Practice 4 COPY Flashcards

1
Q

Which command is used to display the Resultant Set of Policy (RSoP) information for a remote user and computer?

A

gpresult

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

RSoP

A

Resultant Set of Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A report of all Group Policy settings within Active Directory that shows how those settings can affect a network, or how existing Group Policy Objects affect various combinations of users and computers when the local security policy is applied

A

Resultant Set of Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

GPO

A

Group Policy Objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Displays the resulting set of policy settings that were enforced on the computer for the specified user when the user logged on

A

gpresult

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This command allows system administrators to manage user accounts on Windows PCs. You can use this command to display account information or make changes to user accounts.

A

net user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This command is used to locate spots that have network latency and network loss between a client and a destination

A

pathping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This command is used to locate spots that have network latency and network loss between a client and a destination

A

pathping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What defends against voltage spikes that could damage electronics?

A

Surge Protector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

PSK

A

Pre Shared Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

______ means a password is being used as the “key” to activate the secure network

A

Pre Shared Key (PSK)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RADIUS

A

Remote Authentication Dial-In User Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A client-server protocol and software that enables remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service

A

Remote Authentication Dial-In User Service (RADIUS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Does WPA2 Enterprise use PSK or RADIUS?

A

RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What format is used to define a public key certificate?

A

x.509

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A utility used to define and control how programs, network resources, and the operating system operate for users and computers in an organization

A

Group Policy Editor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

IP (company related)

A

Proprietary Information or Intellectual Property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Information created and owned by a company, typically about the products or services that they make or perform

A

Intellectual Property (IP) or Proprietary Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CUI

A

Controlled Unclassified Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Federal non-classified information that must be safeguarded by implementing a uniform set of requirements and information security controls to secure sensitive government information

A

Controlled Unclassified Information (CUI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What lists every person who has worked with or who has touched the evidence that is a port of an investigation and records every action taken by an individual in possession of the evidence?

A

Chain of custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A process that an organization uses to preserve all forms of potentially relevant information when litigation is pending or reasonably anticipated

A

Legal hold

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A clause in a contract or service agreement that allows a company the authority to audit the systems and information processed

A

Right to audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The order in which you should collect evidence

A

Order of volatility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A security policy that states someone or something should be allocated the minimum necessary rights, privileges, or information to perform the specific role

A

Least Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A security policy that states that duties and responsibilities should be divided among individuals to prevent ethical conflicts or abuse or powers

A

Separation of duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A security policy that prevents any one individual from performing the same role or task for too long.

A

Job rotation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A Linux command that allows the creation of a single or multiple files, view file contents, concatenate files, and redirect output in the terminal to a file.

A

cat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A Linux command-line utility for searching plain-text data sets for lines that match a regular expression

A

grep

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A Linux command that displays the present working directory path to the terminal or display

A

pwd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

pwd

A

Present Working Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

sfc

A

System file Checker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

A Windows command that allows users to scan for and restore corrupt Windows system files from the command line

A

sfc (System File Checker)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

A Windows command used to connect to, remove, and configure connections to shared resources such as mapped drives and network printers

A

net use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

A command-line tool that is used to update the group policy settings on a Windows system

A

gpupdate

36
Q

What command line does an administrator use to force a background update of all Group Policy settings

A

gpupdate /force

37
Q

A command used on a Linux system to list a directory’s files and subdirectories

A

ls

38
Q

A Windows command that is used to check the file system and file system metadata of a volume for logical and physical errors

A

chkdsk

39
Q

A text file with commands and settings to configure a user’s environment that runs when the user logs on to a computer

A

Login script

40
Q

Enables an administrator to configure individual switch ports to allow only a specific number of MAC addresses to use that port

A

Port Security

41
Q

Occurs when the humidity is low in computer server rooms

A

Electrostatic Discharge

42
Q

Occurs when the humidity in high in computer server rooms

A

Corrosion of the servers

43
Q

MOU

A

Memorandum of Understanding

44
Q

Defines the responsibilities of each party in an agreement, provides the scope and authority of the agreement, clarifies terms, and outlines compliance issuse

A

Memorandum of Understanding (MOU)

45
Q

NDA

A

Non-Disclosure Agreement

46
Q

A legal contract or part of a contract between at least two parties that outlines confidential material, knowledge, or information that the parties wish to share for certain purposes, but wish to restrict access to.

