Practice 2 Copy Flashcards

1
Q

A _________ attack uses a list of common passwords to crack a user’s password

A

Dictionary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A _____________ attack combines a dictionary list with the ability to add brute-force combinations to crack a password that is slightly different than the dictionary list entry combines a dictionary list with the ability to add brute-force combinations to crack a password that is slightly different than the dictionary list entry

A

Hybrid Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A tool for speeding up attacks against Windows passwords by precomputing possible hashes. is Used to authenticate users by comparing the hash value of the entered password against the one stored in the rainbow table. makes password cracking a lot faster and easier for an attacker

A

Rainbow Table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A contactless card that usually utilizes RFID to communicate with the reader on a physical access system

A

Proximity Card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A computer algorithm that generates a one-time password that uses the current time as a source of uniqueness

A

Time-Based One-Time Password (TOTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

TOTP

A

Time-Based One-Time Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a portion of the hard disk formatted with a minimal kind of file system and used in situations when the operating system runs out of physical memory and needs more of it

A

Swap Partition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An attack that happens once that flaw, or software/hardware vulnerability, is exploited, and attackers release malware before a developer has an opportunity to create a patch to fix the vulnerability

A

Zero-Day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Do all editions of Windows 11 only support x64 (64-bit) processors?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An extended over-voltage event is known as a ___________. An increase in the electric current.

A

Power Surge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A very short pulse of energy on a power line.

A

Power Spike

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A total loss of power in a particular area

A

Power Loss/Failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

GPO

A

Group Policy Object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SOP

A

Standard Operating Procedure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An inflexible, step-by-step listing of the actions that must be completed for any given task

A

Standard Operating Procedure (SOP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

MSDS

A

Material Safety Data Sheet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A document that contains information on the potential hazard (health, fire, etc.) and how to work safety with the chemical product.

A

Material Safety Data Sheet (MSDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What defines how a change or installation will occur?

A

Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What provides the risk levels of carrying out a change, or not performing the requested change?

A

Risk Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What defines the area, number, size, or scale of a particular change?

A

Scope

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Windows 10 Enterprise and Windows 10 Pro for Workstations supports how many physical CPUs and how much ram max?

A

4 physical CPUs
6 TB RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Windows 10 Pro and Windows 10 Education supports how many physical CPUs and how much RAM max?

A

2 physical CPUs
2 TB RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Windows 10 Home only supports how many physical CPUs and how much RAM max?

A

1 CPU
128 GB RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the minimum Hz requirement to run a virtual machine in Windows 10 64-bit?

A

1 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the minimum RAM requirement to run a virtual machine in Windows 10 64-bit?

A

2 GB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the minimum hard drive space required to run a virtual machine in Windows 10 64-bit?

A

20 GB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the minimum Hz requirement to run a virtual machine in Windows 11 64-bit?

A

1 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is the minimum RAM requirement to run a virtual machine in Windows 11 64-bit?

A

4 GB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is the minimum hard drive space required to run a virtual machine in Windows 11 64-bit?

A

64 GB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is the minimum Hz requirement to run a virtual machine in Windows 10 32-bit?

A

1 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is the minimum RAM requirement to run a virtual machine in Windows 10 32-bit?

A

1 GB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is the minimum hard drive space required to run a virtual machine in Windows 10 32-bit?

A

16 GB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

VNC

A

Virtual Network Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What allows a user to save their current session to disk before powering off the computer to save battery life when the system is not being used

A

Hibernate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

FAT

A

File Allocation Table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

exFAT

A

Extensible File Allocation Table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

FAT32 only supports drives up to what size?

A

32 GB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

A method employed by many computer anti-virus programs designed to detect previously unknown computer viruses and new variants of viruses already in the wild.

A

Heuristic Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

ESD

A

Electrostatic Discharge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Which command-line shell enables you to perform management and administrative tasks in Windows 7 and later?

A

PowerShell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

ISE

A

Integrated Script Environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is a type of installation that attempts to replace the existing version of the operating system files with a new copy of the same version and will only affect the system files and not any of the user’s settings, customizations, or applications?

