flashcards3

1
Q

Questions

A

Answers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A computer network that enables users to wirelessly connect to their offices or the Internet via a cellular network. Sometimes referred to as wireless broadband.

A

WWAN (Wireless Wide Area Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Allows you to start up the computer remotely

A

WoL Wake on LAN -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An index level calcuated from signal strength. If it the connection speed is below the RSSI minimum the wireless adapter will drop the signal

A

RSSI (Received Signal Strength Indicator)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Enables network-ready devices to discover each other automatically. Also allows configurations for devices to work with firewalls

A

UPnP (Universal Plug and Play)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Informs you when a program makes a change that requires administrator-level permission, also adjusts the permission level of your user accounts

A

UAC (User Account Control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Part of EUFI, successor to MBR. Windows allows up to 128 partitions at 2TB each. It also has a back up copy for parition entries

A

GPT (GUID Partition Table)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Programming environment that includes features to help you write and edit code as well as debugging tools

A

IDV (Integrated Development Environment)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Runs on on TCP port 3389.

A

RDP (Remote Desktop Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

%%

A

windows batch file escape character

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

%SYSTEMROOT%\System32\drivers\etc\hosts

A

HOSTS file location in Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

%SystemRoot%\System32\Winevt\Logs folder

A

Where are the log files stored?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

(*) 7

A

(*) rwx

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

(*) 0

A

(*) —

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

(*) 1

A

(*) –x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

(*) 2

A

(*) -w-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

(*) 3

A

(*) -wx

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

(*) 4

A

(*) r–

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

(*) 5

A

(*) r-x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

(*) 6

A

(*) rw-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

(Linux)stops a process using its Process ID

A

kill

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

/etc/hosts

A

HOSTS file location in Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
  1. Identify and research malware symptoms
  2. Quarantine infected systems
  3. Disable system restore
  4. Remediate infected systems:
    - update anti-malware software
    - scan and use removal techniques
  5. Schedule scans and run updates
  6. Enable system restore
  7. Educate end user
A

malware removal process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

127.0.0.1

A

IPv4 Loop back address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

512 bytes on a disk

A

Sector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

64 bit file system used for large capacity removable hard drives and flash media.

A

exFAT ( Extended File Allocation Table)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A class of enterprise software designed to apply security policies to the use of smartphones and tablets in a business network

A

MDM (Mobile Device Management )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A collection of user accounts that can be assigned permissions in the same way as a single user object

A

security group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A collection of user accounts that can be assigned permissions in the same way as a single user object.

A

Security Group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A command used to view all variables in the shell, except special variables.

A

set command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

A command-line version of the Task Manager

A

tasklist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A disk partition designated for swap space in linux.

A

Swap Partition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

A disk partition disignated for swap space in linux

A

Swap Partition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

a feature of macOS that enables a user to set up one more desktops with different sets of apps and backgrounds

A

Mission Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

A feature of OS X that gives other computers on the network access to the Mac’s optical drive. System Preferences -> Sharing

A

Remote Disc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

a feature to secure access to shared folders and printers. (exists in windows 7 and 8 but not in later versions of windows 10)

A

Homegroup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

A feature within NTFS on Windows systems that supports encrypting individual files or folders for confidentiality.

A

EFS (Encrypting File System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

a file that contains all the contents of an optical disc

A

ISO File

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

A group of sectors

A

Cluster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

A group of sectors

A

Cluster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

A limited account used to run services that cannot make system wide changes. Also it can access the network anonymously

A

Local Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

A limited account used to run services that cannot make system wide changes. Also it can access the network anonymously

A

LocalService

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

A management console snap in for viewing and managing system logs (accessed through computer management, administrative tools, or eventvwr.msc

A

Event Viewer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

A management console snap in for viewing and managing system logs (accessed through computer managment, administrative tools, or eventvwr.msc)

A

Event Viewer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

A managment console that provides an interface for managing user and group accounts.(not available in Starter or Home editions)

A

Local Users and Groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

A managment console that provides an interface for managing user and group accounts.(not available in Starter or Home editions)

A

net user dmartin Pa$$w0rd /add /fullname: “David Martin” /Logonpasswordchg:yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

A means of applying security settings and other administrative settings across a range of computers and users

A

GPO (Group Policy Object)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

A microsoft utility to encrypt a drive

A

BitLocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

A network protocol for secure transfer of data between computers on port 22

A

SSH (Secure Shell)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

A new feature of Windows 7 that enables users to rapidly access data from remotely located file and web servers. This enables users at a small branch to cache copies of frequently accessed files from head office servers on a local computer.

