1/195
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Ping
verifies connectivity and it can check if a user (incluing oneself) is has connectivity
a locally shared printer has to be __
CONNECTED TO A COMPUTER and the computer will share it on the network and different OSs will need different drivers on the device that is sharing for local share to work for them
The opposite of availability is __
destruction
The opposite of confidentiality is__
disclosure
What 3 Ipconfig commands will fix most basic IP issues?
/renew /release /flush dns
Tracert shows the
path from computer to resource and the number of hops it had to do
Netstat
will show you active TCP/IP connections and network protocol statistics as well as all inbound and outbound traffic on a device/host
copy xcopy and robocopy
copy will copy 1 or more files to another location, xcopy will do that and will allow you to copy full directory trees as well as keeping file attributes and time stamps, robo copy does all that and a ton more it allows you to copy larger amounts of date with high accuracy
Chkdsk will
Only scan a drive for any LOGICAL ERRORS
Sfc - System File Checker
Checks your windows OS SYSTEM FILES for any errors and __ will scan windows files and FIX THEM evidence of windows os errors windows file explorer not working
Shutdown
/s will shutdown the computer /m will let you specify which computer on a network you want to shutdown and /t will let you set a shutdown timer
Netuser
command will list all user accounts on a pc as well as allow you to manage all users and create or delete all usernames on a system
Netuse
allows you to create a network maped drive > maps a network drive
UNC - UNAVERSAL NAMING CONVENTION
The correct UNC path is formatted like \\server\name of shared recource
Winver will tell you what version of windows you are using but msinfo32 will
give you a whole overview of your system
Device Manager
is used for rolling back/updating drivers, if you install a driver and it only messes with programs then you can roll back the driver but if it messes with the OS then reboot using the LAST KNOWN GOOD CONFIGURATION
A YELLOW /_\ triangle means
there is an error (usually a communication one but sometimes a driver error
A RED X means
that the device is disabled for unknown reasons
A black down arrow means
that the device has been manually disabled
Going to the ports tab in printer settings under devices and printers allows you to
redirect print jobs when a printer is down it will also let you see the last working IP the printer had
A network printer is available
anywhere on a network
Under view in file explorer options, you can
Hit/enable the option to have your device show hidden files as well as hide or show extensions for file types
To assign A static IP address go to
The network and sharing center then hit change adapter settings then click use the following IP input
The difference between sleep and hibernate is
that when you put a computer into sleep mode the RAM saves any data that is up and running while with hibernate the data gets saved to the pager swap files on the HDD so sleep recovers to the desktop faster since it uses RAM and Hibernate recovers from the HDD
Storage spaces lets you run
mirroring striping or parodying on external drives so it basically + RAID on eternal drives
To rename your PC and join a domain
go to the system utility in the control panel
A primary partition has a
bootable OS on it while extended partitions are the space used by the primary
A partition is called a
logical volume or drive which is part of a hard drive that is formatted differently than the rest of the drive
A basic disk partition cannot leave the
physical drive, however dynamic one’s can leave and interact with other drives and dynamic disk partitions can share their partitions with other drives
When you add a new drive to a PC you have to __ before you can use it
right click and initialize it, then you can create new partitions on inside it (only follow the instructions and put info into the fluids that you have been given the info for otherwise leave the preset settings as is)
If you have an HDD drive that has a slow boot you can ___ to help its speed when booting
defrag it, disk cleanup won't help with boot speed
Task manager gives you ___
a basic overview of your resource usage, resource monitor does this as well but it gives a bit more info and performance monitor AKA permon.msc, will let you select specific data containers and create logs over time
