Comptia A+2
True or false? If you delete a user, you can recover the user's permissions and group memberships by creating a new account with the same name.
False. Accounts have a unique Security Identifier (SID) that Windows uses to track them. A newly created account would have the same name but a different SID.
True or false? SSH is not available for use with Windows.
False. Support for an SSH client and server is being included in feature updates to Windows 10, and there are numerous commercial and open source products.
authentication factor
Information used to identify a user from one of several categories (something the user knows, has, or "is," or the user's location).
least privilege
Least privilege is a basic principle of security stating that something should be allocated the minimum necessary rights, privileges, or information to perform its role.
recovery disc
OEM recovery media enabling the user to reset the system to its factory configuration.
What is the correct name for the spinning beach ball of death?
Spinning wait cursor.
SOP
Standard Operating Procedure
A customer asks whether an iOS app that your company developed will also work on her Apple macOS computer. What issue does this raise and what answer might you give?
Starting with the M1 processor, Apple's line up of MacOS devices support installing iOS applications. Any Apple MacOS device prior to the M1 processor in 2020 will not run iOS products.
True or false? A firewall can be configured to block hosts with selected IP address ranges from connecting to a particular TCP port on a server that is available to hosts in other IP address ranges.
True. A firewall's access control entry ruleset can combine any supported criteria.
True or false? Each version of Windows has an Administrative Tools shortcut folder in Control Panel.
True—the contents do vary from version to version though.
TPM
Trusted Platform Module A specification for hardware-based storage of digital certificates, keys, hashed passwords, and other user and platform identification information. Essentially, it functions as a smart card embedded on a motherboard.
A program is continually using 99-100% of processor time. What should you do?
Try to end the application or the process using Task Manager, then contact the application vendor to find out why the problem is occurring.
What type of cable and connectors are used to connect a modem to a phone port?
Twisted pair with RJ-11 connectors. In the UK, the phone port might use a Btstyle connector though.
UNIX
UNIX is a family of more than 20 related operating systems that are produced by various companies. It can run on a wide variety of platforms. UNIX offers a multitude of file systems in addition to its native system. UNIX remains widely deployed in enterprise data centers to run mission critical applications and infrastructure.
zombie
Unauthorized software that directs the devices to launch a DDoS attack.
supplicant
Under 802.1X, the device requesting access.
Where would you change the default gestures on a Magic Trackpad?
Under System Preferences→Trackpad.
UPS
Uninterruptible Power Supply An alternative AC power supply in the event of power failure. A UPS requires an array of batteries, a charging circuit, an inverter to convert DC to AC current, a circuit to allow the system to take over from a failing power supply, and some degree of spike, surge, or brownout protection (possibly including a line conditioner).
You are setting up a games console on a home network. What feature on the router will simplify configuration of online multiplayer gaming?
Universal Plug and Play (UPnP).
UPnP
Universal Plug-and-Play A protocol framework allowing network devices to autoconfigure services, such as allowing a games console to request appropriate settings from a firewall.
XML
Updates are made freely available by the software manufacturer to fix problems in a particular software version, including any security vulnerabilities. Updates can be classified as hotfixes (available only to selected customers and for a limited problem), patches (generally available), and service packs (installable collections of patches and software improvements).
spoofing
Where the attacker disguises their identity. Some examples include IP spoofing, where the attacker changes their IP address, or phishing, where the attacker sets up a false website.
replay attack
Where the attacker intercepts some authentication data and reuses it to try to re-establish a session.
ESD
electrostatic discharge The release of a charge from a metal or plastic surface that occurs when a potential difference is formed between the charged object and an oppositely charged conductive object. This electrical discharge can damage silicon chips and computer components if they are exposed to it.
change management
A means of putting policies in place to reduce the risk that changes to information and communications technology infrastructure components could cause service disruption.
What should you configure in order to perform an unattended installation?
An answer file containing the setup configuration.
locator applications
An app installed on mobile devices that identifies the device location to help locate a lost or stolen device.
authenticator application
An app that requires, when using a new computer or device to access a service, a code to be sent in the form of a one time password.
virtual memory
An area on the hard disk allocated to contain pages of memory. When the operating system doesn't have sufficient physical memory (RAM) to perform a task, pages of memory are swapped to the paging file. This frees physical RAM to enable the task to be completed. When the paged RAM is needed again, it is re-read into memory.
You are supporting a user with a Windows 10 Home PC. The user has installed a computer game, but the game will not run. The computer is fitted with a dedicated graphics adapter. You determine that the adapter driver should be updated, but there is no newer driver available via Windows Update. How should you proceed?
Browse the graphics adapter vendor's website and use the card's model number in the driver search tool to look for the latest version. Compare the version information for the driver on the website to the installed version (use Device Manager to check the installed version number). If the website driver is newer, download and run the setup file to install and configure it. You should ensure that the setup file is digitally signed by the vendor. If the driver is only provided as a compressed archive, extract the driver files then use the Update Driver button in Device Manager to select it for use with the adapter.
A computer is caught in a reboot loop. It starts, shows a BSoD, then reboots. What should you do?
Boot using a recovery tool, such as the product disc, and attempt startup repair.
BYOD
Bring Your Own Device Security framework and tools to facilitate use of personally owned devices to access corporate networks and data.
CLI
Command Line Interface. A textual interface based on the operating system, where a user typically enters commands at the command prompt to instruct the computer to perform a specific task.
How do you activate Spotlight Search using the keyboard?
Command+Spacebar.
Charms
Commands displayed in a vertical bar on the right side of a Windows 8 Start Screen. The commands are Search, Share, Start, Devices, and Settings.
COM+
Component Object Model) Microsoft's object-oriented programming architecture and operating system services for developing applications. See also Component Services.
