3: The Windows Operating System

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/53

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

54 Terms

1
New cards

Disk Operating System (DOS)

An operating system that the computer uses to enable data storage devices to read and write files.

2
New cards

Master Boot Record (MBR)

Contains small program responsible for locating and loading operating system.

3
New cards

Windows NT

Stands for "New Technologies".

4
New cards

Vulnerability

Some flaw in the operating system.

5
New cards

Hardware Abstraction Layer (HAL)

Software that handles all of the communication between the hardware and the kernel.

6
New cards

Kernel

The core of the operating system and has control over the entire computer. It handles all of the input and output requests, memory, and all of the peripherals connected to the computer.

7
New cards

File System

How information is organized on storage media.

8
New cards

New Technology File System (NTFS)

This is the most commonly used file system when installing Windows. All versions of Windows and Linux support NTFS.

9
New cards

Partition

Areas into which a hard drive is divided. Each partition is a logical storage unit that can be formatted to store information.

10
New cards

Master File Table (MFT)

Table that contains locations of all files and directories on partition, including file attributes such as security information and timestamps.

11
New cards

MACE

The timestamps Modify, Access, Create, and Entry Modified are often used in forensic investigations to determine the history of a file or folder.

12
New cards

Alternate Data Streams (ADS)

By using NTFS, you can connect Alternate Data Streams to the file. This is sometimes used by applications that are storing additional information about the file.

13
New cards

Windows Boot Process

Many actions that occur between time computer power button is pressed and Windows is fully loaded.

14
New cards

Basic Input-Output System (BIOS)

BIOS firmware was created in the early 1980s and works in the same way it did when it was created.

15
New cards

Unified Extensible Firmware Interface (UEFI)

Designed to replace BIOS and support new features.

16
New cards

Boot Configuration Database (BCD)

Contains additional code needed to start computer.

17
New cards

Registry

Record of all settings, options, hardware, and software the computer has.

18
New cards

Process

Any program that is currently executing.

19
New cards

Thread

A part of the process that can be executed. The processor performs calculations on the thread.

20
New cards

Services

Programs that run in the background to support the operating system and applications.

21
New cards

Virtual Address Space

The set of virtual addresses that the process can use.

22
New cards

Virtual Address

Not the actual physical location in memory, but an entry in a page table that is used to translate the virtual address into the physical address.

23
New cards

Process Handle

The process handle provides the access needed by the user space process without a direct connection to it.

24
New cards

Windows Registry

Windows stores all of the information about hardware, applications, users, and system settings in a large database known as the registry.

25
New cards

HKEYCURRENTUSER (HKCU)

Holds information concerning the currently logged in user.

26
New cards

HKEY_USERS (HKU)

Holds information concerning all the user accounts on the host.

27
New cards

HKEYCLASSESROOT (HKCR)

Holds information about object linking and embedding (OLE) registrations. OLE allows users to embed objects from other applications (like a spreadsheet) into a single document (like a Word document).

28
New cards

HKEYLOCALMACHINE (HKLM)

Holds system-related information.

29
New cards

HKEYCURRENTCONFIG (HKCC)

Holds information about the current hardware profile.

30
New cards

Local User

When you start a new computer for the first time, or you install Windows, you will be prompted to create a user account. This is known as a local user.

31
New cards

Group

Will have a name and a specific set of permissions associated with it.

32
New cards

Domain

A type of network service where all of the users, groups, computers, peripherals, and security settings are stored on and controlled by a database.

33
New cards

Domain Controller (DC)

Special computers or groups of computers where the domain database is stored.

34
New cards

Batch Files

Files that can be created to execute multiple commands in succession, much like a basic script.

35
New cards

Windows Management Instrumentation (WMI)

Used to manage remote computers. It can retrieve information about computer components, hardware and software statistics, and monitor the health of remote computers.

36
New cards

net command

Used in the administration and maintenance of the OS.

37
New cards

Domain Name System (DNS)

Should be tested because it is essential to finding the address of hosts by translating it from a name, such as a URL.

38
New cards

Server Message Block (SMB)

Originally developed by IBM, Microsoft aided in the development of the SMB protocol to share network resources.

39
New cards

Universal Naming Convention (UNC)

Format used to connect to resources.

40
New cards

Administrative Share

Special shares automatically created by Windows, identified by dollar sign ($) after share name.

41
New cards

Remote Desktop Protocol (RDP)

Feature that allows logging in to remote host and manipulating that computer as if it were local, to make configuration changes, install software, or troubleshoot an issue.

42
New cards

Windows Server

Edition of Windows mainly used in data centers. Family of Microsoft products that began with Windows Server 2003.

43
New cards

Process ID (PID)

Each process running on the computer has a unique PID.

44
New cards

Windows Event Viewer

Logs the history of application, security, and system events.

45
New cards

Zero-Day Exploits

These are attacks that come so quickly that defenses against them have not yet been devised and distributed.

46
New cards

Patches

Code updates that manufacturers provide to prevent a newly discovered virus or worm from making a successful attack.

47
New cards

Service Pack

From time to time, manufacturers combine patches and upgrades into a comprehensive update application called a service pack.

48
New cards

Security Policy

A set of objectives that ensures the security of a network, the data, and the computer systems in an organization.

49
New cards

Windows Local Security Policy

Can be used for stand-alone computers that are not part of an Active Directory domain.

50
New cards

Malware

Includes viruses, worms, Trojan horses, keyloggers, spyware, and adware. These are designed to invade privacy, steal information, damage the computer, or corrupt data.

51
New cards

Windows Defender

Windows has built-in virus and spyware protection called Windows Defender.

52
New cards

Firewall

A firewall selectively denies traffic to a computer or network segment.

53
New cards

Restrictive Security Policy

By opening only the required ports on a firewall, you are implementing a restrictive security policy. Any packet not explicitly permitted is denied.

54
New cards

Permissive Security Policy

Permits access through all ports, except those explicitly denied.