flashcards3
Questions
Answers
A computer network that enables users to wirelessly connect to their offices or the Internet via a cellular network. Sometimes referred to as wireless broadband.
WWAN (Wireless Wide Area Network)
Allows you to start up the computer remotely
WoL Wake on LAN -
An index level calcuated from signal strength. If it the connection speed is below the RSSI minimum the wireless adapter will drop the signal
RSSI (Received Signal Strength Indicator)
Enables network-ready devices to discover each other automatically. Also allows configurations for devices to work with firewalls
UPnP (Universal Plug and Play)
Informs you when a program makes a change that requires administrator-level permission, also adjusts the permission level of your user accounts
UAC (User Account Control)
Part of EUFI, successor to MBR. Windows allows up to 128 partitions at 2TB each. It also has a back up copy for parition entries
GPT (GUID Partition Table)
Programming environment that includes features to help you write and edit code as well as debugging tools
IDV (Integrated Development Environment)
Runs on on TCP port 3389.
RDP (Remote Desktop Protocol)
%%
windows batch file escape character
%SYSTEMROOT%\System32\drivers\etc\hosts
HOSTS file location in Windows
%SystemRoot%\System32\Winevt\Logs folder
Where are the log files stored?
(*) 7
(*) rwx
(*) 0
(*) —
(*) 1
(*) –x
(*) 2
(*) -w-
(*) 3
(*) -wx
(*) 4
(*) r–
(*) 5
(*) r-x
(*) 6
(*) rw-
(Linux)stops a process using its Process ID
kill
/etc/hosts
HOSTS file location in Linux
- Identify and research malware symptoms
- Quarantine infected systems
- Disable system restore
- Remediate infected systems:
- update anti-malware software
- scan and use removal techniques - Schedule scans and run updates
- Enable system restore
- Educate end user
malware removal process
127.0.0.1
IPv4 Loop back address
512 bytes on a disk
Sector
64 bit file system used for large capacity removable hard drives and flash media.
exFAT ( Extended File Allocation Table)
A class of enterprise software designed to apply security policies to the use of smartphones and tablets in a business network
MDM (Mobile Device Management )
A collection of user accounts that can be assigned permissions in the same way as a single user object
security group
A collection of user accounts that can be assigned permissions in the same way as a single user object.
Security Group
A command used to view all variables in the shell, except special variables.
set command
A command-line version of the Task Manager
tasklist
A disk partition designated for swap space in linux.
Swap Partition
A disk partition disignated for swap space in linux
Swap Partition
a feature of macOS that enables a user to set up one more desktops with different sets of apps and backgrounds
Mission Control
A feature of OS X that gives other computers on the network access to the Mac’s optical drive. System Preferences -> Sharing
Remote Disc
a feature to secure access to shared folders and printers. (exists in windows 7 and 8 but not in later versions of windows 10)
Homegroup
A feature within NTFS on Windows systems that supports encrypting individual files or folders for confidentiality.
EFS (Encrypting File System)
a file that contains all the contents of an optical disc
ISO File
A group of sectors
Cluster
A group of sectors
Cluster
A limited account used to run services that cannot make system wide changes. Also it can access the network anonymously
Local Service
A limited account used to run services that cannot make system wide changes. Also it can access the network anonymously
LocalService
A management console snap in for viewing and managing system logs (accessed through computer management, administrative tools, or eventvwr.msc
Event Viewer
A management console snap in for viewing and managing system logs (accessed through computer managment, administrative tools, or eventvwr.msc)
Event Viewer
A managment console that provides an interface for managing user and group accounts.(not available in Starter or Home editions)
Local Users and Groups
A managment console that provides an interface for managing user and group accounts.(not available in Starter or Home editions)
net user dmartin Pa$$w0rd /add /fullname: “David Martin” /Logonpasswordchg:yes
A means of applying security settings and other administrative settings across a range of computers and users
GPO (Group Policy Object)
A microsoft utility to encrypt a drive
BitLocker
A network protocol for secure transfer of data between computers on port 22
SSH (Secure Shell)
A new feature of Windows 7 that enables users to rapidly access data from remotely located file and web servers. This enables users at a small branch to cache copies of frequently accessed files from head office servers on a local computer.