CMDB
Configuration Management Database In change management, the database in which configuration items are stored, identified using a label and defined by their attributes.
CMS
Configuration Management System The tools and databases that collect, store, manage, update, and present information about CIs.
force stop
An Android option to close an unresponsive app.
Shell
An OS component that interacts directly with users and functions as the command interpreter for operating systems.
digital certificate
An X.509 digital certificate is issued by a Certificate Authority (CA) as a guarantee that a public key it has issued to an organization to encrypt messages sent to it genuinely belongs to that organization. Both parties must trust the CA. The public key can be used to encrypt messages but not to decrypt them. A message can only be decrypted by the private key, which is mathematically linked to the public key but not derivable from it. This is referred to as asymmetric encryption. Part of the CA's responsibility is ensuring that this private key is known only to the organization owning the certificate. This arrangement is referred to a Public Key Infrastructure (PKI).
answer file
An XML text file that contains all of the instructions that the Windows Setup program will need to install and configure the OS without any administrator intervention, including the product key.
surge
An abrupt but brief change in the value of the voltage, lasting from a few billionths of a second (a transient) to a few thousandths of a second.
blacklisting
An address added to the blacklist is prohibited from connecting to any port.
whitelisting
An address added to the whitelist is permitted to connect to any port.
What is the full path to the Windows system log?
%SystemRoot%\System32\Winevt\Logs\System.evtx
BCD
(Boot Configuration Data) Windows stores information about operating systems installed on the computer in a boot configuration data store, located in \boot\bcd on the system partition. The BCD can be modified using the bcedit command-line tool or MSCONFIG.
DMZ
(Demilitarized Zone) A private network connected to the Internet must be protected against intrusion from the Internet. However, certain services may need to be made publicly accessible from the Internet (web and email, for instance). One solution is to put such servers in a DMZ. The idea of a DMZ is that traffic cannot pass through it. If communication is required between hosts on either side of a DMZ, a host within the DMZ acts as a proxy. It takes the request and checks it. If the request is valid, it re-transmits it to the destination. External hosts have no idea about what (if anything) is behind the DMZ. A DMZ is implemented using either two firewalls (screened subnet) or a single three-legged firewall (one with three network ports).
EFS
(Encrypting File System) Under NTFS, files and folders can be encrypted to ensure privacy of the data. Only the user who encrypted the file can subsequently open it.
POST
(Power-On Self-Test) A hardware checking routine built into the PC firmware. This test sequentially monitors the state of the memory chips, the processor, system clock, display, and firmware itself. Errors that occur within vital components such as these are signified by beep codes emitted by the internal speaker of the computer. Further tests are then performed and any errors displayed as on-screen error codes and messages.
QoS
(Quality of Service) Systems that differentiate data passing over the network that can reserve bandwidth for particular applications. A system that cannot guarantee a level of available bandwidth is often described as Class of Service (CoS).
Which file contains the list of user accounts created on Linux?
/etc/passwd.
low level format
A "proper" low level format creates cylinders and sectors on the disk. This can generally only be done at the factory. The disk utilities just clean data from each sector; they don't re-create the sector layout.
cron
A Linux/Unix daemon that runs in the background and executes specified tasks at a designated time or date.
When would you use the mmc command?
A Microsoft Management Console (MMC) is used for Windows administration. Running mmc opens an empty console. You would do this to create a custom toolkit of the snap-ins used to configure advanced features of Windows. You can save the custom console for future use.
folder redirection
A Microsoft Windows technology that allows an administrative user to redirect the path of a local folder (such as the user's home folder) to a folder on a network share, making the data available to the user when they log into any computer on the network where the network share is located.
roaming profile
A Microsoft Windows technology that redirects user profiles to a network share so that the information is available when the user logs into any computer on the network where the network share is located.
file explore
A Microsoft Windows tool that offers a single view of all the resources and information that you can access from a computer
Standard user account
A Microsoft Windows user account recommended for day-to-day operations, which has much more limited capabilities than the Administrator account, and is able to run installed programs.
administrator account
A Microsoft Windows user account that can perform all tasks on the computer, including installing and uninstalling apps, setting up other users, and configuring hardware and software.
Guest account
A Microsoft Windows user account with limited capabilities, no privacy, and is disabled by default.
Plug and Play (PnP)
A Plug and Play system (comprising a compatible BIOS, operating system, and hardware) is self-configuring. When a hardware device is added or removed, the operating system detects the change and automatically installs the appropriate drivers.
How can QoS improve performance for SOHO Internet access?
A Quality of Service (QoS) mechanism allows you to elevate certain types of traffic to a higher priority to be processed by the router/modem. For example, you could create a rule reserving 80% of bandwidth for a Voice over IP (VoIP) protocol. This means that whenever the VoIP application is active, other protocols can use only 20% of the router's link bandwidth, making it less likely that ordinary file downloads or web browsing will interfere with a call.
backup power generator
A Standby Power Supply fueled by diesel or propane. In the event of a power outage, a UPS must provide transitionary power, as a backup generator cannot be cut-in fast enough.
Windows Resource Protection
A Windows feature that prevents essential system files, folders, and registry keys from being replaced to help prevent application and operating system failure.