A

BranchCache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

A number generated by an algorithm from a text string.

A

hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

A partition that contains an image of the bootable partition created when the computer was built.(Restores OS to factory settings)

A

Factory Recovery Partition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

A program that appears desirable but actually contains something harmful

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

a program that appears desirable but actually contains something harmful

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

A search tool in the macOS

A

Spotlight Search

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

a set of software tools that enable an unauthorized user to gain control of a computer system without being detected.

A

Rootkits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

a set of tools designed to gain control of a computer without revealing its prescence

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

A set of tools designed to gain control of a computer without revealing its presence

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

a single key is used to encrypt and decrypt data

A

symmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

A software program capable of reproducing itself that can spread from one computer to the next over a network

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

a software program capable of reproducing itself that can spread from one computer to the next over a network

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

A storage location in the environment of the operating systems command shell.

A

environment variable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

a text file editor in linux

A

vi/vim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

a text file editor in linux.

A

vi/vim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

A type of network attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network

A

Replay attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

A type of network attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.

A

Replay Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

A utility on macOS that allows a full windows installation to be made on a Mac. Applications ->Utilities folder

A

Boot Camp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

A utility that is used to register component services used by an installed application.

A

regsvr32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

A vulnerability that is exploited before the software creator/vendor is even aware of its existence.

A

zero-day exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

A Windows command that is similar to and more powerful than the xcopy command, used to copy files and folders.

A

robocopy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

A Windows command to manage hard drives, partitions, and volumes.

A

diskpart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

a windows peer-to-peer network

A

workgroup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

A Windows process that does not require any sort of user interaction and so runs in the background

A

service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

A Windows process that does not require any sort of user interaction and so runs in the background.

A

Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Aborts command prompt shutdown

A

shutdown -a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

aborts command prompt shutdown

A

shutdown -a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Acts as the emulator for allowing 32-bit applications to run seamlessly on a Windows 64-bit OS

A

WOW64

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

acts as the emulator for allowing 32-bit applications to run seamlessly on a Windows 64-bit OS

A

WOW64

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Add dmartin to the Administrators local group

A

net localgroup Administrators dmartin /add

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Add or delete a scheduled job in cron

A

crontab -1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Adds missing Windows installations to the BCD

A

bootrec /rebuildbcd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Adds missing Windows installations to the BCD

A

bootrec /rebuildbcd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

All data modified since last full backup ( moderate backup time, moderate restore time uses no more than 2 tape sets)

A

Differential backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

All data modified since last full backup(moderate backup time, moderate restore time uses no more than two tape sets)

A

Differential backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

All selected data regardless of when it was previously backed up (high backup, time low restore time uses one tape set)

A

full backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

All user accounts that have been authenticated to access the system

A

Authenticated Users Group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

All user accounts that have been authenticated to access the system.

A

Authenticated Users Group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Allow you to collect statistics about resources such as memory, disk, and processor

A

counter logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Allows administrators to devise policies or profiles defining the minimum security configuration required of devices for network access

A

NAC (Network Access Control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Allows monitoring of Windows logs. System, security, application, and service events are recorded in these logs

A

Event Viewer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Allows you to view and edit currenty security policy

A

Local Security Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Allows you to view cached passwords for websites and Windows/network accounts

A

Credential Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

An account in which if a process is executed it is unrestricted in terms of making changes to the system configuration and file system (better than administrator account)

A

LocalSystem account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

An account that has the same privileges as LocalService but can access the network using the computer’s machine account’s credentials

A

NetworkService

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

An applet to set the programs you wish to use, or choosing which application is used to open files of a particular extension

A

Default Programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

An application used to provide detailed diagnostic information about your mac

A

System Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

an attack that convinces the network that the attacker’s MAC address is the one associated with an allowed address so that traffic is wrongly sent to the attacker’s machine

A

ARP poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information

A

phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

An interface between the user and computer and software.

A

shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

an xml text file that contains all the instructions a Windows Setup program would need to install and configure an OS with out any administrator intervention

A

answer file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

App in macOS used to verify or repair a disk or file system

A

Disk Utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Appears in legacy applications but is deprecated because the rights allocated to this account type can be abused to allow the user Administrative or System privileges

A

Power Users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Appears in legacy applications but is deprecated because the rights allocated to this account type can be abused to allow the user Administrative or System privileges

A

Power Users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Apple equivalent of Alt

A

Option

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

Apple equivalent of Ctrl button

A

Command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

Apple equivalent of file explorer in Windows

A

Finder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Apple equivalent of system restore

A

Time Machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Apple File System - used in macOS High Sierra or later which supports native file encryption

A

APFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Apple File System - used in macOS High Sierra or later which supports native file encryption

A

APFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

Apple version of performance monitor

A

Activity Monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Applies a new or changed policy to a computer immediately

A

gpupdate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

Assigns a port dynamically from an ephemoral range

A

Remote Assistance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

attempts to discover the password from the hash using databases of precomputed hashes

A

Rainbow Table Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Attempts to fix startup problems.

