Stack 4 Flashcards
What does DLP do?
Stops Snowden stealing data.
Where is Hyper-V enabled?
Enable in programs and features.
What physical device is used for hard tokens and displaying generated codes?
Fob key.
What does vi Linux do?
vi is an interactive text editor that is display-oriented
What does increasing page file size do?
More memory available to all running processes.
What is x.509 format for?
Certificates.
What happens if your browser is being maliciously redirected?
Reset proxy in connections.
What does a UPS protect from?
Sags, power failure and brownouts.
What does a line conditioner do?
Protects equipment from power surges, helps to correct voltage and waveform distortions, and removes external electrical noise (i.e. frequency and electromagnetic interference) caused by devices such as radios and motors.
Maximum memory for 32 bit?
4 GB.
What is the problem with leaving WP3 enabled?
Insecure and hackable.
Weakest WiFi security?
Wet WEP.
What does netuse command do?
Allows you to quickly add, view, and delete network resources from your computer, like mapped drives.
What is BSoD?
Blue screen of death, error logs.
What is a perimeter network?
The boundary between an organization’s secured internal network and the Internet — or any other uncontrolled external network.
What is a client/server network?
A client-server network is the medium through which clients access resources and services from a central computer, via either a local area network (LAN) or a wide-area network (WAN), such as the Internet.
What is a legal hold?
Stop info from being destroyed, as it contains evidence.
What address range is APIPA?
169.254.0.1 to 169.254.255.254.
What does hibernate do?
Longer to resume, but uses less power, write data to disk.
What does rm -f / do?
Delete all files on system.
What does FIFO do?
Replace oldest disk with newest backup.
First in first out. Ensure freshest product.
What is batch .bat used for?
Windows simple scripts.
What is the system/event log?
Shows security and system info logs.
What is the AAA by Cisco?
TACACACS+.
Change management steps?
Scope change.
Risk analysis.
Plan.
User approval.
Present to board.
Backout plan.
Document changes.
What is an integer?
A whole number.
What is the BYOD policy?
Setting parameters for employees using their own laptop and agreement for them using them.
What is airdrop?
Transfer files of iOS and Mac close range.
What is time drift?
CMOS battery probably dying.