Practice 4 COPY Flashcards
Which command is used to display the Resultant Set of Policy (RSoP) information for a remote user and computer?
gpresult
RSoP
Resultant Set of Policy
A report of all Group Policy settings within Active Directory that shows how those settings can affect a network, or how existing Group Policy Objects affect various combinations of users and computers when the local security policy is applied
Resultant Set of Policy
GPO
Group Policy Objects
Displays the resulting set of policy settings that were enforced on the computer for the specified user when the user logged on
gpresult
This command allows system administrators to manage user accounts on Windows PCs. You can use this command to display account information or make changes to user accounts.
net user
This command is used to locate spots that have network latency and network loss between a client and a destination
pathping
This command is used to locate spots that have network latency and network loss between a client and a destination
pathping
What defends against voltage spikes that could damage electronics?
Surge Protector
PSK
Pre Shared Key
______ means a password is being used as the “key” to activate the secure network
Pre Shared Key (PSK)
RADIUS
Remote Authentication Dial-In User Service
A client-server protocol and software that enables remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service
Remote Authentication Dial-In User Service (RADIUS)
Does WPA2 Enterprise use PSK or RADIUS?
RADIUS
What format is used to define a public key certificate?
x.509
A utility used to define and control how programs, network resources, and the operating system operate for users and computers in an organization
Group Policy Editor
IP (company related)
Proprietary Information or Intellectual Property
Information created and owned by a company, typically about the products or services that they make or perform
Intellectual Property (IP) or Proprietary Information
CUI
Controlled Unclassified Information
Federal non-classified information that must be safeguarded by implementing a uniform set of requirements and information security controls to secure sensitive government information
Controlled Unclassified Information (CUI)
What lists every person who has worked with or who has touched the evidence that is a port of an investigation and records every action taken by an individual in possession of the evidence?
Chain of custody
A process that an organization uses to preserve all forms of potentially relevant information when litigation is pending or reasonably anticipated
Legal hold
A clause in a contract or service agreement that allows a company the authority to audit the systems and information processed
Right to audit
The order in which you should collect evidence
Order of volatility
A security policy that states someone or something should be allocated the minimum necessary rights, privileges, or information to perform the specific role
Least Privilege
A security policy that states that duties and responsibilities should be divided among individuals to prevent ethical conflicts or abuse or powers
Separation of duties
A security policy that prevents any one individual from performing the same role or task for too long.
Job rotation
A Linux command that allows the creation of a single or multiple files, view file contents, concatenate files, and redirect output in the terminal to a file.
cat
A Linux command-line utility for searching plain-text data sets for lines that match a regular expression
grep
A Linux command that displays the present working directory path to the terminal or display
pwd
pwd
Present Working Directory
sfc
System file Checker
A Windows command that allows users to scan for and restore corrupt Windows system files from the command line
sfc (System File Checker)
A Windows command used to connect to, remove, and configure connections to shared resources such as mapped drives and network printers
net use
A command-line tool that is used to update the group policy settings on a Windows system
gpupdate
What command line does an administrator use to force a background update of all Group Policy settings
gpupdate /force
A command used on a Linux system to list a directory’s files and subdirectories
ls
A Windows command that is used to check the file system and file system metadata of a volume for logical and physical errors
chkdsk
A text file with commands and settings to configure a user’s environment that runs when the user logs on to a computer
Login script
Enables an administrator to configure individual switch ports to allow only a specific number of MAC addresses to use that port
Port Security
Occurs when the humidity is low in computer server rooms
Electrostatic Discharge
Occurs when the humidity in high in computer server rooms
Corrosion of the servers
MOU
Memorandum of Understanding
Defines the responsibilities of each party in an agreement, provides the scope and authority of the agreement, clarifies terms, and outlines compliance issuse
Memorandum of Understanding (MOU)
NDA
Non-Disclosure Agreement
A legal contract or part of a contract between at least two parties that outlines confidential material, knowledge, or information that the parties wish to share for certain purposes, but wish to restrict access to.
Non-Disclosure Agreement (NDA)
SLA
Service Level Agreement
A commitment between a service provider and a client for particular aspects of the service, such as quality, availability, or responsibilities
Service Level Agreement (SLA)
A type of malware that looks legitimate but can take control of your computer. Designed to damage, disrupt, steal, or inflict some other harmful action on your data network.
Trojan
RAT
Remote Access Trojan
Allows an attacker to control a workstation or steal information remotely
Remote Attack trojan (RAT)
An attack that creates numerous processes that run in the background of the system in order to spy on you and gather/steak your personal information
Trojan
A malicious computer program designed to provide continued privileged access to a computer while actively hiding its presence. They are able to disguise themselves from detection by the operating system and anti-malware solutions
Rootkit
MSDS
Material Safety Data Sheet
A document that contains information on the potential hazards and how to work safely with the chemical product
Material Safety Data Sheet (MSDS)
SOW
Statement/Scope of Work
A document that outlines all the work that is to be performed, as well as the agreed-upon deliverables and timelines.
Statement/Scope of Work (SOW)
A device that adjusts voltages in under-voltage and overvoltage conditions to maintain a 120 V output
Line Conditioner
A command to Install/remove software from Debian-based Linux distros
apt-get
A command to Install/remove software from RPM-based Linux distros
yum
Which log contains a record of events generated during the Windows installation or upgrade process?
Setup log
Which log contains information about service load failures, hardware conflicts, driver load failures, and more?
System log
Which log contains information regarding audit data and security on a system?
Security log
Which log contains information regarding application errors?
Application log
SOC
System Operations Center
A Microsoft client/server network model that groups computers together for security and to centralize administration
Domain
A Microsoft peer-to-peer network model in which computers are connected together with access to shared resources for organizational purposes
Workgroup
Wireless networks that rely on a PIN to connect devices use _________.
WPS (Wi-Fi Protection Setup)
Linux command used to list the current running processes
ps
Linux command used to change the owner of a file, directory, or link
chown
A Linux command that is used to display the amount of disk space available on the file system
df
A Linux command used to obtain information about host addresses, mail exchanges, nameservers, and related information
dig
A loopback address in IPv4 reserved for troubleshooting and testing
127.0.0.1
A full disk encryption program used in the macOS environment
FileVault
Performs full disk encryption of the internal hard drive or SSD device on a Windows 10 system
BitLocker
Performs a full disk encryption of external storage devices
BitLocker to Go
A type of installation that attempts to replace the existing version of the operating system files with a new copy of the same version. Useful when trying to repair a Windows computer that will not boot or when you believe the system files have become corrupted
Repair Installation
A type of installation that uses a clone of an existing installation stored in an image file to perform an installation
image deployment
An installation of the new operating system on top of an existing version of the operating system
In-place upgrade
CSRF
Cross-Site Request Forgery
An attack that forces an end user to execute unwanted actions on a web application in which they are currently authenticated
Cross-Site Request Forgery
An attack that enables attacker to do execute arbitrary JavaScript within the victims browser (such as creating pop-ups)
Cross-Site Scripting
XSS
Cross-Site Scripting
What type of formatting is a hard-disk operation that should make recovering data from your storage devices impossible once the operation is complete
Low-level formatting
Are useful for long-duration power loss events, not under-voltage events
Diesel Generator
A command that is used to connect to, remove, and configure connections to shared resources such as mapped drives and network printers
net use
..
Page file