CompTIA A+ Core 2 Flashcards
an old partition style that allows for four primary bootable partitions per hard disk with one marked as active, and 1 extended partition per hard disk, containing additional logical partitions (not bootable)
MBR (Master Boot Record)
category of user groups given a standard set of rights that allows them to perform appropriate system tasks
built-in local groups
the latest partition style which requires a UEFI BIOS and allows for 128 partitions, all bootable
GPT (GUID Partition Table)
file system that allows for 2 TB volumes, and max file size of 4 GB
FAT32
Microsoft flash drive file system, files can be larger than 4GB
exFAT
an improved file system over FAT32 exclusively for use with Windows, including features such as quotas, file compression, encryption, etc
NTFS (New Technology File System)
ISO 9660 Standard file system, where all OSs can read the CD
CDFS (Compact Disk File System)
file systems common on Linux
ext3
file system common on Linux and Android OS
ext4
file system that allows access to files across the network
NFS (Network File System)
file system for Mac OS, replaced by APFS in High Sierra
HFST (Hierarchical File System)
formatting method that creates a new file table but does not erase data that already existed. it is the default in Windows 7, 8, 10
quick format
formatting method that writes zeroes to the whole disk, making old data unrecoverable, and checks the disk for bad sectors
full format
type of storage involving volumes spanning over an array stored in fixed disks in the computer connected via SATA or NVMe bus
dynamic storage
feature that encrypts info on the disk drive
Bitlocker
feature that offers file and folder level encryption
EFS (Encrypting File System)
feature that allows remote computers to share access to a single cache of data
Branchcache
change directory command
cd
command to rename a file
ren OldName NewName
Windows command to delete a file
del or erase
command to create a directory
md or mkdir
ex. md DirectoryName
remove directory command
rd
command to get more information
help or /?
Windows command to list files and directories
dir
command to wait nn seconds, then shutdown
shutdown /s /t nn
command to shut down and restart after nn seconds
shutdown /r /t nn
command to abort the countdown
shutdown /a
command that fixes logical file system errors on disk
chkdsk /f
command that locates bad sectors and recovers readable info
chkdsk /r
command that scans the integrity of all protected system files
sfc
system file checker
command that allows you to manage Windows Imaging Format (WIM) files
dism
Deployment Image Servicing and Management Tool
Windows command that shows currently running processes
tasklist
command that terminates tasks by process ID
taskkill
command to force group policy update
gpupdate
command that verifies policy settings for a computer or user
gpresult
command that formats a disk for use with Windows
format
command that copies files and verifies that the new files are written correctly
copy /v
command that copies files and suppresses prompting to confirm that you want to overwrite an existing destination file
copy /y
command that copies files and directory trees
xcopy
command that copies files and directory trees and is a better version of xcopy
robocopy
command that pings your local router/gateway, determines TCP/IP and network adapter info, and views details about DNS servers, DHCP server, etc
ipconfig
command that testes reachability using ICMP
ping
command that determines the route a packet takes to the destination
tracert
command that shows all active connections
netstat -a
command that shows binaries (Windows) and requires elevated access
netstat -b
command that tells terminal not to resolve names (show IPs, not DNS names)
netstat -n
command that looks up info from DNS servers
nslookup
What is the solution to internet connectivity issues?
- scan with anti-virus software
- verify proxy server settings
- verify network settings
What is the solution for a security alert?
- scan with anti-malware software
- ultimo system restore to return system to previous known-good state
What is the solution for web browser redirection?
- scan with anti-virus software
- very proxy server settings in web browser
- verify Host.ini file isn’t corrupted
What is the solution to web browser pop-ups?
- scan with anti-spyware software
- clear cache
- delete cookies
graphical and text-based tool set to fix common Windows startup issues
recovery console
set of tools that can be booted and loaded from a CD, DVD, or thumb drive
Pre-Installation Environments (PE)
backup type that backs up everything on the machine
full backup
backup type that backs up new files and files modified since last full or incremental backup
incremental backup
backup type that backs up all data modified since the last full backup
differential backup
From where does a folder inherit its permissions by default?
Its parent folder
What actions should you take to secure your wireless network?
- Ensure access point and end host use the same encryption
- Do not use default SSID
- Change name of SSID (not last name, company name, location, etc)
- Disable the SSID broadcast
What steps should you take to secure your network?
