WINDOWS Flashcards

1
Q

Which command is used to return network configuration information?

ipconfig
mklink
driverquery
Fsutil

A

ipconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which command is NOT used to either create or delete directories?

rmdir
ren
mkdir
rd

A

ren

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When we created the stream “dir.txt” containing the entire Windows directory structure, how did it affect the file size of c:\main.txt?

The file size of main.txt increased by the size of a directory listing
The file size of c:\main.txt went up by 154 kilobytes
The file size of c:\main.txt did not change
The file size of c:\main.txt went up by 154 bytes

A

The file size of c:\main.txt did not change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

If a user is a member of two groups, one of which has explicit “ALLOW Read & Execute” of a file and the other has explicit “DENY Read & Execute”, will the user be able to read the file?

Yes
No

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

If a user is a member of two groups, one of which has inherited “ALLOW Read & Execute” of a file and the other has explicit “DENY Read & Execute”, will the user be able to read the file?

Yes
No

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

If a user is a member of two groups, one of which has explicit “ALLOW Read & Execute” of a file and the other has inherited “DENY Read & Execute”, will the user be able to read the file?

Yes
No

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following options will create a user named “John” from the command line on the Windows operating system?

useradd John
net user John /add
add user John -n C:\Users\John
manageaccount John /add-new

A

net user John /add

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following options will set the password for the username of “John” to “P@ssw0rd” from the command line on the Windows operating system?

User John P@ssw0rd set
Password reset is not available from the command line
net user John P@ssw0rd
net user P@ssw0rd John

A

net user John P@ssw0rd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Bob runs the command “runas /user:bob_admin cmd.exe”. When prompted for the password, bob enters “bob<3alice” and a Command Prompt is successfully launched. Which of the following statements must be true?

Bob_admin must be a valid account on the local system
Bob_admin must love Alice
Bob uses the same password as Bob_admin
Bob is a member of the Administrators group

A

Bob_admin must be a valid account on the local system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following will launch Windows Explorer as the user “bob”?

runas /u:bob /run:explorer.exe
runas /user:bob explorer.exe
runas-bob-cmd=explorer
runas /user:bob /run:explorer.exe

A

runas /user:bob explorer.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which two hash formats does SAM store user passwords in?

LANMAN and NTLM
Whirlpool and CRC32
MD5 and SHA1
DES and MD4

A

LANMAN and NTLM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You have confirmed LANMAN is in use on your computer system. How can you prevent LANMAN hashes from being stored without disabling LANMAN on your system?

Change your password to be longer than 14 characters
Configure Automatic Updates to install optional updates
LANMAN must be allowed on all Windows systems
Install the latest Service Pack

A

Change your password to be longer than 14 characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In which section of the Local Security Policy do you grant a user the ability to change the time zone?

Audit Policy
Administrative Templates
User Rights Assignment
Security Options

A

User Rights Assignment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In which section of the Local Security Policy do you control whether CTRL-ALT-DEL is required before you login?

Administrative Templates
Security Options
Audit Policy
User Rights Assignment

A

Security Options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the name of the registry key that is starting the NETCAT backdoor on his computer?

GrooveMonitor
Adobe ARM
EvilStarter
RUN

A

EvilStarter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the correct syntax for an attacker to create this key with the REG command?

• reg add
“HKLM\Software\Microsoft\Windows\CurrentVersion\Run\Evi
lStarter” Value= “nc -l -p 9000 -e cmd.exe “

• reg add
“HKLM\Software\Microsoft\Windows\CurrentVersion\Run\Evi
lStarter” /d “nc -l -p 9000 -e cmd.exe”

• reg add
“HKLM\Software\Microsoft\Windows\CurrentVersion\Run” /v
“EvilStarter” /d “nc -l -p 9000 -e cmd.exe “

• reg create
“HKLM\Software\Microsoft\Windows\CurrentVersi

A

• reg add
“HKLM\Software\Microsoft\Windows\CurrentVersion\Run\Evi
lStarter” /d “nc -l -p 9000 -e cmd.exe”

17
Q

You are trying to access a share named “FILES” on a server named “SERVER”. Your account has permissions to access that directory. How would you map a drive to this server?

A) net use * \server\files
B) net use z: \server\files
C) mount \server\files z:
D) A or B

A

D) A or B

18
Q

Which of the following commands will list the files on a remote share?

dir \servername\share
dir \share
net use \servername\share
net view \servername\share

A

dir \servername\share

19
Q

Which of the following commands can be used to determine the full path and parameters that are used to start the WebClient service?

sc query CMD WebClient
sc qc WebClient
sc query WebClient
sc query all WebClient

A

sc qc WebClient

20
Q

There are many ways to start and stop services on Windows. Which of the following commands is NOT a valid way to start the WebClient service? wmic service where name=”WebClient” call

StartService
service WebClient start
net start WebClient
sc start WebClient

A

service WebClient start