Back to AI Flashcard MakerInformation Technology /Core Architecture & System Concepts
Core Architecture & System Concepts
This deck covers essential concepts in system architecture, Linux operations, and cybersecurity, including access control, command-line tools, networking, and security practices.
What is Access Control?
Mechanisms that determine who can access files, systems, or services.
Tap or swipe ↕ to flip
Swipe ←→Navigate
1/51
Key Terms
Term
Definition
What is Access Control?
Mechanisms that determine who can access files, systems, or services.
What does ACL stand for?
Access Control List
Define API.
A set of rules that allow software components to communicate.
What is Authentication?
Verifying the identity of a user or system.
What does Authorization involve?
Determining what an authenticated user is allowed to do.
What is an Attack Surface?
All possible points where an attacker can interact with a system.
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
| Term | Definition |
|---|---|
What is Access Control? | Mechanisms that determine who can access files, systems, or services. |
What does ACL stand for? | Access Control List |
Define API. | A set of rules that allow software components to communicate. |
What is Authentication? | Verifying the identity of a user or system. |
What does Authorization involve? | Determining what an authenticated user is allowed to do. |
What is an Attack Surface? | All possible points where an attacker can interact with a system. |
What is Bash? | The most common Linux shell used for command execution and scripting. |
Define Binary. | A compiled executable program. |
What is a Bootloader? | Software that loads the OS kernel (e.g., GRUB). |
Explain a Brute Force Attack. | Trying many password combinations until one succeeds. |
What does CLI stand for? | Command Line Interface |
What is a Configuration File? | A file that stores settings for applications or services (often in /etc). |
What is Cron used for? | A scheduler for automated tasks. |
What is a CVE? | Common Vulnerabilities and Exposures, a public identifier for known security vulnerabilities. |
What is CWE? | Common Weakness Enumeration, a classification of software weaknesses. |
Define Cyber Hygiene. | Practices that maintain system security (updates, strong passwords, backups). |
What is a Daemon? | A background service (e.g., SSH, cron). |
What is a Directory? | A folder in the Linux file system. |
What is a Distro? | A packaged version of Linux (Ubuntu, Kali, Debian). |
What does DNS stand for? | Domain Name System |
Explain DoS/DDoS. | Attacks that overwhelm a system with traffic. |
What is Encryption? | Transforming data into unreadable form without a key. |
Define Environment Variable. | A value that affects how processes run (e.g., $PATH). |
What is an Exit Code? | A number returned by a command indicating success or failure. |
What is an Exploit? | A technique that takes advantage of a vulnerability. |
What is a File System? | The structure that organizes files and directories. |
What is a Firewall? | A system that filters network traffic. |
Define Forensics in computing. | The practice of analyzing systems for evidence of compromise. |
What does FQDN stand for? | Fully Qualified Domain Name |
What is a GID? | Group ID, a numeric identifier for a group. |
Define Group in Linux. | A collection of users sharing permissions. |
What is Grep used for? | A tool for searching text using patterns or regex. |
What is a Hash? | A one-way transformation of data (used for passwords). |
What does Hardening involve? | Securing a system by reducing vulnerabilities. |
What is a Home Directory? | A user’s personal workspace (/home/username). |
What is an Inode? | Metadata structure storing file information (permissions, timestamps, size). |
Define Interface in networking. | A network connection point (e.g., eth0, wlan0). |
What is Integrity in cybersecurity? | Ensuring data has not been altered. |
What is Journalctl? | Tool for viewing systemd logs. |
Define Job in computing. | A scheduled or background process. |
What is a Kernel? | The core of the OS that manages hardware, memory, and processes. |
What is a Key Pair? | A public/private key used for encryption or authentication (e.g., SSH keys). |
What is Least Privilege? | Users should only have the access they need. |
What is a Log File? | A file that records system or application events. |
What is a Loopback Interface? | A virtual network interface for internal communication (127.0.0.1). |
Define Malware. | Malicious software designed to harm systems. |
What does Mount mean in Linux? | Attaching a file system to a directory. |
What is Monitoring in IT? | Observing system activity for anomalies. |
What does NAT stand for? | Network Address Translation |
What is Nmap used for? | A network scanning tool used to discover hosts and services. |
What is a NIC? | Network Interface Card, hardware that connects a device to a network. |
