flashcards3

1
Q

Questions

A

Answers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A computer network that enables users to wirelessly connect to their offices or the Internet via a cellular network. Sometimes referred to as wireless broadband.

A

WWAN (Wireless Wide Area Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Allows you to start up the computer remotely

A

WoL Wake on LAN -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An index level calcuated from signal strength. If it the connection speed is below the RSSI minimum the wireless adapter will drop the signal

A

RSSI (Received Signal Strength Indicator)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Enables network-ready devices to discover each other automatically. Also allows configurations for devices to work with firewalls

A

UPnP (Universal Plug and Play)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Informs you when a program makes a change that requires administrator-level permission, also adjusts the permission level of your user accounts

A

UAC (User Account Control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Part of EUFI, successor to MBR. Windows allows up to 128 partitions at 2TB each. It also has a back up copy for parition entries

A

GPT (GUID Partition Table)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Programming environment that includes features to help you write and edit code as well as debugging tools

A

IDV (Integrated Development Environment)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Runs on on TCP port 3389.

A

RDP (Remote Desktop Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

%%

A

windows batch file escape character

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

%SYSTEMROOT%\System32\drivers\etc\hosts

A

HOSTS file location in Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

%SystemRoot%\System32\Winevt\Logs folder

A

Where are the log files stored?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

(*) 7

A

(*) rwx

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

(*) 0

A

(*) —

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

(*) 1

A

(*) –x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

(*) 2

A

(*) -w-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

(*) 3

A

(*) -wx

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

(*) 4

A

(*) r–

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

(*) 5

A

(*) r-x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

(*) 6

A

(*) rw-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

(Linux)stops a process using its Process ID

A

kill

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

/etc/hosts

A

HOSTS file location in Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
  1. Identify and research malware symptoms
  2. Quarantine infected systems
  3. Disable system restore
  4. Remediate infected systems:
    - update anti-malware software
    - scan and use removal techniques
  5. Schedule scans and run updates
  6. Enable system restore
  7. Educate end user
A