A

Repair installation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is a MacOS feature for managing applications from the desktop that is similar to the Windows taskbar?

A

Dock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is used to allow dual booting on a Macintosh computer?

A

Boot Camp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

ICMP

A

Internet Control Message Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What determines which device in a connection path is not responding appropriately?

A

Tracert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What command-line tool is used to troubleshot DNS issues?

A

nslookup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What command-line tool is used to display network statistics and active connections?

A

netstat

49
Q

What command-line tool is used to tell you if a website is reachable or not?

A

ping

50
Q

What enables encryption for traffic being sent and received over a wireless network when still using open authentication?

A

Enhanced Open

51
Q

Which one has Enhanced Open as a feature?
WEP
WPA
WPA2
WPA3

A

WPA3

52
Q

WPA

A

Wo-Fi Protected Access

53
Q

What is a command-line utility used to trace an IP packet’s path as it moves from its source to its destination?

A

Tracert

54
Q

Class A private IP address range contains the addresses from

A

10.0.0.0 to 10.255.255.255.255

55
Q

Class B private IP address range contains the addresses from

A

172.16.0.0 to 172.31.255.255

56
Q

Class C private IP address range contains the addresses from

A

192.168.0.0 to 192.168.255.255

57
Q

APIPA/link-local autoconfiguration range is from

A

169.254.0.0 to 169.254.255.255

58
Q

What tool is used to copy all of the files from one directory to another?

A

xcopy

59
Q

What command is used to copy one or more files from one location to another?

A

Copy

60
Q

What Linux command is used to copy one or more files and directories from one location to another?

A

cp

61
Q

What are the five conditions can cause the error “Operating System Not Found” to occur?

A
  1. The Basic Input/Output System (BIOS) does not detect the hard disk
  2. The hard disk is damaged
  3. Sector 0 of the physical hard disk drive has an incorrect or malformed master boor record (MBR)
  4. An incompatible partition is marked as Active
  5. A partition that contains the MBR is no longer active
62
Q

A __________________ will hide your computer from other devices on the network and prevent file and printer sharing

A

Public Network

63
Q

A ____________________ is considered trusted, allows the computer to be discoverable to other devices on the network, and supports the use of file and printer sharing

A

Private Network

64
Q

XML

A

Extensible Markup Language

65
Q

If a user receives an “access denied” error message, what does it indicate?

A

The file permission has been changed

66
Q

If a user receives a “file not found” error message, what two things can it possibly indicate?

A

The file has been renamed
The file has disappeared

67
Q

What does the command “shutdown /r” do on a Windows workstation?

A

Reboot

68
Q

What does the command “shutdown /s” do on a Windows workstation?

A

Shut down

69
Q

What does the command “shutdown /l” do on a Windows workstation?

A

Log off

70
Q

The concept and practice of restricting access rights for users, accounts, and computing processes to only those recourses absolutely required to perform routine, legitimate activities

A

Least Privilege

71
Q

This happens when an employee moves between roles in an organization and keeps the access or permissions of the previous role

A

Permission Creep

72
Q

Used to determine which users can access, read, write, and delete files or directories within a given directory

A

Directory permission

73
Q

A list of IP addresses, ports, or applications that are not allowed to be run or used on a given system

A

Blocklist

74
Q

PHI

A

Protected Health Information

75
Q

What refers to medical and insurance records, plus associated hospital and laboratory test results

A

Protected Health Information (PHI)

76
Q

PII

A

Personal Identifiable Information

77
Q

Data that can e used to identify, contact, or locate an individual

A

Personal Identifiable Information (PII)

78
Q

CUI

A

Controlled Unclassified Information

79
Q

Federal non-classified information that must be safeguarded by implementing a uniform set of requirements and information security controls to secure sensitive government information

A

Controlled Unclassified Information (CUI)

80
Q

What allow refers to a security posture where the system will allow all traffic to traverse the firewall unless there is a specific rule to prevent it?

