Comptia A+ Flashcards
tool included in Windows that allows you to view detailed real-time information about CPU, memory, disk, and network performance and resource usage by the operating system, services, and running apps.
Resource Monitor
controls the working environment of user accounts and computer accounts.
Group Policy Editor
designed to free up disk space on a computer’s hard drive.
Disk Clean Up
important functionality provided by the Operating System which can be used to create, delete, format disk partitions, and much more. It enables users to manage and view the different disks and functions like viewing, creating, deleting, and shrinking the partitions associated with the disk drives.
Disk Management
use these commands when computer running slow
-chkdsk (check disk)
-SFC (system file checker)
verifies connectivity and gives you insight as to possible application problems at the computer that is attempting to print.
test page
amount of memory a user is limited to with a 32-bit version of Windows
4gb
what command in linux allows you to see all the files on your system in long format
ls -la
chronological paper trail of evidence that may or may not be used in court.
chain of custody
steps a person takes when first responding to a computer with prohibited content or illegal activity: it includes identifying what exactly is happening, reporting through proper channels, and preserving data and devices.
First time responder
part of first response; a person who first arrives at the scene of a computer incident will be in charge of preserving data and devices in their current state.
Data (and device) preservation
Two things you need to make secure wireless connection work?
-encryption standard used
-SSID of access point
Service Set Identifier (SSID) of the AP and then the encryption being used (for example, WPA or WPA2). The SSID takes care of the “connection” portion, and the encryption takes care of the “secure” portion. After all computers are connected, consider disabling the SSID for increased security.
is a virtually impenetrable symmetric encryption algorithm that uses a 256-bit key to convert your plain text or data into a cipher.
Advanced Encryption Standard (AES) 256
The data is included in dynamic content that is sent to a web user without being validated for malicious content
xss verification
what control panel app in Windows 10 allows system administrators to modify local user account settings
user accounts
performs copy includes all the files and directories along with their NTFS permissions
robocopy
use this to clean dust inside computer
compressed air
main function of a device driver
allows operating system to talk to device
an attacker that sits in the middle between two stations and is able to intercept, and in some cases, change that information that’s being sent interactively across the network
on-path attack
an attack meant to shut down a machine or network, making it inaccessible to its intended users
Denial-of-Service (DoS) attack
Windows System Recovery Option attempts to automatically fix problems?
startup repair
A Windows Control Panel folder containing shortcuts to various system utilities is called:
admin tools
component of physical security addresses outer-level access control
fences
a protocol that devices within a network use to communicate problems with data transmission
The Internet Control Message Protocol (ICMP)
what program is typically designated to house the recovery utility for troubleshooting and repairs?
WinRE
When a person takes control of a session between a server and a client, it is known as which type of attack?
session hijacking
Session hijacking occurs when an unwanted mediator takes control of the session between a client and a server (for example, an FTP or HTTP session). An example of this would be a man-in-the-middle (MITM) attack.
True or False
True
You create an answer file to aid in installing Windows. Which type of installation are you performing?
unattended installation
An unattended installation of Windows requires an answer file. This file is normally named unattend.xml. Unattended installations can be done locally or as part of a network installation using Windows Deployment Services (WDS) in Server 2008 or higher.
True or Fasle
True
checks protected system files and replaces incorrect versions.
System File Checker ( SFC)