CompTia A+ Core 2 (220-1002) yesss

Ace your homework & exams now with Quizwiz!

services.msc

Control Panel\All Control Panel Items\Administrative Tools\ Services Opens the services window in this window, services can be started, stopped, restarted enabled and disabled

msinfo32.exe

Control Panel\All Control Panel Items\Administrative Tools\ System Information - System Summary + Hardware Resources + Components + Software Environment

DRM

Digital Rights Management

netstat -a

Display all connections and listening ports

netstat -b

Display the name of an application involved in creating each connection or listening port

netstat -n

Displays addresses and port numbers in numerical form

net user <username>

Displays user account information

NTFS

New Technology File System The file system that the Windows NT operating system uses for storing and retrieving files on a hard disk

Multiboot installation

OS installation in which multiple operating systems are installed on a single machine.

OSHA

Occupational Safety and Health Administration

SSE2 (Streaming SIMD Extensions 2)

One of the Intel SIMD (Single Instruction, Multiple Data) processor supplementary instruction sets first introduced by Intel with the initial version of the Pentium 4 in 2000. It extends the earlier SSE instruction set, and is intended to fully replace MMX.

Windows 7 Starter

Only 32-bit version Maximum 2GB RAM

MBR (Master Boot Record)

Overall number of partitions limited to 4. Up to three primary partitions and one extended partition. Up to four primary partitions. Each logical drive within the extended partition CANNOT be transformed into a bootable drive.

Paging File

PAGEFILE.SYS A hidden, optional system storage file on a hard disk. Only one is installed on each hard disk, although more can be added. The paging file can support system crashes and expand the amount of system-committed memory, or virtual memory, that a system can back. Windows uses a page file to store data that can't be held by your computer's RAM when it fills up. While you can tweak the page file settings, Windows can manage the page file fine on its own.

Windows 7 Editions

Windows 7 Starter Windows 7 Home Basic Windows 7 Home Premium Windows 7 Ultimate Windows 7 Professional Windows 7 Enterprise

pwd

print working directory

chown command

used on Unix-like systems to change the owner of file system files, directories

Windows 7 Professional

• 64-bit version supports up to 192 GB RAM • Multi-user fast switching • Remote Desktop hosting • Support for domain networking • Location aware printing • Dynamic disks • Encryption File System (EFS) • Windows XP Mode with Windows Virtual PC • Volume licensing • No Bitlocker

exFAT (Extended File Allocation Table)

A 64-bit version of the file allocation table file system designed for use on large USB flash drives. No realistic file-size or partition-size limits.

BitLocker

A Windows feature that encrypts an entire drive. Built to the NTFS file system. FDE (Full Disk Encryption)

Minimum system requirements for 32-bit (x86) version of Microsoft Windows 7

1 GHz CPU 1 GB of system RAM DirectX 9 graphics device with WDDM 1.0 or higher driver 16 GB of free hard disk space

Minimum system requirements for 64-bit (x64) version of Microsoft Windows 7

1 GHz CPU 2 GB of system RAM DirectX 9 graphics device with WDDM 1.0 or higher driver 20 GB of free hard disk space

Minimum system requirements for 32-bit (x86) version of Microsoft Windows 10

1 GHz CPU with support for PAE, NX, and SSE2 1 GB of system RAM DirectX 9 graphics device with WDDM 1.0 or higher driver 16 GB of free hard disk space

Minimum system requirements for 64-bit (x64) version of Microsoft Windows 10

1 GHz CPU with support for PAE, NX, and SSE2 2 GB of system RAM DirectX 9 graphics device with WDDM 1.0 or higher driver 20 GB of free hard disk space

Minimum system requirements for 64-bit (x64) version of Microsoft Windows 8/8.1

1 GHz CPU with support for PAE, NX, and SSE2 2 GB of system RAM DirectX 9 graphics device with WDDM 1.0 or higher driver 20 GB of free hard disk space

Minimum system requirements for 32-bit (x86) version of Microsoft Windows 8/8.1

1 GHz CPU with support for PAE, NX, and SSE2 1 GB of system RAM DirectX 9 graphics device with WDDM 1.0 or higher driver 16 GB of free hard disk space

AUP (Acceptable Use Policy)

A Set of rules and guidelines that are set up to regulate Internet use and to protect the user.

dxdiag.exe

A Windows command used to display information about hardware and diagnose problems with DirectX.

Partition Types

1. Primary 2. Logical 3. Extended Primary partition is a bootable partition and it contains the operating system/s of the computer, while logical partition is a partition that is not bootable. Multiple logical partitions allow storing data in an organized manner. An extended partition is a partition that can be divided into additional logical drives. Unlike a primary partition, you don't need to assign it a drive letter and install a file system. Instead, you can use the operating system to create an additional number of logical drives within the extended partition.