malware removal process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

127.0.0.1

A

IPv4 Loop back address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
512 bytes on a disk
Sector
26
64 bit file system used for large capacity removable hard drives and flash media.
exFAT ( Extended File Allocation Table)
27
A class of enterprise software designed to apply security policies to the use of smartphones and tablets in a business network
MDM (Mobile Device Management )
28
A collection of user accounts that can be assigned permissions in the same way as a single user object
security group
29
A collection of user accounts that can be assigned permissions in the same way as a single user object.
Security Group
30
A command used to view all variables in the shell, except special variables.
set command
31
A command-line version of the Task Manager
tasklist
32
A disk partition designated for swap space in linux.
Swap Partition
33
A disk partition disignated for swap space in linux
Swap Partition
34
a feature of macOS that enables a user to set up one more desktops with different sets of apps and backgrounds
Mission Control
35
A feature of OS X that gives other computers on the network access to the Mac's optical drive. System Preferences -> Sharing
Remote Disc
36
a feature to secure access to shared folders and printers. (exists in windows 7 and 8 but not in later versions of windows 10)
Homegroup
37
A feature within NTFS on Windows systems that supports encrypting individual files or folders for confidentiality.
EFS (Encrypting File System)
38
a file that contains all the contents of an optical disc
ISO File
39
A group of sectors
Cluster
40
A group of sectors
Cluster
41
A limited account used to run services that cannot make system wide changes. Also it can access the network anonymously
Local Service
42
A limited account used to run services that cannot make system wide changes. Also it can access the network anonymously
LocalService
43
A management console snap in for viewing and managing system logs (accessed through computer management, administrative tools, or eventvwr.msc
Event Viewer
44
A management console snap in for viewing and managing system logs (accessed through computer managment, administrative tools, or eventvwr.msc)
Event Viewer
45
A managment console that provides an interface for managing user and group accounts.(not available in Starter or Home editions)
Local Users and Groups
46
A managment console that provides an interface for managing user and group accounts.(not available in Starter or Home editions)
net user dmartin Pa$$w0rd /add /fullname: "David Martin" /Logonpasswordchg:yes
47
A means of applying security settings and other administrative settings across a range of computers and users
GPO (Group Policy Object)
48
A microsoft utility to encrypt a drive
BitLocker
49
A network protocol for secure transfer of data between computers on port 22
SSH (Secure Shell)
50
A new feature of Windows 7 that enables users to rapidly access data from remotely located file and web servers. This enables users at a small branch to cache copies of frequently accessed files from head office servers on a local computer.
BranchCache
51
A number generated by an algorithm from a text string.
hash
52
A partition that contains an image of the bootable partition created when the computer was built.(Restores OS to factory settings)
Factory Recovery Partition
53
A program that appears desirable but actually contains something harmful
Trojan Horse
54
a program that appears desirable but actually contains something harmful
Trojan Horse
55
A search tool in the macOS
Spotlight Search
56
a set of software tools that enable an unauthorized user to gain control of a computer system without being detected.
Rootkits
57
a set of tools designed to gain control of a computer without revealing its prescence
Rootkit
58
A set of tools designed to gain control of a computer without revealing its presence
Rootkit
59
a single key is used to encrypt and decrypt data
symmetric encryption
60
A software program capable of reproducing itself that can spread from one computer to the next over a network
Worm
61
a software program capable of reproducing itself that can spread from one computer to the next over a network
Worm
62
A storage location in the environment of the operating systems command shell.
environment variable
63
a text file editor in linux
vi/vim
64
a text file editor in linux.
vi/vim
65
A type of network attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network
Replay attack
66
A type of network attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.
Replay Attack
67
A utility on macOS that allows a full windows installation to be made on a Mac. Applications ->Utilities folder
Boot Camp
68
A utility that is used to register component services used by an installed application.
regsvr32
69
A vulnerability that is exploited before the software creator/vendor is even aware of its existence.
zero-day exploit
70
A Windows command that is similar to and more powerful than the xcopy command, used to copy files and folders.
robocopy
71
A Windows command to manage hard drives, partitions, and volumes.
diskpart
72
a windows peer-to-peer network
