Module 7 - The Windows Operating System Flashcards

(256 cards)

1
Q

Which operating system enabled early computers to read from and write to floppy and hard disks?

A

The DOS (Disk Operating System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which operating system did Microsoft acquire and further develop into a product widely used in early PCs?

A

MS-DOS (Disk Operating system)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which DOS command displays all files in the current directory?

A

dir

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which DOS command changes to a specified directory?

A

cd (directory_name)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What DOS command changes to the parent directory above the current one?

A

cd ..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What command in MS-DOS copies files from one location to another?

A

copy (source) (destination)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which command returns the user to the root directory?

A

cd\

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which MS-DOS command deletes one or more specified files?

A

del filename

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which command searches for specific text within files in MS-DOS?

A

find

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which command renames an existing file in MS-DOS?

A

ren (oldname) (newname)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What command is used to create a new directory in MS-DOS?

A

mkdir (directory_name)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which command in MS-DOS lists all available commands with brief descriptions?

A

help

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which operating system layer controlled hardware even after the release of Windows 1.0?

A

MS-DOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What command provides detailed assistance on a specific command in MS-DOS?

A

help (command)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What Windows version first introduced a GUI that ran over MS-DOS and when was it introduced?

A

Microsoft Windows 1.0 released in 1985

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What distinguishes Windows NT from MS-DOS in terms of multitasking?

A

Windows NT can support multiple user processes and MS-DOS is a single user and single process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the underlying architecture of modern Windows operating systems like Windows 10?

A

Runs on Windows NT (New Technologies)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What kind of storage first required DOS for file access and management?

A

A floppy disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which key feature made NT-based Windows versions attractive to both the public and businesses?

A

Filesystem Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which version of Windows first introduced a 64-bit edition with a new architecture?

A

Windows XP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the theoretical memory capacity of a 64-bit Windows operating system?

A

Theoretically 16.8 million terabytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the approximate memory limit for 32-bit Windows due to its address space?

A

Just under 4GB of RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which Windows version was offered with six different editions, targeting a range of users and price points?

A

Windows 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which bar runs along the bottom of the Windows Desktop and is divided into the Start menu, quick launch icons, and the notification area?

