A+1102 Exam Review Flashcards
Pass the first time
ls
Linux Command: List directory contents
pwd
Linux Command: show what directory you are in
mv
Linux Command: move or rename a file
cp
Linux Command: copy a file
rm
Linux Command: remove a file
chmod
Linux Command: change permissions
chown
Linux Command: change owner
su/sudo
Linux Command: switch user/superuser do (something)
apt-get
yum
Linux Command: tool to manage applications & updates
Based on Linux distribution (version)
ip
Linux Command: show ip address
df
Linux Command: shows disk free space
grep
Linux Command: look inside a file for text
ps
Linux Command: process status
man
Linux Command: the Linux help manual
top
Linux Command: shows top running programs
find
Linux Command: search for a file
dig
Linux Command: used to lookup DNS information
cat
Linux Command: view a file
nano
Linux Command: file editor
AAA Model
Authentication
Who Are you?
ex: I am user student and my password validateme proves it.
AAA Model
Authorization
What can you do?
ex: What can you access host serverXYZ using Telnet.
AAA Model Accounting
What did you do? How long did you do it? How often did you do it?
ex: User student accessed host serverXYZ using Telnet for 15 minutes.
CIA Triad
Confidentiality
Confidentiality prevents unauthorized disclosure of information
CIA Triad
Integrity
Integrity assures that data cannot be modified in an unauthorized manner.
CIA Triad
Availability
Information should be readily available for the authorized users.
Malware
Bugs
A type of error, flaw or failure that produces an undesirable or unexpected result. Bugs typically exist in a website’s source code and can cause a wide range of damage.
Malware
Worms
A worm relies on security failures to replicate and spread itself to other computers. They are often hidden in attachments and will consume bandwidth and overload a web server
Malware
Virus
A piece of code that is loaded onto your website or computer without your knowledge. It can easily multiply and be transmitted as an attachment or file.
Malware
Bots
A software program created to perform specific tasks. Bots send spam or be used in a DDoS attack to bring down an entire website.
Malware
Trojan Horse
Much like the myth, a Trojan disguises itself as a normal file and tricks users into downloading it, consequently installing malware.
Malware
Ransomware
Ransomware denies access to your files and demands payment through Bitcoin in order for access to be granted again.
Malware
Adware
A type of malware that automatically displays unwanted advertisements. Clicking on one of these ads could redirect you to a malicious website.
Malware
Spyware
A type of malware that functions by spying on a user’s activity. This type of spying includes monitoring a user’s activity, keystrokes, and more.
NTFS File and Folder Permissions
Action: Moving files and folders on the same NTFS volume
Effect: ?
Destination folder: Write permission
Source folder: Modify permission
NTFS permissions are retained
NTFS File and Folder Permissions
Action: Moving files and folders to a different NTFS volume
Effect: ?
Destination folder: Write permission
Source folder: Modify permission
NTFS permissions are inherited from the destination folder and the user becomes the Creator/Owner
NTFS File and Folder Permissions
Action: Copying files and folders on the same NTFS volume or different NTFS volumes
Effect: ?
Destination folder: Write permission
Source folder: Read permission
NTFS permissions are inherited from the destination folder and the user becomes the Creator/Owner.
NTFS File and Folder Permissions
Action: Moving files and folders to a FAT or FAT32 partition.
Effect: ?
Source folder: Modify permission.
All permissions and NTFS attributes (such as encryption) are lost.
NTFS
New Technology File System
Uses log file and checkpoint info to restore consistency of the file system after a system failure
Uses ACLs (Access Control List) to set permissions on files and folders, can use Bitlocker
Handles 8 petabytes on new versions of Windows
Supports per-file compression and encryption, which helps in saving space and securing data
/?
Windows Command: This command is also known as the HELP command. When placed after any command, it will give a help list of how to use that specific command! This is placed AFTER the command.
ex: ipconfig /?
