Day 2 Flashcards

1
Q

PowerShell

A

an object-oriented, interactive command environment with scripting language features
uses some *Nix commands and has a LINUX version.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Windows PowerShell Integrated Scripting Environment (ISE)

A

where the scripting language aspect of Windows PS generally takes place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Versions

A

use the Get-Host cmdlet or the $PSVersionTable variable to show the current PS version

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

aliases

A

use the cmdlet Get-Alias to show a list of aliase commands.
aliases are windows CLI and unix commands that work the same as a PS command
ex. dir is an alias for the Get-ChildItem cmdlet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

help

A

get-command lists all available cmdlets.
use Get-help to show help information for those cmdlets
(help is an alias for Get-help)
you can use -examples to show examples of the cmdlet you are getting help for in use.
use wildcards with Get-Help (ex. Get-Help user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

cmdlets

A

small commands used within PS; they are not stand alone executables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

cmdlets breakdown

A

object
verb-noun attribute additional info
PS C:> get-ChildItem -Path C:\Windows
cmdlet parameter argument

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

more on Get

A

get is not the only verb available. use Get-Verb to display a list of verbs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

cmdlet parameters (switches)

A
used to identify additional object attributes
ex.
-name
-computername
-path
-examples
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

cmdlet arguments

A

arguments define additional information associated with a parameter name.
arguments are not required.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

pipeline

A

piping refers to the process of passing the results of one cmdlet as input into a second cmdlet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

modules

A

packages of PS commands, consisting of cmdlets, functions, variables, and aliases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

logging

A

a way for the OS and its services and applications to record important actions, post status messages, and track security events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

auditpol

A

the command line tool that enables auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

auditing

A

auditing is the tracking of changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

security audits (appear in security logs)

A

event: description:
POLICY CHANGE–changes to policies
OBJECT ACCESS–when an object is accessed that has a *SACL
PRIVILEGE USE–when a user exercises a user right or privilege
PROCESS TRACKING–tracks all processes (program activation, process exit, indirect object access
SYSTEM–computer security events such as restart, shutdown or clearing the event log
ACCOUNT MANAGEMENT–creation, deletion, or change of user account
LOGON–logon attempts
ACCOUNT LOGON–authentication events authenticated through the SAM or AD
DIRECTORY SERVICE ACCESS–when a user accesses a directory service object with a *SACL

17
Q

logs

A

application log-contains events logged by programs
system log-contains events logged by system components
security log-provides security event information

18
Q

logs location

A

5*-%SystemRoot%\system32\config

6*-%SystemRoot%\system32\winevt\logs

19
Q

additional domain logs

A

directory service log– contains events logged by Active directory

file replication service log– contains information about replication events

DNS server log– available when machine is configured as a DNS server

20
Q

configuration of logs

A

log size can be set in incraments of 64kb to 4 Gb
default is 512kb
NSA group policy object changed the defaults of the event viewer from 512kb in size to over 4GB and from 7 days retention to never overwriting itself. events must be cleared manually

21
Q

log intrepretation

A

the bottom of the log contains a summary

the top part of the log contains the description.

22
Q

log event summary info

A
logged
user
computer
event ID
source 
levels (error, warning, info, critical)
keywords (success audit, failed audit)
task category
Op Code
23
Q

levels and keywords chart

A

Keywords Levels
application classic error,critical,warning,info
system classic

security success/failure info

24
Q

windows registry

A

windows registry is a vast hierarchical repository of operating system (OS), hardware, applications, and user settings that is referred to as the heart and soul of the OS

25
Q

The registry is read during the following times:

A

boot process, application startup, user login

26
Q

regedit

A

primary tool for viewing and editing the registry

27
Q

registry format

A

the registry is structured in a directory-type format containing hives, keys, sub-keys, and values containing data.

28
Q

root keys

A

the windows registry consists of five root key hives; two master keys and three derived keys

29
Q

master keys

A

HKEY_USERS (HKU)

HKEY_LOCAL_MACHINE (HKLM)

30
Q

derived keys

A

HKEY_CLASSES_ROOT (HKCR)
HKEY_CURRENT_USER (HKCU)
HKEY_CURRENT_CONFIG (HKCC)