220-1002 Flashcards
Pass the CompTIA A+ 220-1002 test with complete mastery.
When a new harddisk leaves the manufacturer, creates cylinders, tracks and sectors on the platters
Low Level Format
halts any child processes
taskkill /t /pid processid
/t
Terminates the specified process and any child processes which were started by it.
/pid
Specifies the PID of the process to be terminated. Use TaskList to get the PID.
bottom of screen gives one-click access to favorite apps and files in macOS
dock
Opens device manager from runline
Devmgmt.msc
Despite the name being called “Device Manager”, the name used to call the application is short for Device Management.
UGO stands for…
User, Group, Others
User
User is the owner of the file. When you create a file, you become the owner of the file. The ownership can be changed as well, but we’ll see that later.
Group
Every user is part of a certain group(s). A group consists of several users and this is one way to manage users in a multi-user environment.
Other
‘Other’ can be considered as a super group with all the users on the system. Basically, anyone with access to the system belongs to this group.
In other words, ‘User’ is a single user, Group is a collection of users and Other consists of all the users on the system.
*Even if you are the only user of the system, you’ll still be part of many groups. Distributions like Ubuntu also create a group with name same as the user’s name.
Tip: Run the command groups to see what user-groups you belong to.
7 steps in the malware removal process are…
- Identify and research malware symptoms
- Quarantine infected systems
- Disable system restore
- Remediate infected systems:
- update anti-malware software
- scan and use removal techniques - Schedule scans and run updates
- Enable system restore
- Educate end user
IQ DR SEE
I (Identify)
Quietly (Quarantine)
Draw (Disable Restore)
Red (Remediate/Remove)
Shoes (Schedule Scans/Updates)
Every (Enable Restore)
Evening (Educate User)
How do you Force Quit in macOS?
in Apple menu or press command+option+esc
specifies the hour in cron(0-23)
hh
A collection of user accounts, computer accounts, and other groups that can be assigned permissions in the same way as a single user object.
Security Group
Clears the DNS resolver cache
ipconfig /flushdns
A ____ is a logical group of keys, subkeys, and values in the registry that has a set of supporting files loaded into memory when the operating system is started or a user logs in.
Hive
REGISTRY DATABASE FILES
The registry database is stored in binary files called hives. A hive comprises a single file (with no extension), a .LOG file (containing a transaction log), and a .SAV file (a copy of the key as it was at the end of setup). The system hive also has an .ALT backup file. Most of these files are stored in the %SystemRoot%\System32\Config folder, but hive files for user profiles are stored in the folder holding the user’s profile. The following table shows the standard hives.
HKEY_CURRENT_CONF
system, system.alt, system.log, system.sav
HKEY_CURRENT_USER
ntuser.dat, ntuser.dat.log
HKEY_LOCAL_MACHINE\SAM
ssam, sam.log, sam.savv
HKEY_LOCAL_MACHINE\SECURITY
security, security.log, security.sav
HKEY_LOCAL_MACHINE\SOFTWARE
software, software.log, software.sav
HKEY_LOCAL_MACHINE\SYSTEM
system, system.alt, system.log, system.sav
HKEY_USERS.DEFAUT
default, default.log, default.sav
HKEY_CLASSES_ROOT
Not stored in a hive but built from the \SOFTWARE\CLASSES keys in CURRENT_USER and LOCAL_MACHINE
Location of Log files in WIndows
%SystemRoot%\System32\Winevt\Logs folder
127.0.0.1
IPv4 Loop back address
The loopback address is used to test network software:
without physically installing a Network Interface Card (NIC),
and without having to physically connect the machine to a TCP/IP network.
Allow you to collect statistics about resources such as memory, disk, and processor
Peformance Monitor
-perfmon.msc
-Performance Monitor provides a visual display of built-in Windows performance counters, either in real time or as a way to review historical data. You can add performance counters to Performance Monitor by dragging and dropping, or by creating custom Data Collector Sets. It features multiple graph views that enable you to visually review performance log data. You can create custom views in Performance Monitor that can be exported as Data Collector Sets for use with performance and logging features.
32 bit application files location
Program Files(x86)
Do most things with an object but not to change its permissions or owner.
