5.3 Flashcards

1
Q

Displays of changes file attributes.

A

attrib

Options:
+ or - R (Turns on/off read-only attribute)
+ or - H (Turns on/off hidden attribute)
+ or - S (Turns on/off system attribute)
+ or - A (Turns on/off archive attribute)

Syntax: attrib [+/- options] (filename)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Displays or modifies access control lists (ACLs) for directories and files.

A

cacls

Options:
/e (Edits ACL instead of replacing it)
/g (Grants specified user rights for a specified file/folder)

Syntax:
cacls (filename) [options] (user:perm)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Displays or modifies user account settings.

A

net accounts

Options:
/minpwlen:(length)
/minpwage:(days)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Displays, modifies, or creates user accounts.

A

net user

Options:
/add (Creates user account)
/delete (Deletes a user account)

Syntax:
net user (username) (password) /add
net user (username) /delete
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Displays, modifies, or creates group accounts.

A

net localgroup

Options:
/add (Creates a group account or adds a user account as a member.)
/delete (Deletes a group account or removes a user account as a member.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Identifies a user account to execute a program.

A

runas

Options: /user:(username) (Identifies user account)

Syntax: runas /user:(username) (program)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Displays a list of processes currently executing.

A

tasklist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Kills one or more processes.

A

taskkill

Options:
/pid (Specifies PI of process to be killed)
/IM (Specifies process by image name)

Syntax:
taskkill /pid (PID)
taskkill /IM (image name)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What attribute is turned on when the file needs a backup?

A

Archive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the three types of backup?

A

Full, Incremental, Differential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Commonly used to backup an entire system by selecting an entire volume. All files are backed up. Archive attributes are cleared, or turned off.

A

Full Backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Backs up selected files with the archive attribute. Only backs up files or directories that are new or changed since the last full or incremental backup.

A

Incremental Backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Backs up selected files with the archive attribute. Archive attributes remain on for files backed up during a differential backup.

A

Differential Backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Feature that returns the system to a workable state, should i become corrupt, without resorting to backup tapes.

A

System Restore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Snapshots of the system’s sate are created and stored as _________.

A

Restore Points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What can trigger the creation of restore points?

A
  • Installing an Application
  • Installing AutoUpdate
  • Restoring from Backup
  • Creating a Manual Restore Point
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the three event logs supported on all Windows system?

A

Application Log
Security Log
System Log

18
Q

Contains events logged by non-OS and 3rd party applications.

A

Application Log

19
Q

Contains events that may affect the security of the system; user activities such as logon/logoff and resource access attempts.

A

Security Log

20
Q

Contains events logged by OS components.

A

System Log

21
Q

Extremely versatile OS that is portable to a variety of hardware that was developed by researchers at AT&T Bell Labs.

A

UNIX

22
Q

A “work-alike” version of UNIX.

A

Linux

23
Q

In Linux, a _______is opened to access a shell where commands are entered.

A

Terminal Window

24
Q

Refers to an instrument panel that contains the controls of the computer.

A

Console

25
Q

A program that provides text only interface for Linux and other UNIX like OSs. Presents each user with a prompt, executes user commands, and supports a custom environment for each user.

A

Shell

26
Q

Differences between UNIX and Windows commands and formats.

A

UNIX Commands and files are case sensitive while Windows is not. Also, Windows paths use backslash () while UNIX paths use forward slash (/)

27
Q

Displays on-line manual pages about command. (UNIX)

A

man

Syntax:
man (command)

28
Q

Clears the current screen, providing an empty terminal window. (UNIX)

A

cls

29
Q

Displays text files a page at a time. (UNIX)

A

less

Options:
b (Allows backwards movement, pone page at a time)
/ (Initiates a search for a string (word)
q (Exits from less)
SPACE BAR (Advances one screen at a time)
ENTER Key (Advances one line at a time)

Syntax:
less (filename)

30
Q

Searches a file or files for lines that contain strings of a certain pattern. (UNIX)

A

grep

Syntax: grep (pattern) (filename)

31
Q

Creates one or more directories. (UNIX)

A

mkdir

Options:
-p (Creates directories where no parent directory exists)

Syntax:
mkdir (directory)
mkdir -p (directory)/(subdirectory1)/(subdirectory2)

32
Q

Creates a new user or updates default new user information. (UNIX)

A

useradd

Options:

  • d (Specifies the path of the user’s home directory;Linux- users’ home directories are in /home)
  • m (Makes a home directory if one does not already exist
  • n (Assigns whatever group is in default)

Syntax:
useradd -d /home/(username) -m -n (username)

33
Q

Deletes a user account (UNIX).

A

userdel

Options:
-r (username) ( (Recursively) Removes the home directory for specified user.)

Syntax:
userdel -r (username)

34
Q

Enables the user to change their password of for the administrator to set and modify password settings. (UNIX)

A

passwd

Syntax:
passwd (username)

35
Q

used to change from the current user account to another.

A

su

Syntax: su (username)

36
Q

What are the three main files that determine authentication and authorization for UNIX systems?

A
  • /etc/passwd (Authentication and Authorization)
  • /etc/shadow (Authentication)
  • etc/group/ (Authorization)
37
Q

File used to keep track of every registered user that has access to the system.

A

/etc/passwd file

38
Q

What are the seven fields in the /etc/passwd file?

A
  1. ) Username
  2. ) Password
  3. ) UID
  4. ) GID
  5. ) Comment
  6. ) Home Dir:
  7. ) Default Shell
39
Q

Contains password and account expiration information for all user accounts.

A

/etc/shadow file

40
Q

What are the 8 fields of the /etc/shadow file?

A
  1. ) User
  2. ) Hashed Password
  3. ) Lastchg
  4. ) Min
  5. ) Max
  6. ) Warning
  7. ) Inactive
  8. ) Expire
41
Q

A text file which defines the groups to which users belong.

A

/etc/group

42
Q

What are the four fields of the /etc/group file?

A
  1. ) Group name
  2. ) Password
  3. ) GID
  4. ) Users having this supplementary group