Practice 2 Copy Flashcards
A _________ attack uses a list of common passwords to crack a user’s password
Dictionary
A _____________ attack combines a dictionary list with the ability to add brute-force combinations to crack a password that is slightly different than the dictionary list entry combines a dictionary list with the ability to add brute-force combinations to crack a password that is slightly different than the dictionary list entry
Hybrid Attack
A tool for speeding up attacks against Windows passwords by precomputing possible hashes. is Used to authenticate users by comparing the hash value of the entered password against the one stored in the rainbow table. makes password cracking a lot faster and easier for an attacker
Rainbow Table
A contactless card that usually utilizes RFID to communicate with the reader on a physical access system
Proximity Card
A computer algorithm that generates a one-time password that uses the current time as a source of uniqueness
Time-Based One-Time Password (TOTP)
TOTP
Time-Based One-Time Password
a portion of the hard disk formatted with a minimal kind of file system and used in situations when the operating system runs out of physical memory and needs more of it
Swap Partition
An attack that happens once that flaw, or software/hardware vulnerability, is exploited, and attackers release malware before a developer has an opportunity to create a patch to fix the vulnerability
Zero-Day
Do all editions of Windows 11 only support x64 (64-bit) processors?
Yes
An extended over-voltage event is known as a ___________. An increase in the electric current.
Power Surge
A very short pulse of energy on a power line.
Power Spike
A total loss of power in a particular area
Power Loss/Failure
GPO
Group Policy Object
SOP
Standard Operating Procedure
An inflexible, step-by-step listing of the actions that must be completed for any given task
Standard Operating Procedure (SOP)
MSDS
Material Safety Data Sheet
A document that contains information on the potential hazard (health, fire, etc.) and how to work safety with the chemical product.
Material Safety Data Sheet (MSDS)
What defines how a change or installation will occur?
Plan
What provides the risk levels of carrying out a change, or not performing the requested change?
Risk Analysis
What defines the area, number, size, or scale of a particular change?
Scope
Windows 10 Enterprise and Windows 10 Pro for Workstations supports how many physical CPUs and how much ram max?
4 physical CPUs
6 TB RAM
Windows 10 Pro and Windows 10 Education supports how many physical CPUs and how much RAM max?
2 physical CPUs
2 TB RAM
Windows 10 Home only supports how many physical CPUs and how much RAM max?
1 CPU
128 GB RAM
What is the minimum Hz requirement to run a virtual machine in Windows 10 64-bit?
1 GHz
What is the minimum RAM requirement to run a virtual machine in Windows 10 64-bit?
2 GB
What is the minimum hard drive space required to run a virtual machine in Windows 10 64-bit?
20 GB
What is the minimum Hz requirement to run a virtual machine in Windows 11 64-bit?
1 GHz
What is the minimum RAM requirement to run a virtual machine in Windows 11 64-bit?
4 GB
What is the minimum hard drive space required to run a virtual machine in Windows 11 64-bit?
64 GB
What is the minimum Hz requirement to run a virtual machine in Windows 10 32-bit?
1 GHz
What is the minimum RAM requirement to run a virtual machine in Windows 10 32-bit?
1 GB
What is the minimum hard drive space required to run a virtual machine in Windows 10 32-bit?
16 GB
VNC
Virtual Network Computing
What allows a user to save their current session to disk before powering off the computer to save battery life when the system is not being used
Hibernate
FAT
File Allocation Table
exFAT
Extensible File Allocation Table
FAT32 only supports drives up to what size?
32 GB
A method employed by many computer anti-virus programs designed to detect previously unknown computer viruses and new variants of viruses already in the wild.
Heuristic Analysis
ESD
Electrostatic Discharge
Which command-line shell enables you to perform management and administrative tasks in Windows 7 and later?
PowerShell
ISE
Integrated Script Environment
What is a type of installation that attempts to replace the existing version of the operating system files with a new copy of the same version and will only affect the system files and not any of the user’s settings, customizations, or applications?
Repair installation
What is a MacOS feature for managing applications from the desktop that is similar to the Windows taskbar?
Dock
What is used to allow dual booting on a Macintosh computer?
Boot Camp
ICMP
Internet Control Message Protocol
What determines which device in a connection path is not responding appropriately?
Tracert
What command-line tool is used to troubleshot DNS issues?
nslookup
What command-line tool is used to display network statistics and active connections?
netstat
What command-line tool is used to tell you if a website is reachable or not?
ping
What enables encryption for traffic being sent and received over a wireless network when still using open authentication?
Enhanced Open
Which one has Enhanced Open as a feature?
WEP
WPA
WPA2
WPA3
WPA3
WPA
Wo-Fi Protected Access
What is a command-line utility used to trace an IP packet’s path as it moves from its source to its destination?
Tracert
Class A private IP address range contains the addresses from
10.0.0.0 to 10.255.255.255.255
Class B private IP address range contains the addresses from
172.16.0.0 to 172.31.255.255
Class C private IP address range contains the addresses from
192.168.0.0 to 192.168.255.255
APIPA/link-local autoconfiguration range is from
169.254.0.0 to 169.254.255.255
What tool is used to copy all of the files from one directory to another?
xcopy
What command is used to copy one or more files from one location to another?