Modify
Stop a process using its unique ID (Windows)
taskkill /IM pid
A new feature of Windows 7 that enables users to rapidly access data from remotely located file and web servers. This enables users at a small branch to cache copies of frequently accessed files from head office servers on a local computer.
BranchCache
Bash shell script comment
# {#BashCom}
Bash-Hash
Same as Powershell Comments #
Linux shell scrips
.sh
View the contents of a file or folder or start a program
Read/List/Execute
quits a running program in command prompt
Control + C
Control connection to databases set up on the local computer
ODBC Data Sources
(Open Database Connectivity )
displays all files without an extension.
dir *.
Shows a list of services within each process
tasklist /svc
/svc Lists all the service information for each process without truncation. Valid when the /fo parameter is set to table.
An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
phishing
A network protocol for secure transfer of data between computers on port 22
SSH (Secure Shell)
SSH -> 22H = SSH/Port 22
refresh the local database with information about the packages available from the repository
apt-get update
Part of UEFI, successor to MBR. Windows allows up to 128 partitions at 2TB each. It also has a back up copy for parition entries
GPT (GUID Partition Table)
port 23
Telnet
Ensures old data on a hard drive is destroyed by writing zeros or a random patter to each location on the drive. Makes disk suitable for re-use.
Drive Wiping
change ownership in linux
chown
An account in which if a process is executed it is unrestricted in terms of making changes to the system configuration and file system (better than administrator account)
LocalSystem account
{SYSTEM has unrestricted access, SERVICES does not}
- One of the 3 Service User Accounts.
*NetworkService
*LocalService
(Both have minimum privileges)
-Operated by Service Control Manager
tool to copy code to make the partition bootable
bootsect
- Boot sector restoration tool
Bootsect.exe updates the master boot code for hard disk partitions in order to switch between BOOTMGR and NTLDR (the boot loader for all Win NT systems). You can use this tool to restore the boot sector on your computer.
Adds missing Windows installations to the BCD
bootrec /rebuildbcd
Common Usage:
Failure to boot/invalid boot disk
No OS found
A disk partition designated for swap space in linux.
Swap Partition
Apple equivalent of system restore
Time Machine
a file that contains all the contents of an optical disc
ISO File
Enables network-ready devices to discover each other automatically. Also allows configurations for devices to work with firewalls
UPnP (Universal Plug and Play)
Universal Plug and Play (UPnP) is a protocol framework allowing network devices to auto configure services such as allowing a game console to request appropriate settings from a firewall.
Windows automatically detects new or changed hardware, finds drivers, and installs and configures the device.
Minimal user input includes installing vendor drivers.
Microsoft has a repository of generic drivers for many common devices, Mice, keyboards, webcams, etc.
It will automatically install the closest match to the device detected, although this is not the same as the drivers from the device vendor, their drivers may include extra functionality especially for high-end devices and graphics cards, like programmable soft keys on a keyboard, or extra scroll settings on a mouse.
When a new hard drive leaves the manufacturer, creates cylinders, tracks and sectors on the platters
Low-level format
In windows, lists result files one screen at a time
dir /p
- Directory
- /P *Pauses after each screenful of information.
check free space and report usage by directories and files (linux)
df and du
The “disk free” command is a fantastic command-line tool that gives you a quick 30,000-foot view of your filesystem and all mounted disks. It tells you the total disk size, space used, space available, usage percentage, and what partition the disk is mounted on. I recommend pairing it with the -h flag to make the data human-readable.
The “disk usage” command is excellent when applied in the correct context. This command is at its best when you need to see the size of a given directory or subdirectory. It runs at the object level and only reports on the specified stats at the time of execution. I like to pair this command with the -sh flags to give a human-readable summary of a specified object (the directory and all subdirectories).