BranchCache
A number generated by an algorithm from a text string.
hash
A partition that contains an image of the bootable partition created when the computer was built.(Restores OS to factory settings)
Factory Recovery Partition
A program that appears desirable but actually contains something harmful
Trojan Horse
a program that appears desirable but actually contains something harmful
Trojan Horse
A search tool in the macOS
Spotlight Search
a set of software tools that enable an unauthorized user to gain control of a computer system without being detected.
Rootkits
a set of tools designed to gain control of a computer without revealing its prescence
Rootkit
A set of tools designed to gain control of a computer without revealing its presence
Rootkit
a single key is used to encrypt and decrypt data
symmetric encryption
A software program capable of reproducing itself that can spread from one computer to the next over a network
Worm
a software program capable of reproducing itself that can spread from one computer to the next over a network
Worm
A storage location in the environment of the operating systems command shell.
environment variable
a text file editor in linux
vi/vim
a text file editor in linux.
vi/vim
A type of network attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network
Replay attack
A type of network attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.
Replay Attack
A utility on macOS that allows a full windows installation to be made on a Mac. Applications ->Utilities folder
Boot Camp
A utility that is used to register component services used by an installed application.
regsvr32
A vulnerability that is exploited before the software creator/vendor is even aware of its existence.
zero-day exploit
A Windows command that is similar to and more powerful than the xcopy command, used to copy files and folders.
robocopy
A Windows command to manage hard drives, partitions, and volumes.
diskpart
a windows peer-to-peer network
workgroup
A Windows process that does not require any sort of user interaction and so runs in the background
service
A Windows process that does not require any sort of user interaction and so runs in the background.
Service
Aborts command prompt shutdown
shutdown -a
aborts command prompt shutdown
shutdown -a
Acts as the emulator for allowing 32-bit applications to run seamlessly on a Windows 64-bit OS
WOW64
acts as the emulator for allowing 32-bit applications to run seamlessly on a Windows 64-bit OS
WOW64
Add dmartin to the Administrators local group
net localgroup Administrators dmartin /add
Add or delete a scheduled job in cron
crontab -1
Adds missing Windows installations to the BCD
bootrec /rebuildbcd
Adds missing Windows installations to the BCD
bootrec /rebuildbcd
All data modified since last full backup ( moderate backup time, moderate restore time uses no more than 2 tape sets)
Differential backup
All data modified since last full backup(moderate backup time, moderate restore time uses no more than two tape sets)
Differential backup
All selected data regardless of when it was previously backed up (high backup, time low restore time uses one tape set)
full backup
All user accounts that have been authenticated to access the system
Authenticated Users Group
All user accounts that have been authenticated to access the system.
Authenticated Users Group
Allow you to collect statistics about resources such as memory, disk, and processor
counter logs
Allows administrators to devise policies or profiles defining the minimum security configuration required of devices for network access
NAC (Network Access Control)
Allows monitoring of Windows logs. System, security, application, and service events are recorded in these logs
Event Viewer
Allows you to view and edit currenty security policy
Local Security Policy
Allows you to view cached passwords for websites and Windows/network accounts
Credential Manager
An account in which if a process is executed it is unrestricted in terms of making changes to the system configuration and file system (better than administrator account)
LocalSystem account
An account that has the same privileges as LocalService but can access the network using the computer’s machine account’s credentials
NetworkService
An applet to set the programs you wish to use, or choosing which application is used to open files of a particular extension
Default Programs
An application used to provide detailed diagnostic information about your mac
System Information
an attack that convinces the network that the attacker’s MAC address is the one associated with an allowed address so that traffic is wrongly sent to the attacker’s machine
ARP poisoning
An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
Phishing
An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
phishing
An interface between the user and computer and software.
shell
an xml text file that contains all the instructions a Windows Setup program would need to install and configure an OS with out any administrator intervention
answer file
App in macOS used to verify or repair a disk or file system
Disk Utility
Appears in legacy applications but is deprecated because the rights allocated to this account type can be abused to allow the user Administrative or System privileges
Power Users
Appears in legacy applications but is deprecated because the rights allocated to this account type can be abused to allow the user Administrative or System privileges
Power Users
Apple equivalent of Alt
Option
Apple equivalent of Ctrl button
Command
Apple equivalent of file explorer in Windows
Finder
Apple equivalent of system restore
Time Machine
Apple File System - used in macOS High Sierra or later which supports native file encryption
APFS
Apple File System - used in macOS High Sierra or later which supports native file encryption
APFS
Apple version of performance monitor
Activity Monitor
Applies a new or changed policy to a computer immediately
gpupdate
Assigns a port dynamically from an ephemoral range
Remote Assistance
attempts to discover the password from the hash using databases of precomputed hashes
Rainbow Table Attack
Attempts to fix startup problems.
