Practice 2 Copy Flashcards

1
Q

A _________ attack uses a list of common passwords to crack a user’s password

A

Dictionary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A _____________ attack combines a dictionary list with the ability to add brute-force combinations to crack a password that is slightly different than the dictionary list entry combines a dictionary list with the ability to add brute-force combinations to crack a password that is slightly different than the dictionary list entry

A

Hybrid Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A tool for speeding up attacks against Windows passwords by precomputing possible hashes. is Used to authenticate users by comparing the hash value of the entered password against the one stored in the rainbow table. makes password cracking a lot faster and easier for an attacker

A

Rainbow Table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A contactless card that usually utilizes RFID to communicate with the reader on a physical access system

A

Proximity Card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A computer algorithm that generates a one-time password that uses the current time as a source of uniqueness

A

Time-Based One-Time Password (TOTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

TOTP

A

Time-Based One-Time Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a portion of the hard disk formatted with a minimal kind of file system and used in situations when the operating system runs out of physical memory and needs more of it

A

Swap Partition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An attack that happens once that flaw, or software/hardware vulnerability, is exploited, and attackers release malware before a developer has an opportunity to create a patch to fix the vulnerability

A

Zero-Day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Do all editions of Windows 11 only support x64 (64-bit) processors?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An extended over-voltage event is known as a ___________. An increase in the electric current.

A

Power Surge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A very short pulse of energy on a power line.

A

Power Spike

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A total loss of power in a particular area

A

Power Loss/Failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

GPO

A

Group Policy Object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SOP

A

Standard Operating Procedure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An inflexible, step-by-step listing of the actions that must be completed for any given task

A

Standard Operating Procedure (SOP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

MSDS

A

Material Safety Data Sheet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A document that contains information on the potential hazard (health, fire, etc.) and how to work safety with the chemical product.

A

Material Safety Data Sheet (MSDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What defines how a change or installation will occur?

A

Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What provides the risk levels of carrying out a change, or not performing the requested change?

A

Risk Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What defines the area, number, size, or scale of a particular change?

A

Scope

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Windows 10 Enterprise and Windows 10 Pro for Workstations supports how many physical CPUs and how much ram max?

A

4 physical CPUs
6 TB RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Windows 10 Pro and Windows 10 Education supports how many physical CPUs and how much RAM max?

A

2 physical CPUs
2 TB RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Windows 10 Home only supports how many physical CPUs and how much RAM max?

A

1 CPU
128 GB RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the minimum Hz requirement to run a virtual machine in Windows 10 64-bit?

