Recert Extras Flashcards
What is an OS
Made up of kernals and a shell to enable interface, it acts as the medium between you and the hardware in your computer.
What is MS DoS
Disk operating system. Legacy OS.
True or false: Windows 10 has headers within its settings app and win 11 has buttons
False. It’s the other way around.
What’s the difference between rights and permissions
Rights are account and system based. Permissions are your allowances for files.
What is the file that holds error logs for windows update
Windowsupdate.txt
What are four things you’ll find in Settings > System
Display
Power
Troubleshoot
Sound
What is hibernation and standby
Standby powers off all components but RAM, which holds your OS’s state.
Hibernate saves the state to your hard drive
Where will you find network adapter settings and what are two ways to reach them?
In: Network connections
Methods: Network and Internet (Settings) or Network and sharing (Control panel)
Where can you find admin/windows tools
Control panel
What will you find in the compmgmt.msc program
Shares, Local Group policy, users, scheduling, etc.
What is a hardware token
Hardware based security such as smart readers and USBs
What is the purpose of Group Policy objects.
GPO allows you to install objects (applications, any kind of digital data) on groups of machines by adding it to their GPO. GPO gives all computers a shared folder from which they download anything added.
What is a clean install and a refresh
Clean install wipes everything to reinstall windows
Refresh wipes your programs but keeps your files and windows settings.
What is WOW
Windows on Windows. This is when windows runs a different version of windows within itself to allow program compatibility. For example: an x64 system running x86 within itself to properly run a 32-bit program.
What purpose does the privacy tab in settings hold?
Privacy can be used to see permissions your apps have as well as control what data your OS stores about you.
What 4 kinds of data does privacy in settings store about you?
Browsing, app history, web search, location
What is an “image”
An image is a clone of a win installation
What is an SID
Security ID. A unique identifier for windows accounts that windows uses to… identify you. Two accounts will never have the same SID.
What is a partition boot record
Each partition has its own Master boot record, though it’s called a Partition boot record, that points to the OS bootloader for that partition.
What is a recovery partition
A partition reserved by windows for the sole purpose of restoring your OS’s image to a stable state. This is what’s accessed within Win RE
True or false: Bad time settings can cut your internet
True
If you have a routable IP of 82.93.2.9
And you have a camera data storage box hosting all your camera feeds at 192.168.0.222
on port :5904
What IP address would you type when accessing internally and externally?
Externally: 82.93.2.9:5902
Internally: 192.168.0.222
Ports are not required internally.
How do you access the print queue
Settings > Bluetooth and Devices > Printers and scanners > The printer’s name > Open print queue
In order to properly use workgroups, you need to be using a ______ network profile and enable ______ and ________ sharing
private, file, print
Joseph wants to prank his wife by hiding one of the shared folders on his computer by still allowing her access to the folder, but also hiding it from general browsing. How does he do this?
On a shared folder, add a $ (dollar sign) to the end of the folder. This hides it from browsing but still allows it to be mapped
What is a mapped drive
A mapped drive is a network share that has been mapped to a drive letter. This will not appear under “This PC” but rather the “Network” file explorer header
What option can be checked after mapping a drive to make sure it stays connected the next time you sign-in to your pc?
Reconnect at sign in
What is the command to see servers on your network
Net view
What is the command to see the shares of a specific server
Net view \servername
What is the command to map a drive?
net use M: \servername\data /persistent:yes
What are three requirements to share a folder through workgroups?
Same workgroup name between PCs
Netdiscovery / File and print sharing on
Right click folder to share
Does NTFS access control lists apply to people accessing the computer over the network or local users?
NTFS security applies to both
Share permissions in windows protect the _______ as a whole and do not allow for the protection of individual files.
NTFS permissions in windows protect _______
Network share
Individual files
True or false: Share permissions are set at the root of the share and all files and subdirectories inherit the same permissions.
True
What happens when share permissions allow one type of access and NTFS allows a different kind?
Ex: Share permissions allow read only, NTFS allows modify?
