A+ Core 2 Stack 1 Flashcards
Grants users all permissions on the folder. Administrators have this access
Full control
Modify —-
Grants users a high level of access, except the ability to take full ownership.
Read & Execute —
Allows users to read files and execute executable files.
List Folder Contents —
Allows users to list the contents of the folder. It does not allow them to read the individual files within that folder. They can only see the file and folder names.
Read —
Allows users to read the folder’s contents.
Write —
Allows user to write or edit the folder’s contents.
Modify permissions combine
read, write, execute, and delete permissions on everything, including the folder.
Read-only: Files with this attribute cannot be — .
edited or saved. Safest attribute when file sharing
Hidden: Files with this attribute can only be —
seen in the system by Administrators or when certain commands are used.
Recovery Console —-
This Windows software can be used to copy, rename or replace operating system files and folders and repair the file system boot sector or the Master Boot Record (MBR).
Terminal -
Terminal in the Mac OS operates like a command-line prompt in Windows.
System Restore/Snapshot -
This software that is available in Windows allows you to create restore points.
Pre-installation environments - This environment prepares a computer for a full —–
Windows installation.
Event Viewer -
This troubleshooting tool logs system events and errors.
In Windows 8 and higher, you can try to _______________________ the operating system.
Refresh/restore/reset -
MSCONFIG/Safe Boot - The System Configuration (MSCONFIG) tool is used to —–
troubleshoot startup problems. It allows you to disable individual bootup options.
If you discover inappropriate material on a company-owned computer but no specific computer-use policy exists (or Acceptable Use policy), you should —
inform your supervisor of the inappropriate material.
Because she is the only one having the problem, the problem likely arises from a —
setting on her computer. update the network settings.
The tool used to view the system event logs in Windows. This tool is available in Computer Management or from Administrative Tools in Control Panel. —-
Event Viewer
To load into ____________, press F8 when the operating system menu is displayed during bootup. Safe Mode loads minimal drivers and can allow you to troubleshoot issues. —-
Safe Mode
Allows you to run many commands. —
Command prompt
In Windows XP and later, ______________________is part of the Backup utility. This tool creates a disk that can be used to restore certain aspects of the system but can only be created on a floppy drive, which is often not an option in today’s computers. —
Automated System Recovery (ASR) —-
_____________ an operating system completely removes it from the hard drive. Reinstalling or repairing an operating system allows you to fix any problems that may occur. You should always try repairing first as this will have the least effect on your system. Keep in mind that reinstalling or repairing may require you to update device drivers after the reinstall or repair occurs. —
Uninstall/reinstall/repair
This is the firmware in a computer that is used to store system settings needed at boot time, such as hard drive parameters and boot devices. This is where you would go if you need to change the default boot device. —
BIOS/UEFI
This is another method that can be used to repair an operating system. It is the best option to use if you cannot get Windows to boot at all. In Windows 2000, these were called
emergency repair disks (ERD). —
You should use the _____________________to edit, modify, and update the Boot Configuration Data (BCD) file, which contains the boot settings for a computer. —
bcdedit.exe utility
You could also change the boot order by using the —
MSCONFIG tool.
The taskmgr.exe utility allows you to view and stop running —
applications, processes, and services.
The boot.ini file held configuration data for Windows XP and earlier. It was replaced by the —-
BCD file in Windows Vista and later.
The regedit.exe utility edits —
registry settings.
The registry contains important —
configuration information and is should only be edited by administrators.
Regedit and regedt32 are used to edit the —
registry.
Registry edits occur immediately and can
have grave consequences..
The Microsoft Register Server (regsrv32) utility registers and unregisters —
dll files and ActiveX controls in the registry.
If a dll file is replaced, it may be necessary to —
register the new file using this tool.
Whaling and spear phishing are two types of
targeted phishing attacks.
Spear phishing targets a —
group of high-risk users in an organization through email and social media posts.
Whaling is conducted like spear phishing, except that whaling specifically targets —
senior executives (the “big fish”).
A zombie is a computer that an attacker has accessed and configured to —
forward transmissions to other computers on the Internet. Often an attacker has more than one zombie.
Mining or data mining is a database application term that examines —
data to predict behavior..
Ransomware is a type of attack that installs itself on a computer and
blocks access to the computer until a sum of money is paid. You should contact authorities if you become a victim of a ransomware attack.
The Num Lk (Num Lock key) does not control the —
scrolling feature.
Num Lk is a toggle key on the —
numeric keypad.
Num Lk is used to switch between —
number entry and arrow keys.
The Shift key will not prevent arrow keys from —
moving the cursor from one cell to another cell.