Need2Know Flashcards

(197 cards)

1
Q

.pkg file

A

Apple installer package file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

.dmg file

A

Apple file for disk image, full package/installer for a full virtual disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

.app file

A

Apple file that contains code and resources for apps on macOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Mitigating DDoS/DoS attacks

A

-stop it at the firewall
-use ISP and/or third party software to protect against these types of attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Port forwarding

A

-24/7 access to service due to the port the service is live through gets forward to an open port so it’s always available, does not expire or timeout
-process if redirecting network traffic from one port and ip to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Boot repair command

A

“bootrec /rebuildbcd”

“bootrec /fixmbr

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Screened subnet

A

-aka, DMZ (demilitarized zone)
-network architecture of layers of firewalls as another layer of security
-can host public resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Non-persistent cross site scripting attacks

A

-Usually an email, with a sketchy link
1. Website allows scrips to run input prompts and text boxes
2. Email sent
3. Link runs script that send credentials and other info to attacker
4. Simultaneously, the script embedded in URL gets ran

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

On-path attack

A

Attacker sits in between your system and the network and redirects your traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Quick format (Windows)

A

-deletes old file system table and creates a new one
-old files appear to be gone but can be recovered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Full format (windows)

A

-does a full new file table on a disc, writing it all to zeros
-data is gone gone
-checks for bad sectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

PowerShell files and scripts

A

-can run to automate tasks
-.ps1 file extension

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Software licenses are…

A

-included with software
-can be per-seat or concurrent
-can expire or not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

WPA3

A

Current most advanced WPA (WiFi protected access)
-uses GCMP (wireless encryption)
-uses AES
-uses MIC with GMAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

FAT 32 size limits

A

-up to 2 TB volume sizes
-Max file size of 4 GB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ARP poisoning

A

-when an attacker sends spoofed ARP messages on a network, allowing them to “act” like a router or other type of hub so that they receive network traffic instead of the intended recipient
-utilizes spoofing of ARP (address resolution protocol)
-on-path attack that occurs on local IP subnet
-ARP has lack of security features

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Patch Management (steps)

A
  1. test
  2. prioritize
  3. deploy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

System Instability

A
  • general system failures

troubleshooting:
- run a full hardware diagnostic (first)
- check the OS (Windows updates, chkdsk if HDD)
- run SFC (system file checker)
- perform an anti-malware scan (Windows Defender, or whatever is used)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Privacy (Settings)

A

enable or disable shared application activity, shared language, and speech recognition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Verifying Certificate Details (list)

A

verify
- not expired
- domain name
- properly signed
- date and time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

MBR Partition Style

A
  • maximum partition size of 2 TB
  • includes primary and extended partitions

primary partitions:
- bootable
- maximum of four per hard disk
- one can be marked as active

extended partitions:
- used for extending the maximum number of partitions
- one per hard disk (though optional)
- contains additional logical partitions
- not bootable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Altered System or Personal Files (Troubleshooting)

A

indicates malware
- remove or reload from a known good backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

PCI DSS

A

Payment Card Industry Data Security Standard
- a standard for protecting credit card information
- six control objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