A

Bootrec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

Attempts to fix startup problems.

A

bootrec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

attempts to repair MBR

A

bootrec /fixmbr

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

Authenticates user before committing any resources to RDP session preventing denial of service attacks

A

NLA (Network Level Authentication)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

Authentication, Authorization, and Accounting

A

AAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

Background Intelligent Transfer Service - a protocol in which the computer is enabled to browse update.microsoft.com and select updates for download and installation

A

BITS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

Bash shell script comment

A

#

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

Best place to configure your system in Windows 7

A

Control Panel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

binary files that store the registry database

A

hive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

binary files that store the registry database.

A

Hive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

Boot Configuration Data

A

BCD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

both 64 bit file systems that suppor journaling but ext 4 delivers better performance

A

ext3 vs ext4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

Both 64 bit file systems that support journaling but ext4 delivers better performance

A

ext3 vs ext4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

bottom of screen gives one-click access to favorite apps and files in macOS

A

dock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

can be used to specify that date within the month(0-31) in cron

A

dd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

can collect statistics about services, providing detailed reports about about resource behavior

A

trace logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

Can perform all management tasks and generally has very high access to all files and objects

A

Administrators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

Capturing and reading data packets as they move over a network

A

eavesdropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

capturing and reading data packets as they move over a network

A

Eavesdropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

causes a service at a given host to fail or become unavailable to legitimate users

A

DoS attack (Denial of Service Attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

Causes all policies(new and old to be reapplied)

A

gpupdate /force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

Certificate Authority - a third party that vouches for certificates

A

CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

change ownership in linux

A

chown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

Change ownership in linux.

A

chown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

change permission modifiers in linux

A

chmod

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

changes the group in linux

A

chgrp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

changes the name of drive D to drive E

A

format D: /v: E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

Check Disk - checks the integrity of disks and can repair any problems detected

A

chkdsk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

check free space and report usage by directories and files

A

df and du

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

checks partition errors (partition should be unmounted before running this tool)

A

fsck

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

checks partition errors (partition should be unmounted before running this tool)

A

fsck

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

clears the command prompt screen

A

cls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

clears the command prompt screen.

A

cls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

Clears the DNS resolver cache

A

ipconfig /flushdns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

Clients - Provides connections to types of file servers such as Linux, Unix, or Windows Protocols - Provide the format for addressing and delivering data messages between systems. Services - Allow your machine to provide network functionality to other machines

A

Adapter Properties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

Confidentiality, Integrity, Availability

A

CIA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

Configures detailed reports on different system statistics and log performance over time(can be accessed through administrative tools, Computer Management or perfmon.exe command line)

A

Performance Monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

Contains information about service load failures, hardware conflicts, and driver load failures

A

System Log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

Contains information regarding the application errors

A

Application Log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

Contains user accounts of any users connected to a computer over the network

A

Network Group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

Control connection to databases set up on the local computer

A

Data Sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

control panel -> system properties -> remote settings

A

Remote Settings location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

Control Panel –> System Properties –> Remote Settings

A

Remote Settings Location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q

Control Panel ->System -> Advanced system settings ->System Properties->Remote Settings

A

remote settings location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

Data that is used to identify, contact, locate, or impersonate an individual

A

PII (Personally Identifiable Information)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q

Disables dmartin account

A

net user dmartin /active:no

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

Disables dmartin account

A

net user dmartin /active:no

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
162
Q

Dismounts volume C:

A

chkdsk C: /x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
163
Q

Dismounts volume C:

A

chkdsk C: /x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
164
Q

Displays a log of “system reliability” events

A

Reliability Monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
165
Q

Displays all connections and listening ports.

A

netstat -a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
166
Q

displays all files and directories in the current directory

A

dir .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
167
Q

displays all files with the DOC extension in the current directory

A

dir *.doc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
168
Q

displays all files with the DOC extension in the current directory.

A

dir *.doc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
169
Q

displays all files with the DOC extension that start with the letters LET

A

dir Let *.doc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
170
Q

displays all files with the DOC extension that start with the letters LET and searches for subdirectories

A

dir Let *.doc /s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
171
Q

displays all files without an extension.