workgroup
73
A Windows process that does not require any sort of user interaction and so runs in the background
service
74
A Windows process that does not require any sort of user interaction and so runs in the background.
Service
75
Aborts command prompt shutdown
shutdown -a
76
aborts command prompt shutdown
shutdown -a
77
Acts as the emulator for allowing 32-bit applications to run seamlessly on a Windows 64-bit OS
WOW64
78
acts as the emulator for allowing 32-bit applications to run seamlessly on a Windows 64-bit OS
WOW64
79
Add dmartin to the Administrators local group
net localgroup Administrators dmartin /add
80
Add or delete a scheduled job in cron
crontab -1
81
Adds missing Windows installations to the BCD
bootrec /rebuildbcd
82
Adds missing Windows installations to the BCD
bootrec /rebuildbcd
83
All data modified since last full backup ( moderate backup time, moderate restore time uses no more than 2 tape sets)
Differential backup
84
All data modified since last full backup(moderate backup time, moderate restore time uses no more than two tape sets)
Differential backup
85
All selected data regardless of when it was previously backed up (high backup, time low restore time uses one tape set)
full backup
86
All user accounts that have been authenticated to access the system
Authenticated Users Group
87
All user accounts that have been authenticated to access the system.
Authenticated Users Group
88
Allow you to collect statistics about resources such as memory, disk, and processor
counter logs
89
Allows administrators to devise policies or profiles defining the minimum security configuration required of devices for network access
NAC (Network Access Control)
90
Allows monitoring of Windows logs. System, security, application, and service events are recorded in these logs
Event Viewer
91
Allows you to view and edit currenty security policy
Local Security Policy
92
Allows you to view cached passwords for websites and Windows/network accounts
Credential Manager
93
An account in which if a process is executed it is unrestricted in terms of making changes to the system configuration and file system (better than administrator account)
LocalSystem account
94
An account that has the same privileges as LocalService but can access the network using the computer's machine account's credentials
NetworkService
95
An applet to set the programs you wish to use, or choosing which application is used to open files of a particular extension
Default Programs
96
An application used to provide detailed diagnostic information about your mac
System Information
97
an attack that convinces the network that the attacker's MAC address is the one associated with an allowed address so that traffic is wrongly sent to the attacker's machine
ARP poisoning
98
An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
Phishing
99
An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
phishing
100
An interface between the user and computer and software.
shell
101
an xml text file that contains all the instructions a Windows Setup program would need to install and configure an OS with out any administrator intervention
answer file
102
App in macOS used to verify or repair a disk or file system
Disk Utility
103
Appears in legacy applications but is deprecated because the rights allocated to this account type can be abused to allow the user Administrative or System privileges
Power Users
104
Appears in legacy applications but is deprecated because the rights allocated to this account type can be abused to allow the user Administrative or System privileges
Power Users
105
Apple equivalent of Alt
Option
106
Apple equivalent of Ctrl button
Command
107
Apple equivalent of file explorer in Windows
Finder
108
Apple equivalent of system restore
Time Machine
109
Apple File System - used in macOS High Sierra or later which supports native file encryption
APFS
110
Apple File System - used in macOS High Sierra or later which supports native file encryption
APFS
111
Apple version of performance monitor
Activity Monitor
112
Applies a new or changed policy to a computer immediately
gpupdate
113
Assigns a port dynamically from an ephemoral range
Remote Assistance
114
attempts to discover the password from the hash using databases of precomputed hashes
Rainbow Table Attack
115
Attempts to fix startup problems.
Bootrec
116
Attempts to fix startup problems.
bootrec
117
attempts to repair MBR
bootrec /fixmbr
118
Authenticates user before committing any resources to RDP session preventing denial of service attacks
NLA (Network Level Authentication)
119
Authentication, Authorization, and Accounting
AAA
120
Background Intelligent Transfer Service - a protocol in which the computer is enabled to browse update.microsoft.com and select updates for download and installation
BITS
121
Bash shell script comment
#
122
Best place to configure your system in Windows 7
Control Panel
123
binary files that store the registry database
hive
124
binary files that store the registry database.
Hive
125
Boot Configuration Data
BCD
126
both 64 bit file systems that suppor journaling but ext 4 delivers better performance
ext3 vs ext4
127
Both 64 bit file systems that support journaling but ext4 delivers better performance
