
      17. Taking Ownership
      18. Encrypting File System
      19. Bitlocker Drive Encryptions
      20. Strong Password


      Pig Pen - Cipher

      Pig Pen Cipher

      Pig Pen Cipher chart

      Help https://www.creativeescaperooms.com/blogs/how-to-articles/126673795-how-to-use-read-the-pig-pen-cipher-in-escape-rooms

      A+ Chapter 14 Power Words - Defined


      Chapter 14 - Users, Groups, and Permissions.
      Blank
      1. User account applet: include adding or removing hardware and software, controlling user accounts
      2. local user account: An established relationship created on a computer that identifies a user and the user's settings and permissions when logged in.
      3. authorization: the action or fact of authorizing or being authorized.
      4. owner: The owner
      5. group: A group
      6. UAC (User Account Control):
      7. Inheritance: a feature that represents the "is a" relationship between different classes.
      8. Chown: A Unix command that allows the root user to change the owner and group assigned to files, directories and links.
      9. BitLocker Drive Encryption: a data protection feature that integrates with the operating system and addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned computers.
      10. EFS (Encrypting File System): a feature introduced in version 3.0 of NTFS that provides filesystem-level encryption.
      11. BitLocker: a full volume encryption feature included with Microsoft Windows.
      12. UAC: a feature that was designed to prevent unauthorized changes to your computer.
      13. administrative shares: hidden network shares created by Windows NT family of operating systems that allow system administrators to have remote access to every disk volume on a network-connected system.   
      14. Ownership: You own this
      15. Standard user: Just a normal User
      16. Chmod: a UNIX command that changes the access permissions of files or directories in order to read, write or execute files.
      17. User Group: A group of normal users
      18. NTFS Permissions: affect local users as well as network users and they are based on the permission granted to each individual user

      Morse Code - Cipher

      Morse Code

      alphabet_morse

      History https://www.artofmanliness.com/articles/morse-code/
      Practice https://aa9pw.com/morsecode/

      Reference:
      https://morsecode.world/international/decoder/audio-decoder-adaptive.html
      https://morsecode.world/international/translator.html

      Thursday, February 20, 2020

      Network+ Chapter 21 Power Words - Defined

       Network+ Chapter 21 Power Words - Network Troubleshooting

      1. ARP- Address Resolution Protocol
      2. Arping- Uses ARP frames instead of ICMP
      3. Broadcast Storm- One of more devices sending nonstop broadcast frames to a network
      4. Butt Set- Tests if certain telephone lines can function correctly
      5. Cable Stripper- Supports creating UTP cables
      6. Cable Tester- Checks if a wire map is correct
      7. Certifier- Tests if a cable can handle a certain amount of capacity
      8. Dig- Linux command that diagnoses DNS problems
      9. End-to-end principle- In early days of networking, stated that apps and work only happens at endpoints in a network
      10. EoP- Ethernet over Power
      11. Hardware Tool- Tools that help configure a network
      12. HEC- HDMI Ethernet Channel
      13. Hostname- Command that displays your computer’s host name
      14. IEEE 1905.1- A hybrid networking standard with the goal of flexibility
      15. Ifconfig- UNIX command to display IP configurations
      16. IoT- Internet of Things
      17. Ip- Linux command to display IP configurations
      18. Ipconfig- Windows command to display IP configurations
      19. Light Meter- Another name for an optical power meter
      20. Line Tester- Checks the integrity of telephone writing
      21. Link Aggregation- Enables connections to work together simultaneously
      22. Looking Glass Site- Remote servers accessible by browser
      23. Multimeter- Tests voltage resistance and continuity
      24. Mtr- My Traceroute
      25. Nbtstat- Windows command that displays systems running in a network
      26. Netstat- Command that displays the current state of all running IP processes
      27. Network Appliance- Device that has to do with networking
      28. NIC teaming- Enables connections to work together simultaneously
      29. NSlookup- Windows command that diagnoses DNS problems
      30. nVoy- Branding for IEEE 1906.1
      31. Optical Power Meter- Measures the amount of light loss
      32. Packet Sniffer-Intercepts and logs network packets
      33. Pathping- Combines the commands ping and tracert
      34. Ping- Uses ICMP packets to query by IP or name
      35. Ping -6- A command used in Windows Command prompt
      36. Ping6- A command used in Linux and Unix command prompts
      37. Port Scanner- Program that probes ports on another system
      38. Protocol Analyzer- Monitor the different protocol
      39. Proxy ARP- Process of making remotely connected computers act like they are on a single LAN
      40. Punchdown Tool- Puts UTP wires into 66- and 110- blocks
      41. Route- Command that displays and edits local system routing tables
      42. Routing Loop- When network traffics repeats and slows down
      43. Snip- Synonym for cable stripper
      44. Speed-test Site- Used for internet connection throughput
      45. Switching Loop- Connecting and configuring multiple switches in a circle
      46. Temperature Monitor- Detects heat issues in server rooms
      47. Tone Generator- Backbone to a tone probe
      48. Tone Probe- Locates cables
      49. Traceroute- Traces all routers from one point to another
      50. Traceroute6- Displays IPv6 addresses for tracert in UNIX/Linux
      51. Tracert- Traces all routers from one point to another in Windows
      52. Tracert -6- Displays IPv6 addresses for tracert in Windows
      53. Voltage Event Recorder-Detects electricity issues in server rooms
      54. Wireshark- Popular GUI packet sniffer and analyzer

