Showing posts with label blank. Show all posts
Showing posts with label blank. Show all posts

Thursday, March 12, 2020

Network+ Chapter 19 Power Words - Blank

Chapter 19 - Protecting Your Network
Defined
1. Mantrap 
2. Monlist
3. NAC
4. Network-Based anti-malware
5. Network-based firewall
6. Network Closet
7. Non-persistent agent
8. Ntpdc
9. OUI
10. Outbound traffic
11. PDos
12. Persistent agent
13. Phishing
14. Posture Assessment
15. Proximity Reader
16. Quarantine Network
17. Reddit Effect
18. Reflection
19. Cipher lock
20. Cleartext credential
21. Closed circuit television
22. Cloud 
23. DZ
24. DOS
25. DHCP snooping 
26. DDOS 
27. DAC 
28. DAI 
29. Edge
30. Effective permission
31. External firewall 
32. Fail close
33. Fail open 
34. Fault tolerance
35. Firewall
36. Guest network
37. Hardening 
38. Hardware Appliance 
39. Honeynet 
40. Honeypot
41. Host-Based Anti-Malware
42. Host-Based Firewall 
43. Implicit Deny Any
44. Inbound Traffic
45. Inheritance
46. Internal Firewall 
47. IP Camera 
48. Key Fob 
49. Keypad 
50. Macro 
51. Malicious Employee 
52. Malicious User 
53. Malware
54. Man-In-The-Middle
55. Reddit effect 
56. Quarantine network
57. Proximity reader
58. Posture assessment 
59. Pashing 
60. Persistent agent
61. Permanent dos
62. Outbound traffic
63. OUI 
64. Ntpdc
65. Non-persistent agent 
66. Network closet
67.Network based firewall
68. Anti-malware
69. Nac
70. Mon list
71. Mantrap 
72. Reflection
73. Threat
74. TEMPEST 
75. Tail gating 
76. Stateless inspection
77. Stateful inspection 
78. Spyware
79. Spoofing 
80. Reflection 
81. RF emanation
82. Rootkit 
83. Security Guard
84. Services 
85. Session Hijacking 
86. Signature 
87. Slash dotting 
88. Social Engineering 
89. SOHO firewall
90. Smurf attack 
91. Traffic spike
92. Trojan horse
93. Trusted user 
94. Unencrypted user
95. Unified Threat Management (UTM) 
96. Untrusted user
97. Video monitoring
98. Virus
99. Virus shield
100.  VLAN hopping 
101.  Vulnerability 
102. Worm
103. Zero-day attack
104. zombie 

Tuesday, March 3, 2020

Network+ Chapter 20 Power Words - Blank

Chapter 20 – Network Monitoring
  1. Log Management
  2. Managed device
  3. Managed network
  4. MIB
  5. Netflow 
  6. Netflow collector 
  7. NOC 
  8. Packet analyzer 
  9. Packet sniffer 
  10. Performance monitors 
  11. PDU
  12. Response Time 
  13. SIEM 
  14. Set 
  15. SMS
  16. SNMP manager
  17. SNM
  18. Top listener 
  19. Top talker
  20. Trap
  21. Variable
  22. Wireshark




Network+ Chapter 17 Power Words - Blank

Chapter 17 - Building a Real World Network
  1. Air Gap 
  2. CAN
  3. CoS
  4. Compatibility Requirements 
  5. Device Types/Requirements 
  6. DiffServ 
  7. DCS
  8. Environment Limitations
  9. Equipment Limitations
  10. H.320
  11. H.323 
  12. HMI 
  13. ICS Server 
  14. ICS 
  15. List of Requirements
  16. MGCP
  17. Medianet 
  18. Metro Ethernet
  19. Operator
  20. Power Converter 
  21. Power Redundancy 
  22. PLC
  23. RTP
  24. Real-time Video 
  25. RTU
  26. Security Considerations
  27. SIP 
  28. SCADA 
  29. UC Device
  30. UC Gateway
  31. UC Server 
  32. UC 
  33. VTC
  34. Wired/Wireless Considerations



Network+ Chapter 9A Power Words - Blank

Network + Chapter 9A
Defined
  1. A record
  2. Active Directory 
  3. Authoritative DNS server 
  4. Authoritative name server 
  5. Cached lookups
  6. Cache-only DNS server
  7. CNAME
  8. DNS root server 
  9. DNS server
  10. DNS tree 
  11. DIG 
  12. DNS 
  13. DDNS 
  14. Flat Name Space 
  15. Forward Lookup Zone 
  16. FQDN
  17. Hierarchical Name Space 
  18. Host Name
  19. Hosts File 