Flashing AKA updating the BIOS / UEFI is ___ during troubleshooting
a last resort
Regedit (command registry editor) utility has binary files that are the DNA of the OS the smallest details of windows can be changed here using the
Hkeys which are folders that contain registers
If you need to identify which version of Windows, you have you can type the msinfo32 command into the run box to pull up system information for troubleshooting which is not to be mistaken
For msconfig which is boot options and is used to hold the startup tab that was moved to the task manager don't get baited by the test into choosing the wrong but similar answer
A Windows domain is an Enterprise Network and active directory is the __
Software that manages objects and permissions on a domain
A windows work group is smaller than a domain, but it's also defined as a peer-to-peer group, so basically __
a group of peers that have no rules / admins and share data they all have the same permissions work groups can be inside a domain, but they are separate
FAT16 is legacy FAT32 cannot exceed 4GB file size and 2TB partition size FAT16, FAT32 and xFAT all have __
Fewer optimization and customization options because they are built to manage less data, so they are good for removable media like thumb and flash drives
NTFS is Windows proprietary (Windows only) it also offers file-level security through__
EFS (encrypting file system) which allows a single directory to be encrypted while BitLocker encrypts the whole drive
802.11b and 802.11g
B - supports a theoretical speed of up to 11 Mbps and uses 2.5 GHz
G - supports bandwidth up to 54 Mbps and uses the 2.4 GHz frequency and is backwards compatible with B
802.11a and 802.11ac
A - supports bandwidth up to 54 Mbps and uses 5GHz
AC - Supports up to 1GB and uses 5GHz
802.11n and 802.11ax
N - supports MIMO and supports up to 600 Mbps of network bandwidth and is backward compatible with all
Ax - supports 9.5 Gbps and is compatible on both 5 and 2.4 GHz
802.11n uses __
MIMO
802.11ac and 802.11ax both use
MU-MIMO
5GHz suffers from __
Attenuation more than 2.4 GHz
1, 6 and 11 are __
Non overlapping 2.4 channels
All odd numbers end in 1 in binary math and all__
even numbers end in 0
0 and 255 in the IP range are not
usable
A loopback IP address (Aka- local host) is a preassigned address that represents you, it is for testing connectivity to your device. It is for pinging your own device to check things like if TCP is installed correctly or if there are any errors on your machine and uses the whole
127 range eg- 127.0.0.0 to 127.255.255.255 and it is essentially your own IP address
Multicast is one to many communication - routers use this to update other routers on new info about other routers it uses the private IP range of address that are reserved for multicast use and it referred to as a class d address and it goes from
224.0.0.0 to 239.255.255.255
APIPA IP address range is
169.254.0.0 to 169.254.255.255
Reservations allow you to bind a MAC address to an
IP addresses
Exclusive range is the scope of addresses that the server ___ assign
cannot
Routers connect dissimilar networks however, when you are on a switch you have to be on the same network to communicate. so routers are for getting off the local LAN while switches
allow you to communicate with only the devices on your local LAN. - The default gateways have to be in the same network class as the IP address for them to have connectivity
PUBLIC IP ADDRESSES
Class A –
Class B –
Class C –
Class D –
PUBLIC IP ADDRESSES
Class A – 1.0.0.0 to 126.255.255.255
Class B – 128.0.0.0 to 191.255.255.255
Class C – 192.0.0.0 to 223.255.255.255
Class D – 224.0.0.0 to 239.255.255.255
Private non-routable ipv4 - NAT-addresses
Class A -
Class B -
Class C -
Private non-routable ipv4 - NAT-addresses
Class A is anything starting with a 10 so 10.0.0.0 to 10.255.255.255
Class B - 172.16.0.0 to 172.31.255.255
Class C - 192.168.0.0 to 192.168.255.255
A records maps
A mac address to an IPv4 address
AAAA records maps
a mac address to an IPv6 address
Chronological name records (Cname) records maps
abbreviations/allies of domain names to the websites
MX records point to the
IP of a mail server
TXT records includes (SPF) which is sender policy framework and it deals with
spam and it manages it as well. In essence its a list of hostnames/Ip and IPv6 addresses that mail can be sent too so no one can go sent up a spoofed mail server
