flashcards3
Questions
Answers
A computer network that enables users to wirelessly connect to their offices or the Internet via a cellular network. Sometimes referred to as wireless broadband.
WWAN (Wireless Wide Area Network)
Allows you to start up the computer remotely
WoL Wake on LAN -
An index level calcuated from signal strength. If it the connection speed is below the RSSI minimum the wireless adapter will drop the signal
RSSI (Received Signal Strength Indicator)
Enables network-ready devices to discover each other automatically. Also allows configurations for devices to work with firewalls
UPnP (Universal Plug and Play)
Informs you when a program makes a change that requires administrator-level permission, also adjusts the permission level of your user accounts
UAC (User Account Control)
Part of EUFI, successor to MBR. Windows allows up to 128 partitions at 2TB each. It also has a back up copy for parition entries
GPT (GUID Partition Table)
Programming environment that includes features to help you write and edit code as well as debugging tools
IDV (Integrated Development Environment)
Runs on on TCP port 3389.
RDP (Remote Desktop Protocol)
%%
windows batch file escape character
%SYSTEMROOT%\System32\drivers\etc\hosts
HOSTS file location in Windows
%SystemRoot%\System32\Winevt\Logs folder
Where are the log files stored?
(*) 7
(*) rwx
(*) 0
(*) —
(*) 1
(*) –x
(*) 2
(*) -w-
(*) 3
(*) -wx
(*) 4
(*) r–
(*) 5
(*) r-x
(*) 6
(*) rw-
(Linux)stops a process using its Process ID
kill
/etc/hosts
HOSTS file location in Linux
- Identify and research malware symptoms
- Quarantine infected systems
- Disable system restore
- Remediate infected systems:
- update anti-malware software
- scan and use removal techniques - Schedule scans and run updates
- Enable system restore
- Educate end user
malware removal process
127.0.0.1
IPv4 Loop back address
512 bytes on a disk
Sector
64 bit file system used for large capacity removable hard drives and flash media.
exFAT ( Extended File Allocation Table)
A class of enterprise software designed to apply security policies to the use of smartphones and tablets in a business network
MDM (Mobile Device Management )
A collection of user accounts that can be assigned permissions in the same way as a single user object
security group
A collection of user accounts that can be assigned permissions in the same way as a single user object.
Security Group
A command used to view all variables in the shell, except special variables.
set command
A command-line version of the Task Manager
tasklist
A disk partition designated for swap space in linux.
Swap Partition
A disk partition disignated for swap space in linux
Swap Partition
a feature of macOS that enables a user to set up one more desktops with different sets of apps and backgrounds
Mission Control
A feature of OS X that gives other computers on the network access to the Mac’s optical drive. System Preferences -> Sharing
Remote Disc
a feature to secure access to shared folders and printers. (exists in windows 7 and 8 but not in later versions of windows 10)
Homegroup
A feature within NTFS on Windows systems that supports encrypting individual files or folders for confidentiality.
EFS (Encrypting File System)
a file that contains all the contents of an optical disc
ISO File
A group of sectors
Cluster
A group of sectors
Cluster
A limited account used to run services that cannot make system wide changes. Also it can access the network anonymously
Local Service
A limited account used to run services that cannot make system wide changes. Also it can access the network anonymously
LocalService
A management console snap in for viewing and managing system logs (accessed through computer management, administrative tools, or eventvwr.msc
Event Viewer
A management console snap in for viewing and managing system logs (accessed through computer managment, administrative tools, or eventvwr.msc)
Event Viewer
A managment console that provides an interface for managing user and group accounts.(not available in Starter or Home editions)
Local Users and Groups
A managment console that provides an interface for managing user and group accounts.(not available in Starter or Home editions)
net user dmartin Pa$$w0rd /add /fullname: “David Martin” /Logonpasswordchg:yes
A means of applying security settings and other administrative settings across a range of computers and users
GPO (Group Policy Object)
A microsoft utility to encrypt a drive
BitLocker
A network protocol for secure transfer of data between computers on port 22
SSH (Secure Shell)
A new feature of Windows 7 that enables users to rapidly access data from remotely located file and web servers. This enables users at a small branch to cache copies of frequently accessed files from head office servers on a local computer.