ext3 vs ext4
128
bottom of screen gives one-click access to favorite apps and files in macOS
dock
129
can be used to specify that date within the month(0-31) in cron
dd
130
can collect statistics about services, providing detailed reports about about resource behavior
trace logs
131
Can perform all management tasks and generally has very high access to all files and objects
Administrators
132
Capturing and reading data packets as they move over a network
eavesdropping
133
capturing and reading data packets as they move over a network
Eavesdropping
134
causes a service at a given host to fail or become unavailable to legitimate users
DoS attack (Denial of Service Attack)
135
Causes all policies(new and old to be reapplied)
gpupdate /force
136
Certificate Authority - a third party that vouches for certificates
CA
137
change ownership in linux
chown
138
Change ownership in linux.
chown
139
change permission modifiers in linux
chmod
140
changes the group in linux
chgrp
141
changes the name of drive D to drive E
format D: /v: E
142
Check Disk - checks the integrity of disks and can repair any problems detected
chkdsk
143
check free space and report usage by directories and files
df and du
144
checks partition errors (partition should be unmounted before running this tool)
fsck
145
checks partition errors (partition should be unmounted before running this tool)
fsck
146
clears the command prompt screen
cls
147
clears the command prompt screen.
cls
148
Clears the DNS resolver cache
ipconfig /flushdns
149
Clients - Provides connections to types of file servers such as Linux, Unix, or Windows Protocols - Provide the format for addressing and delivering data messages between systems. Services - Allow your machine to provide network functionality to other machines
Adapter Properties
150
Confidentiality, Integrity, Availability
CIA
151
Configures detailed reports on different system statistics and log performance over time(can be accessed through administrative tools, Computer Management or perfmon.exe command line)
Performance Monitor
152
Contains information about service load failures, hardware conflicts, and driver load failures
System Log
153
Contains information regarding the application errors
Application Log
154
Contains user accounts of any users connected to a computer over the network
Network Group
155
Control connection to databases set up on the local computer
Data Sources
156
control panel -> system properties -> remote settings
Remote Settings location
157
Control Panel --> System Properties --> Remote Settings
Remote Settings Location
158
Control Panel ->System -> Advanced system settings ->System Properties->Remote Settings
remote settings location
159
Data that is used to identify, contact, locate, or impersonate an individual
PII (Personally Identifiable Information)
160
Disables dmartin account
net user dmartin /active:no
161
Disables dmartin account
net user dmartin /active:no
162
Dismounts volume C:
chkdsk C: /x
163
Dismounts volume C:
chkdsk C: /x
164
Displays a log of "system reliability" events
Reliability Monitor
165
Displays all connections and listening ports.
netstat -a
166
displays all files and directories in the current directory
dir *.*
167
displays all files with the DOC extension in the current directory
dir *.doc
168
displays all files with the DOC extension in the current directory.
dir *.doc
169
displays all files with the DOC extension that start with the letters LET
dir Let *.doc
170
displays all files with the DOC extension that start with the letters LET and searches for subdirectories
dir Let *.doc /s
171
displays all files without an extension.
dir *.
172
displays all files without an extension.
dir *.
173
Displays DHCP, DNS server, MAC address, and NetBIOS status
ipconfig /all
174
Displays DHCP, DNS server, MAC address, and NetBIOS status
ipconfig /all
175
Displays DNS resolver cache
ipconfig /displaydns
176
displays linux processes that are currently running
ps
177
displays linux processes that are currently running
ps
178
Displays ports and addresses in numerical format. Skipping name resolution speeds up each query
netstat -n
179
displays the current state of network interfaces within linux
ifconfig/iwconfig
180
Displays the RSoP for a computer and user account /s - specifies a host name by name or IP address /u - specifies a host name by user account /p - specifies a host name by password
gpresult
181
Displays, Storage, Service
apple menu items
182
Distributed denial of service attacks that overwhelm a web server and shut it down
DDoS Attack
183
Distributed denial of service attacks that overwhelm a web server and shut it down
DDoS Attack
184
Do anything with the object, including change its permissions and its owner
Full Control
185
Do anything with the object, including change its permissions and its owner
Full Control
186
Do most things with an object but not to change its permissions or owner
Modify
187
Do most things with an object but not to change its permissions or owner.
Modify
188
Either parameter will generate a detailed explanation of the command in Linux
man/ --help
189
Either parameter will generate a detailed explanation of the command in Linux
man/ --help
190