===============================================================================
In Windows, you can right click a drive/folder/file and select properties to find free space and usage
In Linux, what command is used to view tasks scheduled by the
current user?
crontab –l
All selected data regardless of when it was previously backed up (high backup, time low restore time uses one tape set)
full backup
A vulnerability that is exploited before the software creator/vendor is even aware of its existence.
zero-day exploit
Allows you to view cached passwords for websites and Windows/network accounts
Credential Manager
The file system older macOS uses
HFS Plus (Extended Hierarchical File System)
*Replaced by APFS (Apple Filing System)
displays the current state of network interfaces within linux
ifconfig/iwconfig
- ifconfig (ip a) -Display network info (legacy, newer distros use ip a )
- May need to be installed
- iwconfig -Display wireless adapter configurations/info.
schedules a system file scan whenever the PC boots
sfc /scanboot
-System File Checker
Linux User commands
Useradd, Usermod, Userdel
windows batch file escape character
%%
displays all files and directories in the current directory
dir *.*
- dir = Directory
- *.* = Show any file name with any extension.
lists all switches for the netstat command
netstat /? Or netstat /help
Located in Control Panel in Windows 7, is a collection of predefined Microsoft Management Consoles
Computer Management
Control Panel / Administrative Tools
• mmc.exe
(Linux) Shutdown at 5:30pm
shutdown -h 17:30
change permission modifiers in linux
chmod
Change ownership in linux.
chown
legacy file system used for optical disc media
CDFS (compact disc file system)
A collection of user accounts that can be assigned permissions in the same way as a single user object
Security Group
There are two forms of common security principals in Active Directory: user accounts and computer accounts. These accounts represent a physical entity (a person or a computer). Security groups are used to collect user accounts, computer accounts, and other groups into manageable units.
Groups are used to collect user accounts, computer accounts, and other groups into manageable units. Working with groups instead of with individual users helps simplify network maintenance and administration.
There are two types of groups in Active Directory:
Distribution groups: Used to create email distribution lists.
Security groups: Used to assign permissions to shared resources.
Security groups can provide an efficient way to assign access to resources on your network. By using security groups, you can:
- Assign user rights to security groups in Active Directory.
- Assign permissions to security groups for resources.
linux command that makes a copy of an input file to an output file
dd
AKA Duplicate Data (dd)
displays linux processes that are currently running
ps
- View the current processes
- And the process ID (PID)
- Similar to the Windows Task Manager
- View user processes
- ps
- View all processes
- ps -e | more
Medical and insurance records, plus hospital lab results
PHI (Protected Health Information)
• Health information associated with an individual
• Health status, health care records, payments
for health care, and much more
• Data between providers
• Must maintain similar security requirements
• HIPAA regulations
• Health Insurance Portability and Accountability Act of 1996
Removes a directory and its contents recursively (Linux)
rm -r
• Remove files or directories
• Deletes the files
• Does not remove directories by default
• Directories must be empty to be removed or
must be removed with –r (removes contents recursively)
is a text document containing commands for the operating system. The commands are run in the order they are listed
Script File
A text document containing OS commands or instructions from a scripting language.
Scripting Language:
A programming language that is not compiled, and must be run within a particular environment.
You may need command interpreter to execute the scrips.
You can open scripts in text editors or IDEs
- IDEs are designed to support scripting
- Autocomplete
- Debugging tools
Scripting Languages
Types of Instruction Sets:
- Compiled Programs (CPU performs instructions) *C++
- Scripts (OS or command interpreter performs instructions)
File extensions differ for each scripting language:
- Windows batch file: .bat
- PowerShell script: .ps1
- Linux shell script: .sh
- VBScript file: .vbs
- JavaScript file: .js
- Python script: .py
Scripts often used for smaller, repetitive tasks.
PowerShell file extension
.ps1
Queries a dns server about a host
nslookup -Option Host Server
- Lookup information from DNS servers
- Canonical names, IP addresses, cache timers, etc.
- Lookup names and IP addresses
- Many different options
Provide a way of dividing up a domain into different administrative realms
OU (Organizational Unit)
r-x
5
7 Read, Write, and Execute r w x
6 Read and Write r w -
5 Read and Execute r - x
- 4 Read only r - -
3 Write and Execute - w x
2 Write only - w -
- 1 Execute only - - x
0 none - - -
**REMEMBER 421
4 = R– (Read)
2 = -W- (Write)
1 = –X (eXecute)
The rest is just BASIC math.
