Comptia 1002 Flashcards

(421 cards)

1
Q

What does the ls command line In Linux do?

A

Display the contents of a directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does grep do in Linux CLI?

A

Search for regular expression in a text file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does cd do in Linux CLI?

A

Change the current directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does pwd do in the command line In Linux?

A

Print working directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does chaos do in the CLI in Linux?

A

Change file permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does crown do in the CLI in Linux?

A

Change the file owner and group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does ps do in CLI in Linux?

A

Display a list of currently running processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does su do in the CLI in Linux?

A

Starts a new shell as another user (Super user)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does apt-get do in the CLI in Linux?

A

Download files from a respiratory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does vi do in the CLI in Linux?

A

Starts the visual file editor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does dd do in the CLI in Linux?

A

Copy blocks if data from one file to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does kill do in the CLI in Linux?

A

If you want or need to terminate/stop a particular process running on the system (used with PID number)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Are scheduled back ups important?

A

Yes. Set them up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the Mac equivalent to back up?

A

Time Machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the Mac equivalent to Restore?

A

Snapshot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Image Recovery on a Mac OS?

A

Recovering an entire image is usually a larger file size than the snapshot you can take.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are some of the Desk Maintenance Utilities that can be used in Linux?

A

du - checks disk space

df - see how much space is free

fsck - check and repair the disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How do you get to the command line in Mac?

A

Applications > Utilities > Terminal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How do you Force Quit in Mac?

A

Press command-option-escape

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How do you access Mission Control?

A

Either clicking on Mission Control key on the keyboard or clicking the Mission Control icon in the dock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is Keychain?

A

Password management system for Apple

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is Spotlight?

A

Magnifying glass icon in the upper-right corner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