Enables file compression using NTFS
format D: /fs:NTFS /c
191
Encrypting File System - a windows feature that can encrpyt a folder or a file
EFS
192
Ensures old data on a hard drive is destroyed by writing zereos or a random patter to each location on the drive. Makes disk suitable for re-use
Drive wiping
193
Ensures old data on a hard drive is destroyed by writing zeros or a random patter to each location on the drive. Makes disk suitable for re-use.
Drive Wiping
194
enters the editor
crontab -e
195
enters the linux job schedualing editor
crontab -e
196
Exposes the whole registry configuration using a dialog-based interface(Offers a wider range of settings than Local Security Policy)
Local Group Policy(gpedit.msc)
197
Extended Hierarchical File System - the file system older macOS uses
HFS Plus
198
Files are rearanged into contiguous clusters inproving read performance
Defragmentation
199
Files written in non contiguous clusters reducing read performance
Fragmentation
200
firewall implemented as software on the individual host computer
Host Firewall
201
Fixes file system errors on the disk drive C
chkdsk C: /f
202
fixes problems and makes improvements to the scan software itself
Scan engine/components
203
Forced DHCP client to renew lease it has for an IP address (if AdapterName is omitted it releases or renews ALL adapters on the network)
ipconfig /renew AdapterName
204
Forced DHCP client to renew lease it has for an IP address(if AdapterName is omitted it releases or renews ALL adapters on the network)
ipconfig /renew AdapterName
205
forces the volume to dismount
format D: /fs:NTFS /x
206
formats D drive to an exfat file system
format D: /fs:EXFAT
207
Freeware that works over TCP port 5900 with similary functionality to RDP. Screen Sharing is based on VNC
VNC (Virtual Network Computing)
208
Gnome, KDE, Cinnamon, Xfce
popular linux GUIs
209
Governs the processing of credit card and other bank payments
PCI-DSS (payment card industry data security standard)
210
Group is able to perform most common tasks such as shutdown, running applications, and using printers. They can also change time zone and install printers
Users
211
Group Policy Objects - a windows policy in which a computer remotely installs an application from a network folder without any administrator intervention
GPO
212
Group Policy Snap in
gpedit.msc
213
group policy snap in
gpedit.msc
214
groupadd, groupmod, groupdel
linux group commands
215
Halt or power off the system
shutdown -h
216
halts any child processes
taskkill /t /pid processid
217
In administrative tools. You would use this to configure password and account policies with out going into the registry
Local Security Policy(secpol.msc)
218
in Apple menu or press command+option+esc
Force Quit
219
In OS X, a utility to remotely view and control a Mac and is similar to Remote Assistance in Windows.
Screen Sharing
220
incident response processes, management oversight, security awareness, and training
Procedural controls
221
Information gathering threat in which the attacker attempts to learn about the configuration of the network and security systems
footprinting
222
Information, Warning, Error, Critical, Successful Audit, Failure Audit
Event Types
223
install new application
apt-get install (package name)
224
install new application
apt-get install (package name)
225
installing an new OS that completely replaces the old one
clean install
226
installing on top of an existing version of OS
in-place upgrade
227
Interface for managing a Windows 10 computer
Windows Settings
228
ipconfig /flushdns netsh int ip reset resetlog.txt netsh winsock reset
Network resent in Windows 7/8
229
is a text document containing commands for the operating system. The commands are run in the order they are listed
script file
230
JavaScript
.js
231
legacy file system used for optical disc media
CDFS (compact disc file system)
232
Limited rights such as browsing network and shutdown, but they cannot save changes made to the desktop
Guests
233
Linex shell script
.sh
234
linux command that makes a copy of an input file to an output file
dd
235
linux command that shows the default gateway because ifconfig does not
route
236
linux command used to activate the partition swap space
swapon
237
linux command used to search and filter contents of files displaying the lines that match the search string
grep
238
linux command-line program used to create and manage partitions on a hard disk
fdisk
239
linux command-line program used to format a partition
mkfs
240
linux command-line program used to format a swap partition
mkswap
241
linux file system
ext (Extended File Allocation)
242
Linux shell scrips
.sh
243
linux task scheduler
cron
244
list by date created
dir /t:c
245
list by extension
dir /o:e
246
List by extension
dir/o:e
247
list by last modified
dir /t:w
248
list by last time accessed
dir /t:a
249
lists all switches for the netstat command
netstat /? Or netstat /help
250
lists both wide format and one screen at a time
dir /w/p
251
lists files one screen at a time
dir /p
252
lists files using a wide format with no file details
dir /w
253
lists files using a wide format with no file details.
dir/w
254
Load all device drivers and services
Normal Startup
255