Bootrec
Attempts to fix startup problems.
bootrec
attempts to repair MBR
bootrec /fixmbr
Authenticates user before committing any resources to RDP session preventing denial of service attacks
NLA (Network Level Authentication)
Authentication, Authorization, and Accounting
AAA
Background Intelligent Transfer Service - a protocol in which the computer is enabled to browse update.microsoft.com and select updates for download and installation
BITS
Bash shell script comment
#
Best place to configure your system in Windows 7
Control Panel
binary files that store the registry database
hive
binary files that store the registry database.
Hive
Boot Configuration Data
BCD
both 64 bit file systems that suppor journaling but ext 4 delivers better performance
ext3 vs ext4
Both 64 bit file systems that support journaling but ext4 delivers better performance
ext3 vs ext4
bottom of screen gives one-click access to favorite apps and files in macOS
dock
can be used to specify that date within the month(0-31) in cron
dd
can collect statistics about services, providing detailed reports about about resource behavior
trace logs
Can perform all management tasks and generally has very high access to all files and objects
Administrators
Capturing and reading data packets as they move over a network
eavesdropping
capturing and reading data packets as they move over a network
Eavesdropping
causes a service at a given host to fail or become unavailable to legitimate users
DoS attack (Denial of Service Attack)
Causes all policies(new and old to be reapplied)
gpupdate /force
Certificate Authority - a third party that vouches for certificates
CA
change ownership in linux
chown
Change ownership in linux.
chown
change permission modifiers in linux
chmod
changes the group in linux
chgrp
changes the name of drive D to drive E
format D: /v: E
Check Disk - checks the integrity of disks and can repair any problems detected
chkdsk
check free space and report usage by directories and files
df and du
checks partition errors (partition should be unmounted before running this tool)
fsck
checks partition errors (partition should be unmounted before running this tool)
fsck
clears the command prompt screen
cls
clears the command prompt screen.
cls
Clears the DNS resolver cache
ipconfig /flushdns
Clients - Provides connections to types of file servers such as Linux, Unix, or Windows Protocols - Provide the format for addressing and delivering data messages between systems. Services - Allow your machine to provide network functionality to other machines
Adapter Properties
Confidentiality, Integrity, Availability
CIA
Configures detailed reports on different system statistics and log performance over time(can be accessed through administrative tools, Computer Management or perfmon.exe command line)
Performance Monitor
Contains information about service load failures, hardware conflicts, and driver load failures
System Log
Contains information regarding the application errors
Application Log
Contains user accounts of any users connected to a computer over the network
Network Group
Control connection to databases set up on the local computer
Data Sources
control panel -> system properties -> remote settings
Remote Settings location
Control Panel –> System Properties –> Remote Settings
Remote Settings Location
Control Panel ->System -> Advanced system settings ->System Properties->Remote Settings
remote settings location
Data that is used to identify, contact, locate, or impersonate an individual
PII (Personally Identifiable Information)
Disables dmartin account
net user dmartin /active:no
Disables dmartin account
net user dmartin /active:no
Dismounts volume C:
chkdsk C: /x
Dismounts volume C:
chkdsk C: /x
Displays a log of “system reliability” events
Reliability Monitor
Displays all connections and listening ports.
netstat -a
displays all files and directories in the current directory
dir .
displays all files with the DOC extension in the current directory
dir *.doc
displays all files with the DOC extension in the current directory.
dir *.doc
displays all files with the DOC extension that start with the letters LET
dir Let *.doc
displays all files with the DOC extension that start with the letters LET and searches for subdirectories
dir Let *.doc /s
displays all files without an extension.
dir *.
displays all files without an extension.
dir *.