A

dir *.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
172
Q

displays all files without an extension.

A

dir *.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
173
Q

Displays DHCP, DNS server, MAC address, and NetBIOS status

A

ipconfig /all

174
Q

Displays DHCP, DNS server, MAC address, and NetBIOS status

A

ipconfig /all

175
Q

Displays DNS resolver cache

A

ipconfig /displaydns

176
Q

displays linux processes that are currently running

A

ps

177
Q

displays linux processes that are currently running

A

ps

178
Q

Displays ports and addresses in numerical format. Skipping name resolution speeds up each query

A

netstat -n

179
Q

displays the current state of network interfaces within linux

A

ifconfig/iwconfig

180
Q

Displays the RSoP for a computer and user account
/s - specifies a host name by name or IP address
/u - specifies a host name by user account
/p - specifies a host name by password

A

gpresult

181
Q

Displays, Storage, Service

A

apple menu items

182
Q

Distributed denial of service attacks that overwhelm a web server and shut it down

A

DDoS Attack

183
Q

Distributed denial of service attacks that overwhelm a web server and shut it down

A

DDoS Attack

184
Q

Do anything with the object, including change its permissions and its owner

A

Full Control

185
Q

Do anything with the object, including change its permissions and its owner

A

Full Control

186
Q

Do most things with an object but not to change its permissions or owner

A

Modify

187
Q

Do most things with an object but not to change its permissions or owner.

A

Modify

188
Q

Either parameter will generate a detailed explanation of the command in Linux

A

man/ –help

189
Q

Either parameter will generate a detailed explanation of the command in Linux

A

man/ –help

190
Q

Enables file compression using NTFS

A

format D: /fs:NTFS /c

191
Q

Encrypting File System - a windows feature that can encrpyt a folder or a file

A

EFS

192
Q

Ensures old data on a hard drive is destroyed by writing zereos or a random patter to each location on the drive. Makes disk suitable for re-use

A

Drive wiping

193
Q

Ensures old data on a hard drive is destroyed by writing zeros or a random patter to each location on the drive. Makes disk suitable for re-use.

A

Drive Wiping

194
Q

enters the editor

A

crontab -e

195
Q

enters the linux job schedualing editor

A

crontab -e

196
Q

Exposes the whole registry configuration using a dialog-based interface(Offers a wider range of settings than Local Security Policy)

A

Local Group Policy(gpedit.msc)

197
Q

Extended Hierarchical File System - the file system older macOS uses

A

HFS Plus

198
Q

Files are rearanged into contiguous clusters inproving read performance

A

Defragmentation

199
Q

Files written in non contiguous clusters reducing read performance

A

Fragmentation

200
Q

firewall implemented as software on the individual host computer

A

Host Firewall

201
Q

Fixes file system errors on the disk drive C

A

chkdsk C: /f

202
Q

fixes problems and makes improvements to the scan software itself

A

Scan engine/components

203
Q

Forced DHCP client to renew lease it has for an IP address (if AdapterName is omitted it releases or renews ALL adapters on the network)

A

ipconfig /renew AdapterName

204
Q

Forced DHCP client to renew lease it has for an IP address(if AdapterName is omitted it releases or renews ALL adapters on the network)

A

ipconfig /renew AdapterName

205
Q

forces the volume to dismount

A

format D: /fs:NTFS /x

206
Q

formats D drive to an exfat file system

A

format D: /fs:EXFAT

207
Q

Freeware that works over TCP port 5900 with similary functionality to RDP. Screen Sharing is based on VNC

A

VNC (Virtual Network Computing)

208
Q

Gnome, KDE, Cinnamon, Xfce

A

popular linux GUIs

209
Q

Governs the processing of credit card and other bank payments

A

PCI-DSS (payment card industry data security standard)

210
Q

Group is able to perform most common tasks such as shutdown, running applications, and using printers. They can also change time zone and install printers

A

Users

211
Q

Group Policy Objects - a windows policy in which a computer remotely installs an application from a network folder without any administrator intervention

A

GPO

212
Q

Group Policy Snap in

A

gpedit.msc

213
Q

group policy snap in

A

gpedit.msc

214
Q

groupadd, groupmod, groupdel

A

linux group commands

215
Q

Halt or power off the system

A

shutdown -h

216
Q

halts any child processes

A

taskkill /t /pid processid

217
Q

In administrative tools. You would use this to configure password and account policies with out going into the registry

A

Local Security Policy(secpol.msc)

218
Q

in Apple menu or press command+option+esc

A

Force Quit

219
Q

In OS X, a utility to remotely view and control a Mac and is similar to Remote Assistance in Windows.

