1/125
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Windows 10 Processor Requirements
1GHx or a faster
Windows 10 Ram Requirements
1 gb for 32 bit 2 gb for 64
Windows 10 Storage Requirements
16 gb for 32, 20 gb for 64
Windows 10 Graphics Requirements
DirectX 9 or later, 800x600 , wddm 1.0 driver
Windows 10 64 home edition
supports 128 gbs of ram, can rdp into others, but can't be rdp'd to, client only.
Domain Accounts
Managed by a server, limited user changes.
Workgroup Accounts
No central management, full user control.
BitLocker
Encrypts drives using 128 or 256-bit AES.
Group Policy Editor
Creates policies for local domains.
Get-ChildItem Command
Lists all files and folders in location.
SFC Command
Scans and repairs protected system files, File integrity checks
Change Directory Command
CD command
Disk Check Command
Finds and repairs disk errors with /f and /r.
Gpupdate Command
Updates group policy settings immediately.
MBR vs GPT
1 supports 4 partitions, 2 supports 128.
Winver Command
Displays the current Windows version.
Ipconfig Command
Troubleshoots network issues and displays settings.
Ping Command
Tests network connectivity with optional infinite run.
Hostname Command
Displays the name of the computer.
Netstat Command
Displays detailed network connections and traffic.
Nslookup Command
Diagnoses DNS issues.
Tracert Command
Shows each hop to a destination.
Task Manager Tabs
Includes Processes, Performance, Users, Services, Setup.
Microsoft Management Console (MMC)
Houses management tools called snap-ins.
Event Viewer (EVENTVWR)
Stores logs of errors and warnings.
Disk Management (DISKMGMT.msc)
Creates partitions and formats disks.
Task Scheduler (TASKSCHD.msc)
Creates automated tasks.
Device Manager (DEVMGMT.msc)
Manages hardware and drivers.
Performance Monitor (PERFMON)
Views real-time performance data.
MSINFO32
Displays detailed system information.
WOW64
Windows subsystem for running 32-bit applications.
32-bit OS
Max RAM 4 GB, slower performance.
64-bit OS
Max RAM 16 EB, faster performance.
Dedicated GPU
Standalone, more powerful, uses dedicated VRAM.
Robocopy
Command-line tool for robust file copying.
Boot Methods
USB, optical media, network (PXE) boot.
Image Deployment
Installs OS from a customized image.
Repair Installation
Attempts to fix current OS installation.
In-place Upgrade
Upgrades OS while keeping apps and files.
Refresh Installation
Reinstalls Windows, keeps personal files.
Restore Points
Automatic backups created during system changes.
MBR
Legacy partition manager, max 2 TB size.
GPT
Modern partition manager, max 9.4 ZB size.
NTFS
Default Windows file system with encryption support.
ReFS
Resilient file system for high data integrity.
APFS
Apple file system optimized for macOS.
.app File
Application bundle containing necessary files.
.dmg File
macOS disk image that needs mounting.
.pkg File
Installation package requiring no mounting.
Time Machine
macOS backup tool that deletes oldest backups.
Mission Control
Manages multiple desktops on macOS.
Keychain
macOS credential management system.
Finder
macOS GUI for file system interaction.
File Vault
Full disk encryption for macOS.
Terminal
Text-based access to macOS operating system.
LS Command
Lists all files in current directory.
Chmod Command
Sets user access rights to files, Linux
Apt
Package manager for Debian-based Linux distros.
MFA
Multi-factor authentication for enhanced security.
WPA2
Introduced in 2004, uses CCMP with AES encryption.
WPA3
Introduced in 2018, uses GCMP with AES encryption.
WEP
Legacy protocol, not secure, has two versions.
Personal WPA
Designed for SOHO, uses user-defined password.
Enterprise WPA
Uses AAA server, stronger encryption, complex setup.
TKIP
Legacy encryption protocol, less secure than AES.
CCMP
Encryption protocol using AES, part of WPA2.
GCMP
More efficient encryption protocol in WPA3.
PSK
Pre-shared key for WPA2 authentication.
EAP
Extensible Authentication Protocol for network access.
WPS
Wi-Fi Protected Setup for easy device connection.
KRACK
Vulnerability affecting WPA2 protocol security.
RADIUS
Remote Authentication Dial-In User Service protocol.
TACACS+
Cisco protocol for secure network device access.
Kerberos
Authentication protocol using tickets for access.
Rootkits
Malicious software for remote access and data theft.
Antimalware
Software designed to detect and remove malware.
SQL Injection
Attack exploiting unprotected databases via input fields.
XSS
Cross-Site Scripting, injecting scripts into trusted sites.
Encryption
Process of converting data into a secure format.
Asymmetric Encryption
Uses two related keys for secure communication.
Hash Algorithm
Generates a unique fingerprint for data.
PKI
Infrastructure for identity validation.
User Account Types
Standard, Administrator, Power User, Guest accounts.
NTFS Permissions
Access control for files and folders in Windows.
BitLocker
Drive encryption requiring TPM for security.
EFS
Encrypting File System for file-level encryption.
BYOD
Bring Your Own Device policy for employees.
COBO
Corporate Owned, Business Only device policy.
Data Destruction
//Methods include shredding, degaussing, and incinerating.
DHCP Reservations
Assign static IP based on MAC address.
SSID
Service Set Identifier for Wi-Fi networks.
Screened Subnet
Divides LAN into separate network areas.
BSOD
//Blue Screen of Death indicating system failure.
/SCANNOW
Command to scan and repair system files.
/VerifyOnly
Checks integrity of protected system files only.
/SCANFILE
Scans and repairs a specific selected file.
Clean boot
Starts Windows with minimal drivers and startup programs.
USB controller warning
Indicates issues with USB device connectivity.
System instability
Frequent crashes or performance issues in Windows.
No OS Found
Indicates that the operating system is not detected.