(DKIM) Domain keys identified mail provides
authentication of mail being sent and received to prevent spam, so this is the key that is used so that sending and receiving mail is possible
(DMARC) Domain-based message authentication reporting and conformance controls what happens
If authentication fails to prevent spam
RFS - Resilient file systems is the planned replacement for
NTFS and it has a built-in check disk that is always running checks for logical errors only
HFS/APFS is
Apple's file system
ext3 and ext4
are Linux file systems
NTFS permissions if someone has the (modify or change) permissions, they can delete data, effective permissions occur when you have overlapping NTFS and share permissions in the event of having both NTFS and share permissions the most__
restrictive permissions apply so if you have last permissions on one then those are the only ones that you get
When you move or copy a file within NTFS to another partition it will inherit the new file permissions of that partition except when__
you move it to a folder within the same partition that is when it will retain the same permissions and if you are moving an NTFS file to a non-NTFS system all permissions are lost
The RAID with the best/max performance is
RAID 0
WPA introduced__
TKIP - the temporal key integrity protocol
Task manager allows you to choose
which programs will start upon boot
Port 25 is SMTP
465 or the secure version which is 587
Port 143 is
IMAP and 993 is the secure version
MSTSC (Microsoft Terminal Service Client) =
RDP port 3389
WPE and WPA both use RC4 when we transferred to WPA2 we started using
AES - Advanced encryption standard
The Windows utility device manager should be used to
roll back a device driver
The Windows utility FILE EXPLORER OPTIONS can be used to
find hidden files
Mac OS
Taskbar =
multi-screen view =
password manager =
file explorer =
spotlight =
multiple inputs on a touchpad =
remote disk allows you to —
Mac OS
Taskbar = dock
multi-screen view = mission control
password manager = keychain it's a standalone utility
file explorer = finder searching in the file system
spotlight = search utility
multiple inputs on a touchpad = gestures or “magic mouse”
remote disk allows you to remotely access the optical drive of another Mac PC on your network
ISO files =
disc image of an OS and this goes for Windows too
Linux permissions
R = read =
W = write =
X = execute =
Linux permissions
R = read = 4
W = write = 2
X = execute = 1
With Linux permissions there are owner, group, and world/other permissions and they all go in the same line like rwx/rwx/rwx and also 7/7/7 or if someone had only rw it'd be 6 and so on and so forth when numbered permissions are called
octal permissions and the first set of permissions is the owner permissions the second set is the group permissions, and the last set is everyone else's permissions
In Linux ls
lists directory content
In Linux man is short for
Manual and it shows you how to use a command
In Linux mv
is used to move a file
In Linux dd
will copy and convert a file
In Linux cp
is a basic copy
In Linux rm
is remove which will delete the file
In Linux su
is super user which turns you into the windows version of an admin as far as permissions go AKA a root user
In Linux sudu
allows you to do one thing as a super user
In Linux chmod
changes the permissions themselves
In Linux chown
changes the owner of the resource who has all the permissions
In Linux apt/get
installs and updates packages (which is a software of some kind) from a repository, which is the location data is stored in and yum+rpm does the same thing as apt/get but on the red hat distribution of Linux only
df shows you
disk space/info df also stands for a disc/free
with Linux you typically can't change a files permission unless you are the owner, so you have to use
chown and then chmod
On Linux there is no ipconfig there is only ifconfig and iwconfig ifconfig is the
wired version of ipconfig and iwconfig is the wireless version of ifconfig, ip changes networking settings don't get it mixed up with all the other IP commands
In Linux grep searches for
a string of text like if you wanted to find where "I love you' was typed within all your notepads
In Linux the dig command is
used for verifying and troubleshooting DNS problems and to perform DNS lookups
In Linux Cat concatenate =
combining files
In Linux Nano gives you
direct access to a text editor
802.1x is used in
WPA2 enterprise for Port based authentication