asdasd

Ace your homework & exams now with Quizwiz!

Application virtualization

deceives an app into believing it is interfacing with an OS when it isn't...virtualization layer between app and OS...run on central server

Protocols

define the standards for communication between nodes on the network

Secure Socket Layer (SSL)

provides security to the data that is transferred between the web browser your users are operating and the server it is connecting to for its requested information

Session Management

refers to the process of securely handling multiple requests to a web-based application or service from a single user or entity

Schema

schema of a database is its structure described in a formal language supported by the Database Management System (DBMS).

Cloud computing

the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.

Client virtualization

virtualization technology used to separate desktop computer environment from the physical device used to access it.

Service

A software functionality or a set of software functionalities with a purpose that different clients can reuse for different purposes, together with the policies that should control its usage.

Guest OS

An operating system running within a virtual machine.

Base level Comm Focal Point (CFP)

personnel will remediate assets owned and operated by the host base personnel.

Incident Reporting

CFP, NOSCs, and AFNOSC record suspicious and unauthorized network and information systems access and activity.

CSS

Cascading Style Sheets; Used for describing the presentation of a document written in a markup language such as HTML.

JavaScript

Client scripting language that is used for creating web pages. Standalone language originally developed by Netscape (and not associated with Java). Special Effects.

Port

Communication endpoint

Python

Considered one of the easiest languages to use and work with

Relational Database

Consists of numerous tables containing rows and columns of data

Flat Files

Database consisting of only one large table

SaaS

End user

Event Logs

Event logs consist of a header, a description of the event (based on the event type), and other optional data.

XML

Extensible Markup Language, Software and hardware independent tool used to transport and store data.

Virtual desktop infrastructure

Hosting of desktop environments on a central server

HTML

Hypertext Markup Language, a standardized system for tagging text files to achieve font, color, graphic, and hyperlink effects on World Wide Web pages.

PaaS

Information Tech Devlopers

IaaS

Information Tech Managers

NoSQL (Non-Relational)

Mechanism for storage and retrieval of data that is modeled in means other than the tabular relations used in relational databases.

Server Virtualization

Most common type of virtualization Partitioning of a physical server into smaller virtual servers

Java

One of the most popular programming languages. Used to develop website content, games, applications, and software.

Hypervisor

Software that enables a single computer to run multiple operating systems simultaneously.

Application Log

The Application log records events logged by programs, ex a database program might record a file error in the Application log

Event Viewer

The Event Viewer enables administrators to monitor events that occur on a system. The Event Log service starts automatically when a computer is started. All users can view Application and System logs.

Security Log

The Security log records security events, such as valid and invalid logon attempts, and events related to resource use, such as creating, opening, or deleting files/objects.

System Log

The System log records events logged by the system components, ex failure of a driver or other system component to load during startup is recorded in the System log

Event Descriptions

The description indicates what happened or the significance of the event

Mandatory Deployments

These will target all machines that require the update, are not a part of an exemption, and are not designated a PMO/Medical.

Available Deployments

These will target all systems, unless otherwise stated by the tasking authority

Presentation virtualization

Using this virtualization, a remote application running on a server is controlled by a local computer.

Host Server

any computer that provides services and connections to other computers on a network


Related study sets

AP European History Ch. 20-24 Study Guide

View Set

Chapter 7- supplier relationship management (SRM)

View Set

Jason Dions Practice Exams (2 of 5)

View Set