OS EOL Policies

A

vary depending on the OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Standard Operating Environments
- a set of tested and approved hardware/software systems - often a standalone OS image
26
Keychain
- password management utility on macOS - encrypted
27
GDPR
- General Data Protection Regulation (only in Europe) - European union regulation - data protection and privacy for individuals in the EU - gives users control of their personal data - right of erasure
28
Disk Utility
- macOS management of disks and images - has file system utilities
29
Software Center
Linux's version of the Mac OS App Store
30
Failed Screen Lock Attempts (iOS/Android)
iOS - CAN be configured to erase everything after 10 failed attempts Android - lock the device and CAN require Google credentials or else the device is wiped
31
On Site Backups
- no internet link required - data is immediately available - generally cheaper than off site backups
32
Hardware Compatibility Check (for OS upgrades)
- runs when you perform a Windows upgrade - run manually from the Windows setup screen - called the Windows 10 Upgrade Checker or the PC Health Checker for Windows 11
33
iOS
-Apple OS for iPhone -Cloud sourced -Unix based
34
Built-In Windows Groups (list)
- users, guests - remote management users - event log readers
35
Blue Screens and Frequent Shutdowns
- might be linked to bad hardware, bad drivers, or a bad application - use last known good, system restore, or rollback drivers to troubleshoot a possible software problem - or try safe mode - if potentially hardware related, remove or reseat the hardware - run hardware diagnostics
36
Malware Removal Process (steps)
1. verify malware symptoms 2. quarantine infected 3. disable system restore 4. remediate : update anti-virus 5. remediate : scan and remove 6. schedule scans and run updates 7. enable system protection 8. educate the end user
37
Linux File System Modes (list)
- r (read) - w (write) - x (execute)
38
NAT
- Network address translation - Process where a network device, typically a router or firewall, modifies network address information in the IP header of packets traversing a network. It's primarily used to allow multiple devices on a private network to access the internet using a single public IP address. NAT also provides a degree of security by hiding the internal network's topology from the outside world.
39
On-Path Browser Attacks
- the man-in-the-middle is on the local device, in the browser - the attacker uses the advantage of encrypted traffic being so easy to proxy - malware, often a trojan horse does all of the proxy work
40
VBScript
- ".vbs" file extension - general purpose scripting in Windows - application automation- especially for MS Office automation
41
Spyware
- malware that spies on you - may trick you into installing it - may work in conjunction with a keylogger
42
Malware Symptoms
- slow performance and lock up/unresponsiveness - internet connectivity issues - OS update failures - use malware cleaner or reload from a known good backup
43
Browser redirection is usually caused by what?
Malware, restore from known good backup
44
2. Quarantine Infected (Malware Removal Process)
- disconnect from the network - isolate all removable media - control the spread
45
Recreating a Windows Profile (steps)
1. login to the computer with the user account - the profile will be rebuilt 2. login as the domain administrator and copy any important files from the old profile, to the new profile
46
Hashes and Hashing a Password
- represent data as a fixed-length string of text - will likely not have a collision (match another hash) - makes it impossible to recover an original message from the digest - without knowing the hash, the hashing method, etc. - SHA-256 is a common hashing method. - different operating systems and applications use different hash algorithms.
47
Wireless Security Modes (list)
- open system - WPA2/3 - Personal or WPA2/3 - PSK - everyone uses the same 256-bit key - WPA2/3 - Enterprise or WPA2/3 - 802.1x - authenticates users individually with an authentification server
48
WAN IP
- public IP address, assigned by ISP so that router can talk to the rest of the internet - may be dynamically allocated by the ISP - may be able to switch to a static IP address for an additional cost - easier management
49
ACL
- used to allow or deny traffic - also used by operating systems - commonly used on the ingress or egress of a routing interface Track progress
50
Privacy (System Preferences)
- limit application access to private data, as well as cameras and microphones - by default, Mac OS apps cannot view your private data
51
Root Access/Jailbreaking
- provides direct OS access - requires custom firmware - replaces the existing OS's firmware - uncontrolled access - renders an MDM relatively useless - can allow access to things (software/features) that are not officially supported by the manufacture
52
(T/F) Linux and Mac systems can use RDP to connect to a Windows device remotely?
True- as long as they have the appropriate software
53
Smart Cards
- provide certificate based authentication - requires a smart card reader to authenticate
54
Windows Recovery Environment
- basic command line that can be used without having to fully start Windows - provides complete control, but requires an extensive knowledge base to properly and safely use
55
Power Options (Control Panel)
