Shit to remember 1002 Flashcards

1
Q

VBScript

A

VBScript (Microsoft Visual Basic Scripting Edition) can be used for many Windows-related scripting purposes, but one of the most common is to automate the functionality of Microsoft Office applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

JavaScript

A

JavaScript is used on many web sites to enhance the functionality within a user’s browser. This can be used for automation, tracking, interactivity features, and to extend the functionality of the browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Python

A

Python is a scripting language that can handle almost anything, including a number of tasks in this list. However, Python is the best fit for a scripting language that can inter-operate with other devices, including devices across the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

batch file

A

A batch file commonly runs in the console or command line of a Windows device, and it can automate the same processes that a user would perform manually at the Windows command prompt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

shell script

A

A shell script commonly runs at the command prompt, or shell, of a Unix or Linux device. Since most Linux features can be managed from the command line, shell scripts are very powerful automation options.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

PowerShell

A

PowerShell is a Windows-only scripting environment that extends the functionality of the traditional Windows command line. PowerShell extends the functionality of the command prompt to enable the automation of internal Windows and Active Directory functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

chkdsk

A
The chkdsk (Check Disk) command is used to identify and fix logical file system errors and bad physical sectors. The /f option will fix the logical file system and the /r option will locate bad sectors and attempt to recover any readable data. The scanning and repair process is often completed during a
reboot:
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

netstat

A

The netstat utility will display network statistics relating to active connections, application usage, and network activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

net use

A

The net use command will assign a local drive letter to a network share. Once the net use command is completed, the drive letter can be used to reference the share in all applications and in the File Explorer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Remote Disc

A

Remote Disc is a feature that allow a macOS user to share the optical drive of another computer on the network. Remote Disc does not provide a method of running Windows applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Spotlight

A

Spotlight is the built-in macOS search feature for locating files, applications, email messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Boot Camp

A

The Boot Camp utility allows the computer to dual boot between macOS and Windows. Boot Camp does not provide any backup or restore functionality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Spaces

A

The Spaces utility can be used in macOS to create multiple desktops and separate work “spaces” that can be used independently of each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

mv

A

mv
The Linux mv (move) command will move a file from one location to another or move/rename a file from one name to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

pwd

A

The Linux pwd (Print Working Directory) command will display the path of the current working directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

dir

A

The dir (directory) command will display a list of files from the command line. The command includes filtering options, so using “dir *.log” would display all files in the current directory with a .log extension.

17
Q

sfc

A

The sfc (System File Checker) command will scan the integrity of all protected system files and correct any files that may have been changed since their installation.

18
Q

ls

A

The ls (list) command is the Linux command to show a list of files in the current directory. The ls command does not work from a Windows command line

19
Q

mstsc

A

mstsc (Microsoft Terminal Services Client) is the remote desktop client for Windows computers.

20
Q

dxdiag

A

The dxdiag (DirectX Diagnostic Tool) is used to test the DirectX display, sound, and input devices on a Windows computer.

21
Q

PXE

A

Using PXE (Preboot eXecution Environment), or “Pixie,” a technician can boot computers from a centralized network server and automate the installation of multiple operating systems simultaneously.

22
Q

Multiboot

A

Multiboot is a method of booting the system that displays a selection of multiple operating systems during the startup process. A multiboot system would not be a method of deploying operating systems in a training room.

23
Q

Denial of service

A

A denial of service is a process that prevents a service from operating normally.

24
Q

RADIUS

A

RADIUS (Remote Authentication Dial-in User Service) is an authentication protocol commonly used to provide authentication from devices to a centralized database. A common use of RADIUS is to authenticate users to an Active Directory database from a router, switch, VPN concentrator, or any other service

25
Q

MBR

A

The MBR (Master Boot Record) partition style is an older method partitioning files, and the maximum partition size of an MBR partition is 2 terabytes in size.

26
Q

FAT32

A

FAT32 (File Allocation Table 32-bit) is a Microsoft file system originally designed for earlier versions of Windows. FAT32 is not a partition type. The FAT32 (File Allocation Table 32-bit) file system limits volume sizes to a maximum of 2 TB.

27
Q

GPT

A

GPT (GUID Partition Table) is a modern partition style that increases .the number of partitions and partition sizes over the older MBR style. Also provides for very large partition sizes that would easily allow a single partition of 4 terabytes.

28
Q

NFS

A

NFS (Network File System) is a method of accessing files across the network as if they were local. NFS is not a method of partitioning a local storage drive.

29
Q

VNC

A

VNC (Virtual Network Computing) is a remote desktop application that is commonly associated with Linux and macOS desktop sharing

30
Q

Event Viewer

A

Event Viewer logs
The Windows Event Viewer can provide extensive information about the operating system and the applications. Error messages and application failures are logged in the Event Viewer for review.

31
Q

Spear phishing

A

A spear phishing attacker will focus their efforts on specific people or parts of the organization. An attacker that contacts the accounting department with an invoice and payment site details would be considered spearphishing.

32
Q

Spoofing

A

Spoofing is a method of impersonation that attempts to gain access by pretending to be someone else.

33
Q

PCI DSS

A

The PCI DSS (Payment Card Industry Data Security Standard) is a set of objectives designed to secure credit cards and financial transactions. Companies storing credit card information must comply with these standards to accept credit cards for payment.

34
Q

GDPR

A

GDPR (General Data Protection Regulation) is a set of data protection and privacy laws for individuals in the European Union.

35
Q

RC4

A

RC4 (Rivest Cipher 4) is an encryption method used on the original version of WPA.

36
Q

FOSS

A

FOSS (Free and Open-Source) software is distributed without charge and includes a copy of the source code.

37
Q

DLP

A

DLP (Data Loss Prevention) is a security technology that will identify and block the transfer of unauthorized materials through the network. DLP solutions are often used to block private customer information, credit card
details, and other sensitive data

38
Q

TKIP

A

TKIP (Temporal Key Integrity Protocol) provides integrity checks and prevents replay attacks in the original WPA protocol