BranchCache
A number generated by an algorithm from a text string.
hash
A partition that contains an image of the bootable partition created when the computer was built.(Restores OS to factory settings)
Factory Recovery Partition
A program that appears desirable but actually contains something harmful
Trojan Horse
a program that appears desirable but actually contains something harmful
Trojan Horse
A search tool in the macOS
Spotlight Search
a set of software tools that enable an unauthorized user to gain control of a computer system without being detected.
Rootkits
a set of tools designed to gain control of a computer without revealing its prescence
Rootkit
A set of tools designed to gain control of a computer without revealing its presence
Rootkit
a single key is used to encrypt and decrypt data
symmetric encryption
A software program capable of reproducing itself that can spread from one computer to the next over a network
Worm
a software program capable of reproducing itself that can spread from one computer to the next over a network
Worm
A storage location in the environment of the operating systems command shell.
environment variable
a text file editor in linux
vi/vim
a text file editor in linux.
vi/vim
A type of network attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network
Replay attack
A type of network attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.
Replay Attack
A utility on macOS that allows a full windows installation to be made on a Mac. Applications ->Utilities folder
Boot Camp
A utility that is used to register component services used by an installed application.
regsvr32
A vulnerability that is exploited before the software creator/vendor is even aware of its existence.
zero-day exploit
A Windows command that is similar to and more powerful than the xcopy command, used to copy files and folders.
robocopy
A Windows command to manage hard drives, partitions, and volumes.
diskpart
a windows peer-to-peer network
workgroup
A Windows process that does not require any sort of user interaction and so runs in the background
service
A Windows process that does not require any sort of user interaction and so runs in the background.
Service
Aborts command prompt shutdown
shutdown -a
aborts command prompt shutdown
shutdown -a
Acts as the emulator for allowing 32-bit applications to run seamlessly on a Windows 64-bit OS
WOW64
acts as the emulator for allowing 32-bit applications to run seamlessly on a Windows 64-bit OS
WOW64
Add dmartin to the Administrators local group
net localgroup Administrators dmartin /add
Add or delete a scheduled job in cron
crontab -1
Adds missing Windows installations to the BCD
bootrec /rebuildbcd
Adds missing Windows installations to the BCD
bootrec /rebuildbcd
All data modified since last full backup ( moderate backup time, moderate restore time uses no more than 2 tape sets)
Differential backup
All data modified since last full backup(moderate backup time, moderate restore time uses no more than two tape sets)
Differential backup
All selected data regardless of when it was previously backed up (high backup, time low restore time uses one tape set)
full backup
All user accounts that have been authenticated to access the system
Authenticated Users Group
All user accounts that have been authenticated to access the system.
Authenticated Users Group
Allow you to collect statistics about resources such as memory, disk, and processor
counter logs
Allows administrators to devise policies or profiles defining the minimum security configuration required of devices for network access
NAC (Network Access Control)
Allows monitoring of Windows logs. System, security, application, and service events are recorded in these logs
Event Viewer
Allows you to view and edit currenty security policy
Local Security Policy
Allows you to view cached passwords for websites and Windows/network accounts
Credential Manager
An account in which if a process is executed it is unrestricted in terms of making changes to the system configuration and file system (better than administrator account)
LocalSystem account
An account that has the same privileges as LocalService but can access the network using the computer’s machine account’s credentials
NetworkService
An applet to set the programs you wish to use, or choosing which application is used to open files of a particular extension
Default Programs
An application used to provide detailed diagnostic information about your mac
System Information
an attack that convinces the network that the attacker’s MAC address is the one associated with an allowed address so that traffic is wrongly sent to the attacker’s machine
ARP poisoning
An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
Phishing
An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
phishing
An interface between the user and computer and software.
shell
an xml text file that contains all the instructions a Windows Setup program would need to install and configure an OS with out any administrator intervention
answer file
App in macOS used to verify or repair a disk or file system
Disk Utility
Appears in legacy applications but is deprecated because the rights allocated to this account type can be abused to allow the user Administrative or System privileges
Power Users
Appears in legacy applications but is deprecated because the rights allocated to this account type can be abused to allow the user Administrative or System privileges
Power Users
Apple equivalent of Alt
Option
Apple equivalent of Ctrl button
Command
Apple equivalent of file explorer in Windows
Finder
Apple equivalent of system restore
Time Machine
Apple File System - used in macOS High Sierra or later which supports native file encryption
APFS
Apple File System - used in macOS High Sierra or later which supports native file encryption
APFS
Apple version of performance monitor
Activity Monitor
Applies a new or changed policy to a computer immediately
gpupdate
Assigns a port dynamically from an ephemoral range
Remote Assistance
attempts to discover the password from the hash using databases of precomputed hashes
Rainbow Table Attack
Attempts to fix startup problems.