32bit vs. 64bit

32-bit Processor: 4GB RAM or less (Windows) Maximum of 4 GB (2^32 bytes) of memory 64-bit Processor: Theoretical maximum of 18 EB (2^64 bytes). Practical limit is 8 TB of addressable RAM Limitations + Software Compatibility

Swap Partition

A disk partition configured to be used as an extension to a computer's RAM. This enables a system to run more programs or to process larger data sets than would otherwise be possible.

WPS (Wi-Fi Protected Setup)

A feature with many wireless devices that allows users to configure wireless security with a push button or a PIN. When enabled, it is vulnerable to attacks using free open source software.

Physical Address Extension (PAE)

A memory management feature that allows 32-bit CPUs to use more than 4 GB of physical memory on capable versions of Microsoft Windows operating systems

Factory Recovery Partition

A partition that contains an image of the bootable partition created when the computer was built.

TKIP (Temporal Key Integrity Protocol)

A security protocol created by the IEEE 802.11i task group to replace WEP.

MSDS

A widely used abbreviation for Material Safety Data Sheet. A MSDS contains details of the hazards associated with a chemical, and gives information on its safe use.

net user

Adds or modifies user accounts, or displays user account information.

BranchCache

Allows computers at a local branch office to cache data from a file or web server on a WAN (wide area network). The data can be cached either on the client computers, in distributed cache mode, or on a local server, in hosted cache mode. By caching data locally, there is a reduction in WAN traffic and applications often respond faster due to using local files instead of retrieving them over the WAN.

Software Token

An app, or other software that generates a token for authentication.

%appdata%

An environment variable is a dynamic "object" on a computer, containing an editable value, which may be used by one or more software programs in Windows. Environment variables help programs know what directory to install files in, where to store temporary files, and where to find user profile settings.

ext4

An improved version of the ext3 filesystem with an extended feature set and better performance. 1EB Storage

Disk storage types used with MS Windows

Basic & Dynamic: Dynamic disks provide features that basic disks do not, such as the ability to create volumes that span multiple disks (spanned and striped volumes) and the ability to create fault-tolerant volumes (mirrored and RAID-5 volumes). A newly added drive is by default partitioned as a basic disk.

Block-level backup

Block-level backup is a feature that allows to upload only the changed parts of files instead of whole files. In order to do that, it uses snapshot technology. Block-level backup software reads data in the same sized blocks as the file system, or the parameter is chosen by software developers

x86 Architecture

CPU architecture first used in the Intel 8086. Indicates 32-bits

shutdown /s /t 60

Command for setting the time-out period of 60 seconds before powering off a Windows host

TASKLIST Command

Command line to see a list of all the running processes

shutdown /a

Command switch enables aborting a system shutdown

shutdown /r

Command switch in Microsoft Windows Command Prompt forces full system shutdown and restart of a Windows host

shutdown /r /t 120

Command-line commands enables a full system shutdown and restart of an MS Windows host after a time-out period of two minutes

CDFS

Compact Disc File System. The 32-bit file system for CD discs and some CD-R and CD-RW discs.

EFS

Encrypting File System

EOL

End of life

EIDE

Enhanced Integrated Drive Electronics; interface that uses parallel signals to transfer data, instructions, and information.

FAT32

File allocation table that uses 32 bits to address and index clusters. Commonly used with USB flash-media drives and versions of Windows prior to XP. 4 GB maximum file size, 8 TB maximum partition size.

chkdsk /f

Fixes errors on the disk

FDE

Full Disk Encryption

GDPR

General data protection regulation (2016) companies have 2 years to transition to GDPR compliance (from EU directive) after the final text is published

HIPAA

Health Insurance Portability and Accountability Act

HFS

Hierarchical File System. The file system used on a Mac computer for describing how files and folders are to be structured.

Windows Media Center (WMC)

Home entertainment desktop personal computer that includes a mid-to high-end processor, large-capacity hard disk, CD and DVD drives, a remote control and advanced graphics and audio capabilities.

Workgroup

In Windows, a logical group of computers and users in which administration, resources, and security are distributed throughout the network, without centralised management or security.

x64

Indicates a 64-bit processor supporting a 64-bit operating system. 64-bit versions of Windows can run on x64-based systems.

MMC

Microsoft Management Console

.js

JavaScript Filetype

dir *.*

List all directory's files and subdirectories contained in the current directory

chkdsk /r

Locates bad sectors and recovers readable information Fixes errors on the disk

regedit/regedt32

Run-line utilities for editing the Windows Registry.