Remote Assistance
A Windows remote support feature allowing a user to invite a technical support professional to help them over a network using chat. The user can also grant the support professional control over their desktop. Remote Assistance uses the same RDP protocol as Remote Desktop.
face lock
A biometric authentication mechanism in which the hash is computed from a picture of the user's face.
brownout
A brownout occurs when the power that is supplied by the electrical wall socket is insufficient to allow the computer to function correctly. Brownouts are long sags in power output that are often caused by overloaded or faulty power distribution circuits or by a failure in the supply route from electrical power station to a building.
compressed air blaster
A can of air packaged under pressure that is used to remove dust and debris from inside printers and other computing devices.
smart card
A card with a chip containing data on it. Smart cards are typically used for authentication, with the chip storing authentication data such as a digital certificate.
file attribute
A characteristic that can be associated with a file or folder that provides the operating system with important information about the file or folder and how it is intended to be used by system users.
key fob
A chip implanted in a plastic fob. The chip can store authentication data (such as a digital certificate) that can be read when put in proximity to a suitable scanner. Another use for fobs is to generate a One Time Password, valid for a couple of minutes only and mathematically linked to a code generated on a server.
rootkit
A class of malware that modifies system files, often at the kernel level, to conceal its presence.
app scanner
A class of security software designed to monitor the permissions allocated to apps and how they are using (or abusing) them.
security group
A collection of user accounts that can be assigned permissions in the same way as a single user object.
gpresult
A command line tool that displays the RSoP for a computer and user account.
gpupdate
A command line tool to apply a new or changed policy immediately. When used with the /force option, it causes all policies (new and old) to be reapplied.
logical operator
A comparison of more than one condition at the same time by using AND, OR, or XOR.
blackout
A complete loss of electrical power.
legacy system
A computer system that is no longer supported by its vendor and so no longer provided with security updates and patches.
false negative
A condition where a system denies entry when it should have granted it.
false positive
A condition where a system grants entry when it should have denied it.
failed login attempts
A configurable value that specifies how many incorrect login attempts can be used before the device is locked for a specified length of time.
enclosure
A container with its own air filters and fans to protect computers or other devices in dirty or dusty environments.
recovery image
A custom image that contains the current state of the operating system files, plus all of the desktop applications installed to the boot partition.
line conditioner
A device that adjusts voltages in under-voltage and over-voltage conditions to maintain a 120 V output.
fingerprint sensor
A device, usually integrated into a mobile device, that reads the user's fingerprint to determine whether to grant access to the device.
home directory
A directory (folder) where you are placed when you log in to the OS. In Linux, it is typically represented by the ~ symbol. The home directory could be redirected to a network location.
slipstreamed media
A disc-based installation that has all of the various updates, patches, and drivers included along with the original installation files.
Disaster Recovery Plan
A documented and resourced plan showing actions and responsibilities to be used in response to critical incidents. The recovery plan may also provide for practice exercises or drills for testing and to familiarize staff with procedures. As well as facilitating a smooth transition in the event of disaster, plans must stress the importance of maintaining secure systems.
image
A duplicate of an operating system installation (including installed software, settings, and user data) stored on removable media. Windows makes use of image-based backups and they are also used for deploying Windows to multiple PCs rapidly.
multiple desktops
A feature that enables users to set up one or more desktops with different sets of apps, backgrounds, and so on. See Mission Control.
exFAT
A file system designed for flash memory cards and memory sticks.
ISO file
A file that contains all of the contents from an optical disc in a single file which can be mounted to the file system as though it were a physical optical drive
privacy screen
A filter to fit over a display screen so that it can only be viewed straight-on.
personal firewall
A firewall implemented as applications software running on the host. Personal software firewalls can provide sophisticated filtering of network traffic and also block processes at the application level. However, as a user-mode application they are more vulnerable to attack and evasion than kernel mode firewalls or network firewall appliances.
network firewall
A firewall placed inline in the network that inspects all traffic that passes through it.
patch
A fix or update for a software program or application, designed to eliminate known bugs or vulnerabilities and improve performance.
social engineering
A hacking technique, widely publicized by Kevin Mitnick in his book "The Art of Deception," whereby the hacker gains useful information about an organization by deceiving its users or by exploiting their unsecure working practices. Typical social engineering methods include impersonation, domination, and charm.
cryptographic hash
A hashed value from which it is impossible to recover the original data.
hotfix
A hotfix is a software update designed and released to particular customers only, though they may be included in later Service Packs.
shoulder surfing
A human-based attack where the goal is to look over the shoulder of an individual as he or she enters password information or a PIN.
Local Security Accounts database
A local (non-network) database where local system account information is stored. In Windows systems, this is the SAM database, and in Linux systems the information is stored in the /etc/passwd or /etc/shadow file.
network drive
A local share that has been assigned a drive letter.
kernel
A low-level piece of code responsible for controlling the rest of the operating system.
Trojan Horse
A malicious software program hidden within an innocuous-seeming piece of software. Usually the Trojan is used to try to compromise the security of the target computer.
authentication
A means for a user to prove their identity to a computer system. Authentication is implemented as either something you know (a username and password), something you have (a smart card or key fob), or something you are (biometric information). Often, more than one method is employed (2-factor authentication).
configuration management
A means of identifying all components of the information and communications technology infrastructure, including hardware, software, and procedures, and the properties of those items.
botnet
A network of computers that have been compromised by Trojan, rootkit, or worm malware. Providing the botnet can also subvert any firewalls between the controller (or herder) and the compromised computers (zombies), so that they can be remotely controlled and monitored using covert channels.
Windows Server
A network operating system typically used for private network servers and Internet servers running web, email, and social networking apps.
antistatic bag
A packaging material containing anti-ESD shielding or dissipative materials to protect components from ESD damage.
What is a recovery partition?
A partition containing a backup of the system configuration at a particular point in time. These are often used on OEM PCs to enable the PC to be restored to its factory settings.
mount point
A partition or volume mapped to a folder in another file system rather than allocated a drive letter.
threat agent
A person or event that triggers a vulnerability accidentally or exploits it intentionally. Also called threat actor.
backout plan
A plan defined ahead of making any moves, adds, or changes so that in case unforeseen problems arise when the change is made, there is a plan to put things back as they were before making the change.
lockout policy
A policy designed to restrict failed login attempts.
swap partition
A portion of the hard disk that is formatted with a minimal kind of file system and used in situations when Linux runs out of physical memory and needs more of it. It can only be used by the memory manager and not for storage of ordinary data files.
scripting language
A programming language that is interpreted rather than compiled.
proper documentation
A record of what will be done so that the customer knows what to expect in terms of items that are supported, how long incidents may take to resolve, when they can expect an item to be replaced instead of repaired, and so on.