Network+ Chapter 2A Power Words - Blank

Chapter 2 - Network Models
  1. Application layer
  2. API 
  3. Broadcast 
  4. Broadcast Address
  5. CRC
  6. Data Link Layer
  7. Datagram
  8. De-encapsulation
  9. Device ID 
  10. Encapsulation
  11. EUI-48 
  12. Frame 
  13. FCS 
  14. Internet Layer
  15. IP
  16. IP Address
  17. Link Layer 
  18. Logical Address 
  19. Logical Addressing 
  20. LLC 
  21. MAC 
  22. MAC Address 
  23. Model
  24. NIC

Monday, March 2, 2020

A+ Chapter 28 Power Words - Blank

Chapter 28 - Securing Computers
  1. AUP
  2. Cable lock
  3. DRM
  4. Encryptions
  5. EULA
  6. Pop up
  7. Drive-By-Download
  8. Dictionary attack
  9. Digital encryption
  10. Phishing
  11. CA
  12. Event viewer
  13. Replication
  14. Brute force
  15. Ransomware
  16. Entry control roster
  17. MITM
  18. Mantrap
  19. Chain of custody
  20. Closed source software

A+ Chapter 27 Power Words - Blank

Chapter 27 - Printers and Multi-function Devices
  1. Calibration
  2. Color Depth
  3. Consumables
  4. Dot Matrix Printer
  5. Dots Per Inch
  6. Erase Lamp
  7. Flatbed Scanner
  8. Fuser Assembly
  9. Gearbox
  10. Laser
  11. Imaging Drum
  12. Imaging Process
  13. Impact Printer
  14. Laser Printer 
  15. Network Printer
  16. Pages Per Minute
  17. Pickup Roller
  18. Print Server
  19. Print wire
  20. Print head

A+ Chapter 25 Power Words - Blank


Chapter 25 - Understanding Mobile Devices
Defined
  1. Accelerometer
  2. Closed Source
  3. Data roaming
  4. E-reader
  5. E911
  6. Geo tracking
  7. GPS
  8. GSM
  9. GUI
  10. Gyroscope
  11. IMEI
  12. IMSI
  13. iOS
  14. Launcher
  15. Micro USB
  16. Mini USB
  17. MDM
  18. NFC
  19. OLED
  20. PDA

A+ Chapter 22 Power Words - Blank

Chapter 22 - Wireless Networking

  1. 802.11a 
  2. 802.11b
  3. 802.11ac
  4. 802.11g 
  5. 802.11n
  6. IEEE 802.11
  7. Wi-Fi 
  8. Wi-Fi Protected Access (WPA)
  9. Wi-Fi Protected Access 2 (WPA2) 
  10. Wi-Fi Protected Setup (WPS)
  11. Wired Equivalent Privacy (WEP) 
  12. Wireless Access Point (WAP) 
  13. Personal Area Network (PAN) 
  14. Extensible Authentication Protocol (EAP)
  15. Advanced Encryption Standard (AES) 
  16. Temporal Key Integrity Protocol (TKIP) 
  17. Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) 
  18. Infrared Data Association (IrDA) 
  19. Multiuser MIMO (MU-MIMO)

A+ Chapter 21 Power Words - Blank

Chapter 21 - Local Area Networking
Defined
  1. IP Address
  2. Ping
  3. Router
  4. TCP
  5. TCP/IP Services
  6. Workgroup
  7. HomeGroup
  8. Toner
  9. Net Command
  10. Default Gateway
  11. Domain
  12. DNS
  13. Half-Duplex
  14. Full-Duplex
  15. Subnet Mask
  16. ipconfig
  17. nslookup
  18. Network Protocol
  19. IPv4
  20. IPv6

A+ Chapter 20 Power Words - Blank

Chapter 20 - Essentials of Networking
Defined
  1. BNC 
  2. Bridge 
  3. Broadcast domain 
  4. Client 
  5. Coaxial cable 
  6. Crossover Cable 
  7. Ethernet 
  8. F-type connector 
  9. Fiber Optic Cable 
  10. File Server 
  11. Host 
  12. LAN 
  13. MAC address 
  14. NIC 
  15. RJ-45 
  16. Router 
  17. STP 
  18. Switch 
  19. UTP 
  20. WAN 

A+ Chapter 19 Power Words - Blank

Chapter 19 - Display Technologies
Defined
  1. display port
  2. DirectX
  3. Led monitor
  4. sprite
  5. integrated gpu
  6. RCA 
  7. RAMDAC 
  8. refresh rate
  9. sub-pixel 
  10. VGA connector
  11. native resolution 
  12. HD15
  13. LCD
  14. HDMI 
  15. LED
  16. DLP
  17. PCIe
  18. gpu
  19. dual scan passive matrix 
  20. dxdiag

