Final questions p2 Flashcards

1
Q

Define:

File System

A

Logical collection of files located in a drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define:

File Name extensions

A

They tell the OS which program created it and which opens it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between:

Partition VS Volume

A

Partitions are defined spaces on the drive while volumes are partitions that have been formatted and can have files stored in them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does the file system resemble a tree?

A

The drive is the tree while the subfolders are branches and the leaves are the individual files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

FAT32 VS NTFS

Why is NTFS better than FAT32?

A

FAT32 is the old file system until it was replaced by NTFS. NTFS has better features such as
1. Security
2. quotas
3. compression
4. encrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the

windows os file system conversion command?

A

convert C: /fs: ntfs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the advantages

Dynamic discs has over basic discs?

A

Basic discs only support simple volumes while dynamic discs can
1. resize volumes
2. make changes without restarting
3. RAID support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are:

  1. Spanned volume
  2. Mirrored volume
  3. striped volume
A
  1. Two drives are treated as one drive
  2. data is written into two drives at the same time
  3. chunks of data is written into multiple drives at a time
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define:

  1. Raid 0
  2. Raid 1
  3. Raid 5

Pros? Cons?

A
  1. Striped volume. Write speeds are faster as multiple drives carry out the operation but it is not fault tolerant
  2. Mirrored volume. Write speeds are slower but it is fault tolerant as one drive can fail and the other will be fine
  3. Striped volume + parity blocks. Parity blocks allow data to be reconstructed if one drive fails.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define:

Encryption

what two items are needed for encryption?

A

Encryption is the act of scrambling data so that only authorized people can read it. To encrypt data into cyphertext, you need
1. Cryptographic algorithm
2. Cryptographic key - piece of information that can be used to encrypt or decrypt it later

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define:

AES

A

Advanced encryption standard. It is the worldwide standard for encrypting data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Difference between:

Authorization VS authentication

A

Authorization means whether you have the right permissions or not to access certain files or programs

Authention means proving your identity to the system in order to gain access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Difference:

  1. Offline attack
  2. brute force attack
  3. dictionairy attack
A
  1. Don’t need direct access to targeted system (ie stealing password list, keylogger etc)
  2. going through every letter, number, symbol to try and forcibly guess the password
  3. guessing a person’s password by using entries from the dictonairy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What makes a strong password?

A
  1. Longer than 8 words
  2. Do not use dictionairy words
  3. use numbers and symbols
  4. use capitals (except first letter)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define:

  1. Computer Worms
  2. Viruses
  3. Trojans
A

All three are malware
1. self-replicating and self-spreading
2. self-replicate but require their victim to continue to spread
3. masquerade as harmless executables in order to get into the victim’s system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define:

Bitlocker

What are the requirements?

A

Bitlocker is a windows software that allows the user to encrypt their drive.
The requirements to use bitlocker is
1. Vista and above
2. TFS key
3. Admin priviliges
4. 2 partitions

17
Q

Define:

Antivirus Software

Repair? Quarantine? Delete?

A

Antivirus protects your system by scanning it for malware code and comparing it against databases. A antivirus can sometimes repair your file by removing the malware code from your file. Quarantine places the infected file into a special place where neither you or the attacker can activate it. Last of all, delete will remove the whole file from your system

18
Q

list:

The different types of user accounts in windows OS

A

Kernel/administrator mode
User Modes (administrator, user, guest)

19
Q

Difference:

standard accounts vs admin accounts

A

Administrator accounts in windows have elevated priviliges so that it can make any changes and can access reserved memory addresses.
There are more restrictions against standard accounts, even standard administrator accounts are restricted in some ways and there are memory addresses that it cannot touch

20
Q

define:

UAC

and when does it activate?

A

User Access Control.
It activates if
1. User tries to make changes to settings that affect others
2. program tries to make admin level changes
3. unsigned program tries to make any changes

21
Q

define:

Linux

A

Linus is a open source OS that is built on top of UNIX

22
Q

define:

Shell

A

Shell is a software in Linux that allows the user to send commands to the kernel

23
Q

define:

Linux File system

A

Linux File system starts from the root and all directories come from it. In linux, everything including drives etc are treated as files

24
Q

Difference:

Ext4 vs XFS

A

Ext4 and XFS are both linux file systems
Ext4 is good for general purposes with good security features
XFS is meant for large files and is faster with large data transfers

25
Q

Define:

IP address

What are the two different IP versions?

A

IP addresses are unique identfiers of computers connected to the internet. There are two different versions of IP addresses in wide use:
1. IPv4 (32 bit)
2. IPv6 (128 bit)

26
Q

What is Subnet Mask used for?

A

Using 32 bits to identify the host ID and network ID

27
Q

Explain the functions of each item:

  1. Switch
  2. Router
  3. Bridge
  4. Repeater/extender
A
  1. Controls which node data should be sent to in a network rather than all
  2. Converts data into wireless signals
  3. connects two separate networks together
  4. Repeater picks up a signal and amplifies it so that it can go further
28
Q

define:

Network Topology
1. Point to point
2. Star topology
3. Ring

A

It is the logical arrangement of nodes on a network and how they connect to each other.
1. directly connect to each other
2. Nodes are connected to a central server (full mesh vs partial mesh)
3. Nodes are connected to each other in a ring-like pattern

29
Q

Compare:

Full mesh vs Partial mesh

Pros? Cons?

A

Full mesh can completely fail if the central server goes down. It can be fast because it only needs to travel between two nodes. It is more secure because you can monitor what goes into the centre and what comes out. It is limited in size based on how many connections the centre can handle. It can be easier to set up because it just needs to be connected to the centre.

Partial mesh is fault tolerant because each device to connected to each other. Its fast because every device can process data. Its less secure because it can be more difficult to monitor traffic. It can be difficult to set up because all devices need to be able to work together. It can be extended as much as possible since it just needs to connect to different node.

30
Q

Compare:

Wireless vs Wired

A

Wireless Pros
1. no wires
2. mobile
3. less issues with power spikes
cons
1. Less secure
2. data speeds
3. range

Wired pros
1. Fast
2. Reliable
3. More secure
cons
1. ugly wires
2. hard to move
3. expensive

31
Q

IP config cmd line options

A
  1. /all
  2. /displaydns
  3. /flushdns
  4. /registerdns
32
Q

define:

Dynamic DNS

A

the DNS is automatically updated if the IP address behind a certain domain is changed

33
Q

What are:

the records created after resolving a URL?

A

the IP address is cached in the local server so that access is faster next time you try to reach it

34
Q

compare:

Transmission Control Protocol vs User Datagram Protocol

A

TCP breaks the data into ‘packets’ with headers attached so that it can be reassembled at the other point. TCP also supports error checking to see if there’s any corruption while in transit.
UDP on the other hand, is much faster than TCP but does not support reordering or error checking

TCP is connection oriented, reliable and guarenteed while UDP is connectionless, faster but not guaranteed

35
Q

Define:

DHCP

A

Dynamic Host Configuration Protocol.
it is a software that automatically assigns a IP address to your device.

36
Q

explain:

What is a firewall, and how is a ‘DMZ’ related to it?

A

Firewall is a software/hardware that allows you to monitor traffic going in or out and block unauthorized activity. DMZ is the zone between the firewall and the unfiltered internet.

37
Q

define:

NAT

A

Network Address Translation.
This translates our private IP into public IP. This is needed because public IP addresses have all been used up.