The term for the value generated by SHA or MD and used to maintain the integrity of your data
Hash (Hashing)
Name 2 out of the 3 MacOS file types
.app, .dmg, and ,pkg
File type (extension) for a Windows Script
.bat (batch)
Encryption that uses same key to encrypt and decrypt
Symmentric
Lowest Windows 11 Edition that supports Remote Desktop
Pro
Wireless Access Point, not under your control, that exists on your network for malicious purposes
Evil Twin
Feature location in MacOS to allow an unsigned application to be loaded.
System Settings
Feature that uses one set of credentials to allow access to multiple resources, preventing users from having to use those credentials frequently
SSO (Single Sign On)
Password attack that uses common words and phrases
Dictionary attack
Windows Feature location if you wish to use a Narrator (text-to-speech) or Closed Captioning
Ease of Access
In a 3-2-1 Backup strategy, the number of different storage media to utilize
2 Types of media (along with 3 copies and 1 copy stored offsite)
Provide one of the 2 file systems that support creating/using 5 or more Primary Partitions
GPT or APFS
Windows protocol used to allow for remote connections and user session interaction
RDP (Remote Desktop Protocol)(Port 3389)
Physical security device used to prevent vehicles from driving through a front entrance
Bollard
Thin OS designed to work with and save files to the Cloud
Chrome OS
DHCP option available to you if Static IP addresses are not allowed
Reservation
Legacy Linux feature that allows a user to control another computer's GUI remotely over a network
VNC (Virtual Network Computing)
Next File System version from Microsoft that will replace NTFS
ReFS (Resilient File System)
Authentication Factor that relies on human attributes
Biometrics
Feature that saves header and metadata information to allow for faster file searching
Indexing
Name for when an AI provides incorrect output
AI Hallucination
Resource to track product and license information for devices and systems
CMDB (Configuration Management Database)
Accuracy requirement for Kerberos token in Active Directory to function
System timing (provided by NTP)
Term for when you enable a BIOS/UEFI password or set up a screensaver lock for authorized users on a new workstation
Hardening
Windows feature found under Windows Tools/Computer Management on a host device to manage permissions, users, services, etc...
Local Users and groups (lusrmgr)