A+ 1102 combined set (abridged)

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/95

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

96 Terms

1
New cards

exFAT

- Microsoft flash drive file system
- files can be larger than 4 GB
- compatible across many operating systems (Windows, Linux, Mac OS)

2
New cards

NTFS

- provides extensive improvements over FAT32
- quotas, file compression, symbolic links, encryption, large file support, etc.
- not very compatible across operating systems
- many will read NTFS, but not write (or will have limited writing functionality)

3
New cards

Finder

- the central OS file manager
- provides integrated access to other devices

4
New cards

Remote Disc

- use an optical drive from another computer
- designed for copying data files
- set up in System Preferences, under Sharing

5
New cards

Force Quit

- press cmd-option-esc to bring up the menu
- or, hold down the option key when right clicking the application icon in the dock

6
New cards

Accessability

- allow applications to use system input
- can be used to further secure a system

7
New cards

"sdelete" (command)

- file level overwriting

8
New cards

Access Control Lists (acronym)

ACL

9
New cards

ACL

- used to allow or deny traffic
- also used by operating systems
- commonly used on the ingress or egress of a routing interface

10
New cards

Non-Persistent (Reflected) Cross-Site Scripting Attacks (steps)

1. the website allows scripts to run inside of user input prompts and text boxes
2. to utilize this design flaw, the attacker emails a link
3. this link runs a script that sends credentials, session IDs, and cookies to the attacker
4. simultaneously, the script embedded in the URL executes in the victim's browser

11
New cards

Persistent (Stored) Cross-Site Scripting Attacks

- malicious code is placed on a centralized server, such as a social media website
- inside of a comment, for example
- everybody who visits the page or who views the comment gets attacked
- no specific target

12
New cards

Standard Operating Environments

- a set of tested and approved hardware/software systems
- often a standalone OS image

13
New cards

Patch Management (steps)

1. test
2. prioritize
3. deploy

14
New cards

EOSL

- similar to EOD, but support is no longer available
- a costly, premium support option may exist, though

15
New cards

Windows Firewall Exception Rule Types (list)

- program
- port
- predefined
- custom

16
New cards

NTFS Permissions

- apply from local and network connections
- inherited from the parent

17
New cards

Share Permissions

- only apply to connections over the network
- the most restrictive setting wins

18
New cards

User Account Control (acronym)

UAC

19
New cards

User Account Control

- pop-up approval screen
- limits user capabilities
- secure desktop

20
New cards

Verifying Certificate Details (list)

verify
- not expired
- domain name
- properly signed
- date and time

21
New cards

Unable to Access The Network (Troubleshooting)

- may be due to malware
- symptoms:
- slow performance and lock up
- internet connectivity issues
- OS update failures
- use malware cleaner or reload from a known good backup

22
New cards

Altered System or Personal Files (Troubleshooting)

- indicates malware
- remove or reload from a known good backup

23
New cards

Browser Redirection (Troubleshooting)

- malware is the most common cause
- best practice is to restore from a known good backup

24
New cards

App Issues (Troubleshooting)

- restart the device
- stop the app and restart
- or update the application

25
New cards

App Fails to Update (Troubleshooting)

- manually update
- restart the device

26
New cards

OS Fails to Update (Troubleshooting)

- check available storage
- check available bandwidth
- connect to wifi
- try a different network connection
- reboot

27
New cards

Battery Life Issues (Troubleshooting)

- caused by bad reception or an aging battery
- disable unnecessary features
- check application battery usage

28
New cards

Random Reboots (Troubleshooting)

- check the OS and application versions
- perform a hardware check
- check the battery health
- contact tech support for options
- crash logs should be on the device

29
New cards

No Wifi Connectivity (Troubleshooting)

- check/enable Wifi
- check security key configuration
- hard reset your device

30
New cards

"pwd" (command)

- prints the working directory's name (path)

31
New cards

Linux File System Mode Cheat Sheet (image)

knowt flashcard image
32
New cards

Commonly Used "ip" Commands (list)

- "ip address"
- "ip route"

33
New cards

"df" (command)

- view file systems and free space
- presented in blocks
- use "df -h" to view in human-readable sizes

34
New cards

"top" (command)

- view resource utilization
- includes a summary of the overall load
- presented in one, five, and fifteen minute intervals

35
New cards

"cat" (command)

- concatenate files
- "cat [first file and extension] [second file and extension]"
- copies a file or files to another file

36
New cards

"rsync" (command)

- provides a utility for syncing files between storage devices
- can be instant or scheduled

37
New cards

Software Center

Linux's version of the Mac OS App Store

38
New cards

"samba"

