Udemy

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What are the minimum hardware requirements for Windows 10 (64-bit)?

1 GHz processor, 2 GB of RAM, and at least 20 GB of hard drive space

IR

Incident Response, which has 6 steps - 1) Preparation 2) Identification 3) Containment 4) Eradication 5) Recovery 6) Lessons Learned

WPA2

WiFi Protected Access 2. It is the highest level of encryption

WPS

WiFi Protected Setup. It's susceptible to brute-force attacks and therefore should be disabled

gpupdate

Windows command for making immediate group policy changes in an individual system.

WEP

Wired Equivalent Privacy (WEP) is a security protocol, specified in the IEEE Wireless Fidelity (Wi-Fi) standard, 802.11b, that is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what is usually expected of a wired LAN. It is the oldest form of wireless security and the weakest form. WEP can be cracked with brute force techniques in less than 5 minutes with a normal end-user computer.

MSCONFIG

a system utility to troubleshoot the Microsoft Windows startup process.

Windows Services

applications that typically start when the computer is booted and run quietly in the background until it is shut down

.ps1

file extension used to save a powershell text file

Power Users:

have many of the permissions of an administrator but without the ability to change everything in a Windows workstation.

Time Machine

ime Machine is the built-in backup feature of the Mac OS X operating system

CHKDSK

A Windows command to verify the hard drive does not have bad sectors that can corrupt the file system.

What is "No boot device available?"

"No boot device available" is an error message that indicates the workstation is not recognizing the hard drive

7 steps of the malware removal procedure are:

(1) Identify and research malware symptoms, (2) Quarantine the infected systems, (3) Disable System Restore (in Windows), (4) Remediate the infected systems, update the anti-malware software, scan the system, and use removal techniques (safe mode, pre-installation environment), (5) Schedule scans and run updates, (6) Enable System Restore and create a restore point (in Windows), and (7) Educate the end-user.

What are the minimum hardware requirements for Windows 10 (32-bit)?

1 GHz processor, 1 GB of RAM, and at least 16 GB of hard drive space

What is the maximum amount of RAM allowed in a 32-bit system?

4GB

.bat

A .bat file is used for a batch script. Batch scripts run on the Windows

.sh

A .sh file is used for a shell script in Linux, macOS (OS X), and Unix.

netstat

A TCP/IP troubleshooting utility that displays statistics and the state of current TCP/IP connections. It also displays ports, which can signal whether services are using the correct ports.

Backout plan

A backout plan is an IT governance integration approach that specifies the processes required to restore a system to its original or earlier state in the event of failed or aborted implementation.

Line conditioner

A device that regulates, or conditions power, providing continuous voltage during brownouts and spikes

Power spikes

A power spike is a very short pulse of energy on a power line. Power spikes can contain very high voltages up to and beyond 6000 volts but usually last only a few milliseconds instead of longer but lower voltage power surges

AUP

Acceptable Use Policy - Rules or guidelines for the proper use of technology or digital devices within an organization.

BSOD

Blue Screen of Death- an error screen displayed on a Windows computer system following a fatal system error

Chain of custody

Chain of custody (CoC), in legal contexts, is the chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of physical or electronic evidence. The chain of custody must be maintained from when you arrived at the laptop until you turn it over to law enforcement officials.

DLP

Data loss prevention software. Detects potential data breaches/data ex-filtration transmissions and prevents them by monitoring, detecting, and blocking sensitive data while in use (endpoint actions), in-motion (network traffic), and at rest (data storage)

Defragging

Defragging is a simple process when file fragments are put together to speed up file access

What are the steps for solving an issue with a mobile application?

First, clear the application cache since this locally stored information can become glitchy and cause an app to crash. If you have two of the same smartphones having the same issue, it is unlikely to be the application cache causing the issue. In this case, the technician would then attempt to update the OS of the smartphones. Updating the operating system can minimize compatibility issues and fix crashing applications. Third, you can try reinstalling the application if the other two options don't work.

The "View hidden files" option is located under the

Folder Options utility

GDPR

GDPR (General Data Protection Regulation) is a regulation that applies to companies that do business in the European Union

GPT

GPT (GUID Partition Table) is a newer way to partition disks that allow for partition sizes over the 2 TB limit imposed by MBR (Master Boot Record).