Attempts to fix startup problems.
bootrec
Recovery Console: bootrec /rebuildbcd
- bootrec /fixmbr
- bootrec /fixboot
An interface between the user and computer and software.
shell
A Windows command that is similar to and more powerful than the xcopy command, used to copy files and folders.
robocopy
Disables dmartin account
net user dmartin /active:no
Where the local user accounts created are stored?
The Windows local security account database where local system account information is stored.
Users folder. The Users folder is located in the Local Users and Groups folder in the local Computer Management (MMC).
SAM (Security Accounts Manager)
Remote Settings location
control panel -> system -> remote desktop
Settings -> System -> Remote Desktop
CMD:
C:\WINDOWS\System32\control.exe system -> Remote Desktop
Sets radio power level, typically set to the highest level by default
Transmit Power
can be used to specify that date within the month(0-31) in cron
dd
File system created specifically for the Linux kernel.
ext (Extended File System)
schedules a scan when the computer is next restarted
sfc /scanboot
Actions that can be had with Services.
Start, restart ,stop and pause services.
linux command used to activate the partition swap space
swapon
a set of software tools that enable an unauthorized user to gain control of a computer system without being detected.
Rootkits
Windows log files that allow you to collect statistics about services, including extensions to Event Viewer to log data that would otherwise be inaccessible.
trace logs
The process of managing information over its life cycle
ICM (Information Content Management)
A mathematical function that converts an input of arbitrary length into an encrypted output of a fixed length
Hash
a single key is used to encrypt and decrypt data
symmetric encryption
Allows monitoring of Windows logs. System, security, application, and service events are recorded in these logs
Event Viewer
a program on a server that allows the network admin to approve updates for certain groups
WSUS
-Windows Server Update Service
WSUS, previously known as Software Update Services, is a computer program and network service that enables administrators to manage the distribution of updates and hotfixes released for Microsoft products to computers in a corporate environment.
A management console snap in for viewing and managing system logs.
Event Viewer
- (accessed through computer management, administrative tools, or eventvwr.msc)
What does gpresult do?
This command line tool displays the Resultant Set of Policy (RSoP) information for a target user and computer.
Displays the RSoP for a computer and user account
/S
system Specifies the remote system to connect to.
/U
[domain]user Specifies the user context under which the command should run. Can not be used with /X, /H.
/P
[password] Specifies the password for the given user context. Prompts for input if omitted. Cannot be used with /X, /H.
/SCOPE
scope Specifies whether the user or the computer settings need to be displayed. Valid values: “USER”, “COMPUTER”.
/USER
[domain]user Specifies the user name for which the RSoP data is to be displayed.
/X
Saves the report in XML format at the location and with the file name specified by the parameter. (valid in Windows Vista SP1 and later and Windows Server 2008 and later)
/H
Saves the report in HTML format at the location and with the file name specified by the parameter. (valid in Windows at least Vista SP1 and at least Windows Server 2008)
/F
Forces Gpresult to overwrite the file name specified in the /X or /H command.
/R
Displays RSoP summary data.
/V
Specifies that verbose information should be displayed. Verbose information provides additional detailed settings that have been applied with a precedence of 1.
/Z
Specifies that the super-verbose information should be displayed. Super- verbose information provides additional detailed settings that have been applied with a precedence of 1 and higher. This allows you to see if a setting was set in multiple places. See the Group Policy online help topic for more information.
Configures detailed reports on different system statistics and log performance over time
Performance Monitor
- (can be accessed through administrative tools, Computer Management or perfmon.exe command line)
an attack that convinces the network that the attacker’s MAC address is the one associated with an allowed address so that traffic is wrongly sent to the attacker’s machine
ARP poisoning
- Address Resolution Protocol poisoning (ARP poisoning) is a form of attack in which an attacker changes the Media Access Control (MAC) address and attacks an Ethernet LAN by changing the target computer’s ARP cache with a forged ARP request and reply packets.
utility that allows you to copy the contents of more than one directory at a time and retain the directory structure
xcopy
CIA
Confidentiality
Integrity
Availability
{With CIA, all answers end in “ity”
AAA does not!
Authentication
Authorization
Accounting}
shows a list of services within each process
tasklist /svc
VBScript
.vbs
specify image name to kill
taskkill /im PID
Example: End Notepad (14944)
C:\User> TaskKill /IM 14944
SUCCESS: Sent termination signal to the process with PID 14944.