Load basic devices and services only
Diagnostic start up
256
Local Security Policy snap in
secpol.msc
257
located in Administrative Tools, enables you to register new server applications or reconfigure security permissions for existing services
Component Services
258
Located in Control Panel in Windows 7, is a collection of predefined Microsoft Management Consoles
Administrative Tools
259
MacOS version of remote desktop functionality
Screen Sharing
260
Management console with multiple snap-ins to configure local users and groups, disks, services, and devices
Computer Management
261
Medical and insurance records, plus hospital lab results
PHI (Protected Health Information)
262
Microsoft client/server network model that groups computers together for security and to centralize administration
Domain
263
Microsoft peer to peer network model in which computers are grouped together with access to shared resources
Workgroup
264
Microsoft peer to peer network model in which computers are grouped together with access to shared resources
Workgroup
265
Microsoft's Deployment Image Servicing and Management - a tool that reads the contents of a drive and writes the output to a .WIM format file.
DISM
266
Microsoft's Deployment Image Servicing and Management - a tool that reads the contents of a drive and writes the output to a .WIM format file.
DISM
267
Microsoft's System Preparation Tool - a utility to be run before imaging a disk to solve possible configuration problems
Sysprep
268
Modify permission is required for the destination folder. All permissions and NTFS attributes(such as encryption) are lost, FAT does not support permissions or special attributes
Moving files and folders to a FAT or FAT32 partition
269
New files and files modified since last backup(low backup time, high restore time uses multiple tape sets)
Incremental backup
270
New Technology File System - proprietary file system used exclusively in Windows
NTFS
271
Not the apple equivalent of the Ctrl button
Control
272
On NTFS volumes only skips part of the checking process
chkdsk C: /i /c
273
opens a Remote Desktop connection from command line
mstsc
274
Opens device manager from runline
devmgmt.msc
275
Opens device manager from runline
Devmgmt.msc
276
Opens disk management console from runline
Diskmgmt.msc
277
Opens the Computer Management console from runline
compmgmt.msc
278
Opens the Computer Management console from runline.
compmgmt.msc
279
Opens the Run dialog box
Win Key + R
280
Order by date
dir /o:d
281
Order by size
dir /o:s
282
overloading a switch's MAC cache preventing genuine devices from connecting and forcing the switch into "hub" or "flooding" mode
MAC flooding
283
performs a quick format that doesn't scan for boot sectors
format D: /fs:EXFAT /q
284
port 23
Telnet
285
Port-based network access control - means that the switch or router performs authentication of the attached device before activating the port
PNAC
286
Port-based network access control - means that the switch or router performs authentification of the attached device before activating the port
PNAC
287
PowerShell
.ps1
288
Pre-Shared Key - 256 bit cryptographic hash generated from a passphrase. This authentication method is suitable for SOHO networks
PSK
289
prevents anyone but the user from viewing the screen
privacy screen
290
privacy laws, policies, and clauses
legal and regulatory or compliance controls
291
Process ID used to specify a process to kill
taskkill /pid
292
Process ID used to specify a process to kill
taskkill /pid
293
process of optimizing RAM storage by borrowing hard drive space
virtual memory
294
Program Files
64 bit application files location
295
Program Files(x86)
32 bit application files location
296
Provide a way of dividing up a domain into different administrative realms
OU (Organizational Unit)
297
Provides information about hardware resources, components, and the software environment. Also known as System Information.
msinfo32.exe
298
Provides remotely accessible database for storing, operating system, device, and software application configuration information
Windows Registry
299
Python
.py
300
Python comments
#
301
Python file extension
.py
302
Queries a dns server about a host
nslookup -Option Host Server
303
Queries a DNS server about a host.
nslookup ?option host server
304
quits a running program in command prompt
Control + C
305
R- read only, H - Hidden, S - System, cannot be deleted A- Archive, modified since last backup
File Attributes
306
Read a file and change it, or create a file within a folder, but not to delete it
Write
307
Reboot 10 minutes from now
shutdown now, +10
308
Reboot after shutdown
shutdown -r
309
Records events generated during installation
Setup
310
redhat/CentOS, SUSE, Debian/Ubuntu, Knoppix
popular linux distros
311
refresh the local database with information about the packages available from the repository
apt-get update
312
Release the IP address obtained from a DHCP server so the network adapter will no longer have an IP address
ipconfig /release AdapterName
313
Remote Authentication Dial-In User Service - a type of authentication suitable for server and domain based networks
RADIUS
314
Removes a directory and its contents recursively
rm -r