True or False

Homgroups need password?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

True or False

Workgroups need passwords?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Where do you go to setup an Audit Policy?
Local Security Policy
26
What does ODBC stand for?
Open Database Connectivity
27
What does SQL stand for?
Structure Query Language
28
What is ODBC?
Mostly based on SQL but has to have some way to link to the database and that is where ODBC comes into play
29
What does ODBC Toll do?
Let’s windows systems locate shared databases
30
What does Component Services Utility do?
Enables users to edit Component Object Model features
31
Encrypting hard drives is done by path?
System and Security > Bitlocker Drive Encryption
32
What is a Dynamic Partition?
It can hold Simple, Spanned, Striped and mirrored volumes. With dynamic storage you can perform disk and volume management without having to restart the operating system.
33
What does USMT stand for?
User State Migration Tool
34
What is FAT32?
4Gb file limit size Okay for flash drives , especially using in different systems
35
What is trimming?
Mark’s an empty page as AFU on a SSD to be optimized at a later time.
36
What does AFU stand for?
Available For Use
37
Software update on a Mac OS is similar to what in Windows?
Windows update
38
What is Live Patch?
It is a Linux Ubuntu patch utility that is equivalent to Windows update
39
What does UNC stand for?
Universal Naming Convention
40
What would be an example of UNC?
\\(server name)\(file name)
41
Trues or False If you have Windows 8.1 you can do a direct upgrade to Windows 10?
True
42
This command line allows you to change directory
cd
43
What command prompt function lists all files and subdirectories contained in a specific directory?
dir
44
A MMC Snap in, but used as a one stop shop for information like Event Viewer, Device Manager, Disk Management, and services?
Computer Management
45
Which tab in internet options/properties would you select for Auto complete settings?
Content
46
True or False To create Homegroups in Windows 10,you don’t have to be an administrator?
False
47
What is NTFS?
New Technology Filing System De facto standard for Windows Supports: Compression Encryption Permissions
48
What is today’s Mac OS based on?
Unix by Linux
49
Linux is free under what license?
GNU License GNU’s Not Unix
50
What kind of logs can you find in Event Viewer?
Application Security Set-up System
51
What is Audit Policy?
Can set-up an Event log
52
What are network shares?
If you want to share some data on your system with others
53
What is Administrative Shares?
Usually starts with C$ for drive Might hear this called a hidden share
54
What is the difference between Administrator and Power User under Computer Management > Local Users and Groups > Groups?
Administrator is highest in the hierarchy and can override Power User which is a step down from Administrator
55
What is Local Security Policy?
Sets up policy for the local system. Adds Audit Policies
56
What is SQL?
Structured Query Language Allows just about any application to talk to just about any database
57
What is DxDiag?
Diagnostic tool used to test DirectX functionality and troubleshoot video or sound related hardware problems
58
What does MSTSC stand for?
Microsoft Terminal Services Client
59
What does HKLM stand for?
HKey Local Machine
60
What does DLL stand for?
Dynamic Link Libraries
61
What does msconfig do?
It is a system configuration for start up programs/applications
62
What can you access from the systems page?
Device Manager Remote Settings System Protection Advanced System Settings Changing computer name and Domain name Change product key
63
What is DEP stand for?
Data Execution Prevention
64
What does the “net use” do in the command line?
Prompt command that’s used to connect to, remove , and configure connections to shared resources, like mapped drives and network printing
65
What does COM+ applications do?
Is the primary unit of administration and security for Component Services and consists of a group of COM Components that generally perform related functions
66
In MS Windows Storage Space, what does Parity mean?
RAID 5
67
What does RAID stand for?
Redundancy Array of Independent Disks
68
What does WDS stand for?
Windows Deployment Services
69
Application plus Services equal what?
Processes
70
What is End Process Tree?
Ends Dependancy hierarchy
71
What does System Configuration do?
Responsible for Start up programs
72
What are Pages?
Is a fixed length contiguous block of memory
73
What is Hard-Fault?
Happens when the address in memory of a program is no longer in the main memory, but has been instead swapped out to the paging file making the system go looking for it on the hard drive
74
What is msinfo32?
System Information
75
What is Active Directory Repair?
Re-establishes connection to the active directory server providing you have a working network connection
76
What is Apples version of PXE?
NetBoot
77
What is Windows Recovery Environment or WinRE?
It creates a backup copy of Windows installation disk
78
How do you get to virtual memory settings?
This PC > Right click and select properties > Advanced > Settings > Advanced under Virtual Memory
79
What is Storage Spaces (settings)?
A software RAID Tool built into most Windows OS
80
How do you encrypt files/folders in Windows?
Right click on File/folder > Properties > Attributes > Advanced > Encrypt contents to secure data
81
What does DTC do?
Is a component of modern versions of MS Windows that is responsible for coordinating transactions that span multiple resource managers, such as databases, message queue, and file systems
82
Typing MSTSC in the run field will get you what?
