A+ Core 2 Stack 1 Flashcards
Grants users all permissions on the folder. Administrators have this access
Full control
Modify —-
Grants users a high level of access, except the ability to take full ownership.
Read & Execute —
Allows users to read files and execute executable files.
List Folder Contents —
Allows users to list the contents of the folder. It does not allow them to read the individual files within that folder. They can only see the file and folder names.
Read —
Allows users to read the folder’s contents.
Write —
Allows user to write or edit the folder’s contents.
Modify permissions combine
read, write, execute, and delete permissions on everything, including the folder.
Read-only: Files with this attribute cannot be — .
edited or saved. Safest attribute when file sharing
Hidden: Files with this attribute can only be —
seen in the system by Administrators or when certain commands are used.
Recovery Console —-
This Windows software can be used to copy, rename or replace operating system files and folders and repair the file system boot sector or the Master Boot Record (MBR).
Terminal -
Terminal in the Mac OS operates like a command-line prompt in Windows.
System Restore/Snapshot -
This software that is available in Windows allows you to create restore points.
Pre-installation environments - This environment prepares a computer for a full —–
Windows installation.
Event Viewer -
This troubleshooting tool logs system events and errors.
In Windows 8 and higher, you can try to _______________________ the operating system.
Refresh/restore/reset -
MSCONFIG/Safe Boot - The System Configuration (MSCONFIG) tool is used to —–
troubleshoot startup problems. It allows you to disable individual bootup options.
If you discover inappropriate material on a company-owned computer but no specific computer-use policy exists (or Acceptable Use policy), you should —
inform your supervisor of the inappropriate material.
Because she is the only one having the problem, the problem likely arises from a —
setting on her computer. update the network settings.
The tool used to view the system event logs in Windows. This tool is available in Computer Management or from Administrative Tools in Control Panel. —-
Event Viewer
To load into ____________, press F8 when the operating system menu is displayed during bootup. Safe Mode loads minimal drivers and can allow you to troubleshoot issues. —-
Safe Mode
Allows you to run many commands. —
Command prompt
In Windows XP and later, ______________________is part of the Backup utility. This tool creates a disk that can be used to restore certain aspects of the system but can only be created on a floppy drive, which is often not an option in today’s computers. —
Automated System Recovery (ASR) —-
_____________ an operating system completely removes it from the hard drive. Reinstalling or repairing an operating system allows you to fix any problems that may occur. You should always try repairing first as this will have the least effect on your system. Keep in mind that reinstalling or repairing may require you to update device drivers after the reinstall or repair occurs. —
Uninstall/reinstall/repair
This is the firmware in a computer that is used to store system settings needed at boot time, such as hard drive parameters and boot devices. This is where you would go if you need to change the default boot device. —
BIOS/UEFI
This is another method that can be used to repair an operating system. It is the best option to use if you cannot get Windows to boot at all. In Windows 2000, these were called
emergency repair disks (ERD). —
You should use the _____________________to edit, modify, and update the Boot Configuration Data (BCD) file, which contains the boot settings for a computer. —
bcdedit.exe utility
You could also change the boot order by using the —
MSCONFIG tool.
The taskmgr.exe utility allows you to view and stop running —
applications, processes, and services.
The boot.ini file held configuration data for Windows XP and earlier. It was replaced by the —-
BCD file in Windows Vista and later.
The regedit.exe utility edits —
registry settings.
The registry contains important —
configuration information and is should only be edited by administrators.
Regedit and regedt32 are used to edit the —
registry.
Registry edits occur immediately and can
have grave consequences..
The Microsoft Register Server (regsrv32) utility registers and unregisters —
dll files and ActiveX controls in the registry.
If a dll file is replaced, it may be necessary to —
register the new file using this tool.
Whaling and spear phishing are two types of
targeted phishing attacks.
Spear phishing targets a —
group of high-risk users in an organization through email and social media posts.
Whaling is conducted like spear phishing, except that whaling specifically targets —
senior executives (the “big fish”).
A zombie is a computer that an attacker has accessed and configured to —
forward transmissions to other computers on the Internet. Often an attacker has more than one zombie.