A+ Chapter 11 Power Words - Blank


Chapter 11 - Essential Peripherals
  1. Full-Speed USB
  2. USB Host Controller
  3. USB Root Hub
  4. USB Thumb Drive
  5. Low-Speed USB
  6. Biometrics
  7. Digitizer
  8. Touchpad
  9. Power Source
  10.  Optical Mouse
  11.  CD File System
  12.  CD-Recordable
  13.  CD- Rewriteable
  14.  CD-ROM
  15.  Super-Speed USB
  16.  Universal Product Code
  17.  xD-Picture Card
  18.  Touchscreen
  19.  FireWire
  20.  KVM Switch


A+ Chapter 10 Power Words - Blank


Chapter 10 - Implementing Hard Drives
Defined
  1. EFS 
  2. FAT 32 
  3. FAT 64 
  4. Active partition 
  5. File system
  6. EXFat
  7. MBR 
  8. MFT
  9. NTFS
  10. EXT4
  11. Defragment 
  12. CHKDSK
  13. Disk Cleanup 
  14. Disk management 
  15. Disk utility
  16. Data structure
  17. Dynamic disk
  18. Basic disk 
  19. GPT
  20. Parity space 

A+ Chapter 9 Power Words - Blank

Chapter 9 - Hard Drive Technologies 
Defined
  1. AHCI 
  2. ATA 
  3. SATA
  4. eSATA 
  5. HDD 
  6. HBA
  7. HHDs 
  8. IDE
  9. mSATA
  10. NCQ
  11. NVMe 
  12. RAID 
  13. SATAe
  14. S.M.A.R.T. 
  15. SSD
  16. Disk duplexing
  17. Disk mirroring 
  18. Disk stripping
  19. Disk stripping with parity 
  20. Hot Swapping 

A+ Chapter 8 Power Words - Blank


Chapter 8 - Power Supplies
  1. Active PFC
  2. AC
  3. Amperage
  4. Amps
  5. Current
  6. DC
  7. Dual-voltage
  8. FRU
  9. IEC-320
  10. Joule
  11. Mini Connector
  12. Molex Connector
  13. Multimeter
  14. Multi-rail
  15. P1 power connector
  16. P2 power connector
  17. PCIe 6/8- pin power connector
  18. Power conditioning
  19. Power supply fan

Thursday, February 27, 2020

Network+ Chapter 11B Power Words - Blank

Network+ Chapter 11B Power Words

Defined
  1. Integrity
  2. IAS
  3. IPsec
  4. Kerberos
  5. KDC
  6. Key pair
  7. LDAP
  8. LEAP
  9. MIB
  10. MAC
  11. MD5
  12. MS-CHAP
  13. Multifactor Authentication
  14. NAS
  15. NCP
  16. NTP
  17. Nonrepudiation
  18. OpenSSH
  19. PAP
  20. Plaintext
  21. PPP
  22. PEAP
  23. SSL
  24. SNMP
  25. Single Sign-on
  26. Stream Cipher
  27. Symmetric-key Algorithm
  28. TACACS+-
  29. TGT
  30. TLS
  31. Tunnel
  32. Two-factor Authorization




Network+ Chapter 12B Power Words - Blank

Chapter 12b – Advanced Networking Devices
Defined
  1. Out-of-brand Management
  2. Peer-to-Peer
  3. Point-To-Point Tunneling Protocol (PPTP)
  4. Port Authentication
  5. Port Mirroring
  6. Proxy Server
  7. Quality of Service (QoS)
  8. Reverse Proxy Server
  9. Routing and Remote Access Service (RRAS)
  10. Site-to-Site
  11. SSL VPN
  12. Traffic Shaping
  13. Trunk Port
  14. Trunking
  15. Virtual Local Area Network (VLAN)
  16. Virtual Private Network (VPN)
  17. VLAN Trunking Protocol (VTP)
  18. VPN Concentrator

Network + Chapter 11A Power Words - Blank

Network + Chapter 11A


  1. 802.1x
  2. access control list (ACL)
  3. Advanced Encryption Standard (AES)
  4. Algorithm
  5. asymmetric-key algorithm
  6. Authentication
  7. Authenticating, Authorization, and Accounting (AAA)
  8. Authentication Server (AS)
  9. Authorization
  10. block Cipher
  11. Certificate:
  12. Challenge Handshake Authentication Protocol (CHAP)
  13. Cipher: 
  14. Ciphertext: 
  15. Cleartext: 
  16. Data Encryption Standard (DES)
  17. digital signature
  18. Discretionary Access Control (DAC)

Wednesday, February 26, 2020

Network+ Chapter 4A Power Words - Blank


Network + Chapter 4A 
10base2 
10baseFL 
10baseT
802.3
BNC Connector 
Bnc coupler 
bridge 
bridging loop 
broadcast domain 
CSMA/CD 
collision domain 
crimper 
crossover cable
Ethernet 
frame
frame check sequence 
full duplex 
half duplex
hub 
MAC address 
media converter