A+1102 Exam Review Flashcards

Pass the first time

1
Q

ls

A

Linux Command: List directory contents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

pwd

A

Linux Command: show what directory you are in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

mv

A

Linux Command: move or rename a file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

cp

A

Linux Command: copy a file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

rm

A

Linux Command: remove a file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

chmod

A

Linux Command: change permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

chown

A

Linux Command: change owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

su/sudo

A

Linux Command: switch user/superuser do (something)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

apt-get
yum

A

Linux Command: tool to manage applications & updates
Based on Linux distribution (version)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ip

A

Linux Command: show ip address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

df

A

Linux Command: shows disk free space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

grep

A

Linux Command: look inside a file for text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ps

A

Linux Command: process status

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

man

A

Linux Command: the Linux help manual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

top

A

Linux Command: shows top running programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

find

A

Linux Command: search for a file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

dig

A

Linux Command: used to lookup DNS information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

cat

A

Linux Command: view a file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

nano

A

Linux Command: file editor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

AAA Model
Authentication

A

Who Are you?
ex: I am user student and my password validateme proves it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

AAA Model
Authorization

A

What can you do?
ex: What can you access host serverXYZ using Telnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

AAA Model Accounting

A

What did you do? How long did you do it? How often did you do it?
ex: User student accessed host serverXYZ using Telnet for 15 minutes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

CIA Triad
Confidentiality

A

Confidentiality prevents unauthorized disclosure of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

CIA Triad
Integrity

A

Integrity assures that data cannot be modified in an unauthorized manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

CIA Triad
Availability

A

Information should be readily available for the authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Malware
Bugs

A

A type of error, flaw or failure that produces an undesirable or unexpected result. Bugs typically exist in a website’s source code and can cause a wide range of damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Malware
Worms

A

A worm relies on security failures to replicate and spread itself to other computers. They are often hidden in attachments and will consume bandwidth and overload a web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Malware
Virus

A

A piece of code that is loaded onto your website or computer without your knowledge. It can easily multiply and be transmitted as an attachment or file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Malware
Bots

A

A software program created to perform specific tasks. Bots send spam or be used in a DDoS attack to bring down an entire website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Malware
Trojan Horse

A

Much like the myth, a Trojan disguises itself as a normal file and tricks users into downloading it, consequently installing malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Malware
Ransomware

A

Ransomware denies access to your files and demands payment through Bitcoin in order for access to be granted again.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Malware
Adware

A

A type of malware that automatically displays unwanted advertisements. Clicking on one of these ads could redirect you to a malicious website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Malware
Spyware

A

A type of malware that functions by spying on a user’s activity. This type of spying includes monitoring a user’s activity, keystrokes, and more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

NTFS File and Folder Permissions
Action: Moving files and folders on the same NTFS volume
Effect: ?

A

Destination folder: Write permission
Source folder: Modify permission
NTFS permissions are retained

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

NTFS File and Folder Permissions
Action: Moving files and folders to a different NTFS volume
Effect: ?

A

Destination folder: Write permission
Source folder: Modify permission
NTFS permissions are inherited from the destination folder and the user becomes the Creator/Owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

NTFS File and Folder Permissions
Action: Copying files and folders on the same NTFS volume or different NTFS volumes
Effect: ?

A

Destination folder: Write permission
Source folder: Read permission
NTFS permissions are inherited from the destination folder and the user becomes the Creator/Owner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

NTFS File and Folder Permissions
Action: Moving files and folders to a FAT or FAT32 partition.
Effect: ?

A

Source folder: Modify permission.
All permissions and NTFS attributes (such as encryption) are lost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

NTFS

A

New Technology File System
Uses log file and checkpoint info to restore consistency of the file system after a system failure
Uses ACLs (Access Control List) to set permissions on files and folders, can use Bitlocker
Handles 8 petabytes on new versions of Windows
Supports per-file compression and encryption, which helps in saving space and securing data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

/?

A

Windows Command: This command is also known as the HELP command. When placed after any command, it will give a help list of how to use that specific command! This is placed AFTER the command.
ex: ipconfig /?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Help

A

Windows Command: The same as /?, but it will be placed BEFORE a command.
ex: Help ipconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Ipconfig

A

Windows Command: A command line tool used to control the network connections on Windows! It will show most of the network information you’ll need. Network configuration, including IP addresses, subnet masks, and default gateways

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Ipconfig /all

A

Not only will ipconfig /all show you your basic network settings, it will also show you Mac addresses, detailed IPv6 information, IP address leases and DHCP connection information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Windows 10 Editions: Home

A

Designed for home users, with basic features like Cortana and the Edge web browser, but lacks some business-oriented features like domain access, Remote Desktop Protocol (RDP), and Bitlocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Windows 10 Editions: Pro

A

Designed for small businesses, with added features like domain access, Remote Desktop Protocol (RDP), and BitLocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Windows 10 Editions: Pro for Workstations

A

Designed for power users and professionals with high-end hardware, with features like support for up to 6 TB of RAM, ReFS file system, and support for non-volatile memory (NVMe) and persistent memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Windows 10 Editions: Enterprise

A

Designed for large organizations with advanced security features, including Windows Defender Application Guard and Credential Guard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Feature Differences: Domain Vs Access Group

A

Home and Pro editions can only join a workgroup, while enterprise edition can join a domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Feature Differences: Desktop styles/user interface

A

The Home edition does not support the ability to change the desktop wallpaper, and it does not include the Group Policy Editor (gpedit.msc) tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Feature Differences: Availability Of Remote Desktop Protocol (RDP)

A

Only the Pro, Pro for Workstations, and Enterprise editions support RDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Feature Differences: RAM support limitations

A

Home and Pro editions have limitations on the amount of RAM they support, while Pro for Workstations, and Enterprise editions support larger amounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Feature Differences: BitLocker

A

Only the Pro, Pro for Workstations, and Enterprise editions support BitLocker drive encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Feature Differences: gpedit.msc

A

Only the Pro and Enterprise editions include the Group Policy Editor tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Upgrade Paths for Windows 10