Tools used to gather information about the way the network is built and configured and the current status of hosts. (nmap, ZenMap)
Finding out the specific version of OSs, software, network services, and so on can tell attackers what the known vulnerabilities are for the version you use.
network mapping
install new application in Linux
apt-get install (package name)
Dismounts volume C:
chkdsk C: /x
- Check Disk
- /x Forces the volume to dismount first if necessary.
All opened handles to the volume would then be invalid
(implies /F -fixes all errors on disk).
a utility to be ran before imaging a disk to solve possible configuration problems
Sysprep
- Microsoft’s System Preparation Tool
Sysprep Generalizes the image and removes computer-specific information such as installed drivers and the computer security identifier (SID).
The hard drive partition where the Windows OS is stored. The system partition and the boot partition my be different partitions
boot partition
{Boot Partition has the OS}
{System Partition has the BCD}
*Boot Configuration Database
App in macOS used to verify or repair a disk or file system
Disk Utility
the information is highly sensitive, for viewing only by approved persons within the organization
Confidential
- Top Secret = Highest level of restriction
- Secret = Valuable Info, Severely restricted
- Confidential = Highly sensitive info need approval before viewing
- Classified = Restricted, Internal/official use only (3rd party NDA)
- Unclassified = No restrictions
============================================================================
Top Secret
Secret
- Both have “Secret” “Top Secret” is on TOP
Confidential
-is Confidently in the MIDDLE
Classified
Unclassified
- Both have “Classified” “Unclassified” is UNDER classified
Can perform all management tasks and generally has very high access to all files and objects
Administrators
shows you the programs, processes, and services that are currently running on your computer (Ctrl + Alt + Del)
Task Manager
Runs a scan immediately to repair system files
sfc /scannow
Linux command used to search and filter contents of files displaying the lines that match the search string
grep
- Find text in a file
- Search through many files at a time
- grep PATTERN [FILE]
- > grep failed auth.log
ext3 vs ext4
Ext4 is functionally very similar to ext3, Both support journaling but Ext4 brings large filesystem support, improved resistance to fragmentation, higher performance, and improved timestamps.
a text file editor in linux
vi/vim
Records events generated during installation
Setup Logs
Displays ports and addresses in numerical format. Skipping name resolution speeds up each query
netstat -n
-n Displays addresses and port numbers in numerical form.
{N = numerical}
====================================================================
Example:
Proto ___ Local Address _____ Foreign Address _______ State
TCP ___ 10.32.9.109:49264 ___ 35.186.224.42:443 ___ ESTABLISHED
TCP ___ 10.32.9.109:49501 ___ 149.96.232.187:443 ___ ESTABLISHED
TCP ___ 10.32.9.109:49521 ___ 10.32.9.28:7337 _____ ESTABLISHED
TCP ___ 10.32.9.109:49532 ___ 10.32.9.28:6336 ____ ESTABLISHED
TCP ___ 10.32.9.109:51786 ___ 10.32.9.14:1611 _______ ESTABLISHED
TCP ___ 10.32.9.109:52161 ___ 52.113.196.254:443 ____ CLOSE_WAIT
Opens disk management console from runline
Diskmgmt.msc
All user accounts that have been authenticated to access the system would end up here.
Authenticated Users Group
The Authenticated Users group includes all users whose identities were authenticated when they logged on. This includes local user accounts as well as all domain user accounts from trusted domains and also users from other forests that access resources in the local forest using valid credentials and using a forest or external inter-forest trust relationship.
The Everyone group is a superset of the Authenticated Users group. It includes the Authenticated Users group and the Guest account. An important difference between the Everyone and Authenticated Users groups lies in their Guest and Anonymous accounts’ membership
Opens the Computer Management console from runline
compmgmt.msc
These attack the boot sector, partition table and file system
boot sector virus
binary files that store the registry database
hive
Files are rearanged into contiguous clusters inproving read performance
Defragmentation
saves current session to memory and put the computer into a minimal power state
Sleep/Standby Mode
{Sleep/StandBy mode sends data to Memory}
{Hibernate mode sends data to Disk}
HOSTS file location in Windows
%SYSTEMROOT%\System32\drivers\etc\hosts
=========================================================
The hosts file is an operating system file on Windows PC that lets you map specific domain names to an IP address. Windows will use the hosts file each time when connecting over a network using a hostname. It’s used to translate hostnames into numeric protocol addresses that identify and locate a host in an IP network.
