Revision Flashcards

1
Q

What are the NTFS (New technology File System) permissions?

A

Read
Write
List Folder Contents
Read & Execute
Modify
Full Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the Sharing permissions?

A

Full Control
Change
Read

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How to see what kind of NTFS permissions you will be extending when you share a file or folder?

A

To see what kind of permissions you will be extending when you share a file or folder:

*Right click on the file/folder
*Go to “Properties”
*Click on the “Security” tab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How to see what kind of Sharing permissions you will be extending when you share a file or folder?

A

To see what kind of permissions you will be extending when you share a folder:

*Right click on the folder
*Go to “Properties”
*Click on the “Sharing” tab
*Click on “Advanced Sharing…”
*Click on “Permissions”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

NTFS and Sharing examples

A

*If the share permissions are “Read”, NTFS permissions are “Full control”, when a user accesses the file on the share, they will be given “Read” permission.

*If the share permissions are “Full Control”, NTFS permissions are “Read”, when a user accesses the file on the share, they will still be given a “Read” permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How to install printer on Windows?

A

Select:
1.Start/Settings > Bluetooth & Devices > Printers &
Scanners

2.Click ‘Add a printer’
3.Wait for printer to be found or install manually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How to share a printer on Windows?

A
  1. Start > Settings > Settings >Devices > Printers &
    Scanners.

    2.Choose printer to be shared, then select Manage.
    3.Select Printer Properties then choose Sharing tab.
    4.On the Sharing tab, select Share this printer and select Next.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of Disk Formatting?

A

Disk formatting is the process of preparing a data storage device such as a hard drive, sloid state drive for initial use.

Formatting a hard drive means to delete all the data on the drive and set a file system to prepare an available space for the operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Advantages of NTFS

A

Control. One of the primary features of NTFS is the use of disk quotas, which gives organizations more control over storage space. Administrators can use disk quotas to limit the amount of storage space a given user can access.

Performance - NTFS uses file compression, which shrinks file sizes, increasing file transfer speeds and giving businesses more storage space to work with. It also supports very large files.

Security- The access control features of NTFS let administrators place permissions on sensitive data, restricting access to certain users. It also supports encryption.

Easy logging- The MFT logs and audits files on the drive, so administrators can track files that have been deleted, added or changed in any way. NTFS is a journaling file system, meaning it logs transactions in a file system journal.

Reliability- Data and files can be quickly restored in the event of a system failure or error, because NTFS maintains the consistency of the file system. It is a fault tolerant system and has an MFT mirror file that the system can reference if the first MFT gets corrupted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The purpose of password policies?

A

The purpose of password policies is to ensure that users are creating and using strong passwords that are difficult to guess, and that meet the security requirements of the organisation.

Typically, a password policy includes stipulations such as password length, complexity, history, expiry

A password policy is a set of rules that define the complexity and expiration of passwords for user accounts. A password policy can help you create strong passwords that are hard to guess or crack by hackers. A password policy can also force you to change your passwords regularly to prevent them from becoming stale or compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an Account Lockout policy?

A

An account lockout policy is a set of rules that determine how many failed sign-in attempts will cause a user account to be locked out and for how long. An account lockout policy can help prevent force attacks, which are attempts to guess your password by trying many combinations until one works.

An account lockout policy can also deter hackers from continuing their attempts after reaching the threshold.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Backup Operators group?

A

A built-in group. By default, the group has no members. Backup Operators can back up and restore all files on a computer, regardless of the permissions that protect those files. Backup Operators also can log on to the computer and shut it down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Cryptographic Operators group?

A

Members of this group are authorized to perform cryptographic operations. This security group was added in Windows Vista Service Pack 1 (SP1) to configure Windows Firewall for IPsec in Common Criteria mode.

Cryptographic operations include; encryption, decryption, digital signatures, and certificate management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of disk defragmentation?

A

Disks become fragmented over a period of time after continuous usage. Disk defragmentation helps rearrange the files on the disk to contiguous spaces and thus improve disk performance.

The tool to defrag in Win 11 is Defragment & Optimise Drives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the role of a device driver?

A

Device Driver is a type of software application that controls a specific hardware device that enables different hardware devices to communicate with the computer’s Operating System.

Device Drivers are essential for a computer system to work properly because without a device driver the particular hardware fails to work accordingly, which means it fails in doing the function/action it was created to do.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How to maintain earlier versions of files?

A

On Windows 11, the “Previous Versions” feature allows you to recover files from File Explorer.

To recover lost or accidentally deleted files, you can enable the feature by setting up File History, System Restore, or Shadow copies.

To enable Previous Versions from File History on Windows 11, connect an external drive to the computer, and use these steps:

  1. Open Start on Windows 11.
  2. Search Control Panel and select the top result to
  3. Open the app.
  4. Click on System and Security.
  5. Click on File History and click Turn On.
16
Q

How to manage/update drivers in Windows?