A

All editions of Windows 10 can be upgraded to a higher edition through an in-place upgrade, except for Enterprise Edition, which requires a clean install

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Windows Command: cd

A

Changes the current directory to another directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Windows Command: dir

A

Displays a list of files and folders in the current directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Windows Command: md

A

Creates a new directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Windows Command: rmdir

A

Deletes a directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Windows Command: Drive navigation inputs of C: or D: x::

A

Changes the current drive to the specified drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Windows Command: ping

A

Tests network connectivity by sending an ICMP echo request to a destination IP address or hostname

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Windows Command: hostname

A

Displays the name of the current computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Windows Command: netstat

A

Shows active network connections, protocol statistics and network interface information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Windows Command: nslookup

A

Queries the DNS server to obtain domain name or IP address mapping information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Windows Command: chkdsk

A

Checks a disk for errors and repairs them if possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Windows Command: net use

A

Connects to or disconnects from shared resources, such as network drives and printers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Windows Command: net user

A

Manges user accounts on the local computer or a remote computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Windows Command: tracert

A

Traces the path that a packet takes from the local computer to a remote destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Windows Command: format

A

Formats a disk drive or a partition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Windows Command: xcopy

A

Copies files and directories, including subdirectories and files that match specified file types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Windows Command: copy

A

Copies one or more files from one location to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Windows Command: robocopy

A

Copies files and directories with advanced options, including the ability to resume interrupted transfers and copy permissions and attributes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Windows Command: gpupdate

A

Updates group policy settings on the local computer or a remote computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Windows Command: shutdown

A

Shuts down or restarts the local computer or a remote computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Windows Command: sfc

A

Scans and repairs system files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Windows Command: (Command Name) /?

A

Displays help for the specified command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Windows Command: diskpart

A

Manages disk partitions and volumes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Windows Command: pathping

A

Traces the path that a packet takes from the local computer to remote destination, showing the round-trip times for each router along the way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Windows Command: winver

A

Displays the version of Windows installed on the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Task Manager: Services

A

This tab displays the list of services that are currently running on the computer, along with their status, startup type, and description. You can start, stop, or restart services from this tab.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Task Manager Startup

A

This tab displays the list of applications and processes that are configured to start automatically when the computer boots up. You can enable or disable startup items from this tab.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Task Manager: Performance

A

This tab displays real-time information about the computer’s hardware usage, including CPU, memory, disk, and network usage. You can use this tab to monitor the performance of the computer and identify any bottlenecks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Task Manager: Processes

A

This tab displays the list of running processes on the computer, including their names, CPU and memory usage, and status. You can use this tab to end processes that are consuming too many resources or causing problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Task Manager: Users

A

This tab displays the list of users who are currently logged on to the computer, along with their session ID and status. You can use this tab to log off or disconnect users, or to view the processes and resource usage of each user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Microsoft Management Console (MMC) snap-in: Event Viewer

A

It is a tool to view and manage system event logs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Microsoft Managment Console (MCC) snap-in: Disk Management

A

diskmgmt.msc
It is a tool to manage disks, partitions, and volumes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Microsoft Management Console (MMC) snap-in: Task Scheduler

A

taskschd.msc
It is a tool to create and manage automated tasks or scripts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Microsoft Management Console (MMC) snap-in: Device Manager

A

devmgmt.msc
It is a tool to manage system devices and drivers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Microsoft Management Console (MMC) snap-in: Certificate Manager

A

certmgr.msc
It is a tool to manage digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Microsoft Management Console (MMC) snap-in: Local Users and Groups

A

lusrmgr.msc
It is a tool to manage local user and group accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Microsoft Management Console (MMC) snap-in: Performance Monitor

A

perfmon.msc
It is a tool to monitor and analyze system performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Microsoft Management Console (MMC) snap-in: Group Policy Editor

A

gpedit.msc
It is a tool to manage system policies and configurations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

System Information

A

msinfo32.exe
It is a tool to view detailed system information, including hardware and software components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Resource Monitor

A

resmon.exe
It is a tool to monitor system resources such as CPU, memory, disk, and network usage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

System Configuration

A

msconfig.exe
It is a tool to manage system startup setting, services and boot options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Disk Cleanup

A

cleanmgr.exe
It is a tool to free up disk space by removing unnecessary files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Disk Defragment

A

dfrgui.exe
It is a tool to optimize disk performance by rearranging fragmented files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Registry Editor

A

regedit.exe
It is a tool to view and manage the system registry, which contains configuration settings for the system and installed applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Control Panel: Internet Options

A

allows you to manage various internet settings, such as security, privacy, content, and connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Control Panel: Devices and Printers

A

allows you to view and manage the devices connected to your computer, including printers, cameras, and smart phones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Control Panel: Programs and Features

A

Allows you to view and manage the installed programs and features on your computer, including uninstalling programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Control Panel: Network and Sharing Center

A

allows you to view and manage your network connections and sharing options, such as file and printer sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Control Panel: System

A

allows you to view and manage system settings, including system information, device manager, and performance settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Control Panel: Windows Defender Firewall

A

allows you to manage the Windows Firewall settings, including enabling or disabling the firewall, creating firewall rules, and configuring notifications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Control Panel: Mail

A

allows you to manage your email accounts and settings, including adding and removing email accounts, changing email settings, and setting up email signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Control Panel: Sound

A

allows you to manage your computer’s audio settings, including playback and recording devices, volume, and sound effects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Control Panel: User Accounts

A

allows you to manage user accounts on your computer, including creating and deleting user accounts, changing account settings, and managing passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

Control Panel: Device Manager

A

allows you to manage hardware devices installed on your computer, including updating drivers, enabling or disabling devices, and troubleshooting device issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

Control Panel: Indexing Options

A

allows you to manage the Windows search indexing settings, including adding or removing indexed locations and optimizing the search indexing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Control Panel: Administrative Tools

A

Provides access to various administrative tools including Even Viewer, Task Scheduler, and Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Control Panel: File Explorer Options: Show hidden files

A

This option allows you to see files and folders that are normally hidden from view. These files may include system files, hidden files, and other files that Windows does not want you to see by default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Control Panel: File Explorer Options: Hide Extensions