This is similar to nslookup where a domain name is translated to IP.
Causes all policies(new and old to be reapplied)
gpupdate /force
- Group Policy Update /force
A storage location in the environment of the operating systems command shell.
Location to store information about the operating system environment. This information includes details such as the operating system path, the number of processors used by the operating system, and the location of temporary folders. It also stores data that is used by the operating system and other programs.
environment variable
Microsoft peer to peer network model in which computers are grouped together with access to shared resources
Workgroup
Capturing and reading data packets as they move over a network
eavesdropping
The software component that provides the core set of operating system functions
kernel
A type of virus that spreads through memory and network connections rather than infecting files. Autonomously spreads and/or self replicates without user interaction
Worm
- Self-contained
- Typically target network application vulnerability
- Rapidly consumes network bandwidth.
View the performance of the local computer
Reliability and Performance Monitoring
Authenticates user before committing any resources to RDP session preventing denial of service attacks
NLA (Network Level Authentication)
NLA is a feature of Remote Desktop Services (RDP Server) or Remote Desktop Connection (RDP Client) that requires the connecting user to authenticate themselves before a session is established with the server.
Governs the processing of credit card and other bank payments
PCI-DSS (payment card industry data security standard)
===============================================================================
Anything having to do with PAYMENT CARDS or there related INDUSTRY aka banking. Banks want there DATA secured with this STANDARD
Payment
Card
Industry
Data
Security
Standard
PCIDSS
A type of authentication suitable for server and domain based networks
RADIUS
-Remote Authentication Dial-In User Service
RADIUS protocol implements AAA, Authentication, Authorization, and Accounting.
Dismounts volume C:
chkdsk C: /x
/x Forces the volume to dismount first, if necessary. All open handles to the drive are invalidated. /x also includes the functionality of /f.
/f Fixes errors on the disk. The disk must be locked. If chkdsk cannot lock the drive, a message appears that asks you if you want to check the drive the next time you restart the computer.
A group of sectors
Cluster
Appears in legacy applications but is deprecated because the rights allocated to this account type can be abused to allow the user Administrative or System privileges
Power Users
Sets radio power level, typically set to the highest level by default.
Transmit Power
A type of network attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network
Replay attack
An application used to provide detailed diagnostic information about your mac
System Information
A management console snap in for viewing and managing system logs
Event Viewer
- (accessed through computer management, administrative tools, or eventvwr.msc)
Directory listings in order by date
dir /o:d
/o (Order) how?
:d (by Date)
/o:d (Order:by date)
Apple equivalent of Ctrl button
Command
Disables dmartin account
net user dmartin /active:no
The highest level of classification
Top Secret
a tool that reads the contents of a drive and writes the output to a .WIM format file.
DISM
- Microsoft’s Deployment Image Servicing and Management
Python comments
#
A program that appears desirable but actually contains something harmful
Trojan Horse
A management console that provides an interface for managing user and group accounts.(not available in Starter or Home editions)
Local Users and Groups (lusrmgr.msc)
- The Local Users and Groups in Windows 10 is an area where you can secure and manage user accounts or groups. These user accounts or groups must be stored locally on Windows 10 for you to be able to manage them.
Tab in system properties that provides option for system restore
System Protection Tab
displays all files without an extension.
dir *.
Used in public key encryption, its a scheme in which the key to encrypt the data is different from the key to decrypt ( uses an RSA cipher)
Asymmetric Encryption
Do anything with the object, including change its permissions and its owner
Full Control
The database that contains the users, groups, and computer accounts in a Windows Server Domain
Active Directory
Write permission is required for the destination folder and read for the source folder. NTFS permissions are inherited from the destination folder and the user becomes the Creator/Owner
Copying files and folders on the same NTFS volume or different volumes
- The only instance where the source folder has Read permissions, The rest are Modify.