GNU
A recursive acronym standing for "GNU is Not UNIX."
comparison operator
A relationship evaluation between two variables to determine whether they are equal, not equal, less than, greater than, less than or equal to, or greater than or equal to each other.
backdoor
A remote administration utility providing a means of configuring a computer. Remote admin software may be installed intentionally, in which case it must be properly secured. Backdoors may also be installed by malware.
dial-up
A remote network access method that utilizes the local telephone line (Plain Old Telephone System [POTS]) to establish a connection between two computers fitted with modems. Dial-up is a legacy method of Internet access. It may still be deployed for special administrative purposes or as an emergency backup connection method. Configuration is generally a case of setting the telephone number, username, and password.
sag
A sag can occur when the power supply entering a computer's components dips briefly below that which is required. Sags are commonly caused when heavy machinery or other high power appliances are started.
schematic
A schematic is a simplified representation of a system. Physical network diagrams or schematics can show the general location of components and their identification. Logical network diagrams show the organization of the network into subnets and zones.
Windows Certified Products List
A searchable database of hardware devices that have been tested to ensure they are compatible with the Windows 10 operating system.
Sector
A sector is the term given to the regularly sized subdivision of a drive track. During low-level formatting, the size and position of the sectors are written to the disk so that the data can be placed into uniform spots that the drive head can easily access.
mantrap
A secure entry system with two gateways, only one of which is open at any one time.
secure boot
A security system offered by UEFI that is designed to prevent a computer from being hijacked by malware.
hardening
A security technique in which the default configuration of a system is altered to protect the system against attacks.
file extension
A series of characters at the end of a file name; used by an OS to identify the software application that is associated with a file.
Local Security Policy
A set of policies relating to log on, passwords, and other security issues that can be enforced or disabled on the local machine. On domains, security policy is configured centrally using Group Policy Objects (GPO).
surge protector
A simple device intended to protect electrical devices against the damaging effects of a power spike.
workgroup
A small group of computers on a network that share resources in a peer-to-peer fashion. No one computer provides a centralized directory.
dumpster diving
A social engineering technique of discovering things about an organization (or person) based on what it throws away.
unattended installation
A software or operating system installation where the configuration information is derived from an input file.
attended installation
A software or operating system installation where the installer inputs the configuration information in response to prompts from a setup program.
operating system
A software package that enables a computer to function. It performs basic tasks, such as recognizing the input from a keyboard, sending the output to a display screen or monitor, and controlling peripheral devices such as disk drives and printers.
anti-malware software
A software program that scans a device or network for known viruses, Trojans, worms, and other malicious software.
trusted app source
A source for apps that is managed by a service provider.
wildcard
A special character that is used to substitute characters in a string.
spike
A spike can occur when electrical devices are turned off or when electrical storms are happening. Normally, spikes and surges are not sufficient to cause problems but occasionally big fluctuations may lead to the system crashing or hanging.
environment variable
A storage location in the environment of the operating system's command shell.
Policy
A subset of a security profile, and a document that outlines the specific requirements and rules everyone must meet.
data backup
A system maintenance task that enables you to store copies of critical data for safekeeping as protection against loss of data due to disasters such as file corruption or hardware failure.
end of life system
A system that is no longer supported by the developer or vendor.
RFID tag
A tag containing an RFID chip programmed with asset data.
security control
A technology or procedure put in place to mitigate vulnerabilities and risk and to ensure the Confidentiality, Integrity, and Availability (CIA) of information. Control types are often classed in different ways, such as technical, operational, and management.
script file
A text file containing commands or instructions that are performed by a program on the computer rather than by the computer itself.
logon script
A text file that runs when the user logs on. The file contains commands and settings to configure a user's environment.
apt
A tool for maintaining packages on Debian-based Linux systems.
yum
A tool for maintaining packages on Fedora-based Linux systems.
packet filtering
A type of firewall that inspects the headers of IP packets and can perform filtering on IP address, protocol type, and port numbers.
ransomware
A type of malware that tries to extort money from the victim, by appearing to lock their computer or by encrypting their files, for instance.
worm
A type of virus that spreads through memory and network connections rather than infecting files.
Apple ID
A user account on an Apple device based on the sign-in email address that is used to sign-in to the App Store, access iCloud, and other Apple features and functions.
root user
A user who has access rights to all files and resources on the system and is the default administrative account on a Linux system.
jitter
A variation in the time it takes for a signal to reach the recipient. Jitter manifests itself as an inconsistent rate of packet delivery. If packet loss or delay is excessive, then noticeable audio or video problems (artifacts) are experienced by users.
What type of file system is usually used for the Linux boot partition?
A version of ext (ext4 or ext3).
screen lock
A way to prevent unauthorized access to a computer or mobile device. Configuring a screen lock requires the user to enter a passphrase, complete a pattern, or enter a PIN to access the device.
wiki
A website that is configured so users can view, enter, and share information about a subject.
AUP
Acceptable Use Policy A policy that governs employees' use of company equipment and Internet services. ISPs may also apply AUPs to their customers.
ACL
Access Control List The permissions attached to or configured on a network resource, such as folder, file, or firewall. The ACL specifies which subjects (user accounts, host IP addresses, and so on) are allowed or denied access and the privileges given over the object (read only, read/write, and so on).
AD DS
Active Directory Domain Services The database that contains the users, groups, and computer accounts in a Windows Server domain.
