1.3 Given a scenario, use features and tools of the Microsoft Windows 10 operating system (OS). Flashcards

1
Q

Enables an administrator to track and log event logins, security actions, crashes, and other events that have happened in the computer.

A

Event Viewer (eventvwr.msc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

snap-in of the MMC is a GUI-based application for analyzing and configuring hard drives. Try some of the configurations listed in the following sections on a test computer with one or two drives of unpartitioned space.

A

Disk Management (diskmgmt.msc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

run a task on a specified schedule.

A

Task Scheduler (taskschd.msc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

used to display installed device categories and specific installed devices, as well as to troubleshoot problems with devices.

A

Device Manager (devmgmt.msc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

is an MMC snap-in that enables administrators to manage group policy settings on a Windows computer. It is a powerful way to configure and control various aspects of the operating system and user environment in a centralized manner.

A

Group Policy Editor (gpedit.msc):

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

With this tool , you can set policies related to security settings, user rights, software deployment, network configuration, and more. Is especially useful in enterprise environments to enforce specific rules and configurations across multiple computers.

A

Group Policy Editor (gpedit.msc):

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

is an MMC snap-in that allows you to monitor and analyze the performance of various system resources and components in real-time on a Windows machine.

A

Performance Monitor/ perfmon.msc,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

It provides detailed performance data, such as CPU usage, memory usage, disk activity, network activity, and other performance counters._____ is commonly used by system administrators and IT professionals to diagnose performance issues, identify bottlenecks, and monitor system health over time.

A

Performance Monitor/ perfmon.msc,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

is an MMC snap-in in Windows that allows administrators to manage local user accounts and groups on the system. It provides a centralized interface for creating, modifying, and deleting user accounts and groups. With this tool you can change user properties, set passwords, manage group memberships, and assign user rights and permissions on a local computer.

A

Local Users and Groups (lusrmgr.msc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

provides a graphical user interface for managing digital certificates on a Windows system. Digital certificates are used to establish trust between entities, such as websites and applications, in a secure manner. Certmgr.msc allows you to view, install, and manage certificates in various certificate stores on the local machine and user accounts. It also enables you to import, export, and delete certificates, as well as view certificate details, certificate chains, and certificate revocation lists (CRLs).

A

Certificate Manager (certmgr.msc):

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a built-in utility in Windows that provides detailed information about the hardware, software, and system components of a computer. It offers a comprehensive view of the system’s configuration, including the processor, memory, storage devices, installed drivers, running processes, and more. System Information is useful for troubleshooting hardware and software issues, checking system specifications, and generating reports for technical support.

A

System Information (msinfo32.exe)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a Windows utility that allows users to monitor and analyze system resources in real-time. It provides detailed insights into CPU usage, memory usage, disk activity, network activity, and other performance metrics. Resource Monitor is particularly helpful for identifying resource-intensive processes or applications and diagnosing performance-related issues on a Windows system.

A

Resource Monitor (resmon.exe)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a utility that enables users to manage startup programs and services on a Windows computer. It provides a simple interface to control what programs and services start automatically when the system boots. By using msconfig.exe, users can troubleshoot startup problems, reduce boot times, and optimize system performance by selectively enabling or disabling startup items.

A

System Configuration (msconfig.exe)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a built-in Windows utility that helps users free up disk space by removing temporary files, system files, and other unnecessary files from the computer. It scans various system folders and presents a list of files that can be safely deleted to reclaim disk space. Disk Cleanup is useful for keeping the system tidy and maintaining optimal disk performance.

A

Disk Cleanup (cleanmgr.exe)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

a utility that helps optimize the layout of files on a hard disk drive to improve read and write performance. Over time, files on a disk may become fragmented, meaning they are scattered in non-contiguous sectors. Disk Defragment reorganizes these fragmented files to enhance disk efficiency and reduce access times.

A

Disk Defragment (dfrgui.exe)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a powerful tool that allows users to view and edit the Windows Registry. It should should be used with caution, as incorrect changes to the Registry can cause system instability. It is primarily intended for advanced users and IT professionals for specific troubleshooting and configuration tasks.

A

Registry Editor (regedit.exe)

17
Q

The ___is a centralized database that stores configuration settings, system settings, and application settings for the Windows operating system.