- As with Moving files/folders to a different NTFS volume, NTFS permissions are inherited from the destination folder and the user becomes the Creator/Owner.
Both 64 bit file systems that support journaling but ext4 delivers better performance
ext3 vs ext4
A feature within NTFS on Windows systems that supports encrypting individual files or folders for confidentiality.
EFS (Encrypting File System)
The account that created or “owns” an object, usually a user account.
Creator Owner Group
linux command that shows the default gateway because ifconfig does not
route
Error message when you try to ping an IP
Destination Host Unreachable
-“Destination Host Unreachable” is one of the usual but unexpected errors that flow out while carrying a network ping test. It is a type of Troubleshooting IP Default Gateway Issues that induce incorrect default gateway, which further leads to halt in a network ping test.
Microsoft client/server network model that groups computers together for security and to centralize administration
Domain
- An Active Directory Domain is a collection of objects within a Microsoft Active Directory network. An object can be a single user or a group or it can be a hardware component, such as a computer or printer.
tab in system properties that provides option for system restore
system protection tab
An applet to set the programs you wish to use, or choosing which application is used to open files of a particular extension
Default Programs
a utility that provides a manual interface for verifying system files and restoring them from cache if they are corrupt or damaged
sfc
- System File Checker
Read a file and change it, or create a file within a folder, but not to delete it
Write
Shuts the Windows computer down in 30 seconds
shutdown /t 30
Resolves address to hostnames
ping -a IPaddress
-a Resolve addresses to hostnames.
capturing and reading data packets as they move over a network
Eavesdropping
specifies minutes past the hour in cron(0-59)
mm
Either parameter will generate a detailed explanation of the command in Linux
man/ –help
shuts the computer down in 1 minute
Windows:
shutdown /s /t 60
macOS/Linux:
sudo shutdown -h (default is 1 minute)
sudo shutdown -h +5 (5 minutes from now)
sudo shutdown -h 00:05 (also works in hh:mm format)
Allows Group Policy Object management without Active Directory on standalone computers.
Exposes the whole registry configuration using a dialog-based interface(Offers a wider range of settings than Local Security Policy)
Local Group Policy Editor (gpedit.msc)
(LGPO or LocalGPO)
attempts to repair MBR
bootrec /fixmbr
Linux, install new application
apt-get install (package name)
linux command-line program used to create and manage partitions on a hard disk
fdisk
An account that has the same privileges as LocalService but can access the network using the computer’s machine account’s credentials
NetworkService
In administrative tools. You would use this to configure password and account policies with out going into the registry
Local Security Policy (secpol.msc)
The Local Security Policy snap-in (Secpol.msc) restricts the view of local policy objects to the following policies and features:
*Account Policies
*Local Policies
*Windows Firewall with Advanced Security
*Network List Manager Policies
*Public Key Policies
*Software Restriction Policies
*Application Control Policies
*IP Security Policies on Local Computer
*Advanced Audit Policy Configuration
Policies set locally might be overwritten if the computer is joined to the domain.
The Local Security Policy snap-in is part of the Security Configuration Manager tool set.
tool to setup partitions on a hard drive. Sets up active partition
Diskpart
Questions
Answers
In OS X, a utility to remotely view and control a Mac and is similar to Remote Assistance in Windows.
Screen Sharing
changes the name of volume D to volume E
format D: /v:E
format Volume [/V:volume]
/V:label -Specifies the volume label.
- Change the name of D volume to E
Not the apple equivalent of the Ctrl button
Control
displays all files with the DOC extension in the current directory
dir *.doc
A feature of OS X that gives other computers on the network access to the Mac’s optical drive. System Preferences -> Sharing
Remote Disc
Group Policy Snap in
gpedit.msc
(Linux)stops a process using its Process ID
ps
-Gets all process and there PIDs
kill [PID]
-Ends the PID entered
Displays DHCP, DNS server, MAC address, and NetBIOS status
ipconfig /all
The database that contains the users, groups, and computer accounts in a Windows Server Domain
Active Directory
Time it takes for a signal to reach the recipient
Latency
list by date created
dir /t:c
/t [List time fields] what time fields?