- configure how Windows uses power - options to choose what closing the lid on a laptop does - options for USB selective suspend - used to disable individual USB devices - enable or disable fast startup modes: - hibernate - open documents and applications are saved to the disk - used by Fast Startup - sleep (standby) - open files and applications are stored in memory - save power and startup quickly - switches to hibernate if power is low
56
Folder Redirection (GPO)
- redirects folders to a network share - user configuration > policies > windows settings > folder redirection (group policy) - often paired with the Offline Files feature
57
FileVault
- FDE tool - decryption requires a local key or iCloud authentication - required before Mac OS can start - set up in System Preferences, under Security & Privacy
58
Time settings (how to fix time drift)
- enable automatic time setting - settings > time & language > date & time - the time zone may also need configuration
59
Does biometric authentication store an image of your unique biometric?
no, biometric authentication is usually stored as a mathematical representation.
60
Splash Screens
- a message, logo, or graphic shown during startup or login - can be used for branding or to require compliance
61
Shell Script
- scripting in the Unix/Linux shells - starts with a shebang or hashbang ("#!") - often has a ".sh" file extension - similar to batch files in Windows
62
Anti-Virus and Anti-Malware on Linux (is it default, what can you use)
- no built-in options - Clam is the recommended third-party anti-virus - open-source
63
Types of Operating System Installations (list)
- in-place upgrade - recovery partition - clean install - can be in conjunction with a migration tool - image deployment - deploy a clone on every computer - can be completely automated - repair installation - does not modify user files - remote network installation - install across the internet, or from a local server or shared drive
64
Active Directory
- a database of everything on the network - manages authentication - provides centralized access control - commonly used by the help desk
65
Linux Advantages (list)
- free - works on a wide variety of hardware
66
Assigning a Home Folder to a Network Folder
- allows you to manage and backup files from the network - when added to a user profile, the directories are automatically created, with proper permissions assigned
67
EFS
- encrypt at the file system level, can encrypt individual files and folders - requires NTFS - uses a username and password to encrypt the key - administrative password resets cause EFS files to be inaccessible
68
To update or roll back updates on Windows
Settings>updates>update history>uninstall updates
69
Time Machine
- local backups on Mac OS - keeps hourly backups for the past 24 hours, daily backups for the past month, and weekly backups for all previous months - backups are deleted when the disk gets full
70
TACACS
- remote authentication protocol - created to control access to dial-up lines to ARPANET
71
Spotlight
- built-in search engine for Mac, iOS, and iPadOS - accessible by clicking the magnifying glass in the top right of the screen - or by keying cmd-space - define search categories in System Preferences
72
Mobile Device Firewalls
- not included on mobile phones - most activity initiates outbound, not inbound - useful in enterprise environments
73
Finder
- the central OS and file manager - provides integrated access to other devices
74
Humidity (High/Low)
- high humidity promotes condensation - low humidity promotes static discharges - 50% humidity is a good number
75
What is WPA2's biggest security threat?
- PSK brute-force attacks - hackers can derive the PSK hash and then brute-force the actual PSK. - once a hacker has the PSK, they also have everyone else's wireless key - as technology improves, so does the speed of these attacks. Track progress
76
FDE (iOS/Android)
iOS - data is encrypted using your passcode by default Android - encryption tool is integrated into version 5.0 and later - probably turned on by default
77
Cache (browser)
locally stored browser data
78
External Hardware Tokens
- manages application usage - the application will only work if this hardware device is present - commonly a USB device - often used with high-end software
79
TACACS+
- the latest version of TACACS - provides more authentication requests and response codes - released as an open standard in 1993 - commonly associated with Cisco devices, though
80
ext3 and ext4
- file systems commonly used by Linux - ext4 was an upgrade to ext3, and is also seen in Android OS
81
Windows Firewall Exception Rule Types (list)
- program - port - predefined - custom
82
Google Android
- from the Open Handset Alliance - open sourced, based on Linux - wide device and hardware support
83
OS Fails to Update (Troubleshooting)
- check available storage - check available bandwidth - connect to wifi - try a different network connection - reboot
84
Cryptominers (as malware)
- require extensive CPU processing ability/will take up tons of processing power - malware that forces cryptomining to occur on your computer
85
5. Remediate : Scan and Remove (Malware Removal Process)
use tools to remove or run in Safe Mode or in WinPE
86
Cross-Site Scripting (acronym)
XSS
87
Indexing Options (Control Panel)
- speed up the search process - control what information might be searched
88
Sluggish Performance
- check task manager for high CPU and I/O utilization - update Windows - check for available disk space and defrag - verify power-saving mode is turned off (laptops) - run an anti-virus scan and an anti-malware scan
89
Synthetic Backup
- the first full backup copies every file - subsequent full backups are created from previous backups - uses full and synthetic backups to create new full backups