Heuristic analysis

Heuristic analysis is a method employed by many computer anti-virus programs designed to detect previously unknown computer viruses and new variants of viruses already in the wild. This is behavior-based detection and prevention, so it should detect the issue in the scenario provided and stop it from spreading throughout the network.

sfc

If some Windows functions aren't working or Windows crashes, then you can use the System File Checker (SFC) to scan Windows and restore your system files.

Leaked personal files

It's a thing

Reset upgrade

Keeps all the users files but deletes all applications

Least privilege

Least privilege is the concept and practice of restricting access rights for users, accounts, and computing processes to only those resources absolutely required to perform routine, legitimate activities.

MBR

Master Boot Record

MDM Policy

Mobile Device Management

End-user acceptance

Needed to close out project or ticket

What are the 4 forms of regulated data?

PII (Personally Identifiable Information), PCI (Payment Card Industry), GDPR (General Data Protection Regulation), and PHI (Protected Health Information)

PCI DSS

Payment Card Industry Data Security Standard. Applies to companies of any size that accept credit card payments

Blackouts and Brownouts

Periods of power loss or a significant fall in power

PXE

Preboot execution environment (PXE) is technology supported by the BIOS which can be used to boot a PC remotely. It is usually used to install an image to the computer over the network.

PHI

Protected Health Information

Rogue anti-virus

Rogue anti-virus is a form of malicious software and internet fraud that misleads users into believing there is a virus on their computer and to pay money for a fake malware removal tool (that actually introduces malware to the computer)

What does SSID stand for?

Service Set Identifier.

Environmental variables

Shell scripts and batch files use environment variables to communicate data and preferences to child processes. They can also be used to store temporary values for reference later in a shell script.

DISM

The Deployment Image Servicing and Management (DISM) is a command-line tool used to mount and service Windows images before deployment. The dism command with the /RestoreHealth option can run a scan to identify and repair any corruption of an image or virtual hard drive

LTS

The LTS (Long-Term Support) release is well-supported and will be regularly updated by the Linux distribution to support new hardware, performance, and security improvements

What is MSDS

The Material Safety Data Sheet (MSDS) is a document that contains information on the potential hazards (health, fire, reactivity, and environmental) and how to work safely with the chemical product. It is an essential starting point for the development of a complete health and safety program. The MSDS also includes the directions for proper handling and disposal of the chemicals

RegEdit

The Registry Editor (RegEdit) allows you to view and make changes to system files and programs that you wouldn't be able to access otherwise.

Task Scheduler

The Task Scheduler is a tool included with Windows that allows predefined actions to be automatically executed whenever a certain set of conditions is met

AutoRun

The Windows AutoRun feature is turned on by default on most Windows versions, allowing programs to run from an external device as soon as it is attached to a computer

Event Viewer

The Windows Event Viewer shows a log of application and system messages, including errors, information messages, and warnings

chmod

The chmod command is used to change a file or directory's permissions from the command line or terminal

chown

The chown command is used to change the owner of the file, but not its permissions

ifconfig

The ifconfig command is used to display information about the current wired network connection on a macOS or Linux system, including its IP address, subnet mask, and MAC address.

Which file system type is most commonly used on a macOS (OS X) system?

The macOS system uses HFS and HFS+. The original HFS was supported in Mac OS 8.0 and earlier. Since shifted to OS X, Apple's computers all support HFS+ by default. Modern Windows systems use NTFS by default, and older Windows systems used FAT32. NFS is the network file system and was created by Sun Microsystems for network file shares.

Micro-cut shredder

The most secure method of shredding documents

passwd

The passwd command changes passwords for user accounts on MacOS or Linux

pwd

The pwd is used to display the path to the present working directory (current directory) to the terminal or display

sudo

The sudo command allows a command to be executed as the superuser (root) instead of the current user

Complete installation

Totally formats the computers drives

UPS

Uninterruptible Power Supply. The best defense against downtime, damage and data loss

Answer file

Used for unattended installations, whereby it contains answers to the various GUI dialog boxes that would appear during a normal installation

Degaussing

Using strong magnets for scrambling data on magnetic media such as hard drives and tapes.


Ensembles d'études connexes

Chapter 3 Assignment for Module 12

View Set

11. Quiz 2: Eating the Right Foods

View Set

Human Resource Management - Exam 2

View Set

Economics Ch. 5-6 Quiz Questions

View Set