ACPI
Advanced Configuration and Power Management Interface An open standard to communicate between the operating system and hardware to enable power management features
AES
Advanced Encryption Standard) Modern encryption suite providing symmetric encryption (the same key is used to encrypt and decrypt). AES is a very strong cipher with many applications, including being part of the WPA2 Wi-Fi encryption scheme.
Process ID
Also PID. The number assigned to a process.
zero day exploit
An attack that exploits a vulnerability in software that is unknown to the software vendor and users. Most vulnerabilities are discovered by security researchers and the vendor will have time to create a patch and distribute it to users before exploits can be developed, so zero day exploits have the potential to be very destructive.
grounded
An equipment ground provides a safe path for electrical current to flow away in the event that a device or cable is faulty. Self-grounding removes any static potential difference between a technician's clothes and body and a device they are handling, reducing the risk of damaging the component through Electrostatic Discharge (ESD).
procedure
An inflexible, step-by-step listing of the actions that must be completed for any given task.
footprinting
An information gathering threat, in which the attacker attempts to learn about the configuration of the network and security systems through social engineering attacks or software-based tools.
compiled program
An instruction set in which the programming instructions are performed by the computer processor.
Windows Media Center
An obsolete program included with Windows Vista and Windows 7 that included a broadcast TV schedule that allowed computers equipped with a TV tuner card to view and record TV programs. It also acted as a playback interface for optical discs.
Linux
An open-source operating system supported by a wide range of hardware and software vendors
rogue access point
An unauthorized wireless access point on a corporate or private network, which allows unauthorized individuals to connect to the network.
kill switch
Another term for remote wipe.
superuser
Another term for the root user.
swipe lock
Another term for unlocking a device by tracing a pre-determined on screen pattern or joining dots on screen.
member server
Any Windows-based server computer configured into a domain but not maintaining the Active Directory database (authenticating users) is referred to as a member server. Servers in a workgroup are referred to as standalone servers.
domain controller
Any Windows-based server that provides domain authentication services (logon services) is referred to as a domain controller (DC). Domain controllers maintain a master copy of the database of network resources.
trip hazard
Any object placed in pathways where people walk.
threat
Any potential violation of security policies or procedures.
vulnerability
Any weakness that could be triggered accidentally or exploited intentionally to cause a security breach.
Time Machine
App facilitating backup operations in macOS.
Mission Control
App facilitating multiple desktops in macOS.
asset management
Asset management means identifying each asset and recording its location, attributes, and value in a database.
What parameters do you need to specify to connect to a VPN?
Assuming you have a remote host topology, you need to establish a connection to a server over a public network such as the Internet. The VPN server then facilitates a connection to a local network. You need to specify the location of the VPN server as an IP address or Fully Qualified Domain Name (FQDN). If the VPN type is not detected automatically, you might need to configure extra settings or use third-party VPN client software. To connect to the VPN, the user must submit credentials, such as a user name and password.
metadata
Data about data, typically one set of data summarizes information about the original set of data.
What app would you use to install Windows 10 on a Mac?
Boot Camp Assistant lets you create a new partition and install a fresh version of Windows.
cultural sensitivity
Being aware of customs and habits used by other people.
BSOD
Blue Screen of Death A condition that indicates an error from which the system cannot recover (also called a stop error). Blue screens are usually caused by bad driver software or hardware faults (memory or disk).
CA
Certificate Authority A server that can issue digital certificates and the associated public/private key pairs.
CAB
Change Advisory Board In change management, the team responsible for approving or denying RFCs.
What is the effect of running the cd.. command?
Change the directory focus to the parent directory (equivalent of Up One Folder).
Where would you start to investigate a "Service failed to start" error?
Check the event log for more information.
Chrome os
Chrome OS is derived from Linux, via an open source OS called Chromium. Chrome OS itself is proprietary. Chrome OS is developed by Google to run on specific laptop (chromebooks) and PC (chromeboxes) hardware.
CAL
Client Access Licenses Licenses required for clients accessing software services from a server, purchased per server (with a limited number of simultaneous users) or per seat (specifying each unique device or user).
What is meant by disk imaging?
Cloning an installation from one PC to another.
iCloud
Cloud storage service operated by Apple and closely integrated with macOS and iOS.
virus
Code designed to infect computer files (or disks) when it is activated. A virus may also be programmed to carry out other malicious actions, such as deleting files or changing system settings.
A user wants to be able to access an FTP server installed on a computer on their home network from the Internet. The home network is connected to the Internet by a DSL router. How would you enable access?
Configure port forwarding on the router to send incoming connections on port 21 to the LAN computer.
defense in depth
Configuring security controls on hosts (endpoints) as well as providing network (perimeter) security, physical security, and administrative controls.
logical security
Controls implemented in software to create an access control system.
CIRT/CSIRT
Cyber Incident Response Team/Computer Security Incident Response Team Team with responsibility for incident response. The CIRT must have expertise across a number of business domains (IT, HR, legal, and marketing, for instance)
DLP (loss prevention)
Data Loss/Leakage Prevention Software that can identify data that has been classified and apply "fine-grained" user privileges to it (preventing copying it or forwarding by email, for instance).
remnant removal
Data that has nominally been deleted from a disk by the user can often be recovered using special tools. The best way to shred data without physically destroying a disk is to ensure that each writable location has been overwritten in a random pattern.
Boolean values
Data type supporting 1-bit storage, representing FALSE and TRUE. Boolean logic is a statement that resolves to a true or false condition and underpins the branching and looping features of computer code.
string
Data type supporting storage of a variable length series of characters.
integer
Data type supporting storage of whole numbers.
What device optimization settings could you check to mitigate slow performance problems?
Defragment the hard disk, and ensure there is sufficient free space. Verify that the power management configuration is not throttling components such as the CPU or GPU. You can also use performance monitoring to check device utilization and determine whether upgrades are required.