      Network+ Chapter 14 Power Words - Defined

      Network+ Chapter 14
      Blank
      1. 3G: Third generation of wireless mobile telecommunications technology.
      2. 4G: A mobile communications standard intended to replace 3G, allowing wireless Internet access at a much higher speed.
      3. ADSL: Asymmetric digital subscriber line is a type of digital subscriber line technology.
      4. ATM: Asynchronous Transfer Mode; It is a switching technique that uses time division multiplexing for data communications.
      5. BRI: Basic Rate Access is an Integrated Services Digital Network configuration intended primarily for use in subscriber lines similar to those that have long been used for voice-grade telephone service.
      6. Baud: A common measure of symbol rate, one of the components that determine the speed of communication over a data channel.
      7. Baud rate: Rate at which information is transferred in a communication channel.
      8. B Channel: The channel that carries the main data. 
      9. BERT: A neural network-based technique for natural language processing pre-training.
      10. Bridged Connection:  A bridge allows you to connect two or more network segments together allowing devices to join the network when it's not possible to connect them directly to a router or switch.
      11. CCITT:  Primary international body for fostering cooperative standards for telecommunications equipment and systems.
      12. Central Office: A locality to which subscriber home and business lines are connected on what is called a local loop.
      13. CSU/DSU: A hardware device that converts a digital data frame from the communications technology used on a local area network.
      14. Circuit Switching: a method of implementing a telecommunications network in which two network nodes establish a dedicated communications channel.
      15. CWDM: A wavelength multiplexing technology for city and access network.
      16. DOCSIS: An international telecommunications standard that allows for the addition of high-bandwidth data transfer to an existing coaxial cable TV system.
      17. dB: A relative unit of measurement corresponding to one tenth of bel.
      18. Dedicated Line: A communications cable or other facility dedicated to a specific application.
      19. D Channel: A term which refers to the ISDN channel in which the control and signaling information is carried.
      20. Demultiplexer: A device that takes a single input line and routes it to one of several digital output lines.
      21. DWDM: A technology which multiplexes a number of optical carrier signals onto a single optical fiber by using different wavelengths of laser light.
      22. Dial-Up Line: A telephone connection in a system of many lines shared by many users.



      Network+ Chapter 20 Power Words - Defined

      Chapter 20 – Network Monitoring
      Blank

      1. Log Management – a collection process that uses generation, transmission, and analysis.
      2. Managed device – A device that is currently being used in management.
      3. Managed network – A network that is currently being used in management.
      4. MIB – Management information base
      5. Netflow – A feature used in cisco
      6. Netflow collector – Collects all of the recently sent data.
      7. NOC – Network operations center
      8. Packet analyzer – You can see the information being sent in basic packets
      9. Packet sniffer – Searches a ip to sniff out individual data packets.
      10. Performance monitors – Used to see how well a pc is running
      11. PDU – Protocol data unit
      12. Response Time – How fast a computer can respond to something.
      13. SIEM – Security information and events management
      14. Set – The overall process of connecting to another pc.
      15. SMS – Simple message service
      16. SNMP manager – Used to collect basic management information.
      17. SNM – Simple network manager
      18. Top listener – The pc that is receiving the most information
      19. Top talker – Port that is sending the most information
      20. Trap – A basic type of getting someone’s information
      21. Variable – The changeable subject
      22. Wireshark – A program used to see what is being sent threw ports.



      Wednesday, February 19, 2020

      Network+ Chapter 13 Power Words - Defined


      Chapter 13 - IPv6
      Blank
      1. 4to6 - It is an Internet interoperation mechanism allowing Internet Protocol version 4 (IPv4) to be used in an IPv6 only network
      2. 6in4 - 6in4 is an IPv6 transition mechanism for migrating from Internet Protocol version 4 to IPv6.
      3. 6to4 - is an Internet transition mechanism for migrating from Internet Protocol version 4 to version 6
      4. Aggregation - is a collection, or the gathering of things together. Your baseball card collection might represent the aggregation of lots of different types of cards.
      5. Anycast - is a network addressing and routing methodology in which a single destination address has multiple routing paths to two or more endpoint destinations
      6. EUI-64 - is a method we can use to automatically configure IPv6 host addresses. An IPv6 device will use the MAC address of its interface to generate a unique 64-bit interface ID  is a method we can use to automatically configure IPv6 host addresses. An IPv6 device will use the MAC address of its interface to generate a unique 64-bit interface ID
      7. Global Unicast broadcast - Referring to the transmission of a signal or packet from a single device to another single device over a circuit or network. See also anycast, anycast address, broadcast, global unicast address, and multicast
      8. IPV4 -  is the fourth revision of the Internet Protocol (IP) used to to identify devices on a network through an addressing system. The Internet Protocol is designed for use in interconnected systems of packet-switched computer communication networks.
      9. IPV6 - Internet Protocol Version 6 (IPv6) is a network layer protocol that enables data communications over a packet switched network. ... The explosive growth in mobile devices including mobile phones, notebook computers, and wireless handheld devices has created a need for additional blocks of IP addresses.
      10. Interface identifier - The interface ID identifies an interface of a particular node. An interface ID must be unique within the subnet. ... Neighbor Discovery automatically generates the interface ID, based on the MAC or EUI-64 address of the host's interface.
      11.  Mired - Mired is a Tirado tunneling client designed to allow full IPv6 connectivity to computer systems which are on the IPv4-based Internet but which have no direct native connection to an IPv6 network. Mired is included in many Linux and BSD distributions and is also available for recent versions of Mac OS X.