Professor Messor Flashcards

1
Q

what is an on path attack?

A

attackers place themselves between two devices (often a web browser and web server) and intercept or modify communication between the two.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is the windows recovery enviroment?

A

a recovery environment that can repair common causes of unbootable operating systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is kerberos?

A

an authentication protocol used to provide single sign on functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is 802.1X?

A

a standard protocol used for authentication and its common to use this configuration when many individuals need to access a network resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what devices use RFID?

A

key fobs and access badges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what does the yum command provide?

A

a method of performing application installations and updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what extension do mac applications have?

A

.app

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

which file system is most commonly associated with flash drives on windows?

A

exfat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is an ISO file?

A

a disk image standard created by the international organization for standardization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what does appending a dollar sign on a windows share do?

A

it hides the name when listing available shares.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is the registry editor?

A

can be used to configure detailed settings of the windows operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what can you view with netstat?

A

can be used to view a summary of real time inbound and outbound network communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is EFS?

A

allows for individual file and folder encryption in the NTFS file system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is SSH best used for?

A

commonly used to connect to the command line of a remote device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what can MAC filters do?

A

prevent network access by a specific device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is windows quick format?

A

only removes the file system index and allows data to be recovered with the right software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what is UAC?

A

User Account Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what does an SQL injection allow?

A

unintended and unauthorized access to a database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what is MFA?

A

Multi Factor Authentication

20
Q

what is the apt-get command?

A

used to install and update software on a Linux device.

21
Q

what does Spotlight do on Mac?

A

allows for the addition or removal of file categories from the macOS file search function.

22
Q

what is an in-place upgrade?

A

overwrites the operating system but leaves all the applications and user data on the system.

23
Q

what is another function of ISO?

A

provides a format for distributing files and folders as a standarized file system.

24
Q

under which setting is Language sharing options?

A

Privacy

25
Q

what does the net command do?

A

provides a list of available windows shares on a device.

26
Q

what is the minimum amount of ram required to install windows 11?

A

4GB

27
Q

what is FOSS software?

A

Free and Open Source Software

28
Q

what is MSDS?

A

Material Safety Data Sheet

29
Q

what is UAC?

A

User account control

30
Q

what does EOSL mean?

A

describes a product that is no longer sold and ongoing support has ended.

31
Q

What is TACACS+?

A

Terminal Access Controller Access Control System (an authentication protocol used with network infastructure devices.)

32
Q

what uses CCMP?

A

WPA2

33
Q

what is an active directory OU?

A

Organization Units. used to create heirarical lists of users, computers and objects and other objects in a windows domain.

34
Q

what is an ACL?

A

Access Control List

35
Q

what linux command is commonly used for archiving files?

A

tar

36
Q

what linux command can quickly find information in a text file?

A

grep

37
Q

what feature in macOS allows for the configuration of multiple desktops?

A

Spaces

38
Q

how many partitions can a GPT support?

A

128

39
Q

how much RAM does a 32 bit operating system support?

A

4GB

40
Q

what is the defrag command?

A

used to improve read and write times by consolidating data segments into a contiguosuly stored file

41
Q

how can you collect long term statistics from a windows device?

A

perfmon

42
Q

how can you find the IP address for a remote server?

A

nslookup

43
Q

what is an AUP?

A

Acceptable Use Policy a guideline for how employees should use technology in the workspace.

44
Q

what authentication system supports SSO?

A

Kerberos

45
Q

what uses SAE (Simultaneous Authentication of Equals)

A

WPA3