:c [created]
Other time fields:
C Creation
A Last Access
W Last Written
firewall implemented as software on the individual host computer
Host Firewall
Displays all connections and listening ports.
netstat -a
-a Displays all connections and listening ports.
{A for ALL}
list by last time accessed
dir /t:a
/t [list by time field] what time field?
:a [last accessed]
C Creation
A Last Access
W Last Written
Information gathering threat in which the attacker attempts to learn about the configuration of the network and security systems
footprinting
Python file extension
.py
checks the integrity of disks and can repair any problems detected
chkdsk
-Check Disk
/f [fix all errors found]
acts as the emulator for allowing 32-bit applications to run seamlessly on a Windows 64-bit OS
WOW64
Linux shell script
.sh
Windows group that includes all users
Everyone Group
System for which vendors have dropped all support for security updates due to the system’s age.
End-of-life System
rw-
6
7 -Read, Write, and Execute r w x
6 -Read and Write r w -
5 -Read and Execute r - x
4 -Read only r - -
3 -Write and Execute - w x
2 -Write only - w -
1 -Execute only - - x
4 -(letters in) READ
2 -write
1 -eXecute
Read + Write = 6 (rw-)
–x
1
Under this protocol Authentication, Authorization, and Accounting are performed by a separate server
RADIUS (Remote Authentication Dial-In User Service)
{Think - RAAADIUS}
- RADIUS is a networking protocol, operating on ports 1812 and 1813, that provides centralized Authentication, Authorization, and Accounting (AAA or Triple A) management for users who connect and use a network service.
Provides remotely accessible database for storing, operating system, device, and software application configuration information
Windows Registry
%SystemRoot%\System32\Winevt\Logs
Where the log files stored
a feature to secure access to shared folders and printers. (exists in windows 7 and 8 but not in later versions of windows 10)
Homegroup
A utility on macOS that allows a full windows installation to be made on a Mac. Applications ->Utilities folder
Boot Camp
A partition that contains an image of the bootable partition created when the computer was built.(Restores OS to factory settings)
Factory Recovery Partition
WoWLAN
Wake on Wireless LAN
Applies a new or changed policy to a computer immediately
gpupdate /force
The active partition of the hard drive containing the boot record and the specific files required to start the Windows launch.
System Partition
lists both wide format and one screen at a time
dir /w/p
A tool that reads the contents of a drive and writes the output to a .WIM format file.
DISM
- Microsoft’s Deployment Image Servicing and Management
- .WIM Windows Image Format
view and change environment variables in Linux
printenv or env command
restricts OS installation to trusted software
secure boot
virtual file system for linux
VFAT (virtual file allocation table)
- Uses the same data structures that Windows uses
- Supports long (255) file names
The switch or router performs authentication of the attached device before activating the port
PNAC
- Port-based network access control
A third party that vouches for certificates
A server that can issue digital certificates and associated public/private key pairs. A way of authenticating that the keys are authentic.
CA
- Certificate Authority
Displays, Storage, Service
apple menu items
to adjust settings of an apple track pad
System Preferences -> Trackpad
Commands to reset the network adapter in Windows 7/8
ipconfig /flushdns
netsh interface ip reset resetlog.txt (netsh i i r r)
netsh winsock reset
- /flushdns
Reverts the DNS file to default. - netsh interface ip reset resetlog.txt
Rewrites two registry keys that are used by TCP/IP - netsh winsock reset Winsock settings contain your computer’s configuration for Internet connectivity. This reverts them to default.
- netsh = Network Shell
installing an new OS that completely replaces the old one
clean install
End a process using its unique ID
taskkill /pid
===============================================================================
To end a process by name:
taskkill /IM
Taskkill /IM notepad.exe
Either parameter will generate a detailed explanation of the command in Linux
man/ –help
An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
Phishing
Runs on on TCP port 3389.
RDP (Remote Desktop Protocol)
Allows you to view and edit current security policy
Local Security Policy (secpol.msc)
- The local security policy of a system is a set of information about the security of a local computer. The domains trusted to authenticate logon attempts. Which user accounts may access the system and how. For example, interactively, through a network, or as a service.
Halt or power off the system (Linux)
shutdown -h
runline command for system restore
rstrui.exe
*Restore Utility
ReSToR UtIlity