A

The Taskbar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Which version of Windows offered up to five different editions?
Windows 8
26
Which version of Windows came with as many as eight editions?
Windows 10
27
What feature appears when you right-click on an icon or item in Windows and offers commonly used functions like copy, delete, or print?
The Context Menu
28
What feature of the Windows Desktop temporarily stores deleted files until the user chooses to permanently remove or restore them?
The Recycle Bin
29
Which Windows OS was declared the "last version" according to Microsoft?
Windows 10
30
Which component of the Windows interface serves as the main customizable area where users can store files, folders, shortcuts, and application icons?
The Desktop
31
Which part of the Task Bar allows users to place icons that quickly launch specific programs or open folders?
The Quick Launch area located in the center of the taskbar
32
Which section of the Task Bar gives users access to installed programs, configuration settings, and search functionality?
The Start menu located on the left
33
Which Task Bar section displays icons that inform the user of system and program status, such as email alerts or network issues?
The notification area on the right
34
Which built-in Windows tool provides malware protection and should not be turned off to avoid increased system vulnerability?
Windows Defender
35
Which file management tool in Windows is used to open folders and manipulate files through a GUI?
The Windows File Explorer
36
Which security method protects data from being easily gathered or exploited, especially on mobile devices?
Encryption
37
Which type of Windows setting defines how a system defends itself and must be configured and followed carefully?
Security Policy
38
Which Windows component limits communication with network devices by default but must be reviewed periodically for outdated rules?
Windows Firewall
39
Which software layer isolates the kernel from hardware differences during Windows installation and handles communication between them?
The HAL (Hardware Abstraction Layer)
40
What is the core part of the operating system that manages input/output requests, memory, and peripherals?
The Kernel
41
Which layer communicates with both hardware and the kernel but still relies on the kernel for some functions?
The HAL (Hardware Abstraction Layer)
42
What is defined as being a translator between the hardware and the kernel?
The HAL (Hardware Abstraction Layer)
43
Which CPU mode allows unrestricted access to hardware and memory, making it suitable for critical OS functions?
The kernel mode
44
Which CPU mode is used by standard user applications and restricts direct access to hardware and memory?
User mode
45
Which software components allow the OS to communicate with hardware and can run in either kernel or user mode?
Device Drivers
46
What does the kernel assign to each user-mode application to keep it isolated and secure?
A restricted address space and a dedicated process
47
Which part of the system gives each user-mode application its own isolated process for memory safety?
The kernel
48
Which file system is most commonly used during Windows installation and supports security features, large files, and recovery?
NTFS (New Technology File System)
49
Which NTFS structure tracks all files and directories along with security and timestamp data?
MFT (Master File Table)
50
Which file system is used on macOS computers and supports long filenames, large files, and partitions, but requires special software for Windows to read it?
HFS+ (Hierarchical File System Plus)
51
Which Linux file system is not natively supported by Windows but can be read using special software?
EXT (Extended File System)
52
Which file system is used by default on many flash drives and is supported by most operating systems due to its simplicity?
exFAT
53
Which version of FAT is most commonly used due to having fewer restrictions than its predecessor?
FAT32 (File Allocation Table 32)
54
What are FAT16 and FAT32 considered less suitable for, due to limitations in partition and file size?
FAT16 and FAT32 are considered less suitable for HDs (Hard Drives) and SSDs (Solid State Drives).
55
Which feature of NTFS allows data access control down to the file level?
Security Descriptors
56
Which timestamps tracked by NTFS are often used in digital forensics?
MACE (Modify Access Create Entry)timestamps
57
What must be done to a storage device before a file system can be applied to it?
It must be partitioned
58
Which part of an NTFS-formatted disk contains the location of the Master File Table?
The Partition Boot Sector
59
Which NTFS area is where files and directories are actually stored?
File Area
60
What are the last 16 sectors of a drive used for in NTFS formatting?
They contain a copy of the boot sector
61
Which hidden NTFS components store information about other volumes and file attributes?
System Files
62
Which Windows feature allows each user to have a personalized background and color scheme?
The Desktop customization system.
63
Which default macOS behavior applies to NTFS partitions without special drivers installed?
Read only Access
64
What is defined as the component of a file in the NTFS file system?
An attribute
65
Which attribute is the NTFS attribute where the actual file contents (the data you create or edit) are stored?
The data attribute ($DATA)
66
What do we call the section of data within the $DATA attribute?
A data stream
67
What do we call the second (or third, etc.) hidden stream of data that is attached to a file in NTFS, but not visible when you open or browse the file normally?
An ADS (Alternate Data Stream)
68
Which NTFS attribute holds the actual contents of a file in the form of a data stream?
The $DATA attribute
69