Remote Desktop Connection
83
How do you get to System?
Right click on My PC > Properties
84
In Windows Storage Spaces, how many drives do you need to do a three way mirror?
Five drives
85
In Windows Storage Spaces, how many drives can fail without the system going down?
Two drives
86
What happens if you move a GPT Drive into a MBR computer?
It would give a warning that it can not read LBA Portitions
87
Is extended volumes used in GPT?
No
88
Which would be the preferred formatting? MBR or GPT
GPT
89
What is virtual memory?
Takes a little bit of the hard drive and makes the OS think that it is RAM
90
What does “Automatically manage paging file size for all drives” mean?
Paging file = virtual memory
91
Swap File equals what?
Virtual Memory
92
If comparing electricity to a garden hose that has water coming out of it what would equal voltage?
Pressure
93
What would amperage coming out of a garden hose equal?
Amount of flow
94
What is Image Deployment?
Can be used from different locations Can deploy images locally to unattended or attended installations Can use programs like WDS, Windows ADK, USMT, and Sysprep
95
What is NFS?
Network File System Allowing a user on a client computer to access files over a computer network much like local storage is accessed
96
What is LBA0?
Is a sector on a hard drive that stores the MBR (Master Boot Record)
97
What is LBA1?
Used for GPT drives. It skips LBA0 and starts to load from LBA1. Is a primary GPT Header Will have a secondary GPT Header usually LBA2
98
What is Component Services?
Used as a snap-in in MMC to configure and administer COM Components, COM+ Applications and DTC
99
What is logical partitions?
A volume created within an extended partition on a basic disk A logical drive can be formatted and assigned a drive letter, but cannot host an operating system
100
What does DTC stand for?
Distributed Transaction Coordinator
101
cd \
Takes you to the root directory
102
What does ~ on the CLI in Linux do?
Brings you to the Home Directory
103
What is the root directory in Linux?
/$
104
How to make a folder in the CLI?
Must be one level up md (file name)
105
What is md in CLI?
Make directory
106
How do you delete a folder in the CLI?
Type: rd (file name)
107
In Linux, to make a new folder?
mkdir (name of folder)
108
To remove a folder in CLI in Linux?
rmdir (name of folder)
109
In Windows CLI, what command do you use to remove a directory and its contents?
rd /s
110
In Linux CLI, what command do you use to remove a directory and its contents?
rm -r
111
What does IIS stand for?
Internet Information Services
112
What is IIS?
It is a program that is pre-installed in MS Windows. This one is a web server.
113
What tool do you use to uninstall applications?
Programs and Features
114
How do you get to System Restore?
Through System Properties
115
When saving a Restore Point, what does it actually save?
Applications, the Registery, and a few critical system files
116
When should you creat a Restore Point?
Adding applications, changing applications, updating device drivers
117
True or False Windows can restore from a system Restore Point even in Windows Recovery Environment?
True
118
What does Backup and Restore (Windows 7) actually save?
Desktop My Documents My Photos
119
What does CLI stand for?
Command Line Interface
120
What is the alternative to CLI?
Windows PowerShell
121
What is the Linux-Ubuntu version of CLI?
Bash Shell
122
The Mac OS version of Windows CLI is?
Mac Shell
123
What are the two help commands in CLI?
/? and Help (name of command)
124
To use administrator rights on the command line in Linux, what do you need to type in first?
sudo
125
To get more information about Linux CLI type what?
man (command)
126
What is Hardware Compatibility List?
It is a list of hardware that can be run on certain software and/or hardware
127
What does NTFS support?
Compression Encryption Defacto standard for Windows File/Folder Security
128
What does TPM stand for?
Trusted Platform Module It is a chip that is built/plugged into the motherboard for hardware encryption on storage drives
129
Using netstat on the command line will do what?
This utility allows us to see all the TCP and UDP connections to our system
130
What does GUID stand for?
Global Unique Identifier
131
What does PDF stand for?
Portable Document Format
132
What is Basic Partition?
Uses normals partition tables A disk initialized as a basic stood called a basic disk It can hold primary, extended, and logical partitions
133
What is GPT Partition?
GUID Partition Table A basic disk using the GPT partition style can have up to 128 primary partitions, while dynamic disks will have a single LDM (Logical Disk Manager), partition as a MBR partition Because basic disks using GPT partitions do not limit you to four partitions, you do not need to create extended partitions or logical drives
134
In the command prompt, what does dism do?
Deployment Image Servicing and Management Command line tool that is used to mount and service Windows images before deployment Can use dism to install, uninstall, configure and update Windows features, packages, drivers, and international settings in a .wim file using a dism servicing commands
135
In the command line what does sfc do?
System File Checker Utility in MMS Windows that allows users to scan for and restore corruptions in the Windows system files If running Windows 10, 8.1, 8 first run the inbox dism tool prior to running the sfc Then type the below at an elevated command prompt sfc /scannow
136
In the command line, typing chkdsk will do what?
Checks the file system and file system metadata of a volume for logical and physical errors Run from elevated command prompt