315
Removes job from a scheduled list in cron
crontab -r
316
Renames a file or directory
ren
317
Reroutes request for legitimate websites to false websites
Pharming
318
Reroutes requests for legitimate websites to false websites
pharming
319
Resolves address to hostnames
ping -a IPAddress
320
Resolves address to hostnames
ping -a Ipaddress
321
restricts OS installation to trusted software
secure boot
322
Resultant Set of Policies
RSoP
323
Rules applied by packet filter firewalls that filter data by IP address, Protocol ID, and Port Numbers
ACL (Access control list)
324
runline command for system restore
rstrui
325
runs a scan immediately
sfc /scannow
326
saves current session to memory and put the computer into a minimal power state
Sleep/Standby Mode
327
Saves the current session to disk before powering off the computer
Hibernate mode
328
saves the current session to disk before powering off the computer
Hibernate Mode
329
Saves the current session to memory and put the computer into minimal power state
Standby/Sleep Mode
330
scans and attempts to recover bad sectors on drive C
chkdsk C: /r
331
schedules a scan when the computer is next restarted
sfc /scanonce
332
schedules scans whenever the PC boots
sfc /scanboot
333
Security Accounts Manager - where the local accounts are stored
SAM
334
services that work in the device firmware that prevents restores or the disabling of location services
Activation Lock/Device Protection
335
Set properties and monitor local printers and manage print sharing on a network
Print Management
336
Sets radio power level, typically set to the highest level by default
Transmit Power
337
Sets radio power level, typically set to the highest level by default.
Transmit Power
338
sets the day of the week in cron in either numerical or text format
weekday
339
Settings->Network&Internet->Status
Network reset in Windows 10
340
Shows a list of services within each process
tasklist /svc
341
shows a list of services within each process
tasklist /svc
342
shows an enhanced version of the sort of snapshot monitoring provided by task manager
Resource Monitor
343
shows an enhanced version of the sort of snapshot monitoring provided by task manager
Resource Monitor
344
Shows the process that has opened the port
netstat -b
345
shows the properties of the dmartin account
net user dmartin
346
shows you the programs, processes, and services that are currently running on your computer (Ctrl + Alt + Del)
Task Manager
347
Shredding, Incineration, Degaussing
Three most effective types of physical data destruction?
348
Shutdown at 5:30
shutdown 17:30
349
Shuts the computer down in 30 seconds
shutdown -t30
350
shuts the computer down in 30 seconds
shutdown -t 30
351
specifies minutes past the hour in cron(0-59)
mm
352
Specifies minutes past the hour in cron, the linux job scheduler. (0-59)
mm
353
specifies the hour in cron(0-23)
hh
354
specifies the month in numerical or text format in cron
MM
355
specifies the month in numerical or text format in cron
MM
356
specifies the size of allocation units
format D: /a:512
357
specify image name to kill
taskkill /im
358
Start, stop, and pause services
Services
359
System File Checker - a utility that provides a manual interface for verifying system files and restoring them from cache if they are corrupt or damaged
sfc
360
System for which vendors have dropped all support for security updates due to the system's age.
End-of-life System
361
System Preferences -> Trackpad
to adjust settings of an apple track pad
362
System Preferences ->users and groups
adding a new account in MacOS
363
Tab in system properties that provides option for system restore
System Protection Tab
364
tab in system properties that provides option for system restore
system protection tab
365
template containing the OS and required software
Image
366
terminates process without any user notification
taskkill /f /pid processid
367
tests whether or not a system is responsive
Windows + Ctrl + Shift + B
368
The account that created or "owns" an object, usually a user account.
Creator Owner Group
369
The active partition of the hard drive containing the boot record and the specific files required to start the Windows launch.
System Partition
370
the capability for choosing between two or more operating systems to boot from when a computer is turned on. A separate partition is required for each operating system.
Multiboot
371
the command or script to run along with the full path to the file
command
372
The database that contains the users, groups, and computer accounts in a Windows Server Domain
Active Directory
373
The database that contains the users, groups, and computer accounts in a Windows Server Domain
Active Directory
374
The hard drive partition where the Windows OS is stored. The system partition and the boot partition may be different partitions.
Boot Partition
375
The hard drive partition where the Windows OS is stored. The system partition and the boot partition my be different partitions
boot partition
376
The highest level of classification
Top Secret
377
The host cannot route a reply back to your computer
No reply (request timed out)
378
The info is too valuable to permit any risk of its capture. Viewing is severely restricted