- file server utility
- often used to add SMB (Server Message Block) to Linux systems
- implement file and printer sharing
- integrate with Active Directory
- integrates Linux into a Windows environment

39
New cards

Starting the Windows Recovery Environment

- hold shift while clicking the restart button
- or, boot from installation media
- or, restart into advanced startup
- recovery > troubleshoot > advanced options > command prompt

40
New cards

Malware Removal Process (steps)

1. verify malware symptoms
2. quarantine infected
3. disable system restore
4. remediate : update anti-virus
5. remediate : scan and remove
6. schedule scans and run updates
7. enable system protection
8. educate the end user

41
New cards

4. Remediate : Update Anti-Virus (Malware Removal Process)

- the malware may prevent the update process
- copy updated signatures onto your computer

42
New cards

5. Remediate : Scan and Remove (Malware Removal Process)

use tools or run in Safe Mode or in WinPE

43
New cards

Galois Message Authentication Code (acronym)

GCMP with GMAC

44
New cards

Counter Mode with Cipher Block Chaining
Message Authentication Code Protocol (acronym)

CCMP with CBC-MAC

45
New cards

Simultaneous Authentication of Equals (acronym)

SAE

46
New cards

WPA2

- uses CCMP block cipher mode
- provides data confidentiality using AES encryption
- adds a MIC with CBC-MAC (compared to WPA)

47
New cards

WPA3

- introduced in 2018
- uses GCMP block cipher mode
- a stronger encryption method than WPA2
- provides data confidentiality with AES
- includes MIC with GMAC

48
New cards

TACACS

- remote authentication protocol
- created to control access to dial-up lines to ARPANET

49
New cards

TACACS+

- the latest version of TACACS
- provides more authentication requests and response codes
- released as an open standard in 1993
- commonly associated with Cisco devices, though

50
New cards

Kerberos

- network authentication protocol
- supports SSO
- provides mutual authentication between the client and the server
- prevents against on-path or replay attacks
- standard since the 1980s
- used for Windows Domain authentication

51
New cards

Acceptable Use Policy (acronym)

AUP

52
New cards

Differential Backup

subsequent backups contain data changed since the last full backup

53
New cards

Incremental Backup

- subsequent backups contain data changed since the last full backup and the last incremental backup
- a restoration requires the last full backup and all of the incremental backups

54
New cards

Synthetic Backup

- the first full backup copies every file
- subsequent full backups are created from previous backups

55
New cards

Uninterruptible Power Supply (UPS) Types (term-5list)

- standby UPS
- line-interactive UPS
- on-line UPS

56
New cards

Surge Suppressor Specifications (list)

- joule ratings
- surge absorption
- look for 600+ joules of protection
- surge amp ratings
- UL 1449 voltage let-through ratings
- ratings at 500, 400, and 300
- lower is better

57
New cards

Incident Response : Chain of Custody

- control evidence and maintain integrity
- documents everybody who comes into contact with the evidence
- avoid tampering
- use hashes
- label and catalog everything
- use digital signatures

58
New cards

Incident Response : First Response (steps)

1. identify the issue
- logs, monitoring data
2. report to proper channels
3. collect and protect evidence

59
New cards

PHI

regulated with HIPAA

60
New cards

RDP (Microsoft Remote Desktop Protocol)

- clients for MacOS, Linux, etc.
- remotely connect to a Windows device

61
New cards

Remote Frame Buffer Protocol (acronym)

RFB

62
New cards

VNC

- uses RFB protocol
- clients for many operating systems

63
New cards

Maximum Supported RAM for x64 (64-bit) Windows 10 Operating System Versions (list)

- Windows 10 Home: 128 GB
- Windows 10 Pro: 2 TB
- Windows 10 Pro for Workstations: 6 TB
- Windows 10 Enterprise: 6 TB

64
New cards

Group Policy Editor

- centrally manage users and systems
- commonly associated with Active Directory
- though, policies can be part of a local system

65
New cards

Local Group Policy (command)

"gpedit.msc"

66
New cards

Group Policy Management Console

integrated with Active Directory

67
New cards

Group Policy Management Console (command)

"gpmc.msc"

68
New cards

In-Place Upgrade Paths to Windows 10 (list)

- Windows 7
- Windows 8.1
- not Windows 8.0

69
New cards

Roll Back a Windows Upgrade (instructions)

start > settings > system > recovery > go back

70
New cards

Organizational Units (acronym)

OU

71
New cards

Group Policy Updates

- manage the computer or users with group policies, using the group policy management front-end and editor
- a central console
- update a client with the "gpupdate" utility
- applies policy changes
- "gpupdate /force" will update all of the group policies