A

This option hides the file extensions (e.g., .docx, .pdf, .jpg) for known file types in File Explorer. This can help to keep the file names cleaner and easier to read, but can also make it harder to identify different file types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

Control Panel: File Explorer Options: General options

A

this section contains general settings for the File Explorer, such as changing the default folder view, opening File Explorer to this PC instead of Quick Access, and clearing the File Explorer history

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Control Panel: File Explorer Options: View options

A

this section contains more detailed settings for customizing the way File Explorer displays files and folders. This includes options for changing the icon size, enabling or disabling file and folder thumbnails, changing the default sorting order, and more. You can also choose to apply these settings to all folders or just the current folders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

Control Panel: Power Options: Hibernate

A

This option allows you to save all open files and running programs to the hard drive, and then turn off your computer completely. When you turn your computer back on, all open files and programs will be restored to their previous state. This can be useful if you need to leave your computer for a period of time but want to resume your work quickly when you return

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

Control Panel: Power Options: Power plans

A

this option allows you to choose from pre-set power plans that control how your computer uses energy. These plans include Balanced, Power Saver, and High performance, and can be customized to suit your needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Control Panel: Power options: Sleep/suspend

A

This option puts your computer into a low-power state, saving energy while still keeping the computer running. All open files and programs are saved to memory, and the computer can be quickly resumed from this state by pressing a key or moving the mouse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

Control Panel: Power options: Standby

A

this option is similar to sleep/suspend, but the computer uses even less power and takes longer to resume. Standby is rarely used on modern computers, as sleep/suspend provides a better balance between energy savings and speed of resuming

117
Q

Control Panel: Power Options: Choose what closing the lid does

A

this option lets you choose what happens when you close the lid of your laptop. You can choose to do nothing, turn off the display, put the computer to sleep, or shut down the computer

118
Q

Control Panel: Power Options: Turn on fast startup

A

this option allows your computer to start up more quickly by saving system information to a file when you shut down your computer. This information is then used to quickly restore the system state when you turn your computer back on

119
Q

Control Panel: Power Options: Universal Serial Bus (USB) selective suspend

A

this option allows you to save power by suspending power to USB devices when they are not in use. This can be useful for laptops and other portable devices, as it can help to extend battery life

120
Q

Control Panel: Ease of Access

A

allows you to manage accessibility settings, including visual, auditory, and input assistance, to make the computer easier to use for people with disabilities

121
Q

Windows Settings: Time and Language

A

Allows users to configure their time zone, date and time formats, and language settings

122
Q

Windows Settings: Update and Security

A

Provides access to Windows Update, device security settings, and recovery options

123
Q

Windows Settings: Personalization

A

allows users to customize the appearance and behavior of their desktop, taskbar, and Start menu

124
Q

Windows Setting: Apps

A

Allows users to manage and uninstall their installed applications, and configure app related settings

125
Q

Windows Settings: Privacy

A

Provides access to settings for managing how apps and services collect and use data

126
Q

Windows Settings: System

A

Provides access to settings for managing system-wide features and configuration options, such as storage, display, power, and notifications

127
Q

Windows Settings: Devices

A

Provides access to settings for managing and configuring external devices, such as printers, scanners, and Bluetooth devices

128
Q

Windows Settings: Network and Internet

A

Provides access to settings for managing network connections and Wi-Fi settings

129
Q

Windows Settings: Gaming

A

Provides access to settings for managing game-related features, such as Game Bar, Game DVR, and Xbox Game pass

130
Q

Windows Settings: Accounts

A

Allows users to manage their Microsoft account settings, sign-in options, and user account preferences

131
Q

Workgroup vs. Domain setup: Workgroup

A

A workgroup is a collection of computers on a network that share resources, such as files and printers. In a workgroup setup , each computer manages its own user accounts, and users need to provide separate usernames and passwords to access shared resources on other computers

132
Q

Workgroup vs. Domain Setup: Domain

A

A domain is a centralized network setup managed by a server computer called a domain controller. Users log in to the domain controller to access shared resources, and administrators can manage user accounts and security from a single location

133
Q

Workgroup vs Domain setup: Shared resources, printers, and file servers

A

In a network setup, shared resources such as printers and file servers are made available to other computers on the network. This allows users to access and share resources from different computers

134
Q

Local OS firewall settings

A

The firewall in Windows is designed to block incoming traffic that might be harmful to your computer. The firewall can be configured to allow or block specific applications, and expectations can be created for certain types of traffic

135
Q

Client network Configuration: IP addressing scheme

A

IP addresses are used to identify and communicate with other devices on a network. In a client desktop, IP addressing can be configured using DHCP (Dynamic Host Configuration Protocol) or by assigning static IP addresses manually

136
Q

Client network configuration: DNS settings

A

DNS (Domain Name System) resolves domain names to IP addresses, DNS settings can be configured to automatically obtain DNS server addresses from the network or to use specific DNS servers.

137
Q

Client network configurations: Subnet mask

A

A subnet mask is used to define the network address and the host address in an IP address. It is used to determine the network segment to which an IP address belongs

138
Q

Client network configuration: Gateway

A

A gateway is a device that connects two different networks. It allows devices on one network to communicate with devices on another network

139
Q

Client Network configuration: Static vs. dynamic

A

Static IP addresses are manually assigned and do not change, while dynamic IP addresses are automatically assigned and can change

140
Q

Establish network connections: VPN

A

A virtual private network (VPN) allows a user to connect to a remote network securely over the internet

141
Q

Establish network connections: Wireless

A

A wireless connection allows a client desktop to connect a network wirelessly

142
Q

Establish network connection: Wired

A

A wired connection allows a client desktop to connect to a network using an Ethernet cable.