A

Screen Sharing

220
Q

incident response processes, management oversight, security awareness, and training

A

Procedural controls

221
Q

Information gathering threat in which the attacker attempts to learn about the configuration of the network and security systems

A

footprinting

222
Q

Information, Warning, Error, Critical, Successful Audit, Failure Audit

A

Event Types

223
Q

install new application

A

apt-get install (package name)

224
Q

install new application

A

apt-get install (package name)

225
Q

installing an new OS that completely replaces the old one

A

clean install

226
Q

installing on top of an existing version of OS

A

in-place upgrade

227
Q

Interface for managing a Windows 10 computer

A

Windows Settings

228
Q

ipconfig /flushdns

netsh int ip reset resetlog.txt

netsh winsock reset

A

Network resent in Windows 7/8

229
Q

is a text document containing commands for the operating system. The commands are run in the order they are listed

A

script file

230
Q

JavaScript

A

.js

231
Q

legacy file system used for optical disc media

A

CDFS (compact disc file system)

232
Q

Limited rights such as browsing network and shutdown, but they cannot save changes made to the desktop

A

Guests

233
Q

Linex shell script

A

.sh

234
Q

linux command that makes a copy of an input file to an output file

A

dd

235
Q

linux command that shows the default gateway because ifconfig does not

A

route

236
Q

linux command used to activate the partition swap space

A

swapon

237
Q

linux command used to search and filter contents of files displaying the lines that match the search string

A

grep

238
Q

linux command-line program used to create and manage partitions on a hard disk

A

fdisk

239
Q

linux command-line program used to format a partition

A

mkfs

240
Q

linux command-line program used to format a swap partition

A

mkswap

241
Q

linux file system

A

ext (Extended File Allocation)

242
Q

Linux shell scrips

A

.sh

243
Q

linux task scheduler

A

cron

244
Q

list by date created

A

dir /t:c

245
Q

list by extension

A

dir /o:e

246
Q

List by extension

A

dir/o:e

247
Q

list by last modified

A

dir /t:w

248
Q

list by last time accessed

A

dir /t:a

249
Q

lists all switches for the netstat command

A

netstat /? Or netstat /help

250
Q

lists both wide format and one screen at a time

A

dir /w/p

251
Q

lists files one screen at a time

A

dir /p

252
Q

lists files using a wide format with no file details

A

dir /w

253
Q

lists files using a wide format with no file details.

A

dir/w

254
Q

Load all device drivers and services

A

Normal Startup

255
Q

Load basic devices and services only

A

Diagnostic start up

256
Q

Local Security Policy snap in

A

secpol.msc

257
Q

located in Administrative Tools, enables you to register new server applications or reconfigure security permissions for existing services

A

Component Services

258
Q

Located in Control Panel in Windows 7, is a collection of predefined Microsoft Management Consoles

A

Administrative Tools

259
Q

MacOS version of remote desktop functionality

A

Screen Sharing

260
Q

Management console with multiple snap-ins to configure local users and groups, disks, services, and devices

A

Computer Management

261
Q

Medical and insurance records, plus hospital lab results

A

PHI (Protected Health Information)

262
Q

Microsoft client/server network model that groups computers together for security and to centralize administration

A

Domain

263
Q

Microsoft peer to peer network model in which computers are grouped together with access to shared resources

A

Workgroup

264
Q

Microsoft peer to peer network model in which computers are grouped together with access to shared resources

A

Workgroup

265
Q

Microsoft’s Deployment Image Servicing and Management - a tool that reads the contents of a drive and writes the output to a .WIM format file.

A

DISM

266
Q

Microsoft’s Deployment Image Servicing and Management - a tool that reads the contents of a drive and writes the output to a .WIM format file.

A

DISM

267
Q

Microsoft’s System Preparation Tool - a utility to be run before imaging a disk to solve possible configuration problems

A

Sysprep

268
Q

Modify permission is required for the destination folder. All permissions and NTFS attributes(such as encryption) are lost, FAT does not support permissions or special attributes

A

Moving files and folders to a FAT or FAT32 partition

269
Q

New files and files modified since last backup(low backup time, high restore time uses multiple tape sets)

A

Incremental backup

270
Q

New Technology File System - proprietary file system used exclusively in Windows

A

NTFS

271
Q

Not the apple equivalent of the Ctrl button

A

Control

272
Q

On NTFS volumes only skips part of the checking process

A

chkdsk C: /i /c

273
Q

opens a Remote Desktop connection from command line

A

mstsc

274
Q

Opens device manager from runline

A

devmgmt.msc

275
Q

Opens device manager from runline

A

Devmgmt.msc

276
Q

Opens disk management console from runline

A

Diskmgmt.msc

277
Q

Opens the Computer Management console from runline

A

compmgmt.msc

278
Q

Opens the Computer Management console from runline.