- Change default usernames and passwords
- Enable MAC filtering
- Turn off unneeded ports and cover unused network jacks
- Configure a static IP address
- Minimize DHCP IP scope to minimum needed
Which type of IP address is best for servers, more secure, but more time consuming?
static IP
Which type of IP address is best for network hosts?
Dynamic IP
Type of format done by the BIOS that erases the pointers to data on the drive, not the data itself
Low level format
Type of format done by the OS that erases pointers to data, not the data itself
Standard format
How should data on CDs, DVDs, and floppy disks be destroyed?
Shredder
What should you do to sanitize the hard drive if it is to be donated?
Overwrite the hard drive with DOD 5220.22-M compliant program
Possible causes of blue screen of death
- memory issue
- malware infection
possible causes of failure to boot
- incorrect boot configurations in BIOS
- corrupted or missing boot files
- missing drivers
Possible cause of spontaneous shutdown/reboot
often caused by a configuration to automatically restart upon a STOP or blue screen error
Possible cause of RAID not being detected during installation
Windows installation not recognizing RAID because it’s missing special drivers
What could be the causes of slow system performance?
- system not configured for max performance
- paging file drive is fragmented or full
- system needs more memory
- system is overheating
Possible causes of a file failing to open
- file corruption
- broken file association
command to remove a file from a directory or disk and prompt a delete for each file
del /p
command to remove a file from a directory or disk and suppress prompt for read-only files
del /f
command to remove a file from a directory or disk and suppress prompt on a wildcard delete
del /q
command to remove a file from a directory or disk and also delete files from subdirectories
del /s
the scheduling service in Linux when you want to run a batch of commands or a script to perform a backup or other maintenance task
Cron
a non-interactive account with the same, or in some ways better, privileges as the default Administrator account; executed processes are unrestricted in making changes
LocalSystem
a non-interactive account used to run services that cannot make system-wide changes and can access the network anonymously
LocalService
functions that describe the overall operation of an access control system
- authentication: prove who you say you are
- authorization: only authenticated users can access
- accounting: recording when/by whom it was accessed
controls implemented in software to create an access control system
logical security
the three principle types of cryptographic technology
- cryptographic hash: impossible to recover original string from has value
- asymmetric encryption: public key and private key
- symmetric encryption: single secret key
logical security technologies designed to prevent malicious software from running on a hose; does not entirely depend on the good behavior of individual users
execution control
classification category where viewing is restricted to the owner organization or third-parties under NDA
classified
classification level where the information is highly sensitive, for viewing only by approved persons within an organization
confidential
a type of release that is well-supported and will be regularly updated by the Linux distribution to support new hardware, performance, and security improvements. good for servers
LTS (Long-Term Support) release
ia concept in software development where an application is frequently updated through the release of new features over time.
Rolling release
standardized client-server environment that boots a software assembly, retrieved from a network, on clients. It allows a workstation to boot from a server on a network before booting the local hard drive’s operating system. It is usually used to install an image on the computer over the network
The Preboot eXecution Environment (PXE)
What can you use to protect against an under-voltage event?
battery backup or a line conditioner
What can you use to protect against a power loss or power failure?
battery backup or generator should be used
an electrical apparatus that provides emergency power to a load when the input power source becomes too low or the main power fails. provides near-instantaneous protection from input power interruptions by using a battery backup. The on-battery run-time is usually short (less than 60 minutes) but sufficient to properly shut down a computer system
uninterruptible power supply or uninterruptible power source (UPS)
a remote access tool and protocol. It is used for screen sharing on Linux and macOS.
VNC (virtual network computing)
a device that adjusts voltages in under-voltage and overvoltage conditions to maintain a 120 V output, used to protect an entire power circuit from under-voltage events and power sags
Line conditioners
data used to identify, contact, or locate an individual
PII (Personally Identifiable Information)
What are the steps for conducting an indecent response?
- Identify
- Report
- Preserve the data/device
mode used to save the current session to disk before powering off the computer to save battery life
hibernate mode
mode that saves current session to memory and puts computer in minimal power state to save battery
sleep/standby mode
formal request to initiate a data transfer by establishing a circuit or connection between two networks
Data transport request
chronological documentation/paper trail records of the sequence of custody, control, transfer, analysis, and disposition of materials
chain of custody
formal process of exchanging info between parties about witnesses/evidence they will present at trial
Process of discovery
process to preserve all forms of relevant information when there will be litigation
legal hold
hidden system file with .sys extension stored in system drive; reduces workload of physical memory; often referred to as virtual memory
Pagefile
7 steps to malware removal
- Investigate and verify malware symptoms
- Quarantine the infected systems
- Disable system restore in windows
- Remediate the infected systems, updated anti-malware software, scan the system, and use removal techniques (eg safe mode, pre-installation environment)
- Schedule scans and run updates
- Enable system restore and create a restore point in windows
- Educate the end user
command that finds information in the DNS
nslookup
what are the meanings of octal permissions 0-7?
