Stack 2 Flashcards
What is Linux command ps?
Display or view information related to the processes running.
What does the Linux command cat do?
Reads data from the file and gives its content as output.
What does mission control do?
View all open apps open easily.
What is the Mac terminal?
Place for entering commands.
What is exFAT?
Storage system, best for portable. Has huge file sizes. For over 4GB files. Can be used on Mac and Windows and Linux. Not that secure as NTFS.
What is NTFS?
Great security.
Windows only.
For HDD’s.
Huge file storage 256 terabytes.
What is MBR and it’s specs?
Master boot record.
Max 2TB.
4 primary partitions only.
What is GPT and it’s specs?
128 partitions.
18 exabytes.
Best drive.
Uses 64 bit.
What is whaling?
Targeting a major player target, like a CEO.
What is WPS?
Wi-Fi Protected Setup (WPS) is a feature supplied with many routers. It is designed to make the process of connecting to a secure wireless network from a computer or other device easier.
Easy for others to join router when unwanted.
What is a NAS device?
Network-attached storage (NAS) is a file-dedicated storage device that makes data continuously available for employees to collaborate effectively over a network.
What’s best RADIUS or TACACACS+?
TACACACS+.
TKIP or AES?
AES.
What is a MAP toolkit?
Microsoft Assessment and Planning (MAP) Toolkit is a free utility IT can use to determine whether its infrastructure is prepared for a migration to a new operating system, server version or cloud-based deployment.
Max RAM support for Windows 32 bit?
4GB.
What is HKLM?
The HKEY_LOCAL_MACHINE, otherwise known as HKLM, is a Windows Registry tree that contains configuration data that is used by all users in Windows.
What does -p do?
Creates subfolders.
What is ReadyBoost used for?
Speeds up the Windows system mainly by utilizing a USB drive to store cache data. It is an ideal choice for computers with a small amount of RAM.
Speeds up your apps and load up times.
What is most secure SSH or RDP?
SSH. Has no GUI.
What are dynamic disks and what do they do?
They use volumes not data, they have fault tolerance, can span multiple disks, have RAID functionality and can shrink or expand.
What does the command shutdown /s do?
Shutdowns the PC.
What does command rm -r do?
Removes all folder directory.
What is the security log on windows?
Examples include failed and valid logins, file deletions, etc.
What is the setup log?
The setup log contains events that occur during the installation of the Windows operating system.
What does sleep save to?
Memory.
If there is a failed service startup what should you do?
Check for other disabled services effects.
What can Mac mission control do?
Show all open easy to view windows and apps.
What can Mac bootcamp do?
View and install windows.
What does passwd do?
Linux change password.
R = ?
W = ?
X = ?
4.
2.
1.
What is python commonly used for?
Cross platform and cyber security.
If an app is failing what is best to do?
Clear cache.
What port sends email?
25 SMTP.
What is a variable?
Set defined data that can be changed.
What is regulated data examples?
PII.
PHI.
GDPR.
PCI DSS.
What is ARP poisoning?
Address Resolution Protocol (ARP) spoofing or ARP poisoning is a form of spoofing attack that hackers use to intercept data. A hacker commits an ARP spoofing attack by tricking one device into sending messages to the hacker instead of the intended recipient.
LAN/MAC address.