Udemy
What are the minimum hardware requirements for Windows 10 (64-bit)?
1 GHz processor, 2 GB of RAM, and at least 20 GB of hard drive space
IR
Incident Response, which has 6 steps - 1) Preparation 2) Identification 3) Containment 4) Eradication 5) Recovery 6) Lessons Learned
WPA2
WiFi Protected Access 2. It is the highest level of encryption
WPS
WiFi Protected Setup. It's susceptible to brute-force attacks and therefore should be disabled
gpupdate
Windows command for making immediate group policy changes in an individual system.
WEP
Wired Equivalent Privacy (WEP) is a security protocol, specified in the IEEE Wireless Fidelity (Wi-Fi) standard, 802.11b, that is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what is usually expected of a wired LAN. It is the oldest form of wireless security and the weakest form. WEP can be cracked with brute force techniques in less than 5 minutes with a normal end-user computer.
MSCONFIG
a system utility to troubleshoot the Microsoft Windows startup process.
Windows Services
applications that typically start when the computer is booted and run quietly in the background until it is shut down
.ps1
file extension used to save a powershell text file
Power Users:
have many of the permissions of an administrator but without the ability to change everything in a Windows workstation.
Time Machine
ime Machine is the built-in backup feature of the Mac OS X operating system
CHKDSK
A Windows command to verify the hard drive does not have bad sectors that can corrupt the file system.
What is "No boot device available?"
"No boot device available" is an error message that indicates the workstation is not recognizing the hard drive
7 steps of the malware removal procedure are:
(1) Identify and research malware symptoms, (2) Quarantine the infected systems, (3) Disable System Restore (in Windows), (4) Remediate the infected systems, update the anti-malware software, scan the system, and use removal techniques (safe mode, pre-installation environment), (5) Schedule scans and run updates, (6) Enable System Restore and create a restore point (in Windows), and (7) Educate the end-user.
What are the minimum hardware requirements for Windows 10 (32-bit)?
1 GHz processor, 1 GB of RAM, and at least 16 GB of hard drive space
What is the maximum amount of RAM allowed in a 32-bit system?
4GB
.bat
A .bat file is used for a batch script. Batch scripts run on the Windows
.sh
A .sh file is used for a shell script in Linux, macOS (OS X), and Unix.
netstat
A TCP/IP troubleshooting utility that displays statistics and the state of current TCP/IP connections. It also displays ports, which can signal whether services are using the correct ports.
Backout plan
A backout plan is an IT governance integration approach that specifies the processes required to restore a system to its original or earlier state in the event of failed or aborted implementation.
Line conditioner
A device that regulates, or conditions power, providing continuous voltage during brownouts and spikes
Power spikes
A power spike is a very short pulse of energy on a power line. Power spikes can contain very high voltages up to and beyond 6000 volts but usually last only a few milliseconds instead of longer but lower voltage power surges
AUP
Acceptable Use Policy - Rules or guidelines for the proper use of technology or digital devices within an organization.
BSOD
Blue Screen of Death- an error screen displayed on a Windows computer system following a fatal system error
Chain of custody
Chain of custody (CoC), in legal contexts, is the chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of physical or electronic evidence. The chain of custody must be maintained from when you arrived at the laptop until you turn it over to law enforcement officials.
DLP
Data loss prevention software. Detects potential data breaches/data ex-filtration transmissions and prevents them by monitoring, detecting, and blocking sensitive data while in use (endpoint actions), in-motion (network traffic), and at rest (data storage)
Defragging
Defragging is a simple process when file fragments are put together to speed up file access
What are the steps for solving an issue with a mobile application?
First, clear the application cache since this locally stored information can become glitchy and cause an app to crash. If you have two of the same smartphones having the same issue, it is unlikely to be the application cache causing the issue. In this case, the technician would then attempt to update the OS of the smartphones. Updating the operating system can minimize compatibility issues and fix crashing applications. Third, you can try reinstalling the application if the other two options don't work.
The "View hidden files" option is located under the
Folder Options utility
GDPR
GDPR (General Data Protection Regulation) is a regulation that applies to companies that do business in the European Union
GPT
GPT (GUID Partition Table) is a newer way to partition disks that allow for partition sizes over the 2 TB limit imposed by MBR (Master Boot Record).
