DIsk management tools Flashcards

1
Q

What are the three main problems related to file storage?

A
  • Fragmentation
  • Capacity
  • Damage

These issues can significantly impact the performance and reliability of disk drives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is fragmentation in the context of hard disks?

A

Files become fragmented across non-contiguous clusters, reducing read performance

Ideally, each file would be saved in contiguous clusters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does capacity affect disk performance?

A

Performance can be impaired if the boot volume has less than 20% free space

A Low Disk Space warning is generated when space drops below 200 MB.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What can cause damage to hard disk drives?

A

Power cuts, physical impacts, overheating, and electrical issues

SSDs can also suffer from memory circuitry degradation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How often should disk maintenance tools be run?

A

At least every month and before installing software applications

Regular maintenance helps prevent performance issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of the Disk Defragmenter tool (dfrgui.exe)?

A

To speed up the performance of HDDs and SSDs

It performs different operations based on the type of disk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does defragmenting do on a hard disk drive?

A

Rewrites file data to occupy contiguous clusters

This reduces the time the controller needs to seek over the disk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the main purpose of the optimizer tool for SSDs?

A

To instruct the controller to run a TRIM operation

TRIM identifies data marked as deletable and tags blocks as writable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What happens during a TRIM operation on an SSD?

A

The controller identifies deletable data and tags corresponding blocks as writable

This helps in maintaining SSD performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the function of the Disk Clean-up tool (cleanmgr.exe)?

A

Tracks files that can be safely erased to reclaim disk space

It includes files in the Recycle Bin and various temporary files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What additional option can be used with Disk Clean-up to reclaim more space?

A

Clean up system files option in administrator mode

This can reclaim data from caches such as Windows Update and Defender.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False: SSDs manage data blocks directly through the operating system.

A

False

The drive controller manages how blocks are used according to wear-leveling routines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the primary function of the Task Scheduler?

A

Runs commands and scripts automatically

It is accessed through taskschd.msc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What types of schedules can tasks in the Task Scheduler follow?

A

Once at a future date or time, recurring schedule

Tasks can be set to run based on specific triggers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What can a task in the Task Scheduler be?

A

A simple application process, batch file, script

Tasks can include command switches if necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an example of a trigger in the Task Scheduler?

A

User signs in, machine wakes from sleep or hibernation

Triggers can be events rather than just calendar dates/times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How many actions can each task in the Task Scheduler include?

A

Multiple actions

Tasks are versatile and can perform various functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What happens to the activity of tasks in the Task Scheduler?

A

All activity is logged

This allows for investigation of failed tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How can tasks be organized within the Task Scheduler?

A

In folders

This helps manage multiple tasks efficiently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What must be defined apart from the path to the file or script in a task?

A

Trigger and credentials

Credentials are necessary for tasks to run under the correct user account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

True or False: A task will run if the selected user account does not have sufficient permissions.

A

False

Insufficient permissions will prevent the task from running.

22
Q

What is the Local Users and Groups console?

A

The Local Users and Groups (lusrmgr.msc) console provides an advanced interface for creating, modifying, disabling, and deleting user accounts.

23
Q

What can you do with the Local Users and Groups console?

A

You can create, modify, disable, delete user accounts, and reset the password for an account.

24
Q

What are security groups used for?

A

Security groups can be used to collect user accounts that need to be allocated similar permissions.

25
Q

What is an example of a permission allocated to a security group?

A

An example is the right to edit files in a shared folder.

26
Q

What are the default groups in the Local Users and Groups console?

A

The default groups include Administrators, Users, and Guests.

27
Q

What do the default groups implement?

A

The default groups implement the account types that can be selected via the settings interface.

28
Q

What is a digital certificate?

A

A digital certificate is a means of proving the identity of a subject, such as a user, computer, or service.

29
Q

Who guarantees the validity of a digital certificate?

A

The validity of each certificate is guaranteed by the issuing certification authority (CA).

30
Q

What does the Certificate Manager console (certmgr.msc) do?

A

The Certificate Manager console shows which certificates have been installed and provides a mechanism for requesting and importing new certificates.

31
Q

What is stored in the Personal folder of Certificate Manager?

A

The Personal folder stores the certificates that have been issued to the user account.

32
Q

What tasks can user certificates be used for?

A

User certificates can be used for tasks such as authenticating to a network access server, encrypting data, and adding a digital signature to a document or message to prove its authenticity.

33
Q

What does the Trusted Root Certification Authorities folder contain?

A

It contains a superset of the certificates of all issuers that are trusted, including Microsoft’s own CA root, local enterprise CAs, and third-party CAs.

34
Q

How are most Trusted Root Certification Authorities certificates managed?

A

Most of these certificates are managed via Windows Update.

35
Q

What is the purpose of the Third-party Root Certification Authorities folder?

A

It contains trusted issuers from providers other than Microsoft or a local enterprise.

36
Q

What does trusting an unsafe CA raise?

A

Trusting an unsafe CA raises critical security vulnerabilities.

37
Q

What can a rogue CA certificate allow a website to do?

A

A rogue CA certificate might allow a website to masquerade as a legitimate bank or other service and trick the user into submitting a password.

38
Q

What is the function of certlm.msc?

A

Certlm.msc manages the computer certificate store.

39
Q

How do third-party browser applications manage certificates?

A

Third-party browser applications usually maintain a separate store of personal certificates and trusted root CAs.

40
Q

What is the purpose of the Windows registry?

A

A remotely accessible database for storing operating system, device, and software application configuration information

The Registry Editor (regedit.exe) is used to view or edit the registry.

41
Q

What are the five root keys in the Windows registry?

A

HKEY_LOCAL_MACHINE, HKEY_USERS, HKEY_CURRENT_USER, HKEY_CLASSES_ROOT, HKEY_CURRENT_CONFIG

HKEY_LOCAL_MACHINE governs system-wide settings, while HKEY_USERS includes settings for individual user profiles.

42
Q

What does HKEY_CURRENT_USER represent?

A

A subset of HKEY_USERS with the settings for the logged-in user

It contains personalized settings unique to the current user.

43
Q

What is a hive in the context of the Windows registry?

A

A single file that contains the registry database, along with a .LOG file and a .SAV file

The system hive also includes an .ALT backup file.

44
Q

Where are most registry hive files stored?

A

C:\Windows\System32\Config folder

User profile hive files (NTUSER.DAT) are stored in the folder holding the user’s profile.

45
Q

What are subkeys in the registry?

A

Analogous to folders within the registry structure

They can contain additional data items called value entries.

46
Q

What are the three parts of a value entry in the registry?

A

Name of the value, data type of the value, value itself

Data types can include string or binary values.

47
Q

How can you export parts of the registry database?

A

Select File > Export Registry File

The exported file can be merged into another computer’s registry by double-clicking it or calling it from a script.

48
Q

True or False: The Registry Editor can only be used to view the registry, not edit it.

A

False

The Registry Editor (regedit.exe) allows both viewing and editing of the registry.

49
Q

Fill in the blank: A hive comprises a single file with no extension, a .LOG file, and a _______.

A

.SAV file

The .SAV file is a copy of the key as it was at the end of setup.

50
Q
A