Bootrec
Attempts to fix startup problems.
bootrec
attempts to repair MBR
bootrec /fixmbr
Authenticates user before committing any resources to RDP session preventing denial of service attacks
NLA (Network Level Authentication)
Authentication, Authorization, and Accounting
AAA
Background Intelligent Transfer Service - a protocol in which the computer is enabled to browse update.microsoft.com and select updates for download and installation
BITS
Bash shell script comment
#
Best place to configure your system in Windows 7
Control Panel
binary files that store the registry database
hive
binary files that store the registry database.
Hive
Boot Configuration Data
BCD
both 64 bit file systems that suppor journaling but ext 4 delivers better performance
ext3 vs ext4
Both 64 bit file systems that support journaling but ext4 delivers better performance
ext3 vs ext4
bottom of screen gives one-click access to favorite apps and files in macOS
dock
can be used to specify that date within the month(0-31) in cron
dd
can collect statistics about services, providing detailed reports about about resource behavior
trace logs
Can perform all management tasks and generally has very high access to all files and objects
Administrators
Capturing and reading data packets as they move over a network
eavesdropping
capturing and reading data packets as they move over a network
Eavesdropping
causes a service at a given host to fail or become unavailable to legitimate users
DoS attack (Denial of Service Attack)
Causes all policies(new and old to be reapplied)
gpupdate /force
Certificate Authority - a third party that vouches for certificates
CA
change ownership in linux
chown
Change ownership in linux.
chown
change permission modifiers in linux
chmod
changes the group in linux
chgrp
changes the name of drive D to drive E
format D: /v: E
Check Disk - checks the integrity of disks and can repair any problems detected
chkdsk
check free space and report usage by directories and files
df and du
checks partition errors (partition should be unmounted before running this tool)
fsck
checks partition errors (partition should be unmounted before running this tool)
fsck
clears the command prompt screen
cls
clears the command prompt screen.
cls
Clears the DNS resolver cache
ipconfig /flushdns
Clients - Provides connections to types of file servers such as Linux, Unix, or Windows Protocols - Provide the format for addressing and delivering data messages between systems. Services - Allow your machine to provide network functionality to other machines
Adapter Properties
Confidentiality, Integrity, Availability
CIA
Configures detailed reports on different system statistics and log performance over time(can be accessed through administrative tools, Computer Management or perfmon.exe command line)
Performance Monitor
Contains information about service load failures, hardware conflicts, and driver load failures
System Log
Contains information regarding the application errors
Application Log
Contains user accounts of any users connected to a computer over the network
Network Group
Control connection to databases set up on the local computer
Data Sources
control panel -> system properties -> remote settings
Remote Settings location
Control Panel –> System Properties –> Remote Settings
Remote Settings Location
Control Panel ->System -> Advanced system settings ->System Properties->Remote Settings
remote settings location
Data that is used to identify, contact, locate, or impersonate an individual
PII (Personally Identifiable Information)
Disables dmartin account
net user dmartin /active:no
Disables dmartin account
net user dmartin /active:no
Dismounts volume C:
chkdsk C: /x
Dismounts volume C:
chkdsk C: /x
Displays a log of “system reliability” events
Reliability Monitor
Displays all connections and listening ports.
netstat -a
displays all files and directories in the current directory
dir .
displays all files with the DOC extension in the current directory
dir *.doc
displays all files with the DOC extension in the current directory.
dir *.doc
displays all files with the DOC extension that start with the letters LET
dir Let *.doc
displays all files with the DOC extension that start with the letters LET and searches for subdirectories
dir Let *.doc /s
displays all files without an extension.
dir *.
displays all files without an extension.
dir *.