A

compmgmt.msc

279
Q

Opens the Run dialog box

A

Win Key + R

280
Q

Order by date

A

dir /o:d

281
Q

Order by size

A

dir /o:s

282
Q

overloading a switch’s MAC cache preventing genuine devices from connecting and forcing the switch into “hub” or “flooding” mode

A

MAC flooding

283
Q

performs a quick format that doesn’t scan for boot sectors

A

format D: /fs:EXFAT /q

284
Q

port 23

A

Telnet

285
Q

Port-based network access control - means that the switch or router performs authentication of the attached device before activating the port

A

PNAC

286
Q

Port-based network access control - means that the switch or router performs authentification of the attached device before activating the port

A

PNAC

287
Q

PowerShell

A

.ps1

288
Q

Pre-Shared Key - 256 bit cryptographic hash generated from a passphrase. This authentication method is suitable for SOHO networks

A

PSK

289
Q

prevents anyone but the user from viewing the screen

A

privacy screen

290
Q

privacy laws, policies, and clauses

A

legal and regulatory or compliance controls

291
Q

Process ID used to specify a process to kill

A

taskkill /pid

292
Q

Process ID used to specify a process to kill

A

taskkill /pid

293
Q

process of optimizing RAM storage by borrowing hard drive space

A

virtual memory

294
Q

Program Files

A

64 bit application files location

295
Q

Program Files(x86)

A

32 bit application files location

296
Q

Provide a way of dividing up a domain into different administrative realms

A

OU (Organizational Unit)

297
Q

Provides information about hardware resources, components, and the software environment. Also known as System Information.

A

msinfo32.exe

298
Q

Provides remotely accessible database for storing, operating system, device, and software application configuration information

A

Windows Registry

299
Q

Python

A

.py

300
Q

Python comments

A

#

301
Q

Python file extension

A

.py

302
Q

Queries a dns server about a host

A

nslookup -Option Host Server

303
Q

Queries a DNS server about a host.

A

nslookup ?option host server

304
Q

quits a running program in command prompt

A

Control + C

305
Q

R- read only, H - Hidden, S - System, cannot be deleted A- Archive, modified since last backup

A

File Attributes

306
Q

Read a file and change it, or create a file within a folder, but not to delete it

A

Write

307
Q

Reboot 10 minutes from now

A

shutdown now, +10

308
Q

Reboot after shutdown

A

shutdown -r

309
Q

Records events generated during installation

A

Setup

310
Q

redhat/CentOS, SUSE, Debian/Ubuntu, Knoppix

A

popular linux distros

311
Q

refresh the local database with information about the packages available from the repository

A

apt-get update

312
Q

Release the IP address obtained from a DHCP server so the network adapter will no longer have an IP address

A

ipconfig /release AdapterName

313
Q

Remote Authentication Dial-In User Service - a type of authentication suitable for server and domain based networks

A

RADIUS

314
Q

Removes a directory and its contents recursively

A

rm -r

315
Q

Removes job from a scheduled list in cron

A

crontab -r

316
Q

Renames a file or directory

A

ren

317
Q

Reroutes request for legitimate websites to false websites

A

Pharming

318
Q

Reroutes requests for legitimate websites to false websites

A

pharming

319
Q

Resolves address to hostnames

A

ping -a IPAddress

320
Q

Resolves address to hostnames

A

ping -a Ipaddress

321
Q

restricts OS installation to trusted software

A

secure boot

322
Q

Resultant Set of Policies

A

RSoP

323
Q

Rules applied by packet filter firewalls that filter data by IP address, Protocol ID, and Port Numbers

A

ACL (Access control list)

324
Q

runline command for system restore

A

rstrui

325
Q

runs a scan immediately

A

sfc /scannow

326
Q

saves current session to memory and put the computer into a minimal power state

A

Sleep/Standby Mode

327
Q

Saves the current session to disk before powering off the computer

A

Hibernate mode

328
Q

saves the current session to disk before powering off the computer

A

Hibernate Mode

329
Q

Saves the current session to memory and put the computer into minimal power state

A

Standby/Sleep Mode

330
Q

scans and attempts to recover bad sectors on drive C

A

chkdsk C: /r

331
Q

schedules a scan when the computer is next restarted

A

sfc /scanonce

332
Q

schedules scans whenever the PC boots

A

sfc /scanboot

333
Q

Security Accounts Manager - where the local accounts are stored

A

SAM

334
Q

services that work in the device firmware that prevents restores or the disabling of location services

A

Activation Lock/Device Protection

335
Q

Set properties and monitor local printers and manage print sharing on a network

A

Print Management

336
Q

Sets radio power level, typically set to the highest level by default

A

Transmit Power

337
Q

Sets radio power level, typically set to the highest level by default.