A

In the search box on the taskbar, enter device manager, then select Device Manager. Select a category to see names of devices, then right-click (or press and hold) the one you’d like to update.

Select Search automatically for updated driver software. Select Update Driver.

16
Q

What is Plug & Play in Windows?

A

In WIndows, Plug & Play enables a computer system to adapt to hardware changes with minimal intervention by the user. A user can add and remove devices without having to do manual configuration, and without knowledge of computer hardware.

16
Q

How Windows Backup works?

A

Windows’ Backup and Restore is a feature that allows you to create backups of your personal files, such as documents, photos, music, and videos. Moreover, you can also use it to back up a system image of your computer, which includes the operating system, programs, drivers, and settings.

And once you’ve created a backup, Windows’ Backup and Restore can help you restore your files, as well as recover your system in case of a hardware failure, malware infection, or accidental deletion.

To access:
Control Panel > System & Security > Backup & Restore

By default it’s switched off, need to configure it to use and choose type of backup - automatic or manual.

17
Q

What are the type of cookies used by web browsers?

A
  1. First-Party Cookies - First-party cookies are stored on a website (domain) a user has visited directly.
  2. Third-Party Cookies - placed by other domains and not the ones a user visited directly. This happens when a user visits a website that has a third-party cookie file.
  3. ** Session Cookies** - also known as non-persistent cookies, are like a memory of websites. They retain information about the users’ visits only until they close the browser.
  4. Persistent Cookies - also known as permanent cookies, usually have an expiration date set by the publisher. Users’ devices store them, and they remember the information users set, such as language preference, settings, login details, etc.
  5. Secure Cookies - will only be present on a website with an HTTPS protocol. This ensures encrypted connection and prevents cookie theft.
18
Q

How to set IP address on a computer?

A

To assign a permanent TCP/IP configuration on Windows 11, use these steps:

-Open Settings.
-Click on Network & internet.
-(Optional) Click on Advanced network settings.
-Under the “More settings” section, click on Hardware and connection properties.
-Note the current IPv4, Subnet mask, Default Gateway, and DNS server addresses to determine the new configuration, as it has to be in the same network scope.
-Click the Ethernet or Wi-Fi page on the right side from the “Network & internet.” page.

19
Q

What is a web proxy server?

A

A proxy server is an intermediary server that retrieves data from an Internet source, such as a webpage, on behalf of a user. They act as additional data security boundaries protecting users from malicious activity on the internet.

When you connect to a proxy server, all of your web traffic is routed through the proxy server instead of going directly to the website you’re visiting. In other words, a proxy acts as a gateway between users and the internet.

20
Q

What is the role of a web proxy server?

A

Proxies can be used to solve a variety of problems. Here are a few of the most common issues addressed through the use of a proxy server:

-Content filtering and security. Schools and workplaces use proxies to secure and filter content on their networks. With a man-in-the-middle root certificate, network administrators can also access content secured with HTTPS.

-Bypassing censorship. Coincidentally, people also use proxies to circumvent censorship and filtering. Many networks are smart enough to prevent this now, though.

-Handling traffic. Reverse proxies let web developers handle large traffic influxes and use modern web features while saving time.

-Traffic tunnelling. SOCKS proxies allow users to tunnel web traffic to another server, either to avoid filtering or to access another network. These proxies are similar in use to VPNs, although far more people use VPNs nowadays.

21
Q

What are the main types of accessibility options?

A

Narrator
Sticky Keys
FilterKeys
Magnifier
Speech Recognition
Virtual Keyboard
ToggleKeys

22
Q

What is ‘Computer Management’?

A

Computer management is the process of managing, monitoring, and optimizing a computer system for performance, availability, security and/or any base operational requirement.

23
Q

What is ‘Resource Monitor’?

A

Resource monitor is a built-in Windows tool that allows you to monitor and analyse the resource usage of your computer. It provides detailed information about the central processing unit (CPU), memory, disk, and network performance of your system.

24
Q

What is ‘Performance Monitor’?

A

Performance Monitor is a tool that comes built-in with Windows and allows you to look into the performance of your system and the applications that are running on it. It gives you a way to view data points that are associated with these applications and link them with the effect they have on your system.

25
Q

What is ‘Task Manager’?

A

Task manager is a utility program that is included with the Windows operating system (OS). Its primary purpose is to allow users to monitor and manage the processes and applications running on their computer.

26
Q

Checks to Perform after installing Windows?

A

-Ensure all latest updates are installed.
-Check the log files contained within Panther folder to ensure no errors during installation of Windows.

The log files to check are Setupact.log and Setuprr.log.