Displays DHCP, DNS server, MAC address, and NetBIOS status
ipconfig /all
Displays DHCP, DNS server, MAC address, and NetBIOS status
ipconfig /all
Displays DNS resolver cache
ipconfig /displaydns
displays linux processes that are currently running
ps
displays linux processes that are currently running
ps
Displays ports and addresses in numerical format. Skipping name resolution speeds up each query
netstat -n
displays the current state of network interfaces within linux
ifconfig/iwconfig
Displays the RSoP for a computer and user account
/s - specifies a host name by name or IP address
/u - specifies a host name by user account
/p - specifies a host name by password
gpresult
Displays, Storage, Service
apple menu items
Distributed denial of service attacks that overwhelm a web server and shut it down
DDoS Attack
Distributed denial of service attacks that overwhelm a web server and shut it down
DDoS Attack
Do anything with the object, including change its permissions and its owner
Full Control
Do anything with the object, including change its permissions and its owner
Full Control
Do most things with an object but not to change its permissions or owner
Modify
Do most things with an object but not to change its permissions or owner.
Modify
Either parameter will generate a detailed explanation of the command in Linux
man/ –help
Either parameter will generate a detailed explanation of the command in Linux
man/ –help
Enables file compression using NTFS
format D: /fs:NTFS /c
Encrypting File System - a windows feature that can encrpyt a folder or a file
EFS
Ensures old data on a hard drive is destroyed by writing zereos or a random patter to each location on the drive. Makes disk suitable for re-use
Drive wiping
Ensures old data on a hard drive is destroyed by writing zeros or a random patter to each location on the drive. Makes disk suitable for re-use.
Drive Wiping
enters the editor
crontab -e
enters the linux job schedualing editor
crontab -e
Exposes the whole registry configuration using a dialog-based interface(Offers a wider range of settings than Local Security Policy)
Local Group Policy(gpedit.msc)
Extended Hierarchical File System - the file system older macOS uses
HFS Plus
Files are rearanged into contiguous clusters inproving read performance
Defragmentation
Files written in non contiguous clusters reducing read performance
Fragmentation
firewall implemented as software on the individual host computer
Host Firewall
Fixes file system errors on the disk drive C
chkdsk C: /f
fixes problems and makes improvements to the scan software itself
Scan engine/components
Forced DHCP client to renew lease it has for an IP address (if AdapterName is omitted it releases or renews ALL adapters on the network)
ipconfig /renew AdapterName
Forced DHCP client to renew lease it has for an IP address(if AdapterName is omitted it releases or renews ALL adapters on the network)
ipconfig /renew AdapterName
forces the volume to dismount
format D: /fs:NTFS /x
formats D drive to an exfat file system
format D: /fs:EXFAT
Freeware that works over TCP port 5900 with similary functionality to RDP. Screen Sharing is based on VNC
VNC (Virtual Network Computing)
Gnome, KDE, Cinnamon, Xfce
popular linux GUIs
Governs the processing of credit card and other bank payments
PCI-DSS (payment card industry data security standard)
Group is able to perform most common tasks such as shutdown, running applications, and using printers. They can also change time zone and install printers
Users
Group Policy Objects - a windows policy in which a computer remotely installs an application from a network folder without any administrator intervention
GPO
Group Policy Snap in
gpedit.msc
group policy snap in
gpedit.msc
groupadd, groupmod, groupdel
linux group commands
Halt or power off the system
shutdown -h
halts any child processes
taskkill /t /pid processid
In administrative tools. You would use this to configure password and account policies with out going into the registry
Local Security Policy(secpol.msc)
in Apple menu or press command+option+esc
Force Quit
In OS X, a utility to remotely view and control a Mac and is similar to Remote Assistance in Windows.
Screen Sharing
incident response processes, management oversight, security awareness, and training
Procedural controls
Information gathering threat in which the attacker attempts to learn about the configuration of the network and security systems
footprinting
Information, Warning, Error, Critical, Successful Audit, Failure Audit
Event Types
install new application
apt-get install (package name)
install new application
apt-get install (package name)
installing an new OS that completely replaces the old one
clean install
installing on top of an existing version of OS
in-place upgrade
Interface for managing a Windows 10 computer
Windows Settings
ipconfig /flushdns
netsh int ip reset resetlog.txt
netsh winsock reset
Network resent in Windows 7/8
is a text document containing commands for the operating system. The commands are run in the order they are listed
script file
JavaScript
.js
legacy file system used for optical disc media
CDFS (compact disc file system)
Limited rights such as browsing network and shutdown, but they cannot save changes made to the desktop
Guests
Linex shell script
.sh
linux command that makes a copy of an input file to an output file
dd
linux command that shows the default gateway because ifconfig does not
route
linux command used to activate the partition swap space
swapon
linux command used to search and filter contents of files displaying the lines that match the search string
grep
linux command-line program used to create and manage partitions on a hard disk
fdisk
linux command-line program used to format a partition
mkfs
linux command-line program used to format a swap partition
mkswap
linux file system
ext (Extended File Allocation)
Linux shell scrips
.sh
linux task scheduler
cron
list by date created
dir /t:c
list by extension
dir /o:e
List by extension
dir/o:e
list by last modified
dir /t:w
list by last time accessed
dir /t:a
lists all switches for the netstat command
netstat /? Or netstat /help
lists both wide format and one screen at a time
dir /w/p
lists files one screen at a time
dir /p
lists files using a wide format with no file details
dir /w
lists files using a wide format with no file details.