143
Q

Establish network connections: WWAN

A

Wireless wide area network (WWAN) is a wireless network that provides internet access to mobile devices using cellular networks

144
Q

Proxy settings

A

Proxy settings are used to configure the client desktop to use a proxy server to access the internet

145
Q

Public network vs. private network

A

In Windows, a public network is one that is not trusted and has limited access to shared resources, while a private network is a trusted network with access to shared resources

146
Q

File Explorer navigation

A

network paths: File Explorer can be used to navigate to and access shared resources on a network using network paths

147
Q

Metered connections and limitations

A

Metered connections are network connections that have a limited data allowance, such as cellular networks. Windows can be configured to limit data usage on metered connections to reduce the risk of exceeding data allowance

148
Q

System requirements for applications: 32 bit vs. 64 bit

A

These refer to the type of software that can run on the operating system. Windows 10 Home, Pro, and Enterprise all come in both 32-bit and 64-bit versions, while Windows 10 Pro for Workstations only comes in 64-bit. Most newer applications are designed to run on 64-bit operating systems, which offer better performance and more memory support

149
Q

System Requirements for applications: Dedicated graphics vs. integrated graphics

A

This refers to the type of graphics processing unit (GPU) that a computer has. A dedicated graphics card is a separate component that is designed solely for graphics processing, while integrated graphics are built into the CPU and share system resources with the rest of the computer. Dedicated graphics cards are generally more powerful and offer better performance for tasks such as gaming and video editing

150
Q

System Requirements for applications: Video random-access memory (VRAM) requirements

A

This refers to the amount of memory that a graphics card has for storing textures and other data related to rendering images on a display. More VRAM generally means better performance, especially for higher-resolution displays

151
Q

System Requirements for applications: RAM requirements

A

This refers to the amount of memory (RAM) that a computer needs to run an operating system and its applications smoothly. Windows 10 Home requires at least 1 GB of RAM for 32-bit versions and 2 GB for 64-bit versions, while Windows 10 Pro, Pro for Workstations, and Enterprise require at least 2 GB of RAM for 32-bit versions and 4 GB for 64-bit versions. However, more RAM is generally better for running multiple applications or working with large files

152
Q

System Requirements for Applications: Central Processing Unit (CPU) requirements

A

This refers to the type of processor that a computer has, and the speed and number of cores it has. Windows 10 requires a minimum of a 1 GHz or faster processor, but faster and more powerful processors can improve performance, especially for multitasking and running resource-intensive applications

153
Q

System Requirements for Applications: External hardware tokens

A

These are physical devices used for authentication and security purposes, such as smart cards or USB security keys. Windows 10 supports a variety of hardware tokens and has built-in support for biometric authentication through fingerprint readers and webcams

154
Q

System Requirements for Applications: Storage requirements

A

This refers to the amount of disk space that an operating system and its applications need to be installed and run. Windows 10 Home requires at least 16 GB of free space for 32-bit versions and 20 GB for 64-bit versions, while Windows 10 Pro, Pro for Workstations, and Enterprise require at least 32 GB of free space for 64-bit versions. However, more storage is generally needed for storing data and installing additional applications

155
Q

OS requirements for applications: compatibility between windows versions

A

The compatibility between an application and the operating system it is installed on is crucial for the application to function correctly. An application designed for Windows 10 may not work on Windows 7, for example

156
Q

OS requirements for applications: bit version

A

Another important aspect is the bit version of the operating system. Applications designed for a 32-bit OS may not work on a 64-bit OS, and vice versa. It is essential to know which bit version the application is designed for before installing it on an OS

157
Q

OS requirements for applications: Bit memory

A

Furthermore, a 64-bit OS can handle larger amounts of memory and data than a 32-bit OS, So applications that require more memory or process larger amounts of data may require a 64-bit OS to operate efficiently. However, not all applications require a 64-bit OS, and a 32-bit OS can run many applications without issue. It is important to check the application’s system requirements to determine if it requires a 32-bit or 64-bit OS

158
Q

Distribution Methods

A

Windows can be distributed to users through different methods, including physical media and downloadable files

159
Q

Distribution Methods: Physical Media

A

refers to the use of CD’s, DVD’s, or USB flash drives to install or distribute Windows. This method is often used for retail sales, as users can purchase a physical copy of the Windows software and install it on their computer

160
Q

Distribution Methods: Downloadable files

A

are often provided by Microsoft or other authorized sources, allowing users to download the Windows installation files directly from the internet. This method is convenient as users can download the files from anywhere with an internet connection and install them on their computer

161
Q

Distribution Methods: ISO mountable

A

refers to the ability to mount the Windows installation files onto a virtual drive in order to install or distribute the software. This method is often used by IT professionals who need to install Windows on multiple computers, as it allows them to create a master copy of the installation files and easily distribute it to other computers without the need for physical media

162
Q

Other Considerations for new applications: Impact on device

A

The installation of new applications can have an impact on the performance of the device. The new application may require additional system resources, which can lead to slower performance and longer boot times. Additionally, the new application may conflict with existing software or cause instability

163
Q

Other considerations for new applications: Impact to network

A

New applications may require access to the network, either to download updates or to communicate with other devices. This can impact network performance and security, as the new application may introduce new vulnerabilities or require additional network bandwidth

164
Q

Other considerations for new applications: Impact to operation

A

The installation of new applications can impact the day-to-day operations of a device. Users may need to learn how to use the new application, which can require additional training or documentation. Additionally, the new application may change the way that users interact with the device or with other software, which can impact productivity

165
Q

Other Considerations for New Applications: Impact to business

A

Installing new applications can have a significant impact on a business. The new applications can have a significant impact on a business. The new application may require changes to existing workflows or business processes, which can impact productivity and profitability. Finally, the new application may introduce new security risks or compliance concerns, which can impact the reputation of the business

166
Q

Boot Methods: USB

A

USB booting involves creating a bootable USB drive, which contains the necessary files to start up a computer. This method is often used to install a new operating system or to run a live operating system from the USB drive

167
Q

Boot Methods: Optical media

A

This method involves using a bootable CD or DVD to start up the computer. This is an older method that has largely been replaced by USB booting

168
Q

Boot Methods: Network

A

Network booting allows a computer to start up from a remote server over a network connection. This method is often used in enterprise environments where administrators need to quickly and easily deploy new operating systems to multiple computers

169
Q

Boot Methods: Solid-state/flash drives

A

Similar to USB booting, this method involves using a bootable solid-state drive or flash drive to start up the computer. This is often used in embedded systems or other devices where there is no traditional hard drive.