90
Boot Methods for Installing an Operating System (list)
- USB storage - must be bootable - computer must support booting from USB - optical media - PXE - SSDs and HDDs - internet-based - external/hot swappable drive - some can mount an ISO image - boot from USB
91
Explicit Permissions
- set by us - take precedence over inherited permissions
92
SQL Injection
- a method of code injection where SQL requests are modified - if you can manipulate an SQL database, then you can control the application - used by hackers
93
Persistent (Stored) Cross-Site Scripting Attacks
- malicious code is placed on a centralized server, such as a social media website - inside of a comment, for example - everybody who visits the page or who views the comment gets attacked - no specific target
94
Wireless Evil Twins
- a form of social engineering where an access point is configured to look and act like an existing network - may overpower the original access point
95
File Explorer Options (Control Panel)
tabs: - general - view - customize how files and folders are seen - provides options to view hidden files and to hide extensions - search - modify what is shown when you perform a search
96
Apple Business Manager
- supports managed Apple IDs - integrate with Active Directory - can connect with an existing MDM
97
Linux Command Line Options (list)
- Terminal - XTerm - (etc.)
98
Network Topology Diagram
logical diagram of the network layout
99
Corporate Use Software Licenses
- per-seat/per-site - the software may be installed everywhere - annual renewals
100
Handling Toxic Waste (Batteries/Toner)
batteries - usually sent to a hazardous waste facility toner - recycle and reuse
101
Login Script
- automates a series of tasks during login - must associate a script with a group policy - user configuration > policies > windows settings > scripts
102
Autoplay
- settings > bluetooth & devices > Autoplay - AutoRun on older Windows operating systems - if memory cards and removeable drives will
103
Restoring Windows Using System Restore
- system > about > system protection - pick a restore time and let the system reboot - user data is not modified - from here can also manually create a restore point
104
Finding and Removing Rootkits
- look for the unusual - use a remover/tool specific to the rootkit - Secure Boot using a UEFI BIOS
105
Battery Life Issues (Troubleshooting)
- caused by bad reception or an aging battery - disable unnecessary features - check application battery usage
106
Mac OS Advantages
- easy to use - extremely compatible - relatively few security concerns
107
APFS
- apple file system - optimized for SSDs - features include encryption, snapshots, and increased data integrity
108
Differential Backup
subsequent backups contain data changed since the last full backup
109
3-2-1 Backup Rule
- 3 copies of data should always be available - 2 different types of media should be used - 1 copy of the backup should be off site
110
Personal Software Licenses are...?
Perpetual
111
Whaling
spear phishing the CEO of a company
112
UPnP
- Universal Plug and Play - allows network devices to automatically configure and find other network devices - applications on the internal network can open inbound ports using UPnP - no approval is needed - used for many P2P applications - best practice would be to disable UPnP
113
Galois Message Authentication Code (acronym)
GCMP with GMAC
114
Low-Level Disk Formatting (LLF)
Done at the factory, base level sectors and tracks are created
115
MSDS
- Material Safety Data Sheet - required by OSHA - may be abbreviated as SDS - provides information for all hazardous chemicals
116
Different kinds of graphics cards/usage
integrated graphics: - combined CPU and GPU chip - uses system memory for graphics dedicated graphics card: - uses it's own vRAM - Different apps will need/utilize different levels of graphics requirements
117
Free and Open Source Software (acronym)
FOSS
118
URL vs FQDN(example)
- google.com is an example of a fully qualified domain name. - as seen above, a domain name does not include the protocol, and any subdomains, paths, or file names. - a website URL includes all of these components. - https://www.google.com/search?q=domain+name&sxsrf=ALiCzsYV67... is an example of a URL, and includes the domain name, "google.com", as well as the: - protocol (HTTPS) - subdomain (www) - path (/search?q=domain+name&sxsrf=ALiCzsYV67/) - always ends with "/" - in this example, the URL is shortened due to space constraints (shown by the "..." at the end of the shown URL" - as our web search did not lead us into viewing or opening a file, no file path is included. - an example of a URL with a file path, however, is https://www.google.com/search/file.html - (note that this URL is made-up) - this example's file path is "file.html" ** (note that miranda, the creator of this Quizlet set is currently unsure if the file path of a URL includes the backslashes, or not. however, extensive URL knowlege is not listed in the exam objetives, and therefore, is very unlikely to be on the CompTIA A+ 220-1102 A+ Exam. in the future (after i pass my exam), though, i'll try to remember to further research this, and will edit this term's definition, accordingly :)) ** ** insert image of miranda peace signing for time-keeping purposes, i'm typing this the evening of 8/6/22, with my test scheduled for 8/9/22; let's see how long my update takes! **
119
Zero-Day Attacks
- an attack that utilizes a previously unknown vulnerability before it can be patched - utilizes exploit code
120
VNC
