AACL (access control list) Show Learn more about ACLs ➜ Active Directory Antivirus API (application programming interface) Learn more about APIs ➜ Applets Application ASCII (American Standard Code for Information Interchange) AWS (Amazon Web Services) BBackup Bandwidth Maximum Bash Batch file (.bat) BIOS (basic input/output system) Bridge BYOD (Bring your own device) CCache Chkdsk CIM (Common Information Model) Client Client-server model Cloud computing CLR (Common Language Runtime) CMD Command-line interface (CLI) Computer virus Learn more about computer viruses ➜ Cookie Learn more about cookies ➜ CPU (central processing unit) CSV (comma-separated values) Cybersecurity Learn more about cybersecurity ➜ DDatabase DCOM (Distributed Component Object Model) Deployment DevOps DFS (distributed file system) DHCP (Dynamic Host Configuration Protocol) Disaster recovery (DR) DLP (data loss
prevention) DMTF (Distributed management task force) DNS (Domain Name System) DOM (Document Object Model) DoS (denial of service) EEncryption Ethernet Event Viewer Executable file FFailover FAT (file allocation table) Firewall Learn more about firewalls ➜ FTP (File Transfer Protocol) GGateway Group policy HHardware Hashing Host HTTP (Hypertext Transfer Protocol) Hyper-V Iicacls (Integrity Control Access Control List) ICANN (Internet Corporation for Assigned Names and Numbers) IIS (Internet Information Services) Imaging IP address Learn more about IP addresses ➜ ISP (internet service provider) Learn more about IPS ➜ KKerberos LLAN (local area network) Latency LDAP (Lightweight
Directory Access Protocol) Localhost Logs MMAC address Mainframe Malware MDT (Microsoft Deployment Toolkit) Microsoft
Azure Microsoft Endpoint Configuration Manager MOF (Managed object format) Multi-factor authentication (MFA) NNetwork domain Network monitoring Network packet Network
security Network switch NTFS (New technology file system) OOnboarding On-premises (on-prem) OS (operating system) OSI (Open Systems Interconnection) OU (organizational unit) PPagefile.sys Patch Patch management Patch Tuesday Penetration testing Permissions Phishing Learn more about phishing ➜ PowerShell Learn more about PowerShell ➜ Privilege escalation Programming Protocol PSRemoting (PowerShell Remoting) RRansomware RCE (Remote code execution) RDP (Remote Desktop
Protocol) Redundancy Remote
management and monitoring (RMM) Replication Router SSaaS (software as a service) Script SDK (Software development kit) Server SMB (Server Message Block) SMTP (Simple Mail Transfer Protocol) Software Spear-phishing SSD (solid state drive) Learn more about SSDs ➜ SSL (Secure Sockets
Layer) SSO (single sign-on) Switching hub Sysadmin (system administrator) Learn more about sysadmins ➜ Systems management TTCP (Transmission Control Protocol) TCP/IP (Transmission Control Protocol/Internet Protocol) Thick client Thin client TPM (Trusted Platform Module) Learn more about TPMs ➜ Two-factor authentication (2FA) UUAC (User Account Control) Updates VVirtual machine VPN (virtual private network) Learn more about VPNs ➜ WWAN (wide area network) Windows Registry Windows Server Update Service
(WSUS) WinRM (Windows Remote Management) WMI (Windows Management Instrumentation) XXML (Extensible Markup Language) Which Windows 10 feature uses virtualization to protect?Device Guard also includes a powerful system mitigation called hypervisor-protected code integrity (HVCI), which uses virtualization-based security (VBS) to protect Windows' kernel-mode code integrity validation process.
Which of the following Windows utilities can be used to enumerate hosts?NBTscan is a utility can be used for enumeration Windows OSs.
Which of the following commands gives you a quick way to see if there are any shared resources?Which of the following commands gives you a quick way to see if there are any shared resources on a computer or server? The Windows Net use command is a quick way to discover any shared resources on a computer or server.
What tool can be used to read and write data to ports over a network?Port Scanning Techniques. Nmap is one of the most popular open-source port scanning tools available. Nmap provides a number of different port scanning techniques for different scenarios.
|