02 Flashcards

1
Q

What are the commands used to identify if your on a VM?

A

ipconfig /all, system info, task list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What command identifies the MAC address of a VM?

A

ipconfig /all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can you tell if a MAC address belongs to an VM?

A

First Octet has 00

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What command lets you see the system manufacturer/system model info on a VM?

A

systeminfo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What command will let you see installed NICs ona VM?

A

systeminfo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What command will let you see all the processes on windows?

A

tasklist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Windows _________ is an object-oriented, interactive command environment with script language features

A

Powershell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The __________ cmdlet lets you see all of the parameters and arguments for a particular cmdlet

A

get-help

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Required and optional parameters for a particular cmdlet may change depending on the version of PS T/F?

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

________ parameters are specified by name with the cmdlet

A

named

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

___________ lets PS assume the parameter name associated with an argument based on the position of the argument in syntax

A

positional notation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are common parameters in PS and what do they represent

A

-name states the name of an object (exp username, cmdlet name, path name)

-computername state the name/IP on whiich to perform the action

-Path state the path of the directory

-examples use with get-help to show syntax examples

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Parameters can be
__________
__________
_________
________

A

Required
Optional
Named
Positional notation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_________ define additional information associated with a parameter name

What are some common __________?

A

Arguments

-Path
-Name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

__________ refers to the process of passing the results of one cmdlet as input into a second cmdlet

A

piping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The ____ cmdlet sends data in two directions simultaneously

What an example of it?

A

Tee-Object

Tee-Log.txt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

When using the get-childitem in PS how would I filter only the name and time of creation of the files pulled?

A

select lets you search for specific parameters

select name, *time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

_________ gives a complete list of aliased commands and their associated PS cmdlet

A

Get-Alias

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

________ are packages of PS commands, consisting of cmdlet, functions, variables, and aliases

A

modules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How do you view modules imported in a PS session?

A

Get-Module

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

__________ queries a computer system for information about the manufacturer and model PS cmdlet

A

get-wmiobject win32_computersystem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the new version of get-wmiobject?

A

get-ciminstance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

__________ enables a user to gather data and change settings on one or more remote computers using certain PS cmdlets that have a ______________ parameter

A

PS remoting, -computername

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are some cmdlets that include the -computername parameter option?

A

Restart-computer
Test-connection
Clear-eventlog
Get-WMIObject
Get-HotFix
Get-Service
Get-WinEvent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are the two uses of variables in scripting PS?

A

store information for later use in a script
store information that is a result of a script

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

________ is a way for the OS and its services and applications to record important actions, post status messages, and track security events.

A

logging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

_________ contains events logged by Active Directory, enabled when Active Directory is loaded Domain Logs

A

Directory Service Log

28
Q

________ contains information about replication events including changes to SYSVOL Domain Logs

A

DFS Replication Log

29
Q

________ available when a machine is configured as a DNS server

A

DNS server log

30
Q

___________ is the tracking of changes, within computer systems, changes, or events, are tracked in the logs that the system keeps.

A

Auditing

31
Q

What is the command to enable auditing in cmd?

A

auditpol

32
Q

______ changes to user rights, windows firewall, group policy, or audit policies (Audit Event)

A

Policy change

33
Q

_______ When an Object (e.g.,file,folder,etc.) is accessed that has a *SACL (Audit Event)

A

Object Access

34
Q

________ When a user exercises a user right or privlege (Audit Event)

A

Privilege Use

35
Q

___________ Program activation, process exit, and indirect object access (Audit Event)

A

Process tracking (detailed tracking)

36
Q

__________ creation, deletion, or change of user account, group, or any password change (Audit Event)

A

account management

37
Q

__________ logon attempts, not authentication attempts (Audit Event)

A

Logon

38
Q

__________ Network-based access to computer and attempts to connect to shares; also known as authentication events (Audit Event)

A

account logon

39
Q

When a user accesses a directory service (AD) object with a SCAL

A

Directory Service Access

40
Q

What are the four options for a log when its full?

A

overwrite events, archive when full, do not overwrite events or clear logs

41
Q

All log configuration is maintinaed in the registry key
_____\___\_______\Services\Eventlog<eventlogname>

A

HKLM\SYSTEM\CurrentControlSet

42
Q

_________ Date and time event occurred (Event summary information)

A

Logged

43
Q

________ logged in user (Event summary information)

A

User

44
Q

______ name of computer where event occurred (Event summary information)

A

Computer

45
Q

_________ number that identifies the event type (Event summary information)

A

Event ID

46
Q

source-component or program

A

Source

47
Q

_______ classification of the event security

A

levels

48
Q

_______ describes a significant problem such as failure of a critical task (classification of event security)

A

Error

49
Q

_______ indicates a possible future problem such as when a disk becomes full (classification of event security)

A

warning

50
Q

_______ describes successful operation of a task, application, driver, or service (classification of event security)

A

information

51
Q

_______ indicates a problem has occurred that the system cannot automatically recover from (classification of event security)

A

critical

52
Q

_________ classification of event, by specific event source subcategory; used by security log. Description provides more amplifying information

A

Task category

53
Q

_________ may contain a value that identifies the function the application was performing when it raised the event.

A

Opcode

54
Q

_______ is the Microsoft implementation of centralized logging

What are the two advantages?

A

WEF windows event forwarding

keeps backups

sends backups to other systems

55
Q

The _________ is the heart and soul of the OS

A

Windows Registy

56
Q

When is the registry read?

A

Boot Process
Application Start-up
User Login

57
Q

The windows registry consists of _____ root keys

A

5

58
Q

______ - contains a SID sub-key for all loaded user profiles

A

HKEY_USERS HU

59
Q

______-contains specific information about the hardware, software, and preferences for all users who log into the system

A

HKEY_LOCAL_MACHINE HLM

60
Q

______ is derived form two keys, is used to associate file types with programs that are used to open them

A

HKEY_CLASSES_ROOT HCR

61
Q

_______ is derived from HKU<userSID> and contains user profile environment settings of the interactively logged on user

A

HKEY_CURRENT_USER HKC

62
Q

What are the following levels are associated with the application or system log?

A

error
warning
information
critical

63
Q

What are the derived keys?

A

HCC
HCR
HCU

64
Q

What are the master keys?

A

HKM
HKU

65
Q

HKEY___________________ - This key is derived from a link to
HKLM\SYSTEM\CurrentControlSet\Hardware Profiles\Current and is used to establish the
current hardware configuration profile

A

HKEY_CURRENT_CONFIGURATION HCC