137
Running diskpart in the command line will do what?
Helps to manage your PC’s drives Before using diskpart commands, you must first list, and then select an object to give it focus When focused, any diskpart commands that you type will act on that object Need an elevated prompt (admin permission)
138
What does gpresult do in the command prompt?
Group Policy Result That shows the resultant set of policy (RSoP) for a user or computer based on applied Group Policy settings
139
What does “net user” do in the command line prompt?
Is used to add, remove, and make changes to the user accounts on a computer, all from the command prompt
140
What is secpol.msc?
Local Security Policy Like group policy but only applies to this machine
141
What are the different partitions?
Dynamic Basic Primary Extended Logical GPT
142
What is a extended partition?
The hard disk may contain only extended partition, but that extended partition can be subdivided into multiple logical partitions Windows systems may then assign a unique drive letter to each logical partition
143
What is a primary partition?
The primary partition is the partition that houses the system and boot partitions
144
What is MBR?
Master Boot Record
145
What does WDS do?
Is a server technology from MS for networked-based installation of Windows OS Only on server MS OS
146
What does Windows ADK stand for?
Windows Assessment and Deployment Kit and Active Directory
147
What does Windows ADK do?
Is a collection of tools and technologies to deploy Windows OS images to target computer or a virtual hard disk image in a vhd format
148
What is FAT16?
File Allocation Table Using hexadecimal numbers (0000-ffff)
149
What does stateful firewalls do?
It blocks any inbound traffic that was not solicited
150
What does NGFW stand for?
Next Generation Firewall
151
What does NGFW do?
Combines packet filtering, stateful firewall, and application layer firewall all together
152
What does WAF stand for?
Web Application Firewall
153
What does WAF do?
It’s a web application firewall
154
What are the different types of authentication techniques?
Something you have Something you know Something you are Something you do
155
What does DLP stand for?
Data Loss Prevention
156
What does ACE stand for?
Access Control Entries
157
What does UTM stand for?
Unified Threat Management
158
What is a mantrap?
A in between room that is on one side public and on the other side security
159
What does CAC stand for?
Common Access Cards
160
What does Active Directory handle?
Login Scripts Domain Group Policy/updates Organization units Home Folders Folder redirection
161
What does MDM stand for?
Mobile Device Management
162
What is MDM Policies?
Policies regarding: Incident handling Backups Data retention Data ownership Device updates/maintenance
163
What does COM do?
Is a platform-independent, distributed, object-oriented system for creating binary components that can interact
164
What does MMC stand for?
MS Management Console
165
What does MMC do?
Create, save, and open administrative tools, called consoles, which manage the hardware, software, and network components
166
What does COM stand for?
Component Object Model
167
What is Data Source?
A data source is the location where the data that is being used originates from
168
What does USMT do?
Is a command line utility program that allows users, comfortable with scripting, to transfer files and settings between Windows computers
169
What is the use of sysprep?
Prepares a Windows installation (Windows client and Windows server) for imaging, allowing you to capture a customized installation. Sysprep removes pc-specific information from a Windows installation “generalizing” the installation so it can be installed on different PC’s
170
What does BOOTP do?
Is a networking protocol used in Internet Protocol networks to automatically assign an IP address to network devices from a configuration server. BOOTP only operates on IPv4 networks
171
What is Remote Network Installation?
Need a server to push an image to the device. Usually over a network (PXE boot) Need a server in place for addressing. Have to set up addressing prior by either BOOTP or DHCP
172
What does PXE do?
Is a client-server interface that allows computers in a network to be booted from the server before deploying the obtained PC image in local and remote offices. Clients must be PXE enabled.
173
What does PXE stand for?
Preboot Execution Environment
174
What is a Repair Installation?
Pu in the original media for the OS and click on repair You would use this for when something has gone wrong with the operating system such as a bad install, bad uninstall or malware
175
What are the system minimum requirements for Windows 10?
CPU 1ghz Hard drive 16-20gb Ram 1-2gb Graphics DirectX 9 Edge extension Designed for touchscreen New features for Cortana: asking about meetings or flight info on the Lock Screen
176
Asking open ended questions about the problem they are having on their equipment?
Clarify customer statements (don’t interrupt them)
177
In-place upgrade, what is it?
Not the cleanest or recommended way of performing an upgrade Easiest for non IT people Best to do clean install Keeps all your settings and data Put in disk and run exe file
178
What is unattended installation?
Do not need to be on-site (except for initiating) Need a device like a thumb drive with answer file Once you run the installation media the answer file on the thumb drive will provide what the installation program needs
179
What is multiboot?
Can literally boot into different operating systems and provide the choices at boot time
180
What does BOOTP stand for?
Bootstrap Protocol
181
What is a refresh/restore?