0: deny all - - -
1: execute - - x
2: write - w -
3: write and execute - w x
4: read-only r - -
5: read and execute r - x
6: read and write r w -
7: allow all r w x
linux command that sets the permissions of files or directories on a Linux system
chmod
linux command that changes user ownership of a file, directory, or link
chown
linux command to change passwords for user accounts
passwd
linux command that displays the present working directory
pwd
linux command that is used to list files
ls
linux command to display a long list of files
ls -l
linux command to display all files including hidden or system files
ls -a
linux command to change directory to the parent directory of the one you are currently working in
cd ..
linux command used to create a copy of files either in the same or different folder with the same or different name
cp
linux command that copies a file and displays the files copied
cp -v
linux command is used to either move files from one directory to another or rename a file
mv
linux command to delete files
rm
linux command to remove contents of an entire directory
rm -r
linux command used to filter files
grep
command that allows a Linux user to switch to another user account, including superuser (or root) if another user id is not specified
su
linux command that allows a normal user to run specified commands with superuser privilege level
sudo
linux command used to list the currently running processes, and their PIDs plus some other info
ps
linux command used along with a process ID to end the process
kill
file system search feature in the macOS environment
Spotlight
linux tool that displays information about the wireless adapters configured within the system
iwconfig
macOS feature for managing applications from the desktop that is similar to the Windows taskbar
Dock
MacOS feature used to allow dual booting on a Macintosh computer. It allows the user to boot into either macOS (OS X) or Windows as the computer is rebooted. only supported on Intel-based macOS systems
Boot Camp
feature in macOS that enables a user to access a CD/DVD on another Mac or Windows computer.
Remote disk
MacOS utility that enables data to be backed up to an external drive
Time Machine
Under this protocol, Authentication, Authorization, and Accounting are performed by a separate server (the AAA server). Network access devices, such as routers, switches, wireless access points, or VPN servers, function as client devices of the AAA server. Rather than storing and validating user credentials directly, they pass this data between the AAA server and the user.
RADIUS (Remote Authentication Dial-in User Service)
weight amount for team lifting
over 50 lbs
a collection of user accounts that can be assigned permissions in the same way as a single user object. used when assigning permissions and rights, as it is more efficient to assign permissions to a group than to assign them individually to each user. In most corporate environments, they control access to share drives, mailing lists, and other network resources.
security group
file format for a script to run in Windows PowerShell
.ps1
used to uniquely identify each piece of hardware tracked in an asset management database
asset ID
used to communicate data and preferences to child processes within a script or batch file
environmental variables
interface that offers a glass design that includes translucent windows and was new with Windows Vista
Aero
a piece of software that allows an application to be supported by a system that normally does not support it
shim
Windows 7 interface that allows you to configure the firewall, Windows Update, virus protection, spyware and unwanted software protection, internet security settings, UAC, and network access protection
Action Center
Windows 8 and 8.1 interface where the start menu was removed and the desktop replaced with a new look
Metro
a standard Windows file system for optical media with support for multisession writing.
The Universal Disk Format (UDF or ISO 13346)
displays a log of “system stability” events, so you can see at a glance whether a particular application has stopped responding frequently.
Reliability Monitor
a concept designed to make it easier for less knowledgable users to add a new client to the WLAN without manually entering the security information on the client
Wi-Fi Protected Setup (WPS)
group that gives read/write permission to the system, allowing members to install most software but keeping them from changing key operating system files
power user group
device that passes or blocks traffic to specific addresses based on the type of application
packet filter
a method to prevent a router from sending packets through a route that has become invalid within computer networks by changing the route’s metric to a value that exceeds the maximum allowable hop count so that the route is advertised as unreachable
route poisoning
a method of preventing routing loops in distance-vector routing protocols by prohibiting a router from advertising a route back onto the interface from which it was learned
split-horizon route advertisement