Mining or data mining is a database application term that examines —
data to predict behavior..
Ransomware is a type of attack that installs itself on a computer and
blocks access to the computer until a sum of money is paid. You should contact authorities if you become a victim of a ransomware attack.
The Num Lk (Num Lock key) does not control the —
scrolling feature.
Num Lk is a toggle key on the —
numeric keypad.
Num Lk is used to switch between —
number entry and arrow keys.
The Shift key will not prevent arrow keys from —
moving the cursor from one cell to another cell.
The Shift key is a modifier key that can be used to type —
characters in uppercase when Caps Lock is off.
Scroll Lk modifies the behavior of —
arrow keys
According to CompTIA, the steps in the malware removal process are as follows: Identify and research malware symptoms.
1 Quarantine the infected systems. 2 Disable system restore (Windows). 3 Remediate the infected system. 4 Update (or install) anti-malware software. 5 Scan and use removal techniques (safe mode, pre-installation environment). 6 Schedule scans, and run updates. / Enable System Restore, and create a restore point (in Windows). 7 Educate the end user.
allows you to work with the Advanced Packaging Tool and install packages (applications) in Ubuntu, which is a Debian-based distribution. —
apt-get
changes directory. —
cd
changes the permissions on a file. —
chmod
changes the ownership of the file. —
chown
copies files and directories. —
cp
allows you to copy a file and convert it to another format during the copying process. —
dd
finds a pattern of text within a file or group of files. —
grep
lists file and directory contents. —
ls
renames or moves a file. —
mv
provides a list of current processes running on the system. —
ps
The ________command displays the working directory, or the directory that you are currently in. —-
pwd
quits (exits) the vi editor. —
q
removes a file. —-
rm
turns off the computer. —
shutdown - Adding the /h parameter to the command halts the shutdown and adding the /r parameter to the command reboots after shutdown.
The _______command allows you to log on as the superuser (root). The ______ command allows a regular user to execute commands as the superuser. —
su/sudo -
the text editor in Linux. —-
vi
The local network login uses one-factor authentication. Although two items are being presented, both items are categorized as something —
you know.
The remote network login uses two-factor authentication. Although three items are being presented, two items are something —
you know and one is something you have.
Three-factor authentication uses something —
you know (i.e. username or password), something you have (i.e., smart card), and something you are (i.e., biometric authentication).
The _______ contains important information regarding chemicals that were shipped by the chemical manufacturer and includes substance properties, identification of substances, substance storage, fire-fighting procedures, substance handling, safety information, and spillover cleanup procedures. —-
MSDS
A ______ is used for formatting HTML pages —
CSS
_______________ your data that is stored on your phone is very wise as it scrambles your data making it unreadable. —-
Encrypting
This console includes Device Manager, Event Viewer, Shared Folders, Performance/Performance Logs and Alerts (depending on the operating system), and possibly Local Users and Groups and Task Scheduler. This is the console you would open for most computer management tasks.
Computer Management —-
It lists all installed hardware and allows you to add and remove hardware, update drivers, and reconfigure hardware. —
Device Manager
You can edit the ______________ by running secpol.msc. This allows you to configure local security settings, including password policies and audit policies. —
Local Security Policy
While ______________Monitor differs depending on the operating system, it purpose is the same: to use performance counters to gather performance statistics. —
Performance Monitor
This console can be opened by running services.msc at the Run command line. It can also be accessed in the Computer Management console or Administrative Tools. —-
Services
This tool can be accessed by running msconfig at the command line. This tool includes five tabs: General, Boot, Services, Startup, and Tools. It is mainly used to troubleshoot startup issues. — System Configuration
System Configuration
This tool allows you to schedule jobs to run. —-
Task Scheduler
This tool is in Administrative Tools and is used to manage component services. —
Component Services -
This tool is also located in Administrative Tools and is used to manage how a computer connects to a data provider. —-
Data Sources -
This tool is available in Windows 7 or higher. It allows you to manage printers and print servers. —-
Print Management
This tool is available in Windows 7 and higher, and is used to check for memory problems. It requires a system reboot. At the reboot, the memory test will run. —
Windows Memory Diagnostics -
This tool is accessed from the Control Panel and is used to configure firewall settings on the local computer. —
Windows Firewall
This part of Windows firewall is available in Windows 7 and higher. Windows Firewall with Advanced Security is more powerful than Windows Firewall and can manage security associations and security rules. —
Advanced Security
default installation folder for 64-bit applications in any edition of Windows is_______________, regardless of whether it is running a 32-bit or 64-bit version of the operating system. —
C:\Program Files
If 32-bit applications are installed on a 64-bit Windows Vista computer, the 32-bit applications will install to the —
C:\Program Files (x86) folder.