170
Q

Boot Methods: Internet-based

A

Internet-based booting involves downloading the necessary files to start up the computer from a remote server over the internet. This method is often used in thin client environments or in situations where the operating system needs to be quickly and easily deployed to multiple computers

171
Q

Boot Methods: External/hot-swappable drive

A

This method involves using an external hard drive or other removable storage device to start up the computer. This is often used in situations where the internal hard drive has failed or is being replaced

172
Q

Boot Methods: Internal hard drive (partition)

A

This is the most common boot method and involves installing the operating system on the computer’s internal hard drive. The hard drive is partitioned to create a boot partition, which contains the necessary files to start up the computer

173
Q

Types of installations: Upgrade

A

This type of installation allows the user to upgrade their existing operating system to a newer version. During the upgrade process, the old operating system is replaced with the new one, and the user’s files and applications are preserved. However, it’s important to note that not all hardware and software are compatible with newer operating systems, so there may be compatibility issues to consider

174
Q

Types of installations: Recovery Partition

A

Many computer manufacturers include a recovery partition on their devices, which can be used to restore the device to its factory settings. This type of installation wipes all data and applications from the device and reinstalls the operating system and any pre-installed software

175
Q

Types of installations: Clean install

A

A clean install involves completely wiping the device’s hard drive and installing a fresh copy of the operating system. This is usually done when the device is experiencing problems that cannot be resolved through other means, or when the user wants to start fresh with a clean slate

176
Q

Types of installations: Image deployment

A

Image deployment involves creating a master image of a computer’s operating system and software configuration, and then deploying that image to multiple computers. This is a common method used by businesses and organizations to quickly and efficiently deploy the same software configuration across multiple devices

177
Q

Types of installations: Repair installation

A

A repair installation is a type of installation that allows the user to repair or reinstall the operating system without losing their personal files or installed applications

178
Q

Types of installations: Remote network installation

A

This type of installation allows the operating system to be installed on a remote computer over a network connection. This is useful for businesses or organizations that need to install the same operating system on multiple devices

179
Q

Types of installations: Third-party drivers

A

Third-party drivers are drivers that are created by a company other than the manufacturer of the hardware or software. These drivers may be necessary for the hardware or software to function properly, but they may not be included in the operating system installation. In this case, the user may need to manually install the third-party drivers after the operating system installation is complete

180
Q

Partitioning

A

Partitioning is the process of dividing a hard disk into separate logically distinct sections. This allows users to separate operating systems, applications, and data, and to manage them independently. Two commonly used partitioning types are GUID Partition Table (GPT) and Master Boot Record (MBR)

181
Q

Partitioning (GPT: GUID Partition Table)

A

GPT is a newer partitioning scheme that is part of the Unified Extensible Firmware Interface (UEFI) specification. GPT can support hard dries larger than 2 TB and allows for up to 128 partitions on a single disk. GPT also includes a backup partition table at the end of the disk, making it more resilient to damage

182
Q

Partitioning (MBR: Master Bood Record)

A

MBR is an older partitioning scheme that is used with legacy BIOS systems. MBR can only support hard drives up to 2 TB in size and allows for up to four primary partitions or three primary partitions and one extended partition. Extended partitions can then be divided into logical partitions.

183
Q

Drive format

A

Drive format, also known as file system, refers to the method in which a storage device such as a hard drive, solid state drive, or flash drive is organized and structured to store and retrieve data. Each system has its own rules for how data is stored, named, and accessed.
Ex: NTFS (New Technology File System) used by Windows OS
HFS+ (Hierarchical File System Plus) used by macOS
Ext4 (Fourth Extended File System) used by Linux. When formatting a drive, it erases all data on the drive and creates a new file system structure for the operating system to use. The choice of file system can affect the performance and compatibility of the drive with different operating systems and devices

184
Q

Upgrade considerations

A

Upgrading an operating system or software involves replacing an older version with a newer one. This can have a significant impact on the system and its components.

185
Q

Upgrade considerations: Backup files and user preferences

A

Before upgrading, it is essential to create a backup of all critical files and user preferences. This can be done manually by copying files to an external drive or by using a backup utility. In case of any errors during the upgrade process, the backup will ensure that important files and settings are not lost

186
Q

Upgrade considerations: Application and driver support/backward compatibility

A

It is important to ensure that all the applications and drivers installed on the system are compatible with the new operating system version. Some applications may require updates or patches to work with the new OS. Drivers for hardware components such as printers, scanners, and graphics cards may also need to be updated or replaced to ensure compatibility with the new OS.

187
Q

Upgrade considerations: Hardware compatibility

A

Upgrading to a newer version of an operating system may require newer hardware components or more system resources. For example, if the new operating system version requires more RAM or faster processor, it may not work on older systems. It is important to ensure that the system meets the minimum hardware requirements for the new OS version

188
Q

Feature updates

A

A feature update is a major release of an OS that includes significant changes and new features. In the case of Windows 10, feature updates are released twice a year and are typically accompanied by a version number change (e.g. from version 21H1 to version 21H2). Feature updates are free to download and install for users who have a valid license for the operating system

189
Q

Logical Security: Principle of least privilege

A

This is a security principle that dictates that users should only be granted the minimum access rights or permissions to perform their job functions. This helps to limit the potential damage that can be caused by insider attacks or external threats that may gain access to user accounts

190
Q

Logical Security: Access control lists (ACLs)

A

is a set of rules that define the permissions or access rights that are granted to users or groups for a specific resource such as a file or folder. This allows for fine-grained control of access to resources and helps to prevent unauthorized access or modifications

191
Q

Logical Security: Multifactor authentication (MFA)

A

This is can include something the user knows (such as a password), something the user has (such as a smart care or token), or something the user is (such as biometric data)

192
Q

Logical Security: Email

A

security measures include measures such as encryption, anti-spam filters, anti-malware scanners, and content filtering to help prevent unauthorized access or disclosure of sensitive information

193
Q

Logical Security: Hard token

A

A hard token is a physical device such as a smart card or USB drive that generates a one-time password or PIN for authentication