dir/w
Load all device drivers and services
Normal Startup
Load basic devices and services only
Diagnostic start up
Local Security Policy snap in
secpol.msc
located in Administrative Tools, enables you to register new server applications or reconfigure security permissions for existing services
Component Services
Located in Control Panel in Windows 7, is a collection of predefined Microsoft Management Consoles
Administrative Tools
MacOS version of remote desktop functionality
Screen Sharing
Management console with multiple snap-ins to configure local users and groups, disks, services, and devices
Computer Management
Medical and insurance records, plus hospital lab results
PHI (Protected Health Information)
Microsoft client/server network model that groups computers together for security and to centralize administration
Domain
Microsoft peer to peer network model in which computers are grouped together with access to shared resources
Workgroup
Microsoft peer to peer network model in which computers are grouped together with access to shared resources
Workgroup
Microsoft’s Deployment Image Servicing and Management - a tool that reads the contents of a drive and writes the output to a .WIM format file.
DISM
Microsoft’s Deployment Image Servicing and Management - a tool that reads the contents of a drive and writes the output to a .WIM format file.
DISM
Microsoft’s System Preparation Tool - a utility to be run before imaging a disk to solve possible configuration problems
Sysprep
Modify permission is required for the destination folder. All permissions and NTFS attributes(such as encryption) are lost, FAT does not support permissions or special attributes
Moving files and folders to a FAT or FAT32 partition
New files and files modified since last backup(low backup time, high restore time uses multiple tape sets)
Incremental backup
New Technology File System - proprietary file system used exclusively in Windows
NTFS
Not the apple equivalent of the Ctrl button
Control
On NTFS volumes only skips part of the checking process
chkdsk C: /i /c
opens a Remote Desktop connection from command line
mstsc
Opens device manager from runline
devmgmt.msc
Opens device manager from runline
Devmgmt.msc
Opens disk management console from runline
Diskmgmt.msc
Opens the Computer Management console from runline
compmgmt.msc
Opens the Computer Management console from runline.
compmgmt.msc
Opens the Run dialog box
Win Key + R
Order by date
dir /o:d
Order by size
dir /o:s
overloading a switch’s MAC cache preventing genuine devices from connecting and forcing the switch into “hub” or “flooding” mode
MAC flooding
performs a quick format that doesn’t scan for boot sectors
format D: /fs:EXFAT /q
port 23
Telnet
Port-based network access control - means that the switch or router performs authentication of the attached device before activating the port
PNAC
Port-based network access control - means that the switch or router performs authentification of the attached device before activating the port
PNAC
PowerShell
.ps1
Pre-Shared Key - 256 bit cryptographic hash generated from a passphrase. This authentication method is suitable for SOHO networks
PSK
prevents anyone but the user from viewing the screen
privacy screen
privacy laws, policies, and clauses
legal and regulatory or compliance controls
Process ID used to specify a process to kill
taskkill /pid
Process ID used to specify a process to kill
taskkill /pid
process of optimizing RAM storage by borrowing hard drive space
virtual memory
Program Files
64 bit application files location
Program Files(x86)
32 bit application files location
Provide a way of dividing up a domain into different administrative realms
OU (Organizational Unit)
Provides information about hardware resources, components, and the software environment. Also known as System Information.
msinfo32.exe
Provides remotely accessible database for storing, operating system, device, and software application configuration information
Windows Registry
Python
.py
Python comments
#
Python file extension
.py
Queries a dns server about a host
nslookup -Option Host Server
Queries a DNS server about a host.