Heuristic analysis
Heuristic analysis is a method employed by many computer anti-virus programs designed to detect previously unknown computer viruses and new variants of viruses already in the wild. This is behavior-based detection and prevention, so it should detect the issue in the scenario provided and stop it from spreading throughout the network.
sfc
If some Windows functions aren't working or Windows crashes, then you can use the System File Checker (SFC) to scan Windows and restore your system files.
Leaked personal files
It's a thing
Reset upgrade
Keeps all the users files but deletes all applications
Least privilege
Least privilege is the concept and practice of restricting access rights for users, accounts, and computing processes to only those resources absolutely required to perform routine, legitimate activities.
MBR
Master Boot Record
MDM Policy
Mobile Device Management
End-user acceptance
Needed to close out project or ticket
What are the 4 forms of regulated data?
PII (Personally Identifiable Information), PCI (Payment Card Industry), GDPR (General Data Protection Regulation), and PHI (Protected Health Information)
PCI DSS
Payment Card Industry Data Security Standard. Applies to companies of any size that accept credit card payments
Blackouts and Brownouts
Periods of power loss or a significant fall in power
PXE
Preboot execution environment (PXE) is technology supported by the BIOS which can be used to boot a PC remotely. It is usually used to install an image to the computer over the network.
PHI
Protected Health Information
Rogue anti-virus
Rogue anti-virus is a form of malicious software and internet fraud that misleads users into believing there is a virus on their computer and to pay money for a fake malware removal tool (that actually introduces malware to the computer)
What does SSID stand for?
Service Set Identifier.
Environmental variables
Shell scripts and batch files use environment variables to communicate data and preferences to child processes. They can also be used to store temporary values for reference later in a shell script.
DISM
The Deployment Image Servicing and Management (DISM) is a command-line tool used to mount and service Windows images before deployment. The dism command with the /RestoreHealth option can run a scan to identify and repair any corruption of an image or virtual hard drive
LTS
The LTS (Long-Term Support) release is well-supported and will be regularly updated by the Linux distribution to support new hardware, performance, and security improvements
What is MSDS
The Material Safety Data Sheet (MSDS) is a document that contains information on the potential hazards (health, fire, reactivity, and environmental) and how to work safely with the chemical product. It is an essential starting point for the development of a complete health and safety program. The MSDS also includes the directions for proper handling and disposal of the chemicals
RegEdit
The Registry Editor (RegEdit) allows you to view and make changes to system files and programs that you wouldn't be able to access otherwise.
Task Scheduler
The Task Scheduler is a tool included with Windows that allows predefined actions to be automatically executed whenever a certain set of conditions is met
AutoRun
The Windows AutoRun feature is turned on by default on most Windows versions, allowing programs to run from an external device as soon as it is attached to a computer
Event Viewer
The Windows Event Viewer shows a log of application and system messages, including errors, information messages, and warnings
chmod
The chmod command is used to change a file or directory's permissions from the command line or terminal
chown
The chown command is used to change the owner of the file, but not its permissions
ifconfig
The ifconfig command is used to display information about the current wired network connection on a macOS or Linux system, including its IP address, subnet mask, and MAC address.
Which file system type is most commonly used on a macOS (OS X) system?
The macOS system uses HFS and HFS+. The original HFS was supported in Mac OS 8.0 and earlier. Since shifted to OS X, Apple's computers all support HFS+ by default. Modern Windows systems use NTFS by default, and older Windows systems used FAT32. NFS is the network file system and was created by Sun Microsystems for network file shares.
Micro-cut shredder
The most secure method of shredding documents
passwd
The passwd command changes passwords for user accounts on MacOS or Linux
pwd
The pwd is used to display the path to the present working directory (current directory) to the terminal or display
sudo
The sudo command allows a command to be executed as the superuser (root) instead of the current user
Complete installation
Totally formats the computers drives
UPS
Uninterruptible Power Supply. The best defense against downtime, damage and data loss
Answer file
Used for unattended installations, whereby it contains answers to the various GUI dialog boxes that would appear during a normal installation
Degaussing
Using strong magnets for scrambling data on magnetic media such as hard drives and tapes.