What option on the General tab of the Internet Options dialog box is most relevant to user privacy?
Delete browsing history on exit.
DoS
Denial of Service A network attack that aims to disrupt a service, usually by overloading it.
If a host has a firewall configured to block outgoing ICMP traffic, what result would you expect from pinging the host (assuming that the path to the host is otherwise OK)?
Destination unreachable.
geotracking
Determining the location of a person or object using the GPS data from a GPS-enabled device.
DRM
Digital Rights Management Copyright protection technologies for digital media. DRM solutions usually try to restrict the number of devices allowed for playback of a licensed digital file, such as a music track or ebook.
Factory Recovery Partition
Disk partition accessible via the startup sequence that contains an image of the system partition as produced by the PC vendor. This can be used to recover the PC to its factory state by performing a repair install, but will erase any user data or installed programs.
Clusters
Disk sectors are grouped in clusters of 2, 4, 6, 8, or more. The smaller the cluster size, the lower the data overhead in terms of wasted space, but larger clusters can improve performance.
DDoS
Distributed Denial of Service) A DoS attack that uses multiple compromised computers (a "botnet" of "zombies") to launch the attack.
chain of custody
Documentation attached to evidence from a crime scene detailing when, where, and how it was collected, where it has been stored, and who has handled it subsequently to collection.
airborne particles
Dust and other small items that can be blown about and carried on air currents, that if they get inside computers, can prevent effective heat dissipation.
user account
Each user who wishes to access a Windows computer will need a logon ID, referred to as a user account. Each user will normally have a local profile, containing settings and user-created files. Profiles are stored in the "Users" folder or can be redirected to a network folder.
A command has generated a large amount of data on the screen. What could you add to the command to make the output more readable?
Either | more or | less.
EULA
End User License Agreement The agreement governing the installation and use of proprietary software.
unified file system
Everything available to the Linux OS is represented as a file in the file system, including devices.
latent evidence
Evidence that cannot be seen with the naked eye and instead must be interpreted using a machine or process.
degaussing
Exposing the disk to a powerful electromagnet to disrupt the magnetic pattern that stores data on the disk surface.
incineration
Exposing the disk to high heat to melt its components.
HFS+
Extended Hierarchical File System The file system used by Apple Mac workstations and laptops.
EAP
Extensible Authentication Protocol Framework for negotiating authentication methods, supporting a range of authentication devices. EAP-TLS uses PKI certificates, Protected EAP (PEAP) creates a TLS-protected tunnel between the supplicant and authenticator to secure the user authentication method, and Lightweight EAP (LEAP) is a password-based mechanism used by Cisco.
True or false? If you want a computer to be available through Wake-on-LAN, you can disconnect it from the power supply but must leave it connected to the network data port.
False. The network adapter must be connected to standby power, and the computer could not start anyway if it were disconnected from the power supply.
True or false? To allow a PC game to accept incoming connections over a custom port you need to configure the Advanced Security Firewall.
False. You can allow a process to connect via the basic firewall interface.
True or false? A volume or partition MUST be assigned a drive letter to access it via Explorer.
False—assigning a drive letter is common practice, but a partition can be mounted to any point in the file system.
True or false? In Windows 7, libraries cannot contain network folders.
False—this is one of the main reasons for using libraries. They can consolidate a "view" of files stored in different locations on different file systems.
FAT
File Allocation Table) A basic disk format allowing the OS to write data as files on a disk. The original 16-bit version (FAT16, but often simply called FAT) was replaced by a 32- bit version that is almost universally supported by different operating systems and devices. A 64-bit version (exFAT) was introduced with Windows 7 and is also supported by XP SP3 and Vista SP1 and some versions of Linux and macOS. There is also a 12-bit version used to format floppy disks.
What Windows utility would you use to back up data files in Windows 10?
File History. You could also consider OneDrive as a type of backup solution.
Spotlight
File system search feature in macOS.
offline files
Files (or folders) from a network share that are cached locally. The Offline Folders tool handles synchronization between the local and remote copies.
gestures
Finger movements on a trackpad or mouse that enable a user to scroll, zoom, and navigate desktop, document, and application content.
Which of the following are typically delivered as optional via Windows Update? Security patches, Drivers, Firmware updates, or Critical fixes.
Firmware updates.
disk defragmentation
Fragmentation occurs when a data file is not saved to contiguous sectors on a disk. This decreases performance by making the disk read/write heads move between fragments. Defragmentation is a software routine that compacts files back into contiguous areas of the disk. The process can be run from a command-line using the defrag utility, but it is more often run from Windows.
GPT
GUID Partition Table A modern disk partitioning system allowing large numbers of partitions and very large partition sizes.
What are the tab headings in msconfig, and which tab is not in the Windows 8/10 version?
General, Boot, Services, Startup, and Tools. In Windows 8/10, the functionality of the Startup tab has moved to Task Manager.
GUI
Graphical User Interface An easy to use, intuitive interface for a computer operating system. Most GUIs require a pointing device, such as a mouse, to operate efficiently. One of the world's first GUI-based operating systems was the Apple Mac OS, released in 1984. Thereafter, Microsoft produced their Windows family of products based around their GUI. In fact, recognizing that GUI covers a whole range of designs, the Windows interface is better described as a WIMP (Windows, Icons, Menus, Pointing [device]) interface.
shredding
Grinding a disk into little pieces.
GPO
Group Policy Object On a Windows domain, per-user and per-computer settings can be deployed through Group Policy Objects attached to Active Directory containers, such as domains and Organization Units. Group policy can be used to configure security settings such as password policy, account restrictions, firewall status, and so on.
Administrative Templates
Group Policy files for registry-based policy management. The files have the .ADM file extension.