194
Q

Logical Security: Soft token

A

A software-based authentication mechanism that uses an app or mobile device to generate a one-time password or PIN for authentication

195
Q

Logical Security: Short message service (SMS)

A

sends a one-time code via text message to a user’s mobile device for authentication purposes

196
Q

Logical Security: Voice call

A

Voice call authentication sends a one-time code via a voice call to a user’s mobile or landline phone for authentication purposes

197
Q

Logical Security: Authenticator application

A

An authenticator application is a software-based authentication mechanism that generates a one-time code for authentication on a mobile device or computer. Ex: include Google Authenticator, Microsoft Authenticator, and Authy

198
Q

Mobile Device Management (MDM)

A

a type of security software designed to manage, monitor, and secure mobile devices such as smartphone, tablets, and laptops used in an enterprise environment

199
Q

Mobile Device Management (MDM) purpose

A

to ensure the security and manageability of mobile devices in the enterprise by allowing IT administrators to manage device settings, enforce security policies, deploy applications, and control access to enterprise resources

200
Q

Mobile Device Management (MDM) IT administrators

A

can remotely manage devices, monitor devices usage and data access, configure device settings and enforce security policies, and wipe or lock lost or stolen devices. This helps organizations ensure that sensitive data is protected, and that devices accessing corporate resources are secure and comply with corporate policies and regulations

201
Q

Mobile Device Management (MDM) solutions

A

typically provide features such as mobile device inventory and content management, security and compliance enforcement, and device monitoring and reporting. MDM can also help streamline device deployments, reduce the risk of data breaches, and improve overall device performance and reliability

202
Q

Active Directory (AD)

A

a directory service developed by Microsoft that is used to manage network resources, including users, computers, and applications, on a Windows domain network.

203
Q

Active Directory (AD): Login Script

A

a set of instructions that run automatically when a user logs in to a computer. In AD, login scripts can be used to map network drives, set up printers, or perform other tasks that need to be done when a user logs in

204
Q

Active Directory (AD): Domain

A

A domain is a logical grouping of network resources, including computer, users, and other devices. AD uses a domain model to manage network resources and provides centralized management of network security, resources, and services

205
Q

Active Directory (AD): Group Policy/updates

A

Group Policy is a feature of AD that allows administrators to set policies that govern the behavior of computers and users on the network. Group Policy can be used to enforce security settings, set up software installation, and configure user settings

206
Q

Active Directory (AD): Organizational Units

A

OU is a container used to group objects in AD. OUs can be used to delegate administrative control and apply Group Policy settings to specific groups of users or computers

207
Q

Active Directory (AD): Home folder

A

is a user’s designated storage area on a network file server. In AD, administrators can set up a user’s home folder to automatically map to a network drive when the user logs in

208
Q

Active Directory (AD): Folder redirection

A

a feature that allows administrators to redirect certain folders, such as the documents folder, to a network location. This helps ensure that users’ files are backed up and provides easy access to files from multiple computers

209
Q

Active Directory (AD): Security Groups

A

used to control access to network resources to network resources. In AD, administrators can create security groups that include specific users or computers and then assign permissions to those groups for specific resources on the network

210
Q

Social Engineering

A

is a type of attack that targets human behavior and psychology rather than technical vulnerabilities in order to manipulate individuals into divulging sensitive information or performing an action that would be detrimental to an organization’s security.

211
Q

Social Engineering: Whaling

A

This is a type of phishing attack that targets high-level executive or other individuals with access to sensitive information

212
Q

Social Engineering: Tailgating

A

This involves following someone into a restricted area without proper authorization, by pretending to be an authorized person or simply following them closely

213
Q

Social Engineering: Impersonation

A

This involves pretending to be someone else in order to gain access to restricted information or perform a certain action

214
Q

Social Engineering: Evil twin

A

This involves setting up a fake wireless access point that looks identical to a legitimate one, in order to trick users into connecting to it and revealing sensitive information

215
Q

Threats: Distributed denial of service (DDoS) attack

A

a type of cyber attack in which multiple compromised computer systems target a website, server, or other network resources to make it unavailable for its intended users. This is done by overwhelming the target system with a flood of traffic from multiple sources, rendering it inaccessible

216
Q

Threats: Denial of Service (DoS) attack

A

A type of cyber attack that makes a server or network resource unavailable to its intended users by overwhelming it with traffic or sending it information that triggers a crash or shutdown

217
Q

Threats: Zero-day attack

A

A type of cyber attack that exploits an unknown vulnerability in software or hardware. Attackers use these vulnerabilities to gain access to a system and steal data or cause harm

218
Q

Threats: Spoofing

A

A type of cyber attack in which an attacker masquerades as a trusted entity to gain access to sensitive information. Spoofing can occur via email, websites, phone calls, or text messages

219
Q

Threats: On-path attack

A

A type of cyber attack where an attacker intercepts and alters network traffic between two parties. The attacker could steal data, manipulate the data being sent, or even launch additional attacks

220
Q

Threats: Brute-force attack

A

A type of cyber attack where an attacker tries to guess a password or encryption key by trying different combinations of characters until the correct one is found

221
Q

Threats: Dictionary attack

A

A type of cyber attack where an attacker uses a list known passwords or commonly used passwords to try and gain access to a system or device

222
Q

Threats: Insider threat

A

A type of threat where an individual within an organization has access to sensitive data or systems and intentionally or unintentionally causes harm or theft

223
Q

Threats: Structured Query Language (SQL) injection

A

A type of cyber attack where an attack inserts malicious code into a website or application that uses SQL allowing them to access or manipulate sensitive data

224
Q

Threat: Cross-site scripting (XSS)

A

A type of cyber attack where an attacker injects malicious code into a website or application that allows them to steal sensitive information such as login credentials or personal information, from users who visit the site

225
Q

Vulnerabilities: Non-compliant systems

A

Non-compliant systems refer to systems that do not adhere to security policies and standards set by an organization. For example, a system that does not have the latest security patches installed or does not have the necessary security controls in place can be considered non-compliant. Such systems can be exploited by attackers to gain unauthorized access or steal or steal sensitive information