nslookup ?option host server
quits a running program in command prompt
Control + C
R- read only, H - Hidden, S - System, cannot be deleted A- Archive, modified since last backup
File Attributes
Read a file and change it, or create a file within a folder, but not to delete it
Write
Reboot 10 minutes from now
shutdown now, +10
Reboot after shutdown
shutdown -r
Records events generated during installation
Setup
redhat/CentOS, SUSE, Debian/Ubuntu, Knoppix
popular linux distros
refresh the local database with information about the packages available from the repository
apt-get update
Release the IP address obtained from a DHCP server so the network adapter will no longer have an IP address
ipconfig /release AdapterName
Remote Authentication Dial-In User Service - a type of authentication suitable for server and domain based networks
RADIUS
Removes a directory and its contents recursively
rm -r
Removes job from a scheduled list in cron
crontab -r
Renames a file or directory
ren
Reroutes request for legitimate websites to false websites
Pharming
Reroutes requests for legitimate websites to false websites
pharming
Resolves address to hostnames
ping -a IPAddress
Resolves address to hostnames
ping -a Ipaddress
restricts OS installation to trusted software
secure boot
Resultant Set of Policies
RSoP
Rules applied by packet filter firewalls that filter data by IP address, Protocol ID, and Port Numbers
ACL (Access control list)
runline command for system restore
rstrui
runs a scan immediately
sfc /scannow
saves current session to memory and put the computer into a minimal power state
Sleep/Standby Mode
Saves the current session to disk before powering off the computer
Hibernate mode
saves the current session to disk before powering off the computer
Hibernate Mode
Saves the current session to memory and put the computer into minimal power state
Standby/Sleep Mode
scans and attempts to recover bad sectors on drive C
chkdsk C: /r
schedules a scan when the computer is next restarted
sfc /scanonce
schedules scans whenever the PC boots
sfc /scanboot
Security Accounts Manager - where the local accounts are stored
SAM
services that work in the device firmware that prevents restores or the disabling of location services
Activation Lock/Device Protection
Set properties and monitor local printers and manage print sharing on a network
Print Management
Sets radio power level, typically set to the highest level by default
Transmit Power
Sets radio power level, typically set to the highest level by default.
Transmit Power
sets the day of the week in cron in either numerical or text format
weekday
Settings->Network&Internet->Status
Network reset in Windows 10
Shows a list of services within each process
tasklist /svc
shows a list of services within each process
tasklist /svc
shows an enhanced version of the sort of snapshot monitoring provided by task manager
Resource Monitor
shows an enhanced version of the sort of snapshot monitoring provided by task manager
Resource Monitor
Shows the process that has opened the port
netstat -b
shows the properties of the dmartin account
net user dmartin
shows you the programs, processes, and services that are currently running on your computer (Ctrl + Alt + Del)
Task Manager
Shredding, Incineration, Degaussing
Three most effective types of physical data destruction?
Shutdown at 5:30
shutdown 17:30
Shuts the computer down in 30 seconds
shutdown -t30
shuts the computer down in 30 seconds
shutdown -t 30
specifies minutes past the hour in cron(0-59)
mm
Specifies minutes past the hour in cron, the linux job scheduler. (0-59)
mm
specifies the hour in cron(0-23)
hh
specifies the month in numerical or text format in cron
MM
specifies the month in numerical or text format in cron
MM
specifies the size of allocation units
format D: /a:512
specify image name to kill
taskkill /im
Start, stop, and pause services
Services
System File Checker - a utility that provides a manual interface for verifying system files and restoring them from cache if they are corrupt or damaged
sfc
System for which vendors have dropped all support for security updates due to the system’s age.
End-of-life System
System Preferences -> Trackpad
to adjust settings of an apple track pad
System Preferences ->users and groups
adding a new account in MacOS
Tab in system properties that provides option for system restore
System Protection Tab
tab in system properties that provides option for system restore
system protection tab
template containing the OS and required software
Image
terminates process without any user notification
taskkill /f /pid processid
tests whether or not a system is responsive
Windows + Ctrl + Shift + B
The account that created or “owns” an object, usually a user account.
Creator Owner Group
The active partition of the hard drive containing the boot record and the specific files required to start the Windows launch.
System Partition
the capability for choosing between two or more operating systems to boot from when a computer is turned on. A separate partition is required for each operating system.
Multiboot
the command or script to run along with the full path to the file
command
The database that contains the users, groups, and computer accounts in a Windows Server Domain
Active Directory
The database that contains the users, groups, and computer accounts in a Windows Server Domain
Active Directory
The hard drive partition where the Windows OS is stored. The system partition and the boot partition may be different partitions.
