Practice 4 COPY Flashcards
Which command is used to display the Resultant Set of Policy (RSoP) information for a remote user and computer?
gpresult
RSoP
Resultant Set of Policy
A report of all Group Policy settings within Active Directory that shows how those settings can affect a network, or how existing Group Policy Objects affect various combinations of users and computers when the local security policy is applied
Resultant Set of Policy
GPO
Group Policy Objects
Displays the resulting set of policy settings that were enforced on the computer for the specified user when the user logged on
gpresult
This command allows system administrators to manage user accounts on Windows PCs. You can use this command to display account information or make changes to user accounts.
net user
This command is used to locate spots that have network latency and network loss between a client and a destination
pathping
This command is used to locate spots that have network latency and network loss between a client and a destination
pathping
What defends against voltage spikes that could damage electronics?
Surge Protector
PSK
Pre Shared Key
______ means a password is being used as the “key” to activate the secure network
Pre Shared Key (PSK)
RADIUS
Remote Authentication Dial-In User Service
A client-server protocol and software that enables remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service
Remote Authentication Dial-In User Service (RADIUS)
Does WPA2 Enterprise use PSK or RADIUS?
RADIUS
What format is used to define a public key certificate?
x.509
A utility used to define and control how programs, network resources, and the operating system operate for users and computers in an organization
Group Policy Editor
IP (company related)
Proprietary Information or Intellectual Property
Information created and owned by a company, typically about the products or services that they make or perform
Intellectual Property (IP) or Proprietary Information
CUI
Controlled Unclassified Information
Federal non-classified information that must be safeguarded by implementing a uniform set of requirements and information security controls to secure sensitive government information
Controlled Unclassified Information (CUI)
What lists every person who has worked with or who has touched the evidence that is a port of an investigation and records every action taken by an individual in possession of the evidence?
Chain of custody
A process that an organization uses to preserve all forms of potentially relevant information when litigation is pending or reasonably anticipated
Legal hold
A clause in a contract or service agreement that allows a company the authority to audit the systems and information processed
Right to audit
The order in which you should collect evidence
Order of volatility
A security policy that states someone or something should be allocated the minimum necessary rights, privileges, or information to perform the specific role
Least Privilege
A security policy that states that duties and responsibilities should be divided among individuals to prevent ethical conflicts or abuse or powers
Separation of duties
A security policy that prevents any one individual from performing the same role or task for too long.
Job rotation
A Linux command that allows the creation of a single or multiple files, view file contents, concatenate files, and redirect output in the terminal to a file.
cat
A Linux command-line utility for searching plain-text data sets for lines that match a regular expression
grep
A Linux command that displays the present working directory path to the terminal or display
pwd
pwd
Present Working Directory
sfc
System file Checker
A Windows command that allows users to scan for and restore corrupt Windows system files from the command line
sfc (System File Checker)
A Windows command used to connect to, remove, and configure connections to shared resources such as mapped drives and network printers
net use