What is the name of the NTFS feature that allows hidden additional data to be attached to files without changing their size or visibility?
DS (Alternate Data Streams)
70
How is an Alternate Data Stream represented in an NTFS filename?
With a colon (eg Testfile.txt:ADS.)
71
Which command can be used to insert data into an ADS for a file named Testfile.txt?
echo "Alternate data" > Testfile.txt:ADS
72
What is the reason ADS content is not visible in standard dir command output?
Because ADSs are hidden from normal file listings.
73
Which switch must be used with the dir command to reveal Alternate Data Streams?
The /r switch.
74
Which firmware was designed to replace BIOS and offers more security and visibility into the boot process?
Unified Extensible Firmware Interface (UEFI).
75
What is the BIOS initialization phase responsible for during the boot process?
Initializing hardware and performing POST (Power-On Self-Test).
76
In BIOS systems, which structure is located after POST to find and load the OS?
The MBR (Master Boot Record).
77
Where are .efi files stored in a UEFI-based system to assist with booting?
They are stored in the ESP (EFI System Partition)
78
Why is UEFI considered more secure than BIOS at boot time?
UEFI stores boot code in firmware and starts in protected mode
79
Which file is responsible for switching the system from real mode to protected mode during Windows startup?
Bootmgr.exe
80
What key function does Bootmgr.exe perform after initiating protected mode?
After initiating protected mode, Bootmgr.exe reads the BCD (Boot Configuration Database)
81
What does the Boot Configuration Database (BCD) contain?
BCD (Boot Configuration Database) contains additional boot code and information about cold start or hibernation.
82
Which file continues the boot process if the computer is resuming from hibernation?
Winresume.exe
83
What file stores the system state needed to resume from hibernation?
Hiberfil.sys
84
Which executable is launched by Bootmgr.exe if the system is performing a cold start?
Winload.exe
85
Which Windows boot component creates a hardware configuration record in the registry?
Winload.exe
86
Which Windows boot file ensures drivers are digitally signed before loading?
Winload.exe using KMCS (Kernel Mode Code Signing)n
87
What is the purpose of Kernel Mode Code Signing (KMCS) during the Windows boot process?
The KMCS (Kernel Mode Code Signing) ensures all drivers are digitally signed and safe to load.
88
Which file is launched to start the Windows kernel after driver checks are completed?
Ntoskrnl.exe
89
What does Ntoskrnl.exe do as part of the boot process?
Ntoskrnl.exe loads the Windows kernel and sets up the HAL (Hardware Abstraction Layer)
90
Which subsystem reads the registry and prepares the user's desktop during login?
The SMSS (Session Manager Subsystem)
91
Which service is started by SMSS to manage user logon?
The Winlogon service
92
What does the Session Manager Subsystem (SMSS) use to configure the user environment?
The Windows Registry
93
Which data structure records all hardware, software, and configuration options on a Windows system?
The Registry
94
What is one key difference between BIOS and UEFI in terms of how they begin the boot process?
BIOS loads the MBR while the UEFI runs a .efi files from the ESP (EFI System Partition)
95
Which older type of computer firmware dates back to the early 1980s and struggles to support newer features?
BIOS (Basic Input/Output System)
96
Which modern firmware was designed to replace BIOS and better support new computer features?
UEFI (Unified Extensible Firmware Interface)
97
Which Windows registry key stores configuration information for all users and services that start at every boot?
HKEY_LOCAL_MACHINE
98
Which registry key stores user-specific settings, including services that only start when that user logs in?
HKEY_CURRENT_USER
99
Which registry item launches services at every Windows startup, regardless of which user is logged in?
HKEY_LOCAL_MACHINE
100
Which command-line tool should be used instead of manually editing registry startup entries?
Msconfig.exe
101
What is the main purpose of the Msconfig tool in Windows?
Viewing and changing startup options safely
102
Which tab in the System Configuration tool allows selection between Normal, Diagnostic, and Selective startup modes?
The Geeneral tab
103
What does the "Normal" startup mode in Msconfig do?
Loads all drivers and services during startup
104
What startup mode in Msconfig loads only basic drivers and services, useful for troubleshooting?
Diagnostic Startup Mode
105
Which Msconfig startup type allows the user to pick and choose which items load on boot?
Selective Startup
106
Which Msconfig tab allows the user to select which installed operating system to boot and offers Safe Boot options?
The Boot tab
107
Which tab in the System Configuration tool lists all services and allows the user to control whether they launch at startup?
The Services Tab
107
Which Msconfig tab opens the Task Manager to manage startup applications?
The Startup Tab
107
Where in Msconfig can Safe Boot be enabled for troubleshooting startup issues? (which tab)
Under the Boot tab
108
What must be launched from the Startup tab to enable or disable startup applications in recent versions of Windows?
Task Manager
109
Which Msconfig tab gives access to several commonly used Windows tools like Event Viewer or Command Prompt?
The Tools Tab
110
Which three methods can be used to initiate shutdown in Windows?
Start menu power options, shutdown CL command, Ctrl+Alt+Delete followed by clicking the power on.
110
What does Windows shut down after user mode applications during a proper shutdown?
Kernel mode processes
110
Which type of applications are closed first during the Windows shutdown process?
User mode applications
111
What do we call A unit within a process that the processor executes?
