It Basics Flashcards

1
Q

Microsoft update varieties

Definition update

A

A widely released and frequent software update that contains additions to a products definition database. Definition databases are often used to detect objects that have specific attributes such as malicious code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Update varieties

Critical update

A

A widely released fix for a specific problem that addresses a critical non security related bug

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Microsoft update varieties

Driver

A

Software that controls input/output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Virus scanners

A
  • keep up to date

- most antivirus softwares allows online updating of the virus definition files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Spyware

A
  • software that covertly gathers user information through the users internet connection without their knowledge
  • can gather emails/ passwords using things like keyloggers or screen watching software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hoax

A
  • is not a virus at all but a message warning you about the threat of a virus
  • intended to get you to install yourself
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Trojan horse

A
  • programs that pretend to be innocent programs

Trojan horses do not replicate themselves but are often used as droppers of viruses

  • sometimes they don’t try to spend anything but attempt to destroy your computer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Worms

A
  • program that replicates itself over a computer network
  • do not attach to another program
  • subclass of virus
  • depending on the form, a worm may be able to propogate without any action on the victims part
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Virus

A
  • purpose to invade computer (make a copy of itself)
  • maybe a program of parts of computer instructions
  • not necessarily destructive but may carry a payload
  • can piggy back on another process or document to be executed
  • a trigger can be used to activate, could be a date or a program action
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Virus precautions

A
  • never trust any attachments
  • don’t depend on your virus scanner to do all the work
  • save file to HD open with notepad look at first two letter and if they are MZ or PE be very careful
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Optional updates

A

Can include updates, drivers, or new software from Microsoft to enhance experience

  • can only install manually
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Recommended update

A

Addresses non critical problems or helps enhance your computing. Not a critical fix but can offer meaningful improvements

  • can be installed automatically
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Important updates

A

Offer significant benefits, such as improved security privacy and reliability. They should be installed as they become available

  • can be installed automatically
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

User update options selections

A
  • important updates
  • recommended updates
  • optional updates
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Microsoft update varieties

  • feature pack
A

New product functionality that is first distributed outside the context of a product release and that is typically included in the next full product release

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Microsoft update varieties

  • security update
A

A widely released fix for a product specific, security related vulnerability. These are rated by their severity, severity rating is indicated in the Microsoft security bulletin as critical, important, moderate, low

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Microsoft update varieties

  • tool
A

A utility of feature that helps complete a task or set of tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are windows updates

A

Updates are additions to software that can help prevent or fix problems, improve how your computer works, or enhance your computing experience

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Fall back up

A

All data on all servers are copied to a storage medium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Incremental backup

A

Only data that has changed since the last back up is copied to a storage medium

21
Q

Back up strategies

A
  • hot or cold sites - look up
  • sub contract work
  • paper based work
22
Q

Differential backup

A

Only data that has changed since the last full back up are copied to a storage medium, and information is the marked for subsequent back up

23
Q

Disaster recovery

A
  • process of restoring critical functionality and data after enterprise wide outage that affects more than a single system or limited group
  • must take into account of the possible extremes rather than relatively minor situations
24
Q

Businesses Continuity planning

A

A plan as to how our business will continue to operate during the time it takes to recover from a loss ( of data or physical equipment)

25
Q

What is a system restore

A
  • introduced in Microsoft so
  • services running in the background
  • takes a snapshot of necessary system settings, files, folders and registry keys to keep a point in time reference known as a checkpoint
26
Q

How does a system restore work

A
  • it is enabled by default
  • if you disable it you will lose all earlier checkpoints when reenabled a new check point is created
  • by default uses 3-5% of available disk space for each drive that it is set to monitor , up to a maximum of 10 GB
  • system restore automatically deletes restore points after ninety dates
  • if the computer is left powered on it automatically creates a checkpoint every 24 hours
27
Q

Archive bit

A
  • a Microsoft file attribute
  • it’s state indicates wether or not the file has been backed up
  • when a file is created or modified the archive bit set
  • when a back up is done the bit is cleared
  • archive bit is used for incremental back ups
  • when a file that has been cleared is moved into a new file system that bit is reported to set
28
Q

Windows registry system

A
  • stored in files that have a binary format
  • are always locked by the operating system
  • not possible to delete the registry database files of the same operating system when it is running
29
Q

Registry is compromised of two major categories

A

Hkey_local_machine (HKLM)

hkey_current_user (HKCU)

30
Q

hKCU Hkey_current)user

A
  • stores user and application settings

- supporting files are e users profile folder. The primary file is named “nursery.dat”

31
Q

HKLM hkey_local_machine

A

Handles the hardware information

  • supporting files are located in the hidden windows/system32/config folder
32
Q

Values stored under keys and sub keys

A
  • some entries need to be a binary type
  • other key values need to be a string value to display a name, folder location
  • others need to store operating system variables
33
Q

The registry lacks a true Boolean type, a 32 bit numeric type is used in its value and a value of 1 or 0 can th;en be equated to and or not #

A
  • every key or sub key must contain at least one value, known as the default value
34
Q

Hives

- grouping of registry information

A
  • a hive is a group of keys, sub keys and values in the registry that has a set of supporting files containing back ups
35
Q

Registry hive file

A
  • format can add and remove keys, sub keys and values
36
Q

The registration file

A

Format can only add or change keys, sub keys and values

37
Q

System restore check pint for any of the following

A
  • you install a windows update or patch
  • you install an unassigned device driver
  • you install an application that uses an installed that is restore aware
  • you restore a prior configuration with system restore
  • you restore data from a backup set created with windows not backup program
  • you manually create a checkpoint using system restore
38
Q

Information systems

A
  • executive info
  • decision support
  • management info
  • transaction processing systems
39
Q

FCS (frame check sequence)

A
  • refers to the extra code added to a frame in a communications protocol
  • the detection does not imply recovery
  • just discards the frame
  • TCP can notice the data loss and initiate error recovery
40
Q

CSMA/CD

carrier sense multiple access with collision detection

A

Like using the phone live, only one person can make a phone call

CSMA/CD listens for anything on the wire and sends out a message over the wire. A collision is when two messages are sent out at the same time it creates a voltage spike

41
Q

ARP

Address resolution protocol

A

Used by the internet protocol

It maps IP network addresses to the hardware addresses used by the data link protocol

42
Q

MAC

Media access control address

A

The two ports of the MAC address is the oui and nics

(oui}) organizationally unique identifier

(nics) network interface controller specific

43
Q

ICANN

Internet corporation for assigned names and numbers

A
  • domain name system
  • internet protocol address allocation
  • the protocol parameter registry
  • root server systems
  • generic top level domain name systems management
  • country code top level domain name DNS
  • time zone database management
44
Q

Host file

A

The host file is used to. Map domain names to IP addresses and can be used as an alternative to DNS

45
Q

FQDN

Fully qualified domain name

A

Is a complete domain name for a computer or host on the internet

46
Q

Recursive dns queries

A

Recursive dns queries occur when a computer requests a DNS form the DNS servers and if it doesn’t know it goes tot he root hints server which is the iterative query

47
Q

MTU (maximum transmission unit)

ICMP (internet control message protocol)

A

All point to point connections have an MTU size of 28 bytes of this number is reserved for IP/ICMP over head, so the effective size here is 1472

Com -f -l 1472

-f marks the packets that should not be fragmented in the ping (-L 1472 sets the size of the packets

48
Q

Http v1.1

A

Introduced persistent connections, pipelining, and headers to the protocol