Help
Windows Command: The same as /?, but it will be placed BEFORE a command.
ex: Help ipconfig
Ipconfig
Windows Command: A command line tool used to control the network connections on Windows! It will show most of the network information you’ll need. Network configuration, including IP addresses, subnet masks, and default gateways
Ipconfig /all
Not only will ipconfig /all show you your basic network settings, it will also show you Mac addresses, detailed IPv6 information, IP address leases and DHCP connection information
Windows 10 Editions: Home
Designed for home users, with basic features like Cortana and the Edge web browser, but lacks some business-oriented features like domain access, Remote Desktop Protocol (RDP), and Bitlocker
Windows 10 Editions: Pro
Designed for small businesses, with added features like domain access, Remote Desktop Protocol (RDP), and BitLocker
Windows 10 Editions: Pro for Workstations
Designed for power users and professionals with high-end hardware, with features like support for up to 6 TB of RAM, ReFS file system, and support for non-volatile memory (NVMe) and persistent memory
Windows 10 Editions: Enterprise
Designed for large organizations with advanced security features, including Windows Defender Application Guard and Credential Guard.
Feature Differences: Domain Vs Access Group
Home and Pro editions can only join a workgroup, while enterprise edition can join a domain
Feature Differences: Desktop styles/user interface
The Home edition does not support the ability to change the desktop wallpaper, and it does not include the Group Policy Editor (gpedit.msc) tool
Feature Differences: Availability Of Remote Desktop Protocol (RDP)
Only the Pro, Pro for Workstations, and Enterprise editions support RDP
Feature Differences: RAM support limitations
Home and Pro editions have limitations on the amount of RAM they support, while Pro for Workstations, and Enterprise editions support larger amounts
Feature Differences: BitLocker
Only the Pro, Pro for Workstations, and Enterprise editions support BitLocker drive encryption
Feature Differences: gpedit.msc
Only the Pro and Enterprise editions include the Group Policy Editor tool
Upgrade Paths for Windows 10
All editions of Windows 10 can be upgraded to a higher edition through an in-place upgrade, except for Enterprise Edition, which requires a clean install
Windows Command: cd
Changes the current directory to another directory
Windows Command: dir
Displays a list of files and folders in the current directory
Windows Command: md
Creates a new directory
Windows Command: rmdir
Deletes a directory
Windows Command: Drive navigation inputs of C: or D: x::
Changes the current drive to the specified drive
Windows Command: ping
Tests network connectivity by sending an ICMP echo request to a destination IP address or hostname
Windows Command: hostname
Displays the name of the current computer
Windows Command: netstat
Shows active network connections, protocol statistics and network interface information
Windows Command: nslookup
Queries the DNS server to obtain domain name or IP address mapping information
Windows Command: chkdsk
Checks a disk for errors and repairs them if possible
Windows Command: net use
Connects to or disconnects from shared resources, such as network drives and printers
Windows Command: net user
Manges user accounts on the local computer or a remote computer
Windows Command: tracert
Traces the path that a packet takes from the local computer to a remote destination
Windows Command: format
Formats a disk drive or a partition
Windows Command: xcopy
Copies files and directories, including subdirectories and files that match specified file types
Windows Command: copy
Copies one or more files from one location to another
Windows Command: robocopy
Copies files and directories with advanced options, including the ability to resume interrupted transfers and copy permissions and attributes
Windows Command: gpupdate
Updates group policy settings on the local computer or a remote computer
Windows Command: shutdown
Shuts down or restarts the local computer or a remote computer
Windows Command: sfc
Scans and repairs system files
Windows Command: (Command Name) /?
Displays help for the specified command
Windows Command: diskpart
Manages disk partitions and volumes
Windows Command: pathping
Traces the path that a packet takes from the local computer to remote destination, showing the round-trip times for each router along the way
Windows Command: winver
Displays the version of Windows installed on the computer
Task Manager: Services
This tab displays the list of services that are currently running on the computer, along with their status, startup type, and description. You can start, stop, or restart services from this tab.
Task Manager Startup
This tab displays the list of applications and processes that are configured to start automatically when the computer boots up. You can enable or disable startup items from this tab.
Task Manager: Performance
This tab displays real-time information about the computer’s hardware usage, including CPU, memory, disk, and network usage. You can use this tab to monitor the performance of the computer and identify any bottlenecks.
Task Manager: Processes
This tab displays the list of running processes on the computer, including their names, CPU and memory usage, and status. You can use this tab to end processes that are consuming too many resources or causing problems
Task Manager: Users
This tab displays the list of users who are currently logged on to the computer, along with their session ID and status. You can use this tab to log off or disconnect users, or to view the processes and resource usage of each user.
Microsoft Management Console (MMC) snap-in: Event Viewer
It is a tool to view and manage system event logs.
