220-1002 Flashcards
Pass the CompTIA A+ 220-1002 test with complete mastery. (562 cards)
When a new harddisk leaves the manufacturer, creates cylinders, tracks and sectors on the platters
Low Level Format
halts any child processes
taskkill /t /pid processid
/t
Terminates the specified process and any child processes which were started by it.
/pid
Specifies the PID of the process to be terminated. Use TaskList to get the PID.
bottom of screen gives one-click access to favorite apps and files in macOS
dock
Opens device manager from runline
Devmgmt.msc
Despite the name being called “Device Manager”, the name used to call the application is short for Device Management.
UGO stands for…
User, Group, Others
User
User is the owner of the file. When you create a file, you become the owner of the file. The ownership can be changed as well, but we’ll see that later.
Group
Every user is part of a certain group(s). A group consists of several users and this is one way to manage users in a multi-user environment.
Other
‘Other’ can be considered as a super group with all the users on the system. Basically, anyone with access to the system belongs to this group.
In other words, ‘User’ is a single user, Group is a collection of users and Other consists of all the users on the system.
*Even if you are the only user of the system, you’ll still be part of many groups. Distributions like Ubuntu also create a group with name same as the user’s name.
Tip: Run the command groups to see what user-groups you belong to.
7 steps in the malware removal process are…
- Identify and research malware symptoms
- Quarantine infected systems
- Disable system restore
- Remediate infected systems:
- update anti-malware software
- scan and use removal techniques - Schedule scans and run updates
- Enable system restore
- Educate end user
IQ DR SEE
I (Identify)
Quietly (Quarantine)
Draw (Disable Restore)
Red (Remediate/Remove)
Shoes (Schedule Scans/Updates)
Every (Enable Restore)
Evening (Educate User)
How do you Force Quit in macOS?
in Apple menu or press command+option+esc
specifies the hour in cron(0-23)
hh
A collection of user accounts, computer accounts, and other groups that can be assigned permissions in the same way as a single user object.
Security Group
Clears the DNS resolver cache
ipconfig /flushdns
A ____ is a logical group of keys, subkeys, and values in the registry that has a set of supporting files loaded into memory when the operating system is started or a user logs in.
Hive
REGISTRY DATABASE FILES
The registry database is stored in binary files called hives. A hive comprises a single file (with no extension), a .LOG file (containing a transaction log), and a .SAV file (a copy of the key as it was at the end of setup). The system hive also has an .ALT backup file. Most of these files are stored in the %SystemRoot%\System32\Config folder, but hive files for user profiles are stored in the folder holding the user’s profile. The following table shows the standard hives.
HKEY_CURRENT_CONF
system, system.alt, system.log, system.sav
HKEY_CURRENT_USER
ntuser.dat, ntuser.dat.log
HKEY_LOCAL_MACHINE\SAM
ssam, sam.log, sam.savv
HKEY_LOCAL_MACHINE\SECURITY
security, security.log, security.sav
HKEY_LOCAL_MACHINE\SOFTWARE
software, software.log, software.sav
HKEY_LOCAL_MACHINE\SYSTEM
system, system.alt, system.log, system.sav
HKEY_USERS.DEFAUT
default, default.log, default.sav
HKEY_CLASSES_ROOT
Not stored in a hive but built from the \SOFTWARE\CLASSES keys in CURRENT_USER and LOCAL_MACHINE
Location of Log files in WIndows
%SystemRoot%\System32\Winevt\Logs folder
127.0.0.1
IPv4 Loop back address
The loopback address is used to test network software:
without physically installing a Network Interface Card (NIC),
and without having to physically connect the machine to a TCP/IP network.
Allow you to collect statistics about resources such as memory, disk, and processor
Peformance Monitor
-perfmon.msc
-Performance Monitor provides a visual display of built-in Windows performance counters, either in real time or as a way to review historical data. You can add performance counters to Performance Monitor by dragging and dropping, or by creating custom Data Collector Sets. It features multiple graph views that enable you to visually review performance log data. You can create custom views in Performance Monitor that can be exported as Data Collector Sets for use with performance and logging features.
32 bit application files location
Program Files(x86)
Do most things with an object but not to change its permissions or owner.
Modify
Stop a process using its unique ID (Windows)
taskkill /IM pid
A new feature of Windows 7 that enables users to rapidly access data from remotely located file and web servers. This enables users at a small branch to cache copies of frequently accessed files from head office servers on a local computer.
BranchCache
Bash shell script comment
# {#BashCom}
Bash-Hash
Same as Powershell Comments #
Linux shell scrips
.sh
View the contents of a file or folder or start a program
Read/List/Execute
quits a running program in command prompt
Control + C
Control connection to databases set up on the local computer
ODBC Data Sources
(Open Database Connectivity )
displays all files without an extension.
dir *.