A

1 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is the minimum RAM requirement to run a virtual machine in Windows 10 64-bit?
2 GB
26
What is the minimum hard drive space required to run a virtual machine in Windows 10 64-bit?
20 GB
27
What is the minimum Hz requirement to run a virtual machine in Windows 11 64-bit?
1 GHz
28
What is the minimum RAM requirement to run a virtual machine in Windows 11 64-bit?
4 GB
29
What is the minimum hard drive space required to run a virtual machine in Windows 11 64-bit?
64 GB
30
What is the minimum Hz requirement to run a virtual machine in Windows 10 32-bit?
1 GHz
31
What is the minimum RAM requirement to run a virtual machine in Windows 10 32-bit?
1 GB
32
What is the minimum hard drive space required to run a virtual machine in Windows 10 32-bit?
16 GB
33
VNC
Virtual Network Computing
34
What allows a user to save their current session to disk before powering off the computer to save battery life when the system is not being used
Hibernate
35
FAT
File Allocation Table
36
exFAT
Extensible File Allocation Table
37
FAT32 only supports drives up to what size?
32 GB
38
A method employed by many computer anti-virus programs designed to detect previously unknown computer viruses and new variants of viruses already in the wild.
Heuristic Analysis
39
ESD
Electrostatic Discharge
40
Which command-line shell enables you to perform management and administrative tasks in Windows 7 and later?
PowerShell
41
ISE
Integrated Script Environment
42
What is a type of installation that attempts to replace the existing version of the operating system files with a new copy of the same version and will only affect the system files and not any of the user's settings, customizations, or applications?
Repair installation
43
What is a MacOS feature for managing applications from the desktop that is similar to the Windows taskbar?
Dock
44
What is used to allow dual booting on a Macintosh computer?
Boot Camp
45
ICMP
Internet Control Message Protocol
46
What determines which device in a connection path is not responding appropriately?
Tracert
47
What command-line tool is used to troubleshot DNS issues?
nslookup
48
What command-line tool is used to display network statistics and active connections?
netstat
49
What command-line tool is used to tell you if a website is reachable or not?
ping
50
What enables encryption for traffic being sent and received over a wireless network when still using open authentication?
Enhanced Open
51
Which one has Enhanced Open as a feature? WEP WPA WPA2 WPA3
WPA3
52
WPA
Wo-Fi Protected Access
53
What is a command-line utility used to trace an IP packet's path as it moves from its source to its destination?
Tracert
54
Class A private IP address range contains the addresses from
10.0.0.0 to 10.255.255.255.255
55
Class B private IP address range contains the addresses from
172.16.0.0 to 172.31.255.255
56
Class C private IP address range contains the addresses from
192.168.0.0 to 192.168.255.255
57
APIPA/link-local autoconfiguration range is from
169.254.0.0 to 169.254.255.255
58
What tool is used to copy all of the files from one directory to another?
xcopy
59
What command is used to copy one or more files from one location to another?
Copy
60
What Linux command is used to copy one or more files and directories from one location to another?
cp
61
What are the five conditions can cause the error "Operating System Not Found" to occur?
1. The Basic Input/Output System (BIOS) does not detect the hard disk 2. The hard disk is damaged 3. Sector 0 of the physical hard disk drive has an incorrect or malformed master boor record (MBR) 4. An incompatible partition is marked as Active 5. A partition that contains the MBR is no longer active
62
A __________________ will hide your computer from other devices on the network and prevent file and printer sharing
Public Network
63
A ____________________ is considered trusted, allows the computer to be discoverable to other devices on the network, and supports the use of file and printer sharing
Private Network
64
XML
Extensible Markup Language
65
If a user receives an "access denied" error message, what does it indicate?
The file permission has been changed
66
If a user receives a "file not found" error message, what two things can it possibly indicate?
The file has been renamed The file has disappeared
67
What does the command "shutdown /r" do on a Windows workstation?
Reboot
68
What does the command "shutdown /s" do on a Windows workstation?
Shut down
69
What does the command "shutdown /l" do on a Windows workstation?
Log off
70
The concept and practice of restricting access rights for users, accounts, and computing processes to only those recourses absolutely required to perform routine, legitimate activities
Least Privilege
71
This happens when an employee moves between roles in an organization and keeps the access or permissions of the previous role
Permission Creep
72
Used to determine which users can access, read, write, and delete files or directories within a given directory
Directory permission
73
A list of IP addresses, ports, or applications that are not allowed to be run or used on a given system
Blocklist
74
PHI
Protected Health Information
75
What refers to medical and insurance records, plus associated hospital and laboratory test results
Protected Health Information (PHI)
76
PII
Personal Identifiable Information
77
Data that can e used to identify, contact, or locate an individual
Personal Identifiable Information (PII)
78
CUI
Controlled Unclassified Information
79
Federal non-classified information that must be safeguarded by implementing a uniform set of requirements and information security controls to secure sensitive government information
Controlled Unclassified Information (CUI)
80
What allow refers to a security posture where the system will allow all traffic to traverse the firewall unless there is a specific rule to prevent it?
Implicit Allow
81
What allow refers to a security posture where the system will only allow an item to traverse the firewall if the traffic matches an existing rule?
Explicit Allow
82
An attack that consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly.
Brute Force
83
SAE
Simultaneous Authentication of Equals
84
What stores a while number, such as 21, 143, or 1294?
Integers
85
What stores a fractional or decimal number, such as 3.14, 45.5, or 333.33?
Floating-point numbers
86
What stores a value of TRUE (1) or FALSE (0)?
Boolean
87
What stores a group of characters, such as Hello, PYTHON, or IzaakWinner?
String
88
What is a primary administrative tool for defining and controlling how programs, network resources, and the operating system operate for users and computers in an organization?
Group Policy
89
A command-line tool used to mount and service Windows images before deployment
Deployment Image Servicing and Management (DISM)
90
What command-line tool is used to run a scan to identify and repair any image or virtual hard drive corruption?
dism /RestoreHealth
91
SFC
System File Checker
92
DISM
Deployment Image Servicing and Management
93
Which command is a utility in Windows that allows users to scan for and restore corrupted Windows system files from the command line?
sfc (System File Checker)
94
An Extensible Markup Language (XML) based file that contains setting definitions and values to use during Windows Setup.
Answer File
95
RFC
Request For Comment
96
What defines why a change or installation will occur?
Purpose
97
A method employed by many computer anti-virus programs designed to detect previously unknown computer viruses and new variants of viruses already in the wild.
What is Heuristic Analysis?
98
Also known as the dragonfly handshake
SAE Handshake (Simultaneous Authentication of Equals Handshake)
99
What only creates a copy of new files and files modified since the last full, incremental, or differential backup?
Incremental Backup
100
Which backup takes the least to backup and the longest to restore?
Incremental Backup
101
Which backup takes the least to backup and the longest to restore?
Incremental Backup
102
Which backup takes the longest to backup and the least to restore?
Full backup
103
What creates a copy of all the selected data regardless of when it was previously backed up?
Full backup
104
What is the process of generating a file from a complete copy of a file created at some past time and one or more incremental copies created at later times?
Synthetic Backup
105
In a _______, a computer repeats the task until a condition is met.
Loop
106
What is written into a code to help a human to understand the initial programmer's logic?
Comment
107
What is used to control the flow within a computer program or script, usually based on some logic condition? (Often implemented with IF THEM ELSE statements)
Branch
108
What is written into a code to help a human to understand the initial programmer's logic?
Comment
109
A popular screen-oriented text editor in Linux, Unix, and other Unix-like operating systems
vi (visual)
110
vi
visual
111
A powerful package management command-line program that is used to install new software packages, remove existing software packages, upgrade existing software packages, and even upgrade the entire operating system (Works with Ubuntu and Debian-based Linux distributions)
apt-get
112
A utility used to view and control the hardware attached to the computer (Windows)
Device Manager
113
A web server that acts as a gateway between a client application
Proxy server
114
Often implemented with For, For Next, While, or Do While statements
Loop
115
Which type of antivirus scan provides the best protection for a typical home user?
On-Access scans
116
COPE
Company-owned/personally enabled
117
What means that the company provides the users with a smartphone primarily for work use, but basic functions such as voice calls. messaging, and personal applications are allowed.
Company-owned/personally enabled (COPE)
118
CYOD
Choose Your Own Device
119
Used to remotely connect to a network's switches and routers to configure them securely
Secure Shell (SSH)