226
Q

Vulnerabilities: Unpatched systems

A

systems that have not been updated with the latest security patches released by the vendor. Attackers can exploit vulnerabilities in unpatched systems to gain unauthorized access or perform malicious activities. Organizations should regularly update their systems to protect against known vulnerabilities

227
Q

Vulnerabilities: Unprotected systems (missing antivirus/missing firewall)

A

Unprotected systems are systems that do not have the necessary security controls in place to prevent or detect malicious activities. For example, a system without antivirus software can be vulnerable to malware attacks, while a system without a firewall can be vulnerable to network attacks. Organizations should implement appropriate security controls to protect their systems and data

228
Q

Data-at-rest encryption

A

a security measure used to protect sensitive data stored on digital devices such as hard drives, solid-state drives, or other storage devices. It involves encrypting the data while it is at rest (not being accused or used) to prevent unauthorized access, theft, or modification

229
Q

Data-at-rest encryption: encryption process

A

involves converting the original data into a coded form that cannot be read or understood without the proper decryption key. The encryption key is only available to authorized users who possess the correct credentials to access the data

230
Q

Data-at-rest encryption encryption

A

can be implemented at various levels, including the device level, or even individual field level. It can be done using software based encryption services. Some examples of data-at-rest encryption methods include BitLocker, VeraCrypt, and LUKS

231
Q

Data-at-rest benefits

A

organizations can ensure that their sensitive data is protected even if the physical device or storage media falls into the wrong hands. It is an essential security measure for safeguarding confidential information such as financial records, medical records, intellectual property, and personal data

232
Q

Password best practices: Complexity requirements

A

Length and Character types: Passwords should have a minimum length of eight characters and should be a combination of upper and lower case letters, numbers, and special characters. Longer passwords are better, as they are harder to crack

233
Q

Password best practices: Expiration requirements

A

Passwords should be changed regularly, typically every 90 days. This helps ensure that compromised passwords are not used to access systems for an extended period.

234
Q

Password best practices: Basic Input/Output System (BIOS)/Unified Extensible Firmware Interface (UEFI) passwords

A

BIOS/UEFI passwords are used to secure the boot process of a computer. They can prevent unauthorized users from booting the computer from an external device. BIOS/UEFI passwords should be set and should be kept confidential

235
Q

End-user best practices: Use screensaver locks

A

Screensaver locks can automatically lock the screen after a specific period of inactivity. This helps to prevent unauthorized access to the system

236
Q

End-user best practices: Log off when not in use

A

Users should log off their accounts when they are not using the system. This ensures that no one else can access their account and the information on the system

237
Q

End-user best practices: Log off when not in use

A

Users should log off their accounts when they are not using the system. This ensures that no one else can access their account and information on the system

238
Q

End-user best practices: Secure/protect critical hardware:

A

such as laptops, are protected and secured when not in use. This includes using a password-protected screen lock, storing the device in a secure location, and using a cable lock to prevent theft

239
Q

End-user best practices: Secure personally identifiable information (PII) and passwords:

A

Users should secure their personally identifiable information (PII) and passwords by creating strong passwords, not sharing them with others, and avoiding using the same password across multiple accounts

240
Q

Account Management: Restrict user permissions:

A

Users should only be given permissions necessary to perform their job duties. This helps to limit the potential damage that could be caused if a user’s account is compromised

241
Q

Account Management: Restrict login times

A

If users only need to access the system during specific times. This can help prevent unauthorized access outside of business hours

242
Q

Account Management: Disable guest accounts

A

The guest account is a built-in account in many operating systems that allows users to log in without a password. It should be disabled, as it provides an easy entry point for attackers

243
Q

Account Management: Use failed attempts lockout

A

To prevent brute-force attacks on user accounts, lockout policies should be implemented. ex: after a certain number of failed login attempts, the account should be locked for a specified period of time

244
Q

Account Management: Use timeout/screen lock

A

Users should be encouraged to lock their screens or log out of the system when they step away from their computer, even short periods of time. This helps to prevent unauthorized access to their account in their absence

245
Q

Account Management: Change default administrators user account/password

A

This best practice is aimed at changing the default administrator account credentials that are set up by the system manufacturer or software provider. This is because many hackers and attackers are aware of the default usernames and passwords, and may attempt to exploit these to gain access to the system. Therefore, changing the default administrator’s user account/password will help prevent unauthorized access to the system.

246
Q

Account Management: Disable Autorun

A

This is a Windows feature that automatically launches programs or applications when a new device or removable media is connected to the computer. However, this feature can also be exploited by malware or other malicious programs to automatically execute code without the user’s knowledge or consent. Therefore, disabling AutoRun can help prevent the automatic execution of malicious code

247
Q

Account Management: Disable AutoPlay

A

AutoPlay is a feature that launches a menu of options when a new device or removable media is connected to the computer. This menu allows users to choose what they want to do with the device or media, such as open files, import pictures, or play music. However, this feature can be exploited by malware or other malicious programs to automatically execute code without the user’s knowledge or consent. Therefore, disabling AutoPlay can help prevent automatic execution of malicious code

248
Q

Home router settings: Change default passwords

A

Routers come with default passwords that are easy to guess, so it’s crucial to change the default passwords to a strong, unique password

249
Q

Home router settings: IP filtering

A

This setting allows you to specify which devices can access your network by filtering traffic based on IP addresses

250
Q

Home router settings: Firmware updates

A

Regularly updating your router’s firmware can ensure that it has the latest security patches and features

251
Q

Home router settings: Content filtering

A

Content filtering can block malicious or unwanted websites and protect your devices from malware and other cyber threats

252
Q

Home router settings: DHCP reservations

A

Allows you to assign a fixed IP address to a specific device on your network, so it always receives the same IP address

253
Q

Home router settings: Static WAN IP

A

A static WAN IP address is a permanent IP address assigned to your router by your ISP. It’s recommended to use a static IP address instead of a dynamic one to prevent your IP address from changing frequently

254
Q

Home router setting: Universal Plug and Play (UPnP)

A

UPnP allows devices on your network to automatically configure the router and access the internet without manual configuration. However, UPnP can also be a security risk if attackers exploit it to gain access to your network