HCL
Hardware Compatibility List Before installing an OS, it is vital to check that all the PC components have been tested for compatibility with the OS (that they are on the Hardware Compatibility List [HCL] or Windows Logo'd Product List). Incompatible hardware may not work or may even prevent the installation from completing successfully.
firewall
Hardware or software that filters traffic passing into or out of a network. A basic packet-filtering firewall works at Layer 3 (Network). Packets can be filtered depending on several criteria (inbound or outbound, IP address, and port number). More advanced firewalls (proxy and stateful inspection) can examine higher layer information, to provide enhanced security.
HVAC
Heating, Ventilation, and Air Conditioning The building environmental heating and cooling services and the control of those systems.
What command can you use on a Linux computer to report the IP configuration?
Historically, this could be reported using the ifconfig tool. The ip command is now preferred.
IPS
Indoor Positioning Systems A system that works out a device's location by triangulating its proximity to other radio sources, such as Wi-Fi access points or Bluetooth beacons.
ITIL
IT Infrastructure Library An IT best practice framework, emphasizing the alignment of IT Service Management (ITSM) with business needs. ITIL was first developed in 1989 by the UK government and the ITIL v3 2011 edition is now marketed by AXELOS.
variable
Identifier for a value that can change during program execution. Variables are usually declared with a particular data type.
constant
Identifier for a value that is fixed before program execution and does not change.
A computer cannot connect to the network. The machine is configured to obtain a TCP/IP configuration automatically. You use ipconfig to determine the IP address and it returns 0.0.0.0. What does this tell you?
If a DHCP server cannot be contacted, the machine should default to using an APIPA address (169.254.x.y). As it has not done this, something is wrong with the networking software installed on the machine (probably the DHCP client service, TCP/IP stack, or registry configuration, to be specific).
What is the goal of RDP Restricted Admin (RDPRA) Mode and Remote Credential Guard?
If the local machine is compromised, malware may be able to obtain the credentials of a user account connecting to the machine over Remote Desktop. RDPRA Mode and Remote Credential Guard are designed to mitigate this risk.
implicit deny
Implicit deny is a basic principle of security stating that unless something has explicitly been granted access it should be denied access. An example of this is firewall rule processing, where the last (default) rule is to deny all connections not allowed by a previous rule.
terminal window
In Linux, a computer interface for text entry and display, where information is displayed as an array of preselected characters.
file system hierarchy
In Linux, the directory structure starting with the root directory (/) with directories and subdirectories below it to store files.
system partition
In Microsoft terminology, the system partition is the bootable partition on the hard disk. This is usually, but not always, separate to the boot partition, which contains the operating system. The system partition is usually hidden from File Explorer (no drive letter is assigned to it).
port (network)
In TCP and UDP applications, a port is a unique number assigned to a particular application protocol (such as HTTP or SMTP). The port number (with the IP address) forms a socket between client and server. A socket is a bi-directional pipe for the exchange of data. For security, it is important to allow only the ports required to be open (ports can be blocked using a firewall).
evil twin
In an evil twin attack, the attacker creates a malicious wireless access point masquerading as a genuine one, enabling the attacker to harvest confidential information as users connect via the AP.
peer-to-peer network
In peer-to-peer networks there is no dedicated server, but instead, each computer connected to the network acts as both a server and client (each computer is a peer of the other computers). These types of networks were originally developed as a low-cost alternative to server-based systems for use in smaller companies and organizations where there are up to about ten users. A major drawback to this type of network is a comparative lack of security whereby each user must control access to resources on his/her machine.
authorization
In security terms, the process of determining what rights and privileges a particular entity has.
accounting
In security terms, the process of tracking and recording system activities and resource access. Also known as auditing.
How do you run Check Disk in read-only mode?
In the GUI tool, simply do not select an option to fix errors automatically. Alternatively, at a command prompt, run chkdsk without any switches.
Where would you look for the option to view and configure wireless adapter status in macOS?
In the Status menu on the Menu bar, in the top-right of the screen.
jamming
In wireless networking, the phenomenon by which radio waves from other devices interfere with the 802.11 wireless signals used by computing devices and other network devices.
multiboot system
Installing multiple operating systems on a single computer. Each OS must normally be installed to a separate partition.
in-place upgrade
Installing the OS on top of an existing version of the OS, retaining applications, user settings, and data files.
clean install
Installing the OS to a new computer or completely replacing the OS software on an existing computer, and in the process, deleting existing applications, user settings, and data files.
IDE (programming)
Integrated Development Environment A programming environment that typically includes a code editor containing an autocomplete feature to help you write code, a debugger to help you find coding errors, and an interpreter that translates the script file code into machine readable code the computer can execute.
ICMP
Internet Control Message Protocol) IP-level protocol for reporting errors and status information supporting the function of troubleshooting utilities such as ping.
A Windows computer is configured to use DHCP, but no DHCP server is available. The computer is not using an APIPA address either. Why is this?
It has been configured with an Alternate Configuration static IP address.
What is the function of secpol.msc?
It is the image name of the Local Security Policy management console. You can use this to define system security policies, such as password complexity.
What principal restriction would you face if using the backup tool included with Windows 7 Home Premium?
It only supports backing up to local drives or removable media, not to network shares.
What is the effect of reducing transmit power when you are configuring an access point?
It reduces the supported range of the access point. You might do this to prevent interference between two access points in close proximity. You might also reduce power to prevent the network being accessible outside a particular area (such as making thenetwork accessible to indoor users only).
What is the function of a microfilter?
It screens noise from data signals on jacks for voice or fax devices if DSL equipment is connected.
What additional information is shown on the Users tab in Windows 10 Task Manager compared to Windows 7?