Refresh is a way to get the system back into the condition it was when you took it out of the box Restore allows you to keep what we want by going back to an earlier build of the system
182
What does PID stand for?
Process ID
183
What is the feature called on Mac OS that allows you to sign in to MS Domain?
File sharing and Printer sharing
184
What is the feature called in Linux that allows you to sign in to MS Domain?
Samba-Linux
185
Letting the customer describe about the problems they are having with their equipment?
Actively listening
186
When working with customers what attitude should you have?
A positive and confident one
187
What type of language should you use with customers?
Plain language. No jargon or acynomns
188
What is the RAM limitation on a MS 32bit operating system?
Up to 4gb
189
Minimum requirements for Windows 7?
CPU 1 ghz Hard drive 16-20 go RAM 1-2 go Graphics DirectX 9
190
What are the system requirements for Windows 8.1?
CPU 1 ghz Hard drive 16-20 go RAM 1-2 gb Graphics DirectX 9
191
What does EFS stand for?
Encryption File System
192
What does ESD stand for?
Electrostatic discharge
193
What does EMI stand for?
Electromagnetic Interference
194
What does RFI stand for?
Radio Frequency Interference
195
What type of fire extinguisher should you use?
Type “C”
196
Weight limitations: _______ pounds or more needs assistance
25
197
What is the first step in the trouble shooting theory?
Identify the problem Talk to the user
198
What is the second step in the trouble shooting theory?
Establish a theory of probable cause
199
What is the third step in the trouble shooting theory?
Test the theory to determine cause
200
What is the fourth step in the trouble shooting theory?
Establish a plan of action to resolve the problem and implement
201
What is the fifth step in the trouble shooting theory?
Very System functionality, and, if applicable, implement preventative measures Let user verify functionality if possible
202
What is the sixth step in the trouble shooting theory?
Document findings, actions, and outcome
203
What is PXE?
It’s a Network boot
204
What is a clean install?
Great way to “rebuild” a system Removes all settings and files from the drive and completely reinstalls the operating system If data is stored on a separate drive this works great Recommended at least once a year
205
What is the difference between DHCP and BOOTP?
BOOTP has no support for temporary IP addressing DHCP has support for temporary IP addressing but for a limited time
206
What is a Recovery Partition?
This is an area of the hard drive set aside to hold files that can be used to recover the operating system in the event of a failure
207
What is a kernel?
It connects the system hardware to the application software
208
Linux and Mac OS Super User is called what?
Root
209
What is another name for Windows server?
Domain Controller
210
Another term for Domain?
Active Directory
211
What is CDFS?
Compact Disk File System
212
What is swap partition?
Logical place on a hard drive where Linux uses to increase the amount of virtual memory available to a host
213
What is quick format?
When you choose to run a quick format on a volume (or partition) the format removes files from the partition but does not scan the disk for bad sectors
214
What is Full Format?
When you choose to run a Full Format on a volume (or partition) the files are moved from the volume that you are formatting and the hard disk is scanned for bad sectors.
215
In the CMD line typing cd.. does what?
Goes back one level
216
Using tracert on the CMD line will do what?
Allows us to trace the path the packets took and how long to get to the distant end Same command as trace route in Cisco routers/switches
217
In the command prompt line, what does shutdown do?
This command will present the user with options to shutdown the system or restart it
218
What is HFS?
Hierarchy File System Older file system for Apple computers Replaced with HFS+ and now Apple File System (APFS)
219
What is ext3 and ext4?
Linux file system Supports huge individual file size and overall file system size.
220
What is ExFat?
Extended File Allocation Table Choice for flash drives that need to hold lots of data
221
What does taskkill do in the command line prompt?
Ends one or more tasks or processes Process can be ended by process ID or image name Need elevated prompt Use task list first to get a listing of all the background process
222
What does gpupdate do in the command line?
Forces the system to go out and retrieve the latest group policy updates from the domain controller Have to be part of the domain for this to have an effect
223
What does scoot do in the command line?
Copies files and directories including subdirectories
224
What does robocopy do in the command line?
Robocopy or “robust file copy” is a command line directory and/or file replication command Replaces xcopy with more options
225
Pressing “alt”+Q on a Mac does what?
Closes active application
226
What is Finder in Mac OS?
It is the File Folder in Windows
227
What equals the command prompt in Mac OS?
Terminal
228
If you were going to replace Windows with a Linux distro, which distro would you use?
Ubuntu
229
What is a dash in Linux?
It’s the equivalent to the MS taskbar
230
In Linux (Ubuntu) pressing activities does what?
Brings up open programs like alt+tab in Windows
231
How many partitions can you have in MBR?
Four
232
In the command line, what does nslookup do?
It is a DNS utility built into the command prompt/shell of Windows
233
What is unique about GPT?
It can have 128 portions It also has a unique identifier that can be globally used
234
What would you use to set a baseline on a computer?
