Practice 4 COPY Flashcards

1
Q

Which command is used to display the Resultant Set of Policy (RSoP) information for a remote user and computer?

A

gpresult

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

RSoP

A

Resultant Set of Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A report of all Group Policy settings within Active Directory that shows how those settings can affect a network, or how existing Group Policy Objects affect various combinations of users and computers when the local security policy is applied

A

Resultant Set of Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

GPO

A

Group Policy Objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Displays the resulting set of policy settings that were enforced on the computer for the specified user when the user logged on

A

gpresult

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This command allows system administrators to manage user accounts on Windows PCs. You can use this command to display account information or make changes to user accounts.

A

net user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This command is used to locate spots that have network latency and network loss between a client and a destination

A

pathping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This command is used to locate spots that have network latency and network loss between a client and a destination

A

pathping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What defends against voltage spikes that could damage electronics?

A

Surge Protector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

PSK

A

Pre Shared Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

______ means a password is being used as the “key” to activate the secure network

A

Pre Shared Key (PSK)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RADIUS

A

Remote Authentication Dial-In User Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A client-server protocol and software that enables remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service

A

Remote Authentication Dial-In User Service (RADIUS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Does WPA2 Enterprise use PSK or RADIUS?

A

RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What format is used to define a public key certificate?

A

x.509

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A utility used to define and control how programs, network resources, and the operating system operate for users and computers in an organization

A

Group Policy Editor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

IP (company related)

A

Proprietary Information or Intellectual Property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Information created and owned by a company, typically about the products or services that they make or perform

A

Intellectual Property (IP) or Proprietary Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CUI

A

Controlled Unclassified Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Federal non-classified information that must be safeguarded by implementing a uniform set of requirements and information security controls to secure sensitive government information

A

Controlled Unclassified Information (CUI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What lists every person who has worked with or who has touched the evidence that is a port of an investigation and records every action taken by an individual in possession of the evidence?

A

Chain of custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A process that an organization uses to preserve all forms of potentially relevant information when litigation is pending or reasonably anticipated

A

Legal hold

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A clause in a contract or service agreement that allows a company the authority to audit the systems and information processed

A

Right to audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The order in which you should collect evidence