A

Implicit Allow

81
Q

What allow refers to a security posture where the system will only allow an item to traverse the firewall if the traffic matches an existing rule?

A

Explicit Allow

82
Q

An attack that consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly.

A

Brute Force

83
Q

SAE

A

Simultaneous Authentication of Equals

84
Q

What stores a while number, such as 21, 143, or 1294?

A

Integers

85
Q

What stores a fractional or decimal number, such as 3.14, 45.5, or 333.33?

A

Floating-point numbers

86
Q

What stores a value of TRUE (1) or FALSE (0)?

A

Boolean

87
Q

What stores a group of characters, such as Hello, PYTHON, or IzaakWinner?

A

String

88
Q

What is a primary administrative tool for defining and controlling how programs, network resources, and the operating system operate for users and computers in an organization?

A

Group Policy

89
Q

A command-line tool used to mount and service Windows images before deployment

A

Deployment Image Servicing and Management (DISM)

90
Q

What command-line tool is used to run a scan to identify and repair any image or virtual hard drive corruption?

A

dism /RestoreHealth

91
Q

SFC

A

System File Checker

92
Q

DISM

A

Deployment Image Servicing and Management

93
Q

Which command is a utility in Windows that allows users to scan for and restore corrupted Windows system files from the command line?

A

sfc (System File Checker)

94
Q

An Extensible Markup Language (XML) based file that contains setting definitions and values to use during Windows Setup.

A

Answer File

95
Q

RFC

A

Request For Comment

96
Q

What defines why a change or installation will occur?

A

Purpose

97
Q

A method employed by many computer anti-virus programs designed to detect previously unknown computer viruses and new variants of viruses already in the wild.

A

What is Heuristic Analysis?

98
Q

Also known as the dragonfly handshake

A

SAE Handshake (Simultaneous Authentication of Equals Handshake)

99
Q

What only creates a copy of new files and files modified since the last full, incremental, or differential backup?

A

Incremental Backup

100
Q

Which backup takes the least to backup and the longest to restore?

A

Incremental Backup

101
Q

Which backup takes the least to backup and the longest to restore?

A

Incremental Backup

102
Q

Which backup takes the longest to backup and the least to restore?

A

Full backup

103
Q

What creates a copy of all the selected data regardless of when it was previously backed up?

A

Full backup

104
Q

What is the process of generating a file from a complete copy of a file created at some past time and one or more incremental copies created at later times?

A

Synthetic Backup

105
Q

In a _______, a computer repeats the task until a condition is met.

A

Loop

106
Q

What is written into a code to help a human to understand the initial programmer’s logic?

A

Comment

107
Q

What is used to control the flow within a computer program or script, usually based on some logic condition? (Often implemented with IF THEM ELSE statements)

A

Branch

108
Q

What is written into a code to help a human to understand the initial programmer’s logic?

A

Comment

109
Q

A popular screen-oriented text editor in Linux, Unix, and other Unix-like operating systems

A

vi (visual)

110
Q

vi

A

visual

111
Q

A powerful package management command-line program that is used to install new software packages, remove existing software packages, upgrade existing software packages, and even upgrade the entire operating system (Works with Ubuntu and Debian-based Linux distributions)

A

apt-get

112
Q

A utility used to view and control the hardware attached to the computer (Windows)

A

Device Manager

113
Q

A web server that acts as a gateway between a client application

A

Proxy server

114
Q

Often implemented with For, For Next, While, or Do While statements

A

Loop

115
Q

Which type of antivirus scan provides the best protection for a typical home user?

A

On-Access scans

116
Q

COPE

A

Company-owned/personally enabled

117
Q

What means that the company provides the users with a smartphone primarily for work use, but basic functions such as voice calls. messaging, and personal applications are allowed.

A

Company-owned/personally enabled (COPE)

118
Q

CYOD

A

Choose Your Own Device

119
Q

Used to remotely connect to a network’s switches and routers to configure them securely

A

Secure Shell (SSH)