Secret
379
the information is highly sensative, for viewing only by approved persons within the organization
confidential
380
The process of managing information over its life cycle
ICM (Information Content Management)
381
The software component that provides the core set of operating system functions
kernel
382
the standard that defines a Port-based Network Access Control mechanism
802.1x
383
The time it takes for a signal to reach the recipient
latency
384
There is no routing information
Destination Unreachable
385
These attack the boot sector, partition table and file system
boot sector virus
386
These attack the boot sector, partition table, and file system
boot sector virus
387
This group contains the user account of the person currently working at the computer
Interactive Group
388
This log holds the audit data for the system
Security Log
389
Time it takes for a signal to reach the recipient
Latency
390
To adjust settings of an Apple trackpad
System Preferences --> Trackpad
391
to attempt repair of the boot sector
bootrec /fixboot
392
to attempt repair of the boot sector
bootrec /fixboot
393
tool to copy code to make the partition bootable
bootsect
394
tool to setup partitions on a hard drive. Sets up active partition
Diskpart
395
tool to test the memory chips for errors
WIndows Memory Diagnostic
396
Tool to test the memory chips for errors
Windows Memory Diagnostics
397
tools used to gather information about the way a network is built and configured
network mapping
398
Under this protocol Authentication, Authorization, and Accounting are performed by a seperate server
RADIUS (Remote Authentication Dial-In User Service)
399
Updated file system for optical media with support for multi-session writing
UDF (Universal Disk Format)
400
used in public key encryption, it is scheme in which the key to encrypt data is different from the key to decrypt.(uses an RSA cipher)
asymmetric encryption
401
Used in public key encryption, its is scheme in which the key to encrypt the data is different from the key to decrypt ( uses an RSA cipher)
Asymmetric Encryption
402
Used to modify settings and files that effect the affect the way the computer boots in windows
System Configuration Utility(msconfig)
403
Used to mount storage devices into a local file system in linux
NFS (Network File System)
404
user authentication login, firewalls, anti-virus software
Logical controls
405
user group others
ugo
406
Useradd, Usermod, Userdel
Linux User commands
407
useradd, usermod, userdel
linux user commands
408
utility that allows you to copy the contents of more than one directory at a time and retain the directory structure
xcopy
409
variation in delay
jitter
410
VBScript
.vbs
411
view and change environment variables
printenv or env command
412
View the contents of a file or folder or start a program
Read/List/Execute
413
View the performance of the local computer
Reliability and Performance Monitoring
414
viewing is restricted to the owner organization or to third parties under a Non-disclosure Agreement
classified
415
virtual file system for linux
VFAT (virtual file allocation table)
416
virtual memory monitor - manages the memmory mappings and assignments
VMM
417
Virus that takes advantage of the macro programming languages built into some software.(affect an Office Document)
Macro viruses
418
Wake on Wireless LAN
WoWLAN
419
When a new harddisk leaves the manufacturer, creates cylinders, tracks and sectors on the platters
Low Level Format
420
When a new harddisl leaves the manufacturer, creates cylinders, tracks and sectors on the platters
Low-level format
421
Where are the log files stored?
%SystemRoot%\System32\Winevt\Logs folder
422
Windows batch file
.bat
423
Windows group that includes all users
Everyone Group
424
Windows Logo'd Product List- catalog of tested devices and drivers
LPL
425
Windows Server Update Service - a program on a server that allows the network admin to approve updates for certain groups
WSUS
426
Windows Server Update Services - a program on a server that allows the network administrator to approve updates for certain groups
WSUS
427
Write permission is required for the destination folder and Modify for the source folder. NTFS permissions are inherited from the destination folder and the user becomes the Creator/Owner
Moving files and folders to a different NTFS volume
428
Write permission is required for the destination folder and Modify for the source folder. NTFS permissions are retained
Moving files and folders on the same NTFS volume
429
Write permission is required for the destination folder and Modify for the source folder. NTFS permissions are retained.
Moving files and folders on the same NTFS volume
430
Write permission is required for the destination folder and Read for the source folder. NTFS permissions are inherited from the destination folder and the user becomes the creator
Copying files and folders on the same NTFS volume or different volume
431
Write permission is required for the destination folder and read for the source folder. NTFS permissions are inherited from the destination folder and the user becomes the Creator/Owner
Copying files and folders on the same NTFS volume or different volumes