The most restrictive rule will be applied
What is a home folder
A home folder is set in active directory. It provides a mapped drive for a user to place their files in. When they do, the files are sent to a file server for central storage.
How do you add a home folder to a user in active directory?
Right click account > Properties > Profile > Provide drive letter and file server destination
Group policy is a centralized way to manage ________ and ________ settings
Account settings, windows settings
What is a member server?
A server that does not hold a copy of the active directory used within the domain. This could mean a file server, print server and such.
On a non-domain machine, passwords are validated against ________ _______ _______
On a domain network, the passwords are validated against ____ __________
Security accounts manager
The domain
What is the purpose of SAM, the password security.
Security access manager holds the passwords for windows accounts and enforces policies.
What is Local Security Authority
The LSA is a system component that oversees all the security decisions on your machine. Whenever Windows needs to authenticate a user or verify permissions or what not, the system asks the LSA.
What is windows hello
An alternative way to log in to your computer. This involves pins, biometrics and face scanning. The pin is mandatory in case other windows hello methods fail.
What is passwordless SSO
This is when a computer uses WIN hello and a private/public key certificate to identify whether the computer is a known one on the network or not.
Permissions vs rights
Permissions apply to files
Rights apply to system changes
What is the net command to make a new user
net user dmartin password /add /fullname “David Martin” /logonpasswordchg:yes
How would you add the user dmartin to the admin group using cmd
net localgroup administrators dmartin /add
What is implicit deny
Unless a rule specifically allows an action, deny access.
What is the power users user group
A mid between admins and standard users. No longer used.
When looking at NTFS settings, you are viewing a _____ _________ _____
Access control list
What is procedural security control
People.
Incident response, management oversight, security education.
Share level permissions do not apply to ______ ________ or _____ ________
Local accounts, individual files
NTFS ACLs (Access control lists) apply to both _______ _______ and _______ ______
Local accounts and network users
Share level permissions do not protect ______ _______, but rather, the ______ ______.
Individual files, whole share
What is a mapped drive
A mapped drive is a network storage shortcut you can use to easily access remote server storage.
On a domain, what is a home folder and where does it lead.
A home folder is a network share employees use to save their data. This makes sure nothing is stored locally and all files are centralized at the file server.
What is a roaming profile
A profile that downloads data from a network share upon logging in, and and uploads any changes upon logging out. This allows for data syncing.
What is folder redirection?
Re-routing a folder to save in a different place. For example, redirecting anything saved in a user’s documents to a network share called \fileserver\employees\jane documents
What is a security policy?
Settings on users that allow or disallow certain things
What are three examples of account policies?
Restrict login times
Concurrent login lockout (Multiple sessions trying to sing in at the same time)
Failed attempt lockout
What does it mean when an anti virus looks for heuristic behaviour?
They look for applications doing suspicious actions
A program says to list the principals you wish to add to a file’s read/write permissions. What does it mean?
Principals = Users
NTFS permissions only work so long as you are using the same ________ ________ you set them on. Moving files using NTFS to a different one will mean those permissions can potentially be broken.
Operating system.
An admin is worried about his NTFS permissions being overwritten if he moves his files to a Mac. What can he do to make sure no one reads his files no matter what OS they move to?
Encrypt them
Bitlocker is used for ____ ______ encryption and EFS is used for ___ _____ / _____ encryption
Full drive, individual files/folder
When using bitlocker or bitlocker to go, you cannot access your encrypted files without the _____ _______ ____. If you do lose this, your only back up plan is the ______ ______, which you should have written down or stored on a USB somewhere.
Encryption access key, recovery key
A user has bitlocker active on his PC. He moved his hard drive to a new gaming PC (what a lad) but now he can’t access any of his files. Why could this be?
Because when using bitlocker, the access key can be tied to your Trusted Platform Module to make sure it’s not tampered with. When you do this, the TPM ties your fixed drive to the motherboard. If you change your motherboard, you lose your access. This man needs to use his recovery key.