A

Transmit Power

338
Q

sets the day of the week in cron in either numerical or text format

A

weekday

339
Q

Settings->Network&Internet->Status

A

Network reset in Windows 10

340
Q

Shows a list of services within each process

A

tasklist /svc

341
Q

shows a list of services within each process

A

tasklist /svc

342
Q

shows an enhanced version of the sort of snapshot monitoring provided by task manager

A

Resource Monitor

343
Q

shows an enhanced version of the sort of snapshot monitoring provided by task manager

A

Resource Monitor

344
Q

Shows the process that has opened the port

A

netstat -b

345
Q

shows the properties of the dmartin account

A

net user dmartin

346
Q

shows you the programs, processes, and services that are currently running on your computer (Ctrl + Alt + Del)

A

Task Manager

347
Q

Shredding, Incineration, Degaussing

A

Three most effective types of physical data destruction?

348
Q

Shutdown at 5:30

A

shutdown 17:30

349
Q

Shuts the computer down in 30 seconds

A

shutdown -t30

350
Q

shuts the computer down in 30 seconds

A

shutdown -t 30

351
Q

specifies minutes past the hour in cron(0-59)

A

mm

352
Q

Specifies minutes past the hour in cron, the linux job scheduler. (0-59)

A

mm

353
Q

specifies the hour in cron(0-23)

A

hh

354
Q

specifies the month in numerical or text format in cron

A

MM

355
Q

specifies the month in numerical or text format in cron

A

MM

356
Q

specifies the size of allocation units

A

format D: /a:512

357
Q

specify image name to kill

A

taskkill /im

358
Q

Start, stop, and pause services

A

Services

359
Q

System File Checker - a utility that provides a manual interface for verifying system files and restoring them from cache if they are corrupt or damaged

A

sfc

360
Q

System for which vendors have dropped all support for security updates due to the system’s age.

A

End-of-life System

361
Q

System Preferences -> Trackpad

A

to adjust settings of an apple track pad

362
Q

System Preferences ->users and groups

A

adding a new account in MacOS

363
Q

Tab in system properties that provides option for system restore

A

System Protection Tab

364
Q

tab in system properties that provides option for system restore

A

system protection tab

365
Q

template containing the OS and required software

A

Image

366
Q

terminates process without any user notification

A

taskkill /f /pid processid

367
Q

tests whether or not a system is responsive

A

Windows + Ctrl + Shift + B

368
Q

The account that created or “owns” an object, usually a user account.

A

Creator Owner Group

369
Q

The active partition of the hard drive containing the boot record and the specific files required to start the Windows launch.

A

System Partition

370
Q

the capability for choosing between two or more operating systems to boot from when a computer is turned on. A separate partition is required for each operating system.

A

Multiboot

371
Q

the command or script to run along with the full path to the file

A

command

372
Q

The database that contains the users, groups, and computer accounts in a Windows Server Domain

A

Active Directory

373
Q

The database that contains the users, groups, and computer accounts in a Windows Server Domain

A

Active Directory

374
Q

The hard drive partition where the Windows OS is stored. The system partition and the boot partition may be different partitions.

A

Boot Partition

375
Q

The hard drive partition where the Windows OS is stored. The system partition and the boot partition my be different partitions

A

boot partition

376
Q

The highest level of classification

A

Top Secret

377
Q

The host cannot route a reply back to your computer

A

No reply (request timed out)

378
Q

The info is too valuable to permit any risk of its capture. Viewing is severely restricted

A

Secret

379
Q

the information is highly sensative, for viewing only by approved persons within the organization

A

confidential

380
Q

The process of managing information over its life cycle

A

ICM (Information Content Management)

381
Q

The software component that provides the core set of operating system functions

A

kernel

382
Q

the standard that defines a Port-based Network Access Control mechanism

A

802.1x

383
Q

The time it takes for a signal to reach the recipient

A

latency

384
Q

There is no routing information

A

Destination Unreachable

385
Q

These attack the boot sector, partition table and file system

A

boot sector virus

386
Q

These attack the boot sector, partition table, and file system

A

boot sector virus

387
Q

This group contains the user account of the person currently working at the computer

