Stack 6 Flashcards

1
Q

What is NAC?

A

Enable an organization to restrict unauthorized or non-compliant devices and users from accessing the corporate network. This helps to ensure that all devices connected to the corporate network are compliant with corporate security policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the default gateway?

A

A default gateway in networking is like the main exit for your local network. It helps data packets find their way out to other networks or the internet. Think of it as your network’s default path to the outside world.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

If you have a rootkit on your OS what do you do?

A

Repair/reinstall OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Does Android use EFS?

A

Yes and its own encryption method based on Linux single file based.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is inherited parent folders?

A

Child folders and files inherit their access permissions from their parent folder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is WoL?

A

WoL stands for Wake-on-LAN. It’s a network protocol and technology that allows you to remotely wake up or “power on” a computer or device that is in a sleep or powered-off state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is 802.1X standard authentication?

A

802.1X is commonly used in enterprise networks to secure wired and wireless access and is a fundamental component of modern network security practices. It ensures that only authenticated and authorized devices or users can connect to the network, reducing the risk of unauthorized access and potential security breaches.

Ethernet based and ports based.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is mstc.exe?

A

MSTC is commonly known as the Remote Desktop Protocol (RDP) client, and it’s used to establish remote desktop connections to Windows machines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are WIM files?

A

WIM files are a versatile and efficient format for creating, customizing, and deploying Windows operating system images. They play a critical role in automating and simplifying the process of setting up Windows environments on multiple computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the in place upgrade paths?

A

Windows 7 to Windows 10
Windows 8 to Windows 8.1
Windows 8.1 to Windows 10
Windows 10 to a newer Windows 10 version
Windows 10 to Windows 11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

If your app is crashing or have issues what do you do?

A

Restart device/clear cache.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are PAE, SSE2 and NX processers?

A

PAE, SSE2, and NX aren’t strict requirements for Windows, they are relevant for specific scenarios. PAE can be important for systems with large amounts of RAM, SSE2 enhances multimedia performance, and NX/DEP greatly improves system security, especially in modern Windows versions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is SSO?

A

Single sign on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is bootrec?

A

Bootrec /fixboot
Bootrec /rebuild mbr

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is .dmg?

A

Dazzling magic gate.

A disk image iso.

Iso disk image.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is .PKG?

A

A .pkg file contains a kind gift of software or an installer package. It’s like receiving a present on your Mac.

A package a zip.

17
Q

What is an .app file?

A

A .app file is an apparent shortcut to an application. It’s the icon you click to open and run a program.

An exe!

18
Q

What is su command for?

A

When you use su, you become that user and gain full access to their permissions and environment.

19
Q

What is a boot sector virus?

A

A boot sector virus infects the boot sector of a storage device, primarily affecting the boot process and often being more visible than a rootkit virus.

20
Q

What is an evil twin?

A

An “Evil Twin” attack is a type of wireless network attack, often used in the context of Wi-Fi networks, where an attacker sets up a rogue wireless access point (AP) that mimics a legitimate AP.

Fake WiFi.