random 2 Flashcards
you will see every program configured to start up when Windows is booted up. This can be used to disable unwanted programs from launching during the boot-up process.
task manager: startup tab
utility that gathers information about your computer and displays a comprehensive list of hardware, system components, and the software environment that can be used to diagnose computer issues
system information
shows a log of application and system messages, including errors, information messages, and warnings
event viewer
used to prevent malware from damaging a PC by blocking the automatic installation of unauthorized apps and preventing inadvertent changes to system settings.
User account control (UAC)
only creates a copy of new files and files modified since the last full, incremental, or differential backup.
Unfortunately, it also takes the most time to restore since you have to first restore the full backup, then any differential and incremental backups until all your data is restored
Which of the following types of backup requires the LEAST time to complete a backup?
Incremental
only creates a copy of the selected data that has been modified since the last full backup. It is a good compromise in speed
Differential backup
the process of generating a file from a complete copy of a file created at some past time and one or more incremental copies created at later times.
merged or synthesized by a specialized application program from the original file and one or more modifications to it.
Synthetic backup
llows Windows 10 to find other computers and devices on a network. This feature is automatically turned on when connected to private networks like the one in your home or workplace.
Network discovery.
Network discovery is turned off when you’re connected to public networks that shouldn’t be trusted, and you should not allow your PC to be discoverable on those networks. If your Windows 10 computer or device can’t view other computers on the network, two things are probably at fault: either the incorrect network profile is assigned (public instead or private), or network discovery is disabled
tool is used to display the drive status, mount the drive, initialize the drive, and create/split/extend/shrink drive partitions. The utility displays a summary of any fixed and removable drives attached to the system.
disk management.
From the Disk Management console, you can see the S.M.A.R.T. status of each hard disk.
utility in Windows that is used to monitor the activities on CPU and memory activity on a computer.
can only monitor the resource utilization, but it cannot manage or terminate those processes.
performance monitor (perfmon.msc)
is used to view performance data either in real-time or from a log file
an updated file system for optical media supporting multisession writing
The Universal Disk Format (UDF or ISO 13346)
iOS
only be run on iPhones and iPADS, not laptops.
Andriod
can run on laptops
is designed to damage, disrupt, steal, or in general, inflict some other harmful action on your data or network
Trojan
The most common form of a trojan is a Remote Access Trojan (RAT), which allows an attacker to control a workstation or steal information remotely. To operate, a trojan will create numerous processes that run in the background of the system
malicious software designed to infect computer files or disks when it is activated.
such as deleting files or changing system settings
virus
linux command to delete all the files and directories
rm -rf/
.
only begin deleting from the current working directory and then delete all files and folders further down the directory structure, not the entire file system. in linux
You are troubleshooting an issue with a Windows desktop and need to display the machine’s active TCP connections. Which of the following commands should you use?
netstat
command is used to display active TCP connections, ports on which the computer is listening, Ethernet statistics, the IP routing table, IPv4 statistics (for the IP, ICMP, TCP, and UDP protocols), and IPv6 statistics (for the IPv6, ICMPv6, TCP over IPv6, and UDP over IPv6 protocols) on a Windows machine. This is a useful command when determining if any malware has been installed on the system and maybe maintaining a remote connection with a command and control server.
netstat
displays all current TCP/IP network configuration values on a given system
ipconfig
command is used to test a host’s reachability on an Internet Protocol network
ping
command is used to connect to, remove, and configure connections to shared resources such as mapped drives and network printer
net use