Copy
What Linux command is used to copy one or more files and directories from one location to another?
cp
What are the five conditions can cause the error “Operating System Not Found” to occur?
- The Basic Input/Output System (BIOS) does not detect the hard disk
- The hard disk is damaged
- Sector 0 of the physical hard disk drive has an incorrect or malformed master boor record (MBR)
- An incompatible partition is marked as Active
- A partition that contains the MBR is no longer active
A __________________ will hide your computer from other devices on the network and prevent file and printer sharing
Public Network
A ____________________ is considered trusted, allows the computer to be discoverable to other devices on the network, and supports the use of file and printer sharing
Private Network
XML
Extensible Markup Language
If a user receives an “access denied” error message, what does it indicate?
The file permission has been changed
If a user receives a “file not found” error message, what two things can it possibly indicate?
The file has been renamed
The file has disappeared
What does the command “shutdown /r” do on a Windows workstation?
Reboot
What does the command “shutdown /s” do on a Windows workstation?
Shut down
What does the command “shutdown /l” do on a Windows workstation?
Log off
The concept and practice of restricting access rights for users, accounts, and computing processes to only those recourses absolutely required to perform routine, legitimate activities
Least Privilege
This happens when an employee moves between roles in an organization and keeps the access or permissions of the previous role
Permission Creep
Used to determine which users can access, read, write, and delete files or directories within a given directory
Directory permission
A list of IP addresses, ports, or applications that are not allowed to be run or used on a given system
Blocklist
PHI
Protected Health Information
What refers to medical and insurance records, plus associated hospital and laboratory test results
Protected Health Information (PHI)
PII
Personal Identifiable Information
Data that can e used to identify, contact, or locate an individual
Personal Identifiable Information (PII)
CUI
Controlled Unclassified Information
Federal non-classified information that must be safeguarded by implementing a uniform set of requirements and information security controls to secure sensitive government information
Controlled Unclassified Information (CUI)
What allow refers to a security posture where the system will allow all traffic to traverse the firewall unless there is a specific rule to prevent it?
Implicit Allow
What allow refers to a security posture where the system will only allow an item to traverse the firewall if the traffic matches an existing rule?
Explicit Allow
An attack that consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly.
Brute Force
SAE
Simultaneous Authentication of Equals
What stores a while number, such as 21, 143, or 1294?
Integers
What stores a fractional or decimal number, such as 3.14, 45.5, or 333.33?
Floating-point numbers
What stores a value of TRUE (1) or FALSE (0)?
Boolean
What stores a group of characters, such as Hello, PYTHON, or IzaakWinner?
String
What is a primary administrative tool for defining and controlling how programs, network resources, and the operating system operate for users and computers in an organization?
Group Policy
A command-line tool used to mount and service Windows images before deployment
Deployment Image Servicing and Management (DISM)
What command-line tool is used to run a scan to identify and repair any image or virtual hard drive corruption?
dism /RestoreHealth
SFC
System File Checker
DISM
Deployment Image Servicing and Management
Which command is a utility in Windows that allows users to scan for and restore corrupted Windows system files from the command line?
sfc (System File Checker)
An Extensible Markup Language (XML) based file that contains setting definitions and values to use during Windows Setup.
Answer File
RFC
Request For Comment
What defines why a change or installation will occur?
Purpose
A method employed by many computer anti-virus programs designed to detect previously unknown computer viruses and new variants of viruses already in the wild.
What is Heuristic Analysis?
Also known as the dragonfly handshake
SAE Handshake (Simultaneous Authentication of Equals Handshake)
What only creates a copy of new files and files modified since the last full, incremental, or differential backup?
Incremental Backup
Which backup takes the least to backup and the longest to restore?
Incremental Backup
Which backup takes the least to backup and the longest to restore?
Incremental Backup
Which backup takes the longest to backup and the least to restore?
Full backup
What creates a copy of all the selected data regardless of when it was previously backed up?
Full backup
What is the process of generating a file from a complete copy of a file created at some past time and one or more incremental copies created at later times?
Synthetic Backup
In a _______, a computer repeats the task until a condition is met.
Loop
What is written into a code to help a human to understand the initial programmer’s logic?
Comment
What is used to control the flow within a computer program or script, usually based on some logic condition? (Often implemented with IF THEM ELSE statements)
Branch
What is written into a code to help a human to understand the initial programmer’s logic?
Comment
A popular screen-oriented text editor in Linux, Unix, and other Unix-like operating systems
vi (visual)
vi
visual
A powerful package management command-line program that is used to install new software packages, remove existing software packages, upgrade existing software packages, and even upgrade the entire operating system (Works with Ubuntu and Debian-based Linux distributions)
apt-get
A utility used to view and control the hardware attached to the computer (Windows)
Device Manager
A web server that acts as a gateway between a client application
Proxy server
Often implemented with For, For Next, While, or Do While statements
Loop
Which type of antivirus scan provides the best protection for a typical home user?
On-Access scans
COPE
Company-owned/personally enabled
What means that the company provides the users with a smartphone primarily for work use, but basic functions such as voice calls. messaging, and personal applications are allowed.
Company-owned/personally enabled (COPE)
CYOD
Choose Your Own Device
Used to remotely connect to a network’s switches and routers to configure them securely
Secure Shell (SSH)