A thread
111
What do we call A currently executing program or application?
A process
111
What do we call Background programs that support the OS and applications?
Services
111
Which component in a Windows system performs calculations on threads?
The processor (CPU)
112
Why can threads within the same process share memory but not access other processes' memory?
Each process has its own address space to prevent corruption of other processes
112
What allows multiple threads to be executed simultaneously in Windows? (2)
Windows Multitasking and the number of processors available
113
What does a computer use to store instructions before the CPU processes them?
RAM (Random Access Memory)
113
What must every process contain at least one of?
A thread
113
How much virtual address space can each process access in a 64-bit Windows system?
Up to 8 terabytes
114
Which program types in Windows often start automatically with the OS and may also run manually?
Services
115
In Virtual memory, what translates virtual addresses into physical memory addresses?
A page table
115
How much virtual address space is available per process in 32-bit Windows systems?
Up to 4 Gigabytes
115
What defines the range of virtual addresses a process can use, which are translated into physical addresses via a page table?
A Virtual Address Space
115
What must a user space process use to access kernel resources in Windows?
A process handle
116
What stores Information about hardware, applications, users, system settings, and their interactions?
The Windows Registry
116
What is the maximum depth allowed for a registry key hierarchy?
512 levels deep
116
What do we call the system for linking/embedding one app’s data into another?
OLE (Object linking and Embedding).
116
Which tool from the Sysinternals Suite that shows how Windows allocates memory to the kernel, drivers, processes, and applications?
RAMMap
116
Which hive holds OLE-related information for embedding objects across applications?
HKEY_CLASSES_ROOT (HKCR)
116
Which Hive contains Information about the currently logged-in user?
HKEY_CURRENT_USER (HKCU)
116
Which hive contains Information about all user accounts on the system?
HKEY_USERS (HKU)
116
Can new registry hives be created in Windows?
No, only keys and values within existing hives can be created
116
What kind of data does a REG_BINARY value contain?
Numbers or Boolean values in binary format
117
Which hive contains System-related information?
HKEY_LOCAL_MACHINE (HKLM)
117
Which tool is used to edit the Windows Registry manually?
Regedit.exe
117
Which hive stores information about the current hardware profile?
HKEY_CURRENT_CONFIG (HKCC)
117
What comes directly beneath hives in the Windows Registry structure?
Keys
117
What symbol is used to represent hierarchy in registry paths?
backslash \
117
What is the top level of the Windows Registry hierarchy called?
A hive
117
Which registry value type is used for raw data or numbers greater than 32 bits?
REG_DWORD
118
What are keys within the Windows Registry allowed to contain?
Subkeys or values
118
Which part of the registry should be checked during security audits or malware removal?
Application startup locations
118
In the registry structure what stores The actual data associated with a key?
Registry values
119
What type of data is stored in a REG_SZ value?
String values
119
Which Windows option allows you to execute a file with elevated privileges by right-clicking it and choosing a specific menu item?
Run as administrator
120
Which account type is discouraged for regular use because any program it runs inherits full access rights?
An admin account
120
What term describes a user account created during initial Windows setup that stores personal settings and access permissions?
A local user account
121
Which two accounts are disabled by default on a new Windows installation?
The Admin account and guest account
121
Which Windows feature allows multiple users to share the same permissions and access levels by grouping them together?
User Groups
121
Which Windows group allows its members to collect and schedule performance data logs locally or remotely?
Performance log users group
122
What control panel applet is used to manage local users and groups in Windows?
lusrmgr.esc
123
What term describes a network configuration where users, groups, and computers are managed centrally through a database?
A domain
123
What is the name of the servers that authenticate users and apply security policies in a Windows domain?
DCs (Domain Controllers)
123
What must every user and computer in a Windows domain do before accessing network resources?
They must authenticate against a DC (Domain Controller)
124
What type of files can be created in the Windows CLI to execute multiple commands in succession?
Batch files
124
In the Windows CLI, what does the prompt display?
The current location within the filesystem
124
How are storage devices referenced in the Windows CLI?
With a drive letter, colons and backslash (C:\)
125
How are directories and files separated in Windows CLI paths?
By a backslash \
126
Which symbol is used in the Windows CLI to separate a command from its optional switches?
A forward slash /
126
Which key can be used in the Windows CLI to auto-complete commands when directories or files are referenced?
The Tab key
127
What command is used to switch between storage devices in the Windows CLI?
The drive letter followed by a colon (C:)
127
What environment in Windows allows for the automation of tasks and scripting beyond the capabilities of the regular CLI?
Windows PowerShell
127
Which type of PowerShell command performs an action and returns an output or object to the next command?
A cmdlet
127
Which type of PowerShell command is saved in a file with a .ps1 extension and contains executable PowerShell commands?
A PowerShell Script