A

Non-Disclosure Agreement (NDA)

47
Q

SLA

A

Service Level Agreement

48
Q

A commitment between a service provider and a client for particular aspects of the service, such as quality, availability, or responsibilities

A

Service Level Agreement (SLA)

49
Q

A type of malware that looks legitimate but can take control of your computer. Designed to damage, disrupt, steal, or inflict some other harmful action on your data network.

A

Trojan

50
Q

RAT

A

Remote Access Trojan

51
Q

Allows an attacker to control a workstation or steal information remotely

A

Remote Attack trojan (RAT)

52
Q

An attack that creates numerous processes that run in the background of the system in order to spy on you and gather/steak your personal information

A

Trojan

53
Q

A malicious computer program designed to provide continued privileged access to a computer while actively hiding its presence. They are able to disguise themselves from detection by the operating system and anti-malware solutions

A

Rootkit

54
Q

MSDS

A

Material Safety Data Sheet

55
Q

A document that contains information on the potential hazards and how to work safely with the chemical product

A

Material Safety Data Sheet (MSDS)

56
Q

SOW

A

Statement/Scope of Work

57
Q

A document that outlines all the work that is to be performed, as well as the agreed-upon deliverables and timelines.

A

Statement/Scope of Work (SOW)

58
Q

A device that adjusts voltages in under-voltage and overvoltage conditions to maintain a 120 V output

A

Line Conditioner

59
Q

A command to Install/remove software from Debian-based Linux distros

A

apt-get

60
Q

A command to Install/remove software from RPM-based Linux distros

A

yum

61
Q

Which log contains a record of events generated during the Windows installation or upgrade process?

A

Setup log

62
Q

Which log contains information about service load failures, hardware conflicts, driver load failures, and more?

A

System log

63
Q

Which log contains information regarding audit data and security on a system?

A

Security log

64
Q

Which log contains information regarding application errors?

A

Application log

65
Q

SOC

A

System Operations Center

66
Q

A Microsoft client/server network model that groups computers together for security and to centralize administration

A

Domain

67
Q

A Microsoft peer-to-peer network model in which computers are connected together with access to shared resources for organizational purposes

A

Workgroup

68
Q

Wireless networks that rely on a PIN to connect devices use _________.

A

WPS (Wi-Fi Protection Setup)

69
Q

Linux command used to list the current running processes

A

ps

70
Q

Linux command used to change the owner of a file, directory, or link

A

chown

71
Q

A Linux command that is used to display the amount of disk space available on the file system

A

df

72
Q

A Linux command used to obtain information about host addresses, mail exchanges, nameservers, and related information

A

dig

73
Q

A loopback address in IPv4 reserved for troubleshooting and testing

A

127.0.0.1

74
Q

A full disk encryption program used in the macOS environment

A

FileVault

75
Q

Performs full disk encryption of the internal hard drive or SSD device on a Windows 10 system

A

BitLocker

76
Q

Performs a full disk encryption of external storage devices

A

BitLocker to Go

77
Q

A type of installation that attempts to replace the existing version of the operating system files with a new copy of the same version. Useful when trying to repair a Windows computer that will not boot or when you believe the system files have become corrupted

A

Repair Installation

78
Q

A type of installation that uses a clone of an existing installation stored in an image file to perform an installation

A

image deployment

79
Q

An installation of the new operating system on top of an existing version of the operating system

A

In-place upgrade

80
Q

CSRF

A

Cross-Site Request Forgery

81
Q

An attack that forces an end user to execute unwanted actions on a web application in which they are currently authenticated

A

Cross-Site Request Forgery

82
Q

An attack that enables attacker to do execute arbitrary JavaScript within the victims browser (such as creating pop-ups)

A

Cross-Site Scripting

83
Q

XSS

A

Cross-Site Scripting

84
Q

What type of formatting is a hard-disk operation that should make recovering data from your storage devices impossible once the operation is complete

A

Low-level formatting

85
Q

Are useful for long-duration power loss events, not under-voltage events

A

Diesel Generator

86
Q

A command that is used to connect to, remove, and configure connections to shared resources such as mapped drives and network printers

A

net use

87
Q

..

A

Page file