02 Flashcards

1
Q

What are the commands used to identify if your on a VM?

A

ipconfig /all, system info, task list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What command identifies the MAC address of a VM?

A

ipconfig /all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can you tell if a MAC address belongs to an VM?

A

First Octet has 00

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What command lets you see the system manufacturer/system model info on a VM?

A

systeminfo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What command will let you see installed NICs ona VM?

A

systeminfo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What command will let you see all the processes on windows?

A

tasklist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Windows _________ is an object-oriented, interactive command environment with script language features

A

Powershell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The __________ cmdlet lets you see all of the parameters and arguments for a particular cmdlet

A

get-help

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Required and optional parameters for a particular cmdlet may change depending on the version of PS T/F?

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

________ parameters are specified by name with the cmdlet

A

named

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

___________ lets PS assume the parameter name associated with an argument based on the position of the argument in syntax

A

positional notation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are common parameters in PS and what do they represent

A

-name states the name of an object (exp username, cmdlet name, path name)

-computername state the name/IP on whiich to perform the action

-Path state the path of the directory

-examples use with get-help to show syntax examples

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Parameters can be
__________
__________
_________
________

A

Required
Optional
Named
Positional notation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_________ define additional information associated with a parameter name

What are some common __________?

A

Arguments

-Path
-Name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

__________ refers to the process of passing the results of one cmdlet as input into a second cmdlet

A

piping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The ____ cmdlet sends data in two directions simultaneously

What an example of it?

A

Tee-Object

Tee-Log.txt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

When using the get-childitem in PS how would I filter only the name and time of creation of the files pulled?

A

select lets you search for specific parameters

select name, *time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

_________ gives a complete list of aliased commands and their associated PS cmdlet

A

Get-Alias

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

________ are packages of PS commands, consisting of cmdlet, functions, variables, and aliases

A

modules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How do you view modules imported in a PS session?

A

Get-Module

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

__________ queries a computer system for information about the manufacturer and model PS cmdlet

A

get-wmiobject win32_computersystem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the new version of get-wmiobject?

A

get-ciminstance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

__________ enables a user to gather data and change settings on one or more remote computers using certain PS cmdlets that have a ______________ parameter

A

PS remoting, -computername

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are some cmdlets that include the -computername parameter option?

A

Restart-computer
Test-connection
Clear-eventlog
Get-WMIObject
Get-HotFix
Get-Service
Get-WinEvent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What are the two uses of variables in scripting PS?
store information for later use in a script store information that is a result of a script
26
________ is a way for the OS and its services and applications to record important actions, post status messages, and track security events.
logging
27
_________ contains events logged by Active Directory, enabled when Active Directory is loaded Domain Logs
Directory Service Log
28
________ contains information about replication events including changes to SYSVOL Domain Logs
DFS Replication Log
29
________ available when a machine is configured as a DNS server
DNS server log
30
___________ is the tracking of changes, within computer systems, changes, or events, are tracked in the logs that the system keeps.
Auditing
31
What is the command to enable auditing in cmd?
auditpol
32
______ changes to user rights, windows firewall, group policy, or audit policies (Audit Event)
Policy change
33
_______ When an Object (e.g.,file,folder,etc.) is accessed that has a *SACL (Audit Event)
Object Access
34
________ When a user exercises a user right or privlege (Audit Event)
Privilege Use
35
___________ Program activation, process exit, and indirect object access (Audit Event)
Process tracking (detailed tracking)
36
__________ creation, deletion, or change of user account, group, or any password change (Audit Event)
account management
37
__________ logon attempts, not authentication attempts (Audit Event)
Logon
38
__________ Network-based access to computer and attempts to connect to shares; also known as authentication events (Audit Event)
account logon
39
When a user accesses a directory service (AD) object with a SCAL
Directory Service Access
40
What are the four options for a log when its full?
overwrite events, archive when full, do not overwrite events or clear logs
41
All log configuration is maintinaed in the registry key _____\____\________\Services\Eventlog\
HKLM\SYSTEM\CurrentControlSet
42
_________ Date and time event occurred (Event summary information)
Logged
43
________ logged in user (Event summary information)
User
44
______ name of computer where event occurred (Event summary information)
Computer
45
_________ number that identifies the event type (Event summary information)
Event ID
46
source-component or program
Source
47
_______ classification of the event security
levels
48
_______ describes a significant problem such as failure of a critical task (classification of event security)
Error
49
_______ indicates a possible future problem such as when a disk becomes full (classification of event security)
warning
50
_______ describes successful operation of a task, application, driver, or service (classification of event security)
information
51
_______ indicates a problem has occurred that the system cannot automatically recover from (classification of event security)
critical
52
_________ classification of event, by specific event source subcategory; used by security log. Description provides more amplifying information
Task category
53
_________ may contain a value that identifies the function the application was performing when it raised the event.
Opcode
54
_______ is the Microsoft implementation of centralized logging What are the two advantages?
WEF windows event forwarding keeps backups sends backups to other systems
55
The _________ is the heart and soul of the OS
Windows Registy
56
When is the registry read?
Boot Process Application Start-up User Login
57
The windows registry consists of _____ root keys
5
58
______ - contains a SID sub-key for all loaded user profiles
HKEY_USERS HU
59
______-contains specific information about the hardware, software, and preferences for all users who log into the system
HKEY_LOCAL_MACHINE HLM
60
______ is derived form two keys, is used to associate file types with programs that are used to open them
HKEY_CLASSES_ROOT HCR
61
_______ is derived from HKU\ and contains user profile environment settings of the interactively logged on user
HKEY_CURRENT_USER HKC
62
What are the following levels are associated with the application or system log?
error warning information critical
63
What are the derived keys?
HCC HCR HCU
64
What are the master keys?
HKM HKU
65
HKEY___________________ - This key is derived from a link to HKLM\SYSTEM\CurrentControlSet\Hardware Profiles\Current and is used to establish the current hardware configuration profile
HKEY_CURRENT_CONFIGURATION HCC