72
New cards

Assigning a Home Folder to a Network Folder

- allows you to manage and backup files from the network
- when added to a user profile, the directories are automatically created, with proper permissions assigned

73
New cards

Folder Redirection

- redirects folders to a network share
- user configuration > policies > windows settings > folder redirection
- often paired with the Offline Files feature

74
New cards

Built-In Windows Groups (list)

- users, guests
- remote management users
- event log readers

75
New cards

Microsoft Management Console

- build your own management consoles
- add snap-ins to customize
- mmc.exe

76
New cards

Power Options (Control Panel)

- configure how Windows uses power
- options to choose what closing the lid on a laptop does
- options for USB selective suspend
- used to disable individual USB devices
- enable or disable fast startup

modes:
- hibernate
- open documents and applications are saved to the disk
- used by Fast Startup
- sleep (standby)
- open files and applications are stored in memory
- save power and startup quickly
- switches to hibernate if power is low

77
New cards

Blue Screens and Frequent Shutdowns

- might be linked to bad hardware, bad drivers, or a bad application
- use last known good, system restore, or rollback drivers to troubleshoot a possible software problem
- or try safe mode
- if potentially hardware related, remove or reseat the hardware
- run hardware diagnostics

78
New cards

Sluggish Performance

- check task manager for high CPU and I/O utilization
- update Windows
- check for available disk space and defrag
- verify power-saving mode is turned off (laptops)
- run an anti-virus scan and an anti-malware scan

79
New cards

Windows Boot Configuration (acronym)

BCD

80
New cards

Windows Boot Configuration

"bootrec /rebuildbdcd" in the recovery console

81
New cards

Boot Errors

- may be caused by a boot loader replacement or changes

try:
- checking boot drives
- remove any removable media
- using startup repair
- modifying BCD

82
New cards

Startup Repair

- useful in missing NTLDR troubleshooting
- the main Windows boot loader is missing
- run Startup Repair or replace manually and reboot
- disconnect any removable media
- also useful with missing OS errors
- boot configuration data may be incorrect
- settings > system > recovery
- or run from advanced boot options

83
New cards

Starting The System Troubleshooting

- if Windows is starting, but a device is not, check device manager and event viewer
- often due to a bad driver
- remove or replace
- the "one or more services failed to start" error is due to bad/incorrect drivers or bad hardware
- try starting manually
- check account permissions
- check service dependencies
- check system files (Windows Service)
- reinstall application (application service)

84
New cards

Application Crashing

- check the event log and/or the reliability monitor
- reinstall the application
- contact application support

85
New cards

System Instability

- general system failures

troubleshooting:
- run a full diagnostic (first)
- check the OS
- run SFC
- perform an anti-malware scan

86
New cards

System File Checker

- verifies the integrity of the OS
- "sfc /scannow"

87
New cards

Deleting a Windows Profile (steps)

1. login to the computer with domain administrator rights
2. rename the \users\name folder
3. backup the user's registry
- HKLM\software\microsoft\windows nt\currentversion\profilelist
- right click and export
4. delete the registry entry

88
New cards

Recreating a Windows Profile (steps)

1. login to the computer with the user account
- the profile will be rebuilt
2. login as the domain administrator and copy any important files from the old profile, to the new profile

89
New cards

GPT Partition Style

- the latest partition format standard
- requires a UEFI BIOS
- can have up to 128 partitions
- maximum partition size is over 9 billion TB
- no need for extended partitions or logical drives

90
New cards

MBR Partition Style

- maximum partition size of 2 TB
- includes primary and extended partitions

primary partitions:
- bootable
- maximum of four per hard disk
- one can be marked as active

extended partitions:
- used for extending the maximum number of partitions
- one per hard disk (though optional)
- contains additional logical partitions
- not bootable

91
New cards

Shared Resources

- make a folder or printer available on the network
- share by mapping a drive letter to a share
- shares ending with a $ are hidden
- view shares in Administrative Tools/Computer Management

92
New cards

Mapping Drives

- needed to access a share on a remote device
- associates a drive letter with a share name
- view network shares in "This PC"
- create using "map network drive"
- or by using "net use [drive letter]: \\[server]\[name]" in command prompt
- disconnect a share in the toolbar or by right-clicking the drive

93
New cards

Sharing a Printer

- access the share function in printer properties, file explorer, or the settings application
- manage printer access under the security tab

94
New cards

Accessing a Shared Printer

add the printer to your system from file explorer or from the settings application

95
New cards

Windows Firewall Configuration Options (list)

- block all incoming connections
- ignores your exceptions
- the most secure option
- modify notifications
- app blocking

96
New cards

Allowing an Application or Feature Through Windows Firewall Options (list)

- block or allow by port number
- use predefined exceptions
- set custom rules