128
Which PowerShell feature allows users to define reusable pieces of code that can be referenced in scripts?
A PowerShell function
128
What is the file extension for PowerShell scripts?
.ps1
128
Which PowerShell command displays basic help for a command?
get-help PS command
128
Which PowerShell command provides the most detailed help for a command, including examples?
get-help PS command [-full]
128
Which PowerShell help command displays basic help for a command along with examples?
get-help PS command [-examples]
128
Which PowerShell help command displays detailed help for a command with examples?
get-help PS command [-detailed]
129
Which Windows feature is used to manage remote systems, retrieve hardware/software statistics, and monitor remote computer health?
WMI (Windows Management Instrumentation)
129
Which tool would you open in the Control Panel to access WMI settings through the Computer Management window?
WMI Control (Windows Management Instrumentation) control
129
Which WMI Control Properties tab provides summary details about the local computer and WMI?
The General tab
129
Which WMI Control Properties tab allows manual backup of statistics gathered by WMI?
The Backup/Restore tab
129
Which WMI Control Properties tab is used to configure who can access various WMI statistics?
Security tab
129
Which command provides access to many administrative subcommands in Windows and supports switches for tailored output?
The net command
130
Which Windows command should you use at the command prompt to see all available net subcommands?
net help
130
Which command allows you to view detailed help on a specific net subcommand?
net help [subcommand]
131
Which net command is used to set password and logon requirements for user accounts?
net account
131
Which net command lists or disconnects active sessions between the local computer and others on the network?
net session
132
Which net command allows you to create, remove, or manage shared folders or other network resources?
net share
133
Which net command is used to start a network service or display all currently running network services?
net start
134
Which net command is used to stop a network service that is currently running?
net stop
134
Which net command lets you connect to, disconnect from, or view shared network resources such as shared drives or printers?
net use
135
Which type of command is designed for the maintenance and administration of the Windows OS and works with subcommands and switches?
The net command
135
Which net command displays a list of computers and devices available on the network?
net view
136
Which two Windows tools help administrators monitor running applications, services, and processes and investigate issues such as malware or performance problems?
Task manager and Resource Monitor
136
Which Task Manager tab lists all currently running programs and processes and shows their individual CPU, memory, disk, and network usage?
Processes tab -{used to identify performance-heavy or stalled processes.}
136
Which Task Manager tab displays an overview of the system’s CPU, memory, disk, and network performance?
Performance tab
136
Which tab in Task Manager shows how much CPU, memory, and other resources applications have used over time?
App History tab
136
Which tab in Task Manager lists programs and services configured to launch at system startup?
Startup tab
137
Which Task Manager tab displays all users currently logged on and the resources their applications are using?
Users tab
137
Which Task Manager tab provides deeper process management, such as setting priority or CPU affinity?
Details tab
137
Which Windows tool offers more detailed insights into resource usage than Task Manager and is especially helpful for diagnosing erratic system behavior?
The Resource Manager
138
Which feature in the Details tab lets you assign a specific core or CPU for a process to run on?
CPU Affinity -{which restricts a process to a chosen CPU core(s)}
138
Which detail is shown alongside each service in the Services tab, helping identify which process it belongs to?
A PID (Process ID)
138
Which tab shows all the services loaded on the system, including their process ID and current status?
Services tab
139
Which tab in Resource Monitor shows general system usage and filters all other tabs to display only a selected process's statistics?
Overview tab
139
Which Resource Monitor tab displays the PID, thread count, average CPU usage, and the specific CPU used by each process?
CPU tab
140
Which tab in Resource Monitor shows RAM usage by each process and also includes an overview of total RAM usage?
Memory tab
140
Which tab in Resource Monitor would you use to see disk read/write statistics for each process and monitor activity across storage devices?
Disk tab
140
Which information shown in the Network tab is especially useful for identifying unauthorized or suspicious processes?
Current TCP connections and listening ports
140
Which Resource Monitor tab would help identify which processes are currently using the network and which ports are open or listening?
The Network tab
140
Which feature was removed in Windows 10 version 1803 but was previously accessible from the Network and Sharing Center?
The HomeGroup -{allowed file and printer sharing among trusted computers on a network.}
141
Which Resource Monitor tab shows all processes using the network along with data such as TCP connections and remote addresses?
Network tab
141
Which Windows tool is used to verify or create network connections, configure sharing, and access adapter settings?
The Network and Sharing Center
142
Which tool should you search for in Windows to start a remote desktop session?
Remote desktop connection
142
Which step is required to configure a network adapter’s properties such as IPv4 settings?
Right clicking the adapter and choosing Properties