Microsoft Managment Console (MCC) snap-in: Disk Management
diskmgmt.msc
It is a tool to manage disks, partitions, and volumes
Microsoft Management Console (MMC) snap-in: Task Scheduler
taskschd.msc
It is a tool to create and manage automated tasks or scripts
Microsoft Management Console (MMC) snap-in: Device Manager
devmgmt.msc
It is a tool to manage system devices and drivers
Microsoft Management Console (MMC) snap-in: Certificate Manager
certmgr.msc
It is a tool to manage digital certificates
Microsoft Management Console (MMC) snap-in: Local Users and Groups
lusrmgr.msc
It is a tool to manage local user and group accounts
Microsoft Management Console (MMC) snap-in: Performance Monitor
perfmon.msc
It is a tool to monitor and analyze system performance
Microsoft Management Console (MMC) snap-in: Group Policy Editor
gpedit.msc
It is a tool to manage system policies and configurations
System Information
msinfo32.exe
It is a tool to view detailed system information, including hardware and software components
Resource Monitor
resmon.exe
It is a tool to monitor system resources such as CPU, memory, disk, and network usage
System Configuration
msconfig.exe
It is a tool to manage system startup setting, services and boot options
Disk Cleanup
cleanmgr.exe
It is a tool to free up disk space by removing unnecessary files
Disk Defragment
dfrgui.exe
It is a tool to optimize disk performance by rearranging fragmented files
Registry Editor
regedit.exe
It is a tool to view and manage the system registry, which contains configuration settings for the system and installed applications
Control Panel: Internet Options
allows you to manage various internet settings, such as security, privacy, content, and connections
Control Panel: Devices and Printers
allows you to view and manage the devices connected to your computer, including printers, cameras, and smart phones
Control Panel: Programs and Features
Allows you to view and manage the installed programs and features on your computer, including uninstalling programs
Control Panel: Network and Sharing Center
allows you to view and manage your network connections and sharing options, such as file and printer sharing
Control Panel: System
allows you to view and manage system settings, including system information, device manager, and performance settings
Control Panel: Windows Defender Firewall
allows you to manage the Windows Firewall settings, including enabling or disabling the firewall, creating firewall rules, and configuring notifications
Control Panel: Mail
allows you to manage your email accounts and settings, including adding and removing email accounts, changing email settings, and setting up email signatures
Control Panel: Sound
allows you to manage your computer’s audio settings, including playback and recording devices, volume, and sound effects
Control Panel: User Accounts
allows you to manage user accounts on your computer, including creating and deleting user accounts, changing account settings, and managing passwords
Control Panel: Device Manager
allows you to manage hardware devices installed on your computer, including updating drivers, enabling or disabling devices, and troubleshooting device issues
Control Panel: Indexing Options
allows you to manage the Windows search indexing settings, including adding or removing indexed locations and optimizing the search indexing
Control Panel: Administrative Tools
Provides access to various administrative tools including Even Viewer, Task Scheduler, and Services
Control Panel: File Explorer Options: Show hidden files
This option allows you to see files and folders that are normally hidden from view. These files may include system files, hidden files, and other files that Windows does not want you to see by default
Control Panel: File Explorer Options: Hide Extensions
This option hides the file extensions (e.g., .docx, .pdf, .jpg) for known file types in File Explorer. This can help to keep the file names cleaner and easier to read, but can also make it harder to identify different file types
Control Panel: File Explorer Options: General options
this section contains general settings for the File Explorer, such as changing the default folder view, opening File Explorer to this PC instead of Quick Access, and clearing the File Explorer history
Control Panel: File Explorer Options: View options
this section contains more detailed settings for customizing the way File Explorer displays files and folders. This includes options for changing the icon size, enabling or disabling file and folder thumbnails, changing the default sorting order, and more. You can also choose to apply these settings to all folders or just the current folders
Control Panel: Power Options: Hibernate
This option allows you to save all open files and running programs to the hard drive, and then turn off your computer completely. When you turn your computer back on, all open files and programs will be restored to their previous state. This can be useful if you need to leave your computer for a period of time but want to resume your work quickly when you return
Control Panel: Power Options: Power plans
this option allows you to choose from pre-set power plans that control how your computer uses energy. These plans include Balanced, Power Saver, and High performance, and can be customized to suit your needs
Control Panel: Power options: Sleep/suspend
This option puts your computer into a low-power state, saving energy while still keeping the computer running. All open files and programs are saved to memory, and the computer can be quickly resumed from this state by pressing a key or moving the mouse