Virtual network computing is a system that allows you to remotely view and interact with a computer's desktop environment, regardless of its physical location -VNC allows you to connect to a computer (the VNC server) from another computer (the VNC viewer) over a network, including the internet. - uses RFB (remote frame buffing) - there are clients for many OS'
121
Startup Repair
- useful in missing NTLDR troubleshooting - the main Windows boot loader is missing - run Startup Repair or replace manually and reboot - disconnect any removable media - also useful with missing OS errors - boot configuration data may be incorrect - settings > system > recovery - or run from advanced boot options
122
CCMP with CBC-MAC
Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (acronym) - used with WPW2, uses AES encryption
123
Physical Destruction Methods (list)
- shredder - drill/hammer - degaussing - incineration
124
Windows Reset Option
- reimage or reload the OS - Windows 10: settings > update & security > recovery - Windows 11: settings > system > recovery
125
Spear Phishing
targeted phishing, using insider information -often targeting a high up individual in a company/organization
126
Software Firewall
- monitors the local computer - prevents malware communication - for example, Microsoft Defender Firewall - built into Windows
127
RADIUS
-Remote Authentication Dial-In User Service (acronym) - one of the more common AAA (Authentication, authorization, and accounting) protocols - supported on a wide variety of platforms and devices - not just for dial-in - centralizes authentication for users
128
Windows Boot Configuration (acronym)
BCD (boot configuration data)
129
Python
- general purpose scripting - has interoperability between devices and other languages - ".py" file extension
130
Client-to-Site VPN
- on demand access from a remote device - software connects to a VPN concentrator - some software can be configured as always-on
131
Cross-Site Scripting
- Malicious code being injected into otherwise trusted websites - utilizing browser security flaws - one of the most common web application development errors - by using malware that takes advantage of JavaScript
132
BitLocker To Go
- BitLocker FDE for removeable media/USB drives - not included in Windows Home editions
133
Rootkits
- modifies core system files - embeds itself deep inside the OS, often in the kernel - can be invisible to the OS and to anti-virus software
134
JavaScript
- scripting inside of the browser - ".js" file extension - adds interactivity to HTML and CSS
135
MSRA
Microsoft remote assistance - used over the web
136
SAE
Simultaneous authentication of equals -- built into the WPA3 standard, also an IEEE standard that changed the PSK authentication process - includes mutual authentication - without a hash, there's no risk of brute-force attacks - SAE uses a diffie-hellman derived key exchange with an authentication component - everyone uses a different session key, even with the same PSK - dragonfly handshake
137
Displays (System Preferences)
- configure the locations of multiple displays - modify which display contains the Apple menu - modify individual display settings
138
Mail (Control Panel)
- the mail applet icon does not appear unless a mail client is installed on the system - provides access to local mail configuration - account information - data files
139
Do applications have compatibility between different operating systems?
No. There is almost no direct application compatibility between operating systems.
140
System (Control Panel)
- shows computer information, including the version and edition of Windows - modify system properties and system preferences - configure remote desktop - can launch to settings
141
PHI
Protected Health Information - regulated with HIPAA
142
How does Windows set the time, by default?
automatically, with five minutes of tolerance
143
Brute Force Attacks
- a form of password attack where attackers try every single possible password combination, until the password's hash is matched - time consuming - also requires a large amount of computing power and resources Track progress
144
When does Microsoft release Window's patches?
the second tuesday of every month at 10:00am PST
145
WPA2
- uses CCMP block cipher mode - provides data confidentiality using AES encryption - adds a MIC with CBC-MAC (compared to WPA)
146
Why is Cross-Site Scripting abbreviated as XSS?
though CSS seems like a better acronym for cross-site scripting, it is already utilized for a programming language, used in website design.
147
USB Controller Resource Warnings
- given when you exceed the number of USB endpoints (buffers) - try moving the device to a different USB interface or matching the USB interface to the device capabilities - USB 2.0 might support a larger number of endpoints
148
Disk Partitions
- separates the physical drive into logical pieces - useful for maintaining multiple operating systems - in Windows, formatted partitions are called volumes
149
EOL Operating Systems
- manufacturer stops selling an OS - may continue supporting it, though Track progress
150
Force Quit (Mac)
- press cmd-option-esc to bring up the menu - or, hold down the option key when right clicking the application icon in the dock
151
Distributed Denial of Service Attacks
- attack that uses an army of computers to bring down a service - the army uses all of the network resources, leaving none for the service to run - this "army" may be utilizing a botnet
152
Uninterruptible Power Supply (UPS) Types (term-5list)