Performance Monitor
235
What does shutdown doe in the CLI?
Shuts down the system
236
What does passwd do in the CLI?
Change the password
237
What does mv do in the CLI?
Rename a file and move the file from one directory to another
238
What does cp do in the Linux CLI?
Copy files
239
What does rm do in the Linux CLI?
Remove (delete) files
240
What does iwconfig do in the CLI?
View and change information related to wireless networking configuration
241
What does ifconfig do in the CLI?
View and change information related to networking configuration
242
What does sudo do in the CLI?
Similar as adim in Linux
243
How do you delete a file on the command line?
Type: del (file name and extension)
244
What does the * do in the command line?
It is a wildcard character for finding things
245
What are the five steps to copy files from the hard disk to a thumb drive using the command line?
1. Get to the directory where the files are located 2. Type copy 3. Type in the files you want to copy. Example; copy free.txt 4. Type the path you want to copy to. Example; D:>copy Fred.text k: 5. Hit enter and verify the copy completed
246
To delete a file on Linux terminal, what do you type?
rm (file name and extension)
247
What does chkdsk do in CLI?
Fixes formatted partitions
248
What does sfc do in the command line?
Repairs critical Windows files based on the system store
249
What does dism do in the command line?
Repairs critical Windows files based on online system store
250
What ones diskpart do in the CLI?
Partitions drives
251
If you run sfc and you encounter corrupted files what do you run next?
dism /online /clean-image /restore health Run sfc one last time
252
What is did in Linux CLI?
Similar to Windows robocopy/xcopy
253
What is task list in Windows CLI?
Lists all programs and processes on the computer
254
To verify results of running gpupdate, what do you need to type and then look for?
Type gpresulit and look for “Applied Group Policy object”
255
How do you shutdown a computer in the terminal ?
shutdown (will take one minute to shutdown) -c (cancels shutdown) -r (reboots in one minute) now ( shuts down immediately)
256
How do you update your repository in Linux on the terminal?
Type: sudo apt-get update
257
How to install programs on the terminal in Linux?
Type: sudo apt-get install (file/app name)
258
How do you update programs in Linux using the terminal?
Type: sudo apt-get upgrade _________ (If left blank will update all programs) (If file name is inserted will only update the file/application)
259
How do you remove a program from Linux by the terminal?
Type: sudo apt-get remove (program name)
260
How do you get a list of processes in Linux using the terminal?
Type: ps aux
261
How do you filter results from using pa aux?
Type: pa aux | grep (“what if” string you are looking for) Only works with txt files
262
How do you end process i. Linux using the terminal?
Type: kill (process ID)
263
What is Vi-text editor in Linux?
It’s a old text editor
264
What is icacls for CLI?
Changes NTFS permissions Example: D:\>icacls timmy /grant Mike :F
265
What does chmod do in the CLI in Linux?
Changing permissions
266
After typing ls-l in Linux CLI, what is the order of grouping for available tasks?
Read, write, execute or rwx User-group—everyone/other
267
In Linux CLI, if you want to provide RWX to user/group/other, what command would you sue?
chmod 777 (file name)
268
In Linux CLI, if you only wanted to read-write to user and group but only read for other, what command string would you use?
chmod 664 (name of file)
269
When changing permission in CLI Linux, what are the values for read/write/execute (rwx)?
Read=4 Write=2 Execute=2
270
How do you change the password in Linux CLI?
Type: sudo passwd
271
What does chmod do in the CLI in Linux?
Enables changing Linux permissions
272
What does chown do in the CLI in Linux
Enables root users to take control of any Linux folder or file
273
After scripting on Notepad, what file extension should you save the script too?
.bat (batch)
274
Scripting in a text file and saving it to a .bat file is called what?
Batch file
275
Typing set in the command line in Windows does what?
Gives you the environment variables
276
What is power shell in Windows?
It is a stronger version of CLI
277
What is cmdlet?
It is a powershell command lets
278
What is intergrated scripting environment?
It is a powerful text editor that is within powershell used for scripting
279
What is the powershell extensions named?
.ps1
280
What does Bash shell extension end with?
.sh
281
What is .vbs extension?
Visual Basic
282
What does JavaScript do?
Runs client-side application as a web application
283
What is a for statement in Java?
Is a conditional loop
284
What is a IF statement in Java?
If this, than that
285
What is functions in programming in Java?
Chunks of code run over and over again
286
What is Python extension named?
.py
287
What is JavaScript extension?
.js
288
What does WEP stand for?
Wired Equivalent Privacy
289
What does WPA stand for?
WiFi Protected Access
290
Why is WEP a week encryption method?
After a time, it sends out the same IV (initialization vector)
291
What does TKIP stand for?
Temporal Key Integrity Protocol
292
What does IV stand for?
Initializeation Vector
293
What does TKIP do?
Rotates the keys in the IV
294
What does IV do?
Starts the initialization process to connect to a wireless access point by confirming the password for it
295
What does AES stand for?
Advanced Encryption Standard
296
What does RADIUS Authentication stand for?
Remote Access Dial In User Service
297
What does TACACS Authentication stand for?
Terminal Access Controller Access Control Service
298
What are worms?
