1.3 Given a scenario, use features and tools of the Microsoft Windows 10 operating system (OS). Flashcards
(38 cards)
Enables an administrator to track and log event logins, security actions, crashes, and other events that have happened in the computer.
Event Viewer (eventvwr.msc)
snap-in of the MMC is a GUI-based application for analyzing and configuring hard drives. Try some of the configurations listed in the following sections on a test computer with one or two drives of unpartitioned space.
Disk Management (diskmgmt.msc)
run a task on a specified schedule.
Task Scheduler (taskschd.msc)
used to display installed device categories and specific installed devices, as well as to troubleshoot problems with devices.
Device Manager (devmgmt.msc)
is an MMC snap-in that enables administrators to manage group policy settings on a Windows computer. It is a powerful way to configure and control various aspects of the operating system and user environment in a centralized manner.
Group Policy Editor (gpedit.msc):
With this tool , you can set policies related to security settings, user rights, software deployment, network configuration, and more. Is especially useful in enterprise environments to enforce specific rules and configurations across multiple computers.
Group Policy Editor (gpedit.msc):
is an MMC snap-in that allows you to monitor and analyze the performance of various system resources and components in real-time on a Windows machine.
Performance Monitor/ perfmon.msc,
It provides detailed performance data, such as CPU usage, memory usage, disk activity, network activity, and other performance counters._____ is commonly used by system administrators and IT professionals to diagnose performance issues, identify bottlenecks, and monitor system health over time.
Performance Monitor/ perfmon.msc,
is an MMC snap-in in Windows that allows administrators to manage local user accounts and groups on the system. It provides a centralized interface for creating, modifying, and deleting user accounts and groups. With this tool you can change user properties, set passwords, manage group memberships, and assign user rights and permissions on a local computer.
Local Users and Groups (lusrmgr.msc)
provides a graphical user interface for managing digital certificates on a Windows system. Digital certificates are used to establish trust between entities, such as websites and applications, in a secure manner. Certmgr.msc allows you to view, install, and manage certificates in various certificate stores on the local machine and user accounts. It also enables you to import, export, and delete certificates, as well as view certificate details, certificate chains, and certificate revocation lists (CRLs).
Certificate Manager (certmgr.msc):
a built-in utility in Windows that provides detailed information about the hardware, software, and system components of a computer. It offers a comprehensive view of the system’s configuration, including the processor, memory, storage devices, installed drivers, running processes, and more. System Information is useful for troubleshooting hardware and software issues, checking system specifications, and generating reports for technical support.
System Information (msinfo32.exe)
a Windows utility that allows users to monitor and analyze system resources in real-time. It provides detailed insights into CPU usage, memory usage, disk activity, network activity, and other performance metrics. Resource Monitor is particularly helpful for identifying resource-intensive processes or applications and diagnosing performance-related issues on a Windows system.
Resource Monitor (resmon.exe)
a utility that enables users to manage startup programs and services on a Windows computer. It provides a simple interface to control what programs and services start automatically when the system boots. By using msconfig.exe, users can troubleshoot startup problems, reduce boot times, and optimize system performance by selectively enabling or disabling startup items.
System Configuration (msconfig.exe)
a built-in Windows utility that helps users free up disk space by removing temporary files, system files, and other unnecessary files from the computer. It scans various system folders and presents a list of files that can be safely deleted to reclaim disk space. Disk Cleanup is useful for keeping the system tidy and maintaining optimal disk performance.
Disk Cleanup (cleanmgr.exe)
a utility that helps optimize the layout of files on a hard disk drive to improve read and write performance. Over time, files on a disk may become fragmented, meaning they are scattered in non-contiguous sectors. Disk Defragment reorganizes these fragmented files to enhance disk efficiency and reduce access times.
Disk Defragment (dfrgui.exe)
a powerful tool that allows users to view and edit the Windows Registry. It should should be used with caution, as incorrect changes to the Registry can cause system instability. It is primarily intended for advanced users and IT professionals for specific troubleshooting and configuration tasks.
Registry Editor (regedit.exe)
The ___is a centralized database that stores configuration settings, system settings, and application settings for the Windows operating system.
Registry
____ is the most common way to attack an organization because its employees might fall for phishing attacks (described in the section, “Social Engineering Threats and Vulnerabilities”). Filtering can automatically organize ____ into folders, but from a security standpoint, its most important function is to block spam and potentially dangerous messages. ____ filtering can be performed at the point of entry to a network with a specialized ____ filtering server or appliance, as well as by enabling the spam- and threat-detection features that are built into ____ clients or security software.
Users can discard or quarantine spam or suspicious ____s, as well as retrieve false positives that are actually legitimate messages from the spam folder and place them back into the normal inbox.
____ protocols should be secured to ensure that ____ is encrypted. For example, by default, POP and IMAP ____ protocols are not secure. Using secure protocols such as POP3S (port 995) or IMAPS (port 993) allows the incoming data from the client to be encrypted because they use an SSL/TLS session.
As with key fobs, mentioned in the previous section on physical security, software tokens (or ____) are part of a multifactor authentication process. The difference is that software tokens exist in software and are commonly stored on devices. For example, logging into a secure system might require sending a soft token via SMS message to a smartphone for code authentication. Both hard tokens and soft tokens can be used in multifactor authentication, as described earlier in this section.
Soft Tokens
A ____ is any physical device that a user must carry to gain access to a specific system. Examples are smart cards, RFID cards, USB tokens, and key fobs. (Key fob hardware tokens are explained earlier in this section.) ____
hard token
____ is the standard format of text messaging between devices. Products might have their own message formats (for example, Apple uses iMessage on its devices), but ____ is a standard. ____ is usually used for multifactor soft tokens, described earlier.
Short Message Service (SMS)
Soft tokens can be authenticated with a voice callback. When a user logs in to a site, they might have to authenticate with a ____and pressing a key provided by the service app on the phone. This is similar to the SMS login just described.
voice call