A

Order of volatility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
A security policy that states someone or something should be allocated the minimum necessary rights, privileges, or information to perform the specific role
Least Privilege
26
A security policy that states that duties and responsibilities should be divided among individuals to prevent ethical conflicts or abuse or powers
Separation of duties
27
A security policy that prevents any one individual from performing the same role or task for too long.
Job rotation
28
A Linux command that allows the creation of a single or multiple files, view file contents, concatenate files, and redirect output in the terminal to a file.
cat
29
A Linux command-line utility for searching plain-text data sets for lines that match a regular expression
grep
30
A Linux command that displays the present working directory path to the terminal or display
pwd
31
pwd
Present Working Directory
32
sfc
System file Checker
33
A Windows command that allows users to scan for and restore corrupt Windows system files from the command line
sfc (System File Checker)
34
A Windows command used to connect to, remove, and configure connections to shared resources such as mapped drives and network printers
net use
35
A command-line tool that is used to update the group policy settings on a Windows system
gpupdate
36
What command line does an administrator use to force a background update of all Group Policy settings
gpupdate /force
37
A command used on a Linux system to list a directory's files and subdirectories
ls
38
A Windows command that is used to check the file system and file system metadata of a volume for logical and physical errors
chkdsk
39
A text file with commands and settings to configure a user's environment that runs when the user logs on to a computer
Login script
40
Enables an administrator to configure individual switch ports to allow only a specific number of MAC addresses to use that port
Port Security
41
Occurs when the humidity is low in computer server rooms
Electrostatic Discharge
42
Occurs when the humidity in high in computer server rooms
Corrosion of the servers
43
MOU
Memorandum of Understanding
44
Defines the responsibilities of each party in an agreement, provides the scope and authority of the agreement, clarifies terms, and outlines compliance issuse
Memorandum of Understanding (MOU)
45
NDA
Non-Disclosure Agreement
46
A legal contract or part of a contract between at least two parties that outlines confidential material, knowledge, or information that the parties wish to share for certain purposes, but wish to restrict access to.
Non-Disclosure Agreement (NDA)
47
SLA
Service Level Agreement
48
A commitment between a service provider and a client for particular aspects of the service, such as quality, availability, or responsibilities
Service Level Agreement (SLA)
49
A type of malware that looks legitimate but can take control of your computer. Designed to damage, disrupt, steal, or inflict some other harmful action on your data network.
Trojan
50
RAT
Remote Access Trojan
51
Allows an attacker to control a workstation or steal information remotely
Remote Attack trojan (RAT)
52
An attack that creates numerous processes that run in the background of the system in order to spy on you and gather/steak your personal information
Trojan
53
A malicious computer program designed to provide continued privileged access to a computer while actively hiding its presence. They are able to disguise themselves from detection by the operating system and anti-malware solutions
Rootkit
54
MSDS
Material Safety Data Sheet
55
A document that contains information on the potential hazards and how to work safely with the chemical product
Material Safety Data Sheet (MSDS)
56
SOW
Statement/Scope of Work
57
A document that outlines all the work that is to be performed, as well as the agreed-upon deliverables and timelines.
Statement/Scope of Work (SOW)
58
A device that adjusts voltages in under-voltage and overvoltage conditions to maintain a 120 V output
Line Conditioner
59
A command to Install/remove software from Debian-based Linux distros
apt-get
60
A command to Install/remove software from RPM-based Linux distros
yum
61
Which log contains a record of events generated during the Windows installation or upgrade process?
Setup log
62
Which log contains information about service load failures, hardware conflicts, driver load failures, and more?
System log
63
Which log contains information regarding audit data and security on a system?
Security log
64
Which log contains information regarding application errors?
Application log
65
SOC
System Operations Center
66
A Microsoft client/server network model that groups computers together for security and to centralize administration
Domain
67
A Microsoft peer-to-peer network model in which computers are connected together with access to shared resources for organizational purposes
Workgroup
68
Wireless networks that rely on a PIN to connect devices use _________.
WPS (Wi-Fi Protection Setup)
69
Linux command used to list the current running processes
ps
70
Linux command used to change the owner of a file, directory, or link
chown
71
A Linux command that is used to display the amount of disk space available on the file system
df
72
A Linux command used to obtain information about host addresses, mail exchanges, nameservers, and related information
dig
73
A loopback address in IPv4 reserved for troubleshooting and testing
127.0.0.1
74
A full disk encryption program used in the macOS environment
FileVault
75
Performs full disk encryption of the internal hard drive or SSD device on a Windows 10 system
BitLocker
76
Performs a full disk encryption of external storage devices
BitLocker to Go
77
A type of installation that attempts to replace the existing version of the operating system files with a new copy of the same version. Useful when trying to repair a Windows computer that will not boot or when you believe the system files have become corrupted
Repair Installation
78
A type of installation that uses a clone of an existing installation stored in an image file to perform an installation
image deployment
79
An installation of the new operating system on top of an existing version of the operating system
In-place upgrade
80
CSRF
Cross-Site Request Forgery
81
An attack that forces an end user to execute unwanted actions on a web application in which they are currently authenticated
Cross-Site Request Forgery
82
An attack that enables attacker to do execute arbitrary JavaScript within the victims browser (such as creating pop-ups)
Cross-Site Scripting
83
XSS
Cross-Site Scripting
84
What type of formatting is a hard-disk operation that should make recovering data from your storage devices impossible once the operation is complete
Low-level formatting
85
Are useful for long-duration power loss events, not under-voltage events
Diesel Generator
86
A command that is used to connect to, remove, and configure connections to shared resources such as mapped drives and network printers
net use
87
..
Page file