Self contained malware packages, capable of propagating
299
What does WinPE stand for?
Windows pre-installation environment | Is the dark blue screen
300
What does WinRE stand for?
Windows recovery environment | Is the blue screen
301
Where do you go to safe boot on the next system restart?
System configuration > boot tap
302
How do you get into Advanced Boot options?
Intentionally crashing the system several times
303
What does SPoD stand for?
Spinning Pinwheel of death
304
What does BSoD stand for?
Blue screen of death
305
What is a rainbow table?
Compares hashes to try and reverse engineer and crack passwords
306
How do you get to users and groups?
Right-click on start menu select computer management and select users and groups
307
What does netstat do in the command prompt?
Lists TCP connections along with local address/foreign address and state of the connections
308
Using netstat -n -a will do what?
Lists any and all ports that are sending or listening over the network card
309
What uses port 80?
MS web services (IIS) and http
310
What does net view do in the CLI?
Looks for all computers on the network
311
Typing in net view (computer name) will do what?
Will bring up all the shares on the system
312
To share a folder/file in CLI, what would be the command prompt needed?
Net share shareit = c:\(name of file/folder)
313
Typing in net share will do what?
Shows shared folders on the system
314
To map a drive/folder/file what would you type?
Net use v:\\(computer name)\folder
315
To add a user in CLI, what do you type?
Net user (user name) (password) /add
316
To delete a user in the CLI, what do you type?
Net user (user name) /delete
317
What does typing in Net user do?
Brings up all the users on the computer
318
What is a stateless firewall?
A firewall that ignores the state of the network and will continue blocking traffic
319
What is a stateful firewall?
Will make judgement calls on suspicious activity
320
What is a SPI firewall?
Stateful firewall
321
What does ACL stand for?
Access Control List
322
What does SSID stand for?
Service Set Identifier
323
DLP stands for this and attempts to keep documents safe from leakage?
Data Loss Prevention
324
Only give enough authorization to individuals to do their job effectively and efficiently is known as this?
Least Privilege
325
If you provide a username, password and pin when logging in, how many factors of authentication are you using?
One
326
For centralized authentication, you can use which of the following:
RADIUS AND TACACS+
327
Which takes precedence when assigned permissions?
Deny
328
True or False Admins can configure a maximum password age without a domain environment
True
329
This is MS directory environment for enterprise networks?
AD or Active Directory
330
Which of the following allow you to unlock a locked phone?
Fingerprint Face Passcode
331
Locator applications can use which of the following to help?
GPS Cellular RF WiFi
332
True or False Firewalls are too complex for mobile devices to use
False
333
True or False Patching and updates can come from various vendors
True
334
What is PuTTY?
It is a telnet client
335
Remote assistance let’s you do what?
Connects multiple computers
336
What does Remote Desktop do?
Allows you to connect to another computer but no other computer can also connect
337
What does VNC stand for?
Virtual Network computing
338
What are certificates on the World Wide Web?
They are verified by a third party saying that this “key” is legit
339
What does SSL stand for?
Secure Sockets Layer
340
What does TLS stand for?
Transport Layer Security
341
What three CLI utilities will you use to investigate network issues?
Ipconfig Tracert Ping
342
What does ACPI stand for?
Advanced Configuration and Power Interface
343
What does ACPI level 0 mean?
It’s on
344
What is ACPI level 3?
It’s sleep mode RAM is still powered
345
What does ACPI level 4 do?
Hibernation mode Everything on RAM is stored on a file in the hard drive and then the RAM is switched off
346
What does CDMA stands for what?
Code Division Multiple Access
347
What does GSM stand for?
Global System for Mobile Communications | These have SIM cards
348
What does IMSI stand for?
International Mobile Subscriber Identity
349
What are the three steps to setting up a VPN on a phone?
Give it a name Set up the VPN Know the servers IP address
350
What does IDS stand for?
Intrusion Detection System
351
What does IPS stand for?
Intrusion Prevention System
352
What does IPS do?
It is smarter than IDS as in it is installed on all/some computers and it talks to the other “agents” and reacts accordingly
353
What features does UTM have?
It includes IDS/IPS, firewalls, anti-malware and is also available on the cloud
354
What would apply for perimeter security?
Security guard Mantrap Locking doors
355
What would apply for Room security?
Locking doors Entry control roster Badge reader (rfid-chips)(NFC) Smart card (swipe or insert) Biometric
356
What would apply for individual devices security?
Cable locks Server locks USB locks Privacy screens Key fobs Hardware tokens
357
What does BCD stand for?
Boot Configuration Data
358
What does FRP stand for?
Factory Reset Protection
359
What does FRP do?
Done to make stolen phones less valuable
360
Which command line tool allows you to pause, stop or start a service
sc.exe
361
What is a dictionary attack?
A list of known passwords that people people use
362
What is step one in cleaning a malware infected system?
Identify and research malware symptoms
363
What is the second step in cleaning malware infected system?
Quarantine the infected system Disconnect from network. If hardwired, unplug from the wall rather than from the computer
364