255
Q

Home router settings: Screened subnet

A

A screened subnet is a DMZ (Demilitarized Zone) that is set up to isolate public-facing servers from the rest of the network. This provides an additional layer of security to protect your network from external attacks

256
Q

Wireless specifics: Changing the service set identifier (SSID)

A

the name of the wireless network, and it is visible to anyone within range. Changing the default SSID to a unique name makes it harder for attackers to identify and target the network

257
Q

Wireless specifics: Disabling SSID broadcast

A

When SSID broadcast is enabled, the network name is included in the signal broadcast by the wireless access point. Disabling this feature means that users must manually enter the SSID to connect to the network, making it less visible to potential attackers

258
Q

Wireless specifics: Encryption settings

A

Encryption is used to protect wireless traffic from eavesdropping and unauthorized access. Common encryption methods include Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), WPA2, and WPA3. Of these, WPA3 is the most secure and recommended method for wireless networks

259
Q

Wireless specifics: Disabling guest access

A

Disabling guest access means that only authorized users can connect to the wireless network. This prevents unauthorized individuals from accessing the network and its resources

260
Q

Wireless specifics: Changing channels

A

Wireless networks use different channels to broadcast signals. Changing the channel can help to avoid interference from other networks and reduce the risk of attacks targeting specific channels. Non-overlapping on the 2.4 GHz frequency are 1,6,11. 5 GHz frequencies have more channels and less interference

261
Q

Firewall settings

A

Firewalls are network security systems that monitor and control network traffic. They can be hardware-based or software-based and can be configured to block to allow specific types of traffic based on rules and policies. Two important firewall security settings are disabling unused ports and port forwarding/mapping

262
Q

Firewall settings: Disabling

A

Unused ports involves closing off network ports that are not being used. This is important because unused ports can be exploited by attackers to gain access to a network. By disabling unused ports, organizations can reduce the attack surface of their network and limit the number of potential entry points for attackers

263
Q

Firewall settings: Port forwarding/mapping

A

involves redirecting network traffic from one port to another. This is commonly used to allow external access to a specific service or application running on a device on the internal network. However, port forwarding can also be used by attackers to bypass firewalls and gain access to a network. It is important for organizations to carefully consider the risks of port forwarding and ensure that it is only used when necessary and that it is properly configured to prevent unauthorized access

264
Q

Windows Common Symptoms: Blue screen of death (BSOD)

A

It is an error screen displayed when the system encounters a critical error that it can’t recover from. This can be caused by faulty hardware, corrupt drivers, or software issues

265
Q

Windows Common Symptoms: Sluggish performance

A

This is when the computer is slow to respond or perform tasks. This can be caused by a lack of memory, outdated drivers, or malware

266
Q

Windows Common Symptoms: Boot problems

A

This is when the system fails to boot up. This can be caused by hardware failure, corrupt system files, or malware

267
Q

Windows Common Symptoms: Frequent Shutdowns

A

This is when the system shuts down unexpectedly. this can be caused by overheating, a failing power supply, or malware

268
Q

Windows Common Symptoms: Services not starting

A

This is when system services fail to start. This can be caused by corrupt system files, malware, or a lack of available memory

269
Q

Windows Common Symptoms: Applications crashing

A

This is when applications close unexpectedly. This can be caused by outdated software, corrupt system files, or malware

270
Q

Windows Common Symptoms: Low memory warnings

A

This is when the system warns of low memory availability. This can be caused by a lack of available memory, too many programs running, or memory leaks in applications

271
Q

Windows Common Symptoms: USB controller resource warnings

A

This is when the system warns of low USB controller resources. This can be caused by too many USB devices connected, outdated drivers, or hardware issues.

272
Q

Windows Common Symptoms: System instability

A

This is when the system behaves erratically or unpredictably. This can be caused by malware, outdated drivers, or hardware failure

273
Q

Windows Common Symptoms: No OS found

A

This is when the system can’t find the OS. This can be caused by failing hard drive, corrupt system files, or malware

274
Q

Windows Common Symptoms: Slow profile load

A

This is when it takes a long time for a user profile to load. This can be caused by a large number of files in the user’s profile, corrupt user profile files, or a lack of available memory

275
Q

Windows Common Symptoms: Time drift

A

This is when the system clock is inaccurate. This can be caused by a failing battery on the motherboard, incorrect time zone settings, or malware

276
Q

Common Troubleshooting Steps: Reboot

A

Restarting the computer is often the first step in troubleshooting many issues. It can help clear the memory and fix minor issues.

277
Q

Common Troubleshooting Steps: Restart services

A

If a particular service is causing issues, you can try restarting it to see if it resolves the problem

278
Q

Common Troubleshooting Steps: Uninstall/reinstall/update applications

A

If an application is causing issues, you can try uninstalling it and reinstalling it or updating it to the latest version

279
Q

Common Troubleshooting Steps: Add resources

A

If the computer is running slow, you can try adding more resources like RAM, hard drive space, or a better processor

280
Q

Common Troubleshooting Steps: Verify requirements

A

Make sure that the computer meets the minimum requirements for the software or application that is causing issues

281
Q

Common Troubleshooting Steps: System file check

A

Use the built-in System File Checker tool to scan for and repair any corrupted or missing system files

282
Q

Common Troubleshooting Steps: Repair Windows

A

You can use the built-in Windows Repair tool to fix common issues with the operating system

283
Q

Common Troubleshooting Steps: Restore

A

You can restore the system to a previous state using System Restore if the issue occurred after a recent change or update

284
Q

Common Troubleshooting Steps: Reimage

A

In some cases, it may be necessary to reimage the computer to restore it to a working state

285
Q

Common Troubleshooting Steps: Roll back updates

A

If an update caused the issue, you can try rolling back the update to a previous version

286
Q

Common Troubleshooting Steps: Rebuild Windows profiles:

A

If the user profile is causing issues, you can try rebuilding it by creating a new profile and copying the data over

287
Q

Common PC security issues: Unable to access the network

A

This could be caused by a malware infection that is blocking network access. Try running a malware scan and checking network settings to ensure they are configured correctly

288
Q

Common PC security issues:

A