A

Registry

18
Q

____ is the most common way to attack an organization because its employees might fall for phishing attacks (described in the section, “Social Engineering Threats and Vulnerabilities”). Filtering can automatically organize ____ into folders, but from a security standpoint, its most important function is to block spam and potentially dangerous messages. ____ filtering can be performed at the point of entry to a network with a specialized ____ filtering server or appliance, as well as by enabling the spam- and threat-detection features that are built into ____ clients or security software.

A

Email

19
Q

Users can discard or quarantine spam or suspicious ____s, as well as retrieve false positives that are actually legitimate messages from the spam folder and place them back into the normal inbox.

A

Email

20
Q

____ protocols should be secured to ensure that ____ is encrypted. For example, by default, POP and IMAP ____ protocols are not secure. Using secure protocols such as POP3S (port 995) or IMAPS (port 993) allows the incoming data from the client to be encrypted because they use an SSL/TLS session.

A

Email

21
Q

As with key fobs, mentioned in the previous section on physical security, software tokens (or ____) are part of a multifactor authentication process. The difference is that software tokens exist in software and are commonly stored on devices. For example, logging into a secure system might require sending a soft token via SMS message to a smartphone for code authentication. Both hard tokens and soft tokens can be used in multifactor authentication, as described earlier in this section.

A

Soft Tokens

22
Q

A ____ is any physical device that a user must carry to gain access to a specific system. Examples are smart cards, RFID cards, USB tokens, and key fobs. (Key fob hardware tokens are explained earlier in this section.) ____

A

hard token

23
Q

____ is the standard format of text messaging between devices. Products might have their own message formats (for example, Apple uses iMessage on its devices), but ____ is a standard. ____ is usually used for multifactor soft tokens, described earlier.

A

Short Message Service (SMS)

24
Q

Soft tokens can be authenticated with a voice callback. When a user logs in to a site, they might have to authenticate with a ____and pressing a key provided by the service app on the phone. This is similar to the SMS login just described.

A

voice call

25
Q

Multifactor authentication services provide apps that are downloadable to phones and other devices. This is an easy way to provide second-factor authentications after login. When logging into a restricted site, the service pushes a token to the user’s registered device. Simply touching a confirmation button suffices for a fast and secure login.

A

Authentication Application

26
Q

Organizations that have many ____s need to administer them so that all devices and users comply with the security practices and policies in place. This is usually done with a suite of software known as ____ ____ . The ____ marketplace is quite competitive, and several solutions are available from companies such as VMware (AirWatch), Citrix (XenMobile), and SOTI MobiControl. These products push updates and allow an administrator to configure many ____s from a central location. Good ____ software secures, monitors, manages, and supports multiple different ____s across the enterprise.

A

Mobile Device Management /mdm

27
Q

____is a Microsoft solution for managing users, computers, and information access in a network. It is based on a database of all resources and users that will be managed within the network. The information in the database determines what people can see and do within the network. A complete understanding of ____is beyond the scope of this book, but every IT support person should know the basics of what it is and how it works.

A

Active Directory

28
Q

____: When a user logs onto the network, Active Directory knows who that user is and runs a ____ to make the assigned resources available. Examples of login tasks include virus updates, drive mappings, and printer assignments.

A

Login script

29
Q

The ___ is a computer network or group of computer networks under one administration. Users log into the Active Directory ___ to access network resources within the __.

A

domain

30
Q

This is a set of rules and instructions defining what a user or group of users can or cannot do when logged into the domain.

A

Group Policy:

31
Q

is a set of instructions assigned to a group of users or to certain machines on the network.

A

Group Policy Object (GPO)

32
Q

For example,

a team of accountants might be assigned to an OU, and their GPO might give them special access to financial records.

A

Organizational Unit (OU):

33
Q

are logical groups that help organize users and computers so that GPOs can be assigned to them.

A

Organizational Unit (OU):

34
Q

This folder, which is accessible to the network administrator, is where the user’s data and files are kept locally.

A

Home folder:

35
Q

These provide an efficient way to assign user rights and permissions to approved users who are accessing resources on the network. Group Policy (earlier in the list) can be used to assign rights to ____. Permissions can be assigned to a security group for shared resources at specific levels of access.

A

Security Groups:

36
Q

This allows for the work done by an OU to be saved on a common folder in the domain, as directed by the administrator instead of the user.

A

Folder redirection:

37
Q

For example:
a policy might dictate that all work be kept in a common folder so that all members of a team can see the latest work and updates.

A

Folder redirection:

38
Q
A