SMTP with SSL

Port 465

SMTP with TLS

Port 587

.ps1

Powershell Script Cmdlet

taskkill /pid 1230

Provided that the process ID of notepad.exe obtained with the tasklist command is 1230, which of the following answers lists the correct syntax for a Windows Command Prompt taskkill command that would allow to close this application?

Windows 7 Ultimate

Provides the same feature set as Windows 7 Enterprise x64 version supports 192GB RAM.

.py

Python file extension #!/user/bin/python3

RISC

Reduced Instruction Set Computer (AKA: the instruction set architecture (ISA)) which allows a computer's microprocessor to have fewer cycles per instruction (CPI) than a complex instruction set computer (CISC).

PXE (preboot execution environment)

Refers to a client that can boot from a NIC. Enabled clients include a NIC and BIOS that can be configured to boot from the NIC instead of a hard drive. Often used to allow clients to download images.

SOX

Sarbanes-Oxley Act. This law requires publicly traded companies and their independent auditors to demonstrate that their numbers are accurate and that they have processes in place to ensure accurate reporting. Several sections of the law have important implications for human resource activities.

SCM

Service Control Manager (SCM) is a special system process under the Windows NT family of operating systems, which starts, stops and interacts with Windows service processes. It is located in the %SystemRoot%\System32\services.exe executable.

Server Room Temperature

Should not dip below 50 degrees Fahrenheit, and should not exceed 82 degrees Fahrenheit. The optimal temperature range is between 68 and 71 degrees

SPOF

Single Point of Failure

SDLC

Software Development Life Cycle

Image backup

System backup that stores all information on the system including the operating system, programs, settings, and data. Most recent image backup programs also support restoration of individual files.

SMTP port

TCP 25

PXE

Technology that enables a PC to boot without any local storage by retrieving an OS from a server over a network.

NX bit

Technology that enables the CPU to protect certain sections of memory. This feature, coupled with implementation by the operating system, stops malicious attacks from getting to essential operating system files. Microsoft calls the feature Data Execution Prevention (DEP)

ext3

The Linux file system that was the first to support journaling, which is a technique that tracks and stores changes to the hard drive and helps prevent file system corruption. Max. 32, 000 subdirectories

sc.exe

The Service Controller utility is a powerful command-line utility for managing Windows services.

Active Directory

The Windows directory service that enables administrators to create and manage users and groups, set network-wide user and computer policies, manage security, and organise network resources.

dd

The dd command stands for "data duplicator" and used for copying and converting data.

vi

The vi editor is the most popular and commonly used Linux text editor

.sh

Unix/Linux Shell script #! Hash-bang #!/bin/bash

bootrec.exe

Utility is a tool provided by Microsoft in Windows Recovery Environment, or the Windows RE. Bootrec.exe is used in connection with: Master Boot Record (MBR) Boot Sector. Boot Configuration Data (BCD)

.vbs

VBScript Manage Server Back-end Microsoft Office

WEP (Wired Equivalent Privacy)

WEP uses a data encryption scheme that is based on a combination of user- and system-generated key values. The original implementations of WEP supported encryption keys of 40 bits plus 24 additional bits of system-generated data, leading to keys of 64 bits in total length.

WPA2

WPA2-PSK and WPA2-Enterprise both use AES 128 bit keys (TK1 & TK2) for the data encryption. However that key is derived from a Master key (MK) that must be at least 128 bits long (key strength), and it depends on what provides the MK what the actual strength is.

Domain groups

Which item resides on a domain controller and provides access to network resources throughout the domain?

WPA-TKIP

Wi-Fi Protected Access and Temporal Key Integrtiy Protocol. Replacement for WEP. Uses WEP algorithm with TKIP to encrypt packets. New keys used for each packet.

.bat

Windows batch file @ECHO OFF cd c:\source

chkdsk

Windows, OS/2 and DOS command-line tool used for checking the file system and status of the system's hard drives

Windows 7 Home Premium

• Full Aero interface • Multiple monitors • Support for up to 2 physical CPUs • 32-bit and 64-bit versions • 64-bit version supports up to 16 GB RAM • Support for tablet PCs and MultiTouch controls • Display personalization • Desktop enhancements • Windows Media Center capabilities • Creation and use of HomeGroups • Windows Mobility Center • Network printing • Internet Connection Sharing • Fast user switching • Games

Windows 7 Enterprise

• Multiple Language User Interface for companies spanning the globe • UNIX-based application support • BitLocker Drive Encryption • Enhancements to remote corporate data access


Related study sets

4-Stroke Cycle Engine Theory Terms Ch 5

View Set

Medical Terminology Ch1 Test Questions

View Set

General Insurance Regulation Chapter Quiz

View Set

Describe the components and digestive functions of saliva.

View Set

Financial Management - Chapter 7

View Set