- standby UPS- waits to detect a power outage, then switches to battery power (longer transfer time) - line-interactive UPS- monitors for power fluctuations and will go to battery power in an instant (very short transfer time) - on-line UPS- always working, constantly converts AC to DC and back and provides constant protection
153
VBScript (acronym name)
Microsoft Visual Basic Scripting Edition
154
Microsoft Windows Disadvantages (list)
- big target for security exploitation - challenging integration due to the sheer amount of support for various hardware
155
Application considerations
- Impact to device - Impact to network - Impact to operation - Impact to business
156
PII
Personally identifiable information
157
Chain of custody
Documentation of the continuous possession and handling of devices and information that are under investigation
158
What do you do with empty toner cartridges and old batteries?
Take them to a hazardous waste facility
159
Which Windows Share permissions has the priority when assigning mapped network drives?
Deny
160
Windows 10 requirements (32- and 64-bit)
CPU: 1 GHz or faster RAM: 1 GB for 32- and 64-bit Storage: 32 GB free or more
161
Windows 11 requirements
CPU: 1 GHz or faster with 2 or more cores, needs to be a 64-bit CPU RAM: 4 GB Storage: 64 GB free or more
162
Who's approval do you need before making a change (upgrading, rolling back, new machine build, etc)?
Change board's approval
163
(T/F) The date and time on a device is very important for encryption purposes (like browsing using the HTTPS protocol)?
Yes. If time and date are off, it can throw the process off
164
What kind of data type is most important when dealing with payment services/subscriptions?
Credit card transactions/information
165
What do you do if a virus or malware disables remediating tools?
Boot to safe mode and use signatures downloaded from another computer
166
(T/F) Installation of services on Windows requires elevated permissions?
True. Services are based on the OS, adding one would be changing the OS
167
Win PE
Windows pre-installation environment -can be used to boot to, will allow windows repair options without having to boot to the actual windows OS
168
“cleanmgr” (Command)
Windows command for launching the Disk Cleanup utility
169
On-access scans
Scans that scan all files before they open, very effective
170
(T/F) All versions of Windows 10 can be supported on an x86 processor?
True
171
Bollards
Short, study posts designed to stop vehicles and vehicle ramming attacks
172
Unattended installation
Automated installation of an OS/software the utilizes an answer file (usually and .xml file) to answer all of the prompts and questions that would normally popup during the installation
173
Before working with electrical equipment or the inside of a PC, what two things should you do?
Remove jewelry and disconnect power source
174
Mobile devices at work
COPE (corporate owned/personally enabled) vs BYOD vs CYOD (choose your own device, from corporate options)
175
Where to configure Internet proxy address on a workstation in windows?
Control panel>Internet options>connections
176
RFC documents
Purpose, plan, scope, risk analysis. Must be approved by the change board
177
DHCP reservations
Assigning an IP address to a system permanently according to its MAC address
178
What is the maximum amount of RAM an x86 OS can utilize?
4 GB
179
Dictionary attack
Specific kind of brute force attack where attacker uses a library of pre-written possible passwords and runs them through a login attempt
180
(T/F) WPA3 encrypts network traffic without the need for authentication?
True. It’s called “enhanced open”
181
Insider threat
An attack from a person within the organization or company
182
Private IP address classes
Class A: 10.x.x.x Class B: 172.16.x.x-172.31.x.x Class C: 192.168.x.x
183
What is the first step to troubleshoot a mobile app not opening?
Clear the local app cache
184
Asset ID
ID for every piece of major hardware on a network: desktops, servers, laptops, printers and monitors
185
WEP
Wired Equivalent Privacy - outdated encryption standard - uses 64-bit and 128-bit encryption keys
186
(T/F) A rollback plan is EXTREMELY important to include in a RFC document? (Maybe even the most important aspect)
True
187
Rogue anti-virus
A fake virus alert, meant to actually trick the user into clicking the button that says to remove the virus, and it will then infect your system. These will likely pop up in a browser or on your desktop
188
What happens with hibernation mode?
It saves a session file on your hard drive and fully shuts done, different from sleep mode where it saves session details on RAM
189
Sideloading
Installing an application from a third-party provider instead of an official provider
190
(T/F) WPS is easily compromised, especially to brute-force attacks?
True
191
Mission Control
On Mac, see all windows, apps and desktops and switch between them
192
Dock
Mac’s version of “Taskbar”
193
msconfig.exe
Can be used to troubleshoot and configure the start up process of Windows machines
194
DLP software
Data loss prevention software - used to detect possible data exfiltration attempts at multiple points in the transmission process (on machine, network and in storage)
195
UDP
User datagram protocol - used with TFTP (trivial file transfer protocol) - sends connectionless, non-guaranteed packets over a network
196
Key fob
Hardware token used for authentication that generates a limited time code that matches the code on the server
197
Thin clients
Smaller, less-component heavy computers that boot from a network image. Thin clients run from resources that are stored on a network server, as opposed to a local hard drive. Can reduce software and licensing costs