142
Which command can be used to verify that DNS is translating domain names into IP addresses correctly?
nslookup
142
Which command displays active TCP/IP network connections, including port usage and connection status?
netstat
142
Which command-line tool can display and modify the system’s network configuration settings?
netsh.exe -{command-line utility for configuring network parameters.}
142
What command can you type to view all available options for the netsh command-line tool?
netsh /? -{displays a list of all usable switches and subcommands.}
142
What should be selected in the TCP/IPv4 properties dialog if you want the system to receive its IP address via DHCP?
Obtain an IP address automatically
143
Which utility would help you determine whether a certain port is currently open or in use on the system?
netstat
144
In the UNC path \\servername\sharename\file, what does "servername" represent?
The host-system sharing the resource -{can be a DNS name, NetBIOS name, or IP address.}
144
Which command shows the IP address of a domain like cisco.com, verifying DNS resolution functionality?
nslookup cisco.com
144
What is the UNC path element that specifies the actual item being accessed on a remote system?
File -{refers to the specific resource or document within the shared directory.}
144
Which format is used to access a shared network resource in Windows using the path \\servername\sharename\file?
UNC (Universal Naming Convention) format
144
Which protocol, originally developed with IBM's involvement, allows Windows systems to access files and resources on remote hosts?
SMB (Server Message Block) -{used primarily for sharing files over a network.}
145
What does "sharename" indicate in a UNC path?
The root folder in the remote filesystem that is being shared
145
What symbol is used in UNC to indicate a remote path?
Double backslashes \\ -{followed by the server name and share path.}
146
Which type of shares are automatically created by Windows and identified with a dollar sign ($)?
Administrative shares -{such as C$, D$, admin$, and print$.}
147
Which folder is shared as admin$ in Windows administrative shares?
The Windows installation folder
147
When prompted for credentials to access a network share, which system should the credentials belong to?
The remote computer hosting the resources
147
Which Windows feature allows you to remotely log in to another host and interact with it as if local?
RDP (Remote Desktop Protocol)
147
Which security role often uses RDP to access and investigate remote computers during incidents?
A security analyst
148
Why is Remote Desktop Protocol (RDP) considered a target for attackers?
RDP allows full control of individual hosts
148
Which types of systems are especially risky to expose with RDP due to lack of updates?
Legacy systems
149
What type of attack occurs before security patches are available and exploits unknown vulnerabilities?
A Zero-day exploit
149
Which edition of Windows is primarily designed for data centers and enterprise environments rather than desktops or laptops?
Windows Server
149
What security model is recommended to limit RDP exposure and access to internal hosts?
A zero trust model -{enforces strict access control regardless of user location.}
149
Which version of Windows Server marked the beginning of the official Windows Server family?
Windows server 2003 , based Windows NT 5.2
149
What is the Windows version that came before Windows Server 2003 but is considered part of the Windows NT client line?
Windows Server 2000 based on Windows NT 5.0 and treated as a client version.
150
Which command shows all active TCP connections on a Windows host by default?
netstat
150
What full command shows all active connections with associated executables and PIDs?
netstat -abno
150
What Windows tool logs application, security, and system event history?
Event Viewer
151
After identifying a suspicious connection, which tool can be used to terminate the process?
Task manager
151
What are the two main categories of logs in Event Viewer?
Windows logs and Applications and Services logs
152
What policy helps prevent brute-force login attempts?
Account lockout policy
152
Which tool is used to configure security settings on stand-alone Windows computers?
Local Security policy
153
What Windows component allows central security policies for domain-joined computers?
Domain security policy
153
Which built-in Windows tool provides real-time protection against viruses, spyware, and other malware threats, and is enabled by default?
Windows Defender
153
What is defined as A set of objectives that ensures the security of networks, data, and computers?
A security policy
153
Which setting lets you define which applications users or groups can run?
Applocker
153
Which Windows feature checks online for high-priority updates?
Windows Update
154
What do we call A comprehensive update that combines patches and upgrades into one package?
A service pack.
154
What is the general security rule used by firewalls where any packet not explicitly permitted is denied?
Restrictive security policy
154
Which type of software continuously monitors for and attempts to quarantine or delete viruses once detected?
Antivirus protection
154
Which default policy type did earlier hardware/software versions use that permitted access to all ports unless explicitly denied?
Permissive security policy
154
Which type of antimalware software blocks IP addresses of known phishing websites and warns users about suspicious sites?
Phishing protection
155
Which type of malware protection warns users about unsafe programs about to be installed or unsafe websites before visiting them?
Trusted/untrusted source protection
155
Which protection program scans for keyloggers and other tools used to secretly record user activity?
Spyware protection