A

Interactive Group

388
Q

This log holds the audit data for the system

A

Security Log

389
Q

Time it takes for a signal to reach the recipient

A

Latency

390
Q

To adjust settings of an Apple trackpad

A

System Preferences –> Trackpad

391
Q

to attempt repair of the boot sector

A

bootrec /fixboot

392
Q

to attempt repair of the boot sector

A

bootrec /fixboot

393
Q

tool to copy code to make the partition bootable

A

bootsect

394
Q

tool to setup partitions on a hard drive. Sets up active partition

A

Diskpart

395
Q

tool to test the memory chips for errors

A

WIndows Memory Diagnostic

396
Q

Tool to test the memory chips for errors

A

Windows Memory Diagnostics

397
Q

tools used to gather information about the way a network is built and configured

A

network mapping

398
Q

Under this protocol Authentication, Authorization, and Accounting are performed by a seperate server

A

RADIUS (Remote Authentication Dial-In User Service)

399
Q

Updated file system for optical media with support for multi-session writing

A

UDF (Universal Disk Format)

400
Q

used in public key encryption, it is scheme in which the key to encrypt data is different from the key to decrypt.(uses an RSA cipher)

A

asymmetric encryption

401
Q

Used in public key encryption, its is scheme in which the key to encrypt the data is different from the key to decrypt ( uses an RSA cipher)

A

Asymmetric Encryption

402
Q

Used to modify settings and files that effect the affect the way the computer boots in windows

A

System Configuration Utility(msconfig)

403
Q

Used to mount storage devices into a local file system in linux

A

NFS (Network File System)

404
Q

user authentication login, firewalls, anti-virus software

A

Logical controls

405
Q

user group others

A

ugo

406
Q

Useradd, Usermod, Userdel

A

Linux User commands

407
Q

useradd, usermod, userdel

A

linux user commands

408
Q

utility that allows you to copy the contents of more than one directory at a time and retain the directory structure

A

xcopy

409
Q

variation in delay

A

jitter

410
Q

VBScript

A

.vbs

411
Q

view and change environment variables

A

printenv or env command

412
Q

View the contents of a file or folder or start a program

A

Read/List/Execute

413
Q

View the performance of the local computer

A

Reliability and Performance Monitoring

414
Q

viewing is restricted to the owner organization or to third parties under a Non-disclosure Agreement

A

classified

415
Q

virtual file system for linux

A

VFAT (virtual file allocation table)

416
Q

virtual memory monitor - manages the memmory mappings and assignments

A

VMM

417
Q

Virus that takes advantage of the macro programming languages built into some software.(affect an Office Document)

A

Macro viruses

418
Q

Wake on Wireless LAN

A

WoWLAN

419
Q

When a new harddisk leaves the manufacturer, creates cylinders, tracks and sectors on the platters

A

Low Level Format

420
Q

When a new harddisl leaves the manufacturer, creates cylinders, tracks and sectors on the platters

A

Low-level format

421
Q

Where are the log files stored?

A

%SystemRoot%\System32\Winevt\Logs folder

422
Q

Windows batch file

A

.bat

423
Q

Windows group that includes all users

A

Everyone Group

424
Q

Windows Logo’d Product List- catalog of tested devices and drivers

A

LPL

425
Q

Windows Server Update Service - a program on a server that allows the network admin to approve updates for certain groups

A

WSUS

426
Q

Windows Server Update Services - a program on a server that allows the network administrator to approve updates for certain groups

A

WSUS

427
Q

Write permission is required for the destination folder and Modify for the source folder. NTFS permissions are inherited from the destination folder and the user becomes the Creator/Owner

A

Moving files and folders to a different NTFS volume

428
Q

Write permission is required for the destination folder and Modify for the source folder. NTFS permissions are retained

A

Moving files and folders on the same NTFS volume

429
Q

Write permission is required for the destination folder and Modify for the source folder. NTFS permissions are retained.

A

Moving files and folders on the same NTFS volume

430
Q

Write permission is required for the destination folder and Read for the source folder. NTFS permissions are inherited from the destination folder and the user becomes the creator

A

Copying files and folders on the same NTFS volume or different volume

431
Q

Write permission is required for the destination folder and read for the source folder. NTFS permissions are inherited from the destination folder and the user becomes the Creator/Owner

A

Copying files and folders on the same NTFS volume or different volumes