5.3 Flashcards

1
Q

Displays of changes file attributes.

A

attrib

Options:
+ or - R (Turns on/off read-only attribute)
+ or - H (Turns on/off hidden attribute)
+ or - S (Turns on/off system attribute)
+ or - A (Turns on/off archive attribute)

Syntax: attrib [+/- options] (filename)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Displays or modifies access control lists (ACLs) for directories and files.

A

cacls

Options:
/e (Edits ACL instead of replacing it)
/g (Grants specified user rights for a specified file/folder)

Syntax:
cacls (filename) [options] (user:perm)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Displays or modifies user account settings.

A

net accounts

Options:
/minpwlen:(length)
/minpwage:(days)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Displays, modifies, or creates user accounts.

A

net user

Options:
/add (Creates user account)
/delete (Deletes a user account)

Syntax:
net user (username) (password) /add
net user (username) /delete
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Displays, modifies, or creates group accounts.

A

net localgroup

Options:
/add (Creates a group account or adds a user account as a member.)
/delete (Deletes a group account or removes a user account as a member.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Identifies a user account to execute a program.

A

runas

Options: /user:(username) (Identifies user account)

Syntax: runas /user:(username) (program)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Displays a list of processes currently executing.

A

tasklist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Kills one or more processes.

A

taskkill

Options:
/pid (Specifies PI of process to be killed)
/IM (Specifies process by image name)

Syntax:
taskkill /pid (PID)
taskkill /IM (image name)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What attribute is turned on when the file needs a backup?

A

Archive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the three types of backup?

A

Full, Incremental, Differential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Commonly used to backup an entire system by selecting an entire volume. All files are backed up. Archive attributes are cleared, or turned off.

A

Full Backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Backs up selected files with the archive attribute. Only backs up files or directories that are new or changed since the last full or incremental backup.

A

Incremental Backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Backs up selected files with the archive attribute. Archive attributes remain on for files backed up during a differential backup.

A

Differential Backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Feature that returns the system to a workable state, should i become corrupt, without resorting to backup tapes.

A

System Restore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Snapshots of the system’s sate are created and stored as _________.

A

Restore Points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What can trigger the creation of restore points?

A
  • Installing an Application
  • Installing AutoUpdate
  • Restoring from Backup
  • Creating a Manual Restore Point
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the three event logs supported on all Windows system?

A

Application Log
Security Log
System Log

18
Q

Contains events logged by non-OS and 3rd party applications.

A

Application Log

19
Q

Contains events that may affect the security of the system; user activities such as logon/logoff and resource access attempts.

A

Security Log

20
Q

Contains events logged by OS components.

A

System Log

21
Q

Extremely versatile OS that is portable to a variety of hardware that was developed by researchers at AT&T Bell Labs.

22
Q

A “work-alike” version of UNIX.

23
Q

In Linux, a _______is opened to access a shell where commands are entered.

A

Terminal Window

24
Q

Refers to an instrument panel that contains the controls of the computer.

25
A program that provides text only interface for Linux and other UNIX like OSs. Presents each user with a prompt, executes user commands, and supports a custom environment for each user.
Shell
26
Differences between UNIX and Windows commands and formats.
UNIX Commands and files are case sensitive while Windows is not. Also, Windows paths use backslash (\) while UNIX paths use forward slash (/)
27
Displays on-line manual pages about command. (UNIX)
man Syntax: man (command)
28
Clears the current screen, providing an empty terminal window. (UNIX)
cls
29
Displays text files a page at a time. (UNIX)
less Options: b (Allows backwards movement, pone page at a time) / (Initiates a search for a string (word) q (Exits from less) SPACE BAR (Advances one screen at a time) ENTER Key (Advances one line at a time) Syntax: less (filename)
30
Searches a file or files for lines that contain strings of a certain pattern. (UNIX)
grep Syntax: grep (pattern) (filename)
31
Creates one or more directories. (UNIX)
mkdir Options: -p (Creates directories where no parent directory exists) Syntax: mkdir (directory) mkdir -p (directory)/(subdirectory1)/(subdirectory2)
32
Creates a new user or updates default new user information. (UNIX)
useradd Options: - d (Specifies the path of the user's home directory;Linux- users' home directories are in /home) - m (Makes a home directory if one does not already exist - n (Assigns whatever group is in default) Syntax: useradd -d /home/(username) -m -n (username)
33
Deletes a user account (UNIX).
userdel Options: -r (username) ( (Recursively) Removes the home directory for specified user.) Syntax: userdel -r (username)
34
Enables the user to change their password of for the administrator to set and modify password settings. (UNIX)
passwd Syntax: passwd (username)
35
used to change from the current user account to another.
su Syntax: su (username)
36
What are the three main files that determine authentication and authorization for UNIX systems?
* /etc/passwd (Authentication and Authorization) * /etc/shadow (Authentication) * etc/group/ (Authorization)
37
File used to keep track of every registered user that has access to the system.
/etc/passwd file
38
What are the seven fields in the /etc/passwd file?
1. ) Username 2. ) Password 3. ) UID 4. ) GID 5. ) Comment 6. ) Home Dir: 7. ) Default Shell
39
Contains password and account expiration information for all user accounts.
/etc/shadow file
40
What are the 8 fields of the /etc/shadow file?
1. ) User 2. ) Hashed Password 3. ) Lastchg 4. ) Min 5. ) Max 6. ) Warning 7. ) Inactive 8. ) Expire
41
A text file which defines the groups to which users belong.
/etc/group
42
What are the four fields of the /etc/group file?
1. ) Group name 2. ) Password 3. ) GID 4. ) Users having this supplementary group