Boot Partition
The hard drive partition where the Windows OS is stored. The system partition and the boot partition my be different partitions
boot partition
The highest level of classification
Top Secret
The host cannot route a reply back to your computer
No reply (request timed out)
The info is too valuable to permit any risk of its capture. Viewing is severely restricted
Secret
the information is highly sensative, for viewing only by approved persons within the organization
confidential
The process of managing information over its life cycle
ICM (Information Content Management)
The software component that provides the core set of operating system functions
kernel
the standard that defines a Port-based Network Access Control mechanism
802.1x
The time it takes for a signal to reach the recipient
latency
There is no routing information
Destination Unreachable
These attack the boot sector, partition table and file system
boot sector virus
These attack the boot sector, partition table, and file system
boot sector virus
This group contains the user account of the person currently working at the computer
Interactive Group
This log holds the audit data for the system
Security Log
Time it takes for a signal to reach the recipient
Latency
To adjust settings of an Apple trackpad
System Preferences –> Trackpad
to attempt repair of the boot sector
bootrec /fixboot
to attempt repair of the boot sector
bootrec /fixboot
tool to copy code to make the partition bootable
bootsect
tool to setup partitions on a hard drive. Sets up active partition
Diskpart
tool to test the memory chips for errors
WIndows Memory Diagnostic
Tool to test the memory chips for errors
Windows Memory Diagnostics
tools used to gather information about the way a network is built and configured
network mapping
Under this protocol Authentication, Authorization, and Accounting are performed by a seperate server
RADIUS (Remote Authentication Dial-In User Service)
Updated file system for optical media with support for multi-session writing
UDF (Universal Disk Format)
used in public key encryption, it is scheme in which the key to encrypt data is different from the key to decrypt.(uses an RSA cipher)
asymmetric encryption
Used in public key encryption, its is scheme in which the key to encrypt the data is different from the key to decrypt ( uses an RSA cipher)
Asymmetric Encryption
Used to modify settings and files that effect the affect the way the computer boots in windows
System Configuration Utility(msconfig)
Used to mount storage devices into a local file system in linux
NFS (Network File System)
user authentication login, firewalls, anti-virus software
Logical controls
user group others
ugo
Useradd, Usermod, Userdel
Linux User commands
useradd, usermod, userdel
linux user commands
utility that allows you to copy the contents of more than one directory at a time and retain the directory structure
xcopy
variation in delay
jitter
VBScript
.vbs
view and change environment variables
printenv or env command
View the contents of a file or folder or start a program
Read/List/Execute
View the performance of the local computer
Reliability and Performance Monitoring
viewing is restricted to the owner organization or to third parties under a Non-disclosure Agreement
classified
virtual file system for linux
VFAT (virtual file allocation table)
virtual memory monitor - manages the memmory mappings and assignments
VMM
Virus that takes advantage of the macro programming languages built into some software.(affect an Office Document)
Macro viruses
Wake on Wireless LAN
WoWLAN
When a new harddisk leaves the manufacturer, creates cylinders, tracks and sectors on the platters
Low Level Format
When a new harddisl leaves the manufacturer, creates cylinders, tracks and sectors on the platters
Low-level format
Where are the log files stored?
%SystemRoot%\System32\Winevt\Logs folder
Windows batch file
.bat
Windows group that includes all users
Everyone Group
Windows Logo’d Product List- catalog of tested devices and drivers
LPL
Windows Server Update Service - a program on a server that allows the network admin to approve updates for certain groups
WSUS
Windows Server Update Services - a program on a server that allows the network administrator to approve updates for certain groups
WSUS
Write permission is required for the destination folder and Modify for the source folder. NTFS permissions are inherited from the destination folder and the user becomes the Creator/Owner
Moving files and folders to a different NTFS volume
Write permission is required for the destination folder and Modify for the source folder. NTFS permissions are retained
Moving files and folders on the same NTFS volume
Write permission is required for the destination folder and Modify for the source folder. NTFS permissions are retained.
Moving files and folders on the same NTFS volume
Write permission is required for the destination folder and Read for the source folder. NTFS permissions are inherited from the destination folder and the user becomes the creator
Copying files and folders on the same NTFS volume or different volume
Write permission is required for the destination folder and read for the source folder. NTFS permissions are inherited from the destination folder and the user becomes the Creator/Owner
Copying files and folders on the same NTFS volume or different volumes