What is the third step in cleaning out malware on a system?
Disable System Restore
365
What is the fourth step in cleaning out malware on a system?
Remediate the infected system | A. Update the anti-malware software B. Scan and use removal techniques Safe mode, pre-installation environment
366
What is the fifth step in cleaning out malware on a system?
Schedule scans and run updates
367
What is the sixth step in cleaning out malware on a system?
Turn back on System Restore also, create a restore point Delete the last weeks or up to a month of last restore points
368
What is the seventh step in cleaning out malware on a system?
Educate the end-user and document
369
What is Network topology diagrams?
Documentation stating how devices are hooked up
370
What is a logical diagram?
How things are organized electronically (with IP address)
371
What is physical diagrams?
How things are physically in the real world.
372
What does AUP stand for?
Acceptable use Policy
373
What does PII stand for?
Personally Identified Information
374
What does PHI stand for?
Personal Health Information
375
What does GDPR stand for?
EU- General Data Protection Regulation Specifies how and what data online organizations can get from visitors
376
What does PCI-DDS stand for?
Payment Card Industry Data Security Standard Ensures security of financial interactions
377
What is a change board?
Usually meets monthly/weekly/quarterly to discuss and changes that my be needed
378
What is documented business processes?
Document the business practices and how it is going to improve the business practices
379
What is risk analysis?
What are the downsides of making this change
380
What is the first step in implementing change management?
Document business process
381
What is the second step in implementing change management?
Purpose of the change
382
What is the third step in implementing change management?
Scope of the change
383
What is the fourth step in implementing change management?
Risk analysis
384
What is the fifth step in implementing change management?
Plan for change
385
What is the sixth step in implementing change?
Get end user acceptance Should be done from the beginning
386
What is the seventh step in implementing change management?
Blackout plan
387
What is the eighth step in the change management?
Document changes Is there any “lessons learned”, document that too
388
What is a image-level backup?
It is going to back-up everything on the partition/drive
389
What should be documented in an incident?
Date/time Who reported When noticed Who took the report Triage steps/first responder steps taken Resolution Lesson learned
390
Banks need to follow what regulatory policy?
Sara bed Oxley
391
What should the temperature and humidity levels be set at?
Temperature 65-70 F Humidity 45-55%
392
What does DRM stand for?
Digital Rights Management
393
What does PHI stand for?
Protected Health Information Any information about health status, provisions of healthcare, or payment for healthcare
394
What is a .sh file?
Shell File Shell files are run on terminals
395
What is a .js file?
JavaScript file
396
What is a .cab file?
Visual Basic Script Scripting language developed by MS that is modeled on Visual Basic
397
What is a integer?
A whole number (not fractions or decimals) that can be positive, negative or zero
398
What are System variables?
When scripting, you can use system variables as “short cuts” when needing to type file paths
399
What port does RDP use?
3389
400
What paper does Telnet use?
23
401
What port does SSH use?
22
402
Which of the following is a new feature of iOS 5?
Ability to perform untethered updates
403
What should be documented in an incident?
Date/time Who reported When noticed Who took the report Triage steps/first responder steps taken Resolution Lesson learned
404
Banks need to follow what regulatory policy?
Sara bed Oxley
405
What should the temperature and humidity levels be set at?
Temperature 65-70 F Humidity 45-55%
406
What does DRM stand for?
Digital Rights Management
407
What does PHI stand for?
Protected Health Information Any information about health status, provisions of healthcare, or payment for healthcare
408
What is a .sh file?
Shell File Shell files are run on terminals
409
What is a .js file?
JavaScript file
410
What is a .cab file?
Visual Basic Script Scripting language developed by MS that is modeled on Visual Basic
411
What is a integer?
A whole number (not fractions or decimals) that can be positive, negative or zero
412
What are System variables?
When scripting, you can use system variables as “short cuts” when needing to type file paths
413
What port does RDP use?
3389
414
What paper does Telnet use?
23
415
What port does SSH use?
22
416
Which of the following is a new feature of iOS 5?
Ability to perform untethered updates
417
Tyrion discovers a computer on his network has been infected with a 0-day virus. Which of the following is the first thing that should be done to the workstation?
Unplug it from the network
418
Uhura has just accepted an SSL certificate, but she’s not comfortable about the source and now wishes to make it “go away”, what should she do?
Clear the SSL cache
419
How should a user manually back up their registry?
Open the registry, file, pick location to save to
420
Which of the following actions would best show a computer was connected to the internet?
Pinging www.CompTIA.org
421
Kevin gets a call from a user who is trying to install a new piece of software. The user doesn’t have administrative rights, so she is unable to install the software. What tool can Kevin use to install the software for the user without giving the user the local administrator password?
Remote Desktop