The C:\Program Files (x64) folder is —
not a valid default folder.
The C:\Windows\System32 folder contains —
vital operating system files.
You can change the default folder for installation by editing the registry. Remember that editing the registry can —
cause problems with your computer, so only edit the registry if you are sure of what you are doing.
32-bit applications can run on 32-bit and 64-bit computers, but 64-bit applications can only run on —
64-bit computers.
If you install both 32-bit and 64-bit applications on a 64-bit computer, the 32-bit applications will be installed in the —-
C:\Program Files (x86)
All 32-bit versions of Windows 7 have the following minimum requirements:
- 1 gigahertz (GHz) processor 2. 1 gigabyte (GB) RAM 3. 16 GB available hard drive space 4. DirectX 9 graphics card with WDDM 1.0 or higher driver
All 64-bit versions of Windows 7 have the following minimum requirements:
- 1 GHz processor 2. 2 GB RAM 3. 20 GB available hard drive space 4. DirectX 9 graphics card with WDDM 1.0 or higher driver
Windows 8 and 8.1 have the following minimum requirements:
- 1 GHz 32- or 64-bit processor with support for PAE,NX and SSE2 /2. 1 GB RAM (32-bit), 2 GB RAM (64-bit) /3. 16 GB hard drive space (32-bit) or 20 GB (64-bit) /4. DirectX 9 graphics card with WDDM driver
Windows 10 has the following minimum requirements:
- Processor: 1 GHz or faster processor or SoC / 2. RAM: 1 GB for 32-bit or 2 GB for 64-bit /3. Hard disk space: 16 GB for 32-bit OS or 20 GB for 64-bit OS /4. Graphics card: DirectX 9 or later with WDDM 1.0 driver /5. Display: 800 x 600
The User State Migration Tool (USMT) is used to —
migrate user settings from one operating system to another in Windows 7 and higher.
The Windows Upgrade Advisor is a tool used to —
determine if your computer is able to run a new operating system version.
The Microsoft Assessment and Planning Toolkit is a tool used to —
plan desktop and server migrations.
A hardware compatibility list (HCL) is a list of —
hardware that is compatible with a particular operating system version. Each version of Windows has its own HCL.
WPA was created to fix core problems with —
WEP.
WPA is designed to work with older wireless clients while implementing the —
802.11i standard.
WAP is the default protocol used by —
most wireless networks and devices
WEP was the first security standard for —
wireless networks and devices that uses encryption to protect data.
WPA2 implements the 802.11i standard completely. Therefore, it does —
not support the use of older wireless cards.
WPA uses ________________________for encryption. — —
Temporal Key Integrity Protocol (TKIP)
WPA2 uses _______________ for encryption. —
CCM Mode Protocol (CCMP)
Both WPA and WPA2 can operate in two modes: —–
Personal and Enterprise.
A virus is
malicious software (malware) that relies on other application programs to execute and infect a system.
Stealth virus: —
It hides the changes it makes as it replicates.
Self-garbling virus: —
It formats its own code to prevent antivirus software from detecting it.
Polymorphic virus: —
It can produce multiple operational copies of itself.
Multipart virus: —
It can infect system files and boot sectors of a computer system.
Macro virus: —
It generally infects the system by attaching itself to MS-Office applications.
Boot sector virus: —
It infects the master boot record of the system and is spread via infected floppy disks.
Compression virus: —
It decompresses itself upon execution but otherwise resides normally in a system.