It shows user-initiated processes and resource utilization.
spam
Junk messages sent over email (or instant messaging [SPIM]). Filters and blacklists are available to block spam and known spam servers. It is also important to ensure that any mail servers you operate are not open relays, allowing a spammer to leverage your server to distribute spam and making it likely that it will be blacklisted.
KB
Knowledge Base A searchable database of product FAQs (Frequently Asked Questions), advice, and known troubleshooting issues. The Microsoft KB is found at support.microsoft.com.
loop
Like a branch, a loop deviates from the initial program path to some sort of logic condition. In a loop, the computer repeats the task until a condition is met. Often implemented with For or While statements.
execution control
Logical security technologies designed to prevent malicious software from running on a host and establish a security system that does not entirely depend on the good behavior of individual users.
MitM
Man-in-the-Middle Where the attacker intercepts communications between two hosts.
control panel
Management interface for configuring Windows settings. In Windows 8 and later, the touch-enabled app PC Settings/Windows Settings is used for many options previously configured via Control Panel.
self-grounding
Manual dissipation of static buildup by touching a grounded object prior to touching any electronic equipment.
MBR
Master Boot Record A sector on a hard disk storing information about partitions configured on the disk.
MSDS
Materials Safety Data Sheet Information sheet accompanying hazardous products or substances explaining the proper procedures for handling and disposal.
MTBF
Mean Time Between Failures The rating on a device or component that predicts the expected time between failures.
MD5
Message Digest Algorithm v5 The Message Digest Algorithm was designed in 1990 by Ronald Rivest, one of the "fathers" of modern cryptography. The most widely used version is MD5, released in 1991, which uses a 128-bit hash value.
What is the name of Apple's multiple desktop management feature?
Mission Control.
MDM
Mobile Device Management Software suites designed to manage use of smartphones and tablets within an enterprise.
iOS
Mobile OS developed by Apple for its iPhone and iPad devices.
heuristic
Monitoring technique that allows dynamic pattern matching based on past experience rather than relying on pre-loaded signatures.
NTFS
NT File System A Windows file system that supports a 64-bit address space and is able to provide extra features such as file-by-file compression and RAID support as well as advanced file attribute management tools, encryption, and disk quotas.
NAC
Network Access Control A means of ensuring endpoint security—ensuring that all devices connecting to the network conform to a "health" policy (patch level, anti-virus/firewall configuration, and so on). NAC can work on the basis of pre- or post-admission control. The core components are an agent running on the client, policy enforcers (network connection devices such as switches and access points), and policy decision points (NAC policy server and AAA/RADIUS server).
NAPT
Network Address Port Translation Similar to NAT, it (or PAT or NAT overloading) maps private host IP addresses onto a single public IP address. Each host is tracked by assigning it a random high TCP port for communications.
NAT
Network Address Translation A network service provided by router or proxy server to map private local addresses to one or more publicly accessible IP addresses. NAT can use static mappings but is most commonly implemented as Network Address Port Translation (NAPT) or NAT overloading, where a few public IP addresses are mapped to multiple LAN hosts using port allocations.
NFS
Network File System A remote file access protocol used principally on UNIX and Linux networks.
NLA
Network Level Authentication An RDP technology requiring users to authenticate before a server session is created.
If you want to use PXE as an installation method, what type of compatible component would you require?
Network adapter/NIC and system firmware support.
You are monitoring system performance and notice that a substantial number of page faults are occurring. Does this indicate that a memory module is faulty?
No—it shows the system is using the pagefile intensively and could benefit from more system RAM being installed.
phishing
Obtaining user authentication or financial information through a fraudulent request for information. Phishing is specifically associated with emailing users with a link to a faked site (or some other malware that steals the information they use to try to authenticate). Pharming is a related technique where the attacker uses DNS spoofing to redirect the user to the fake site. Vishing refers to phishing attacks conducted over voice channels (VoIP), while spear phishing means attacks that target specific individuals or institutions and whaling refers to attacks directed at managers or senior executives.
fragmentation
Occurs when a data file is not saved to contiguous sectors on a disk. This decreases performance by making the disk read/write heads move between fragments.
You need to configure duplex settings on a network adapter manually. What steps do you need to follow?
Open Device Manager and the adapter's Property sheet. Select the Advanced tab and select the Duplex property (or Speed and Duplex). Change the value as required, and select OK.
You are supporting a user who has installed a vendor keyboard driver. The keyboard no longer functions correctly. Under Windows 10, what are the steps to revert to the previous driver?
Open Device Manager from the WinX menu, Instant Search, or the Computer Management console. Expand Keyboards then right-click the device and select Properties. On the Driver tab, select Rollback Driver.
How do you enable a Windows 7 computer to function as a Remote Desktop Server?
Open System properties, select Change settings, then select the Remote tab and check the Allow remote connections to this computer option on the Remote tab. You can also specify the user accounts permitted to connect to the server.
You are attempting to run a command but receive the message "The requested operation requires elevation." What must you do to run the command?
Open a new command prompt window with sufficient privileges. You can right-click the Command Prompt icon and select Run as administrator, or press Ctrl+Shift+Enter with the icon selected.
open source
Open source means that the programming code used to design the software is freely available.
You have a computer with two SATA disks. You want to evaluate the performance of the primary disk. How would you select this in Performance Monitor and what might be appropriate counters to use?
Open the Add Counter dialog box, select the Physical Disk object, select the counter, then select the 0 C: instance. Useful counters to use to evaluate performance include % Disk Time and Average Disk Queue Length.
How would you configure a Windows 7 computer to use a proxy server for web browsing?
Open the Internet Options dialog box, and select the Connections tab. Select LAN Settings and enter the address of the proxy.
How would you update an app purchased from the Mac App Store?
Open the Mac App Store and select the Updates button.
How would you configure a legacy Windows 98 application to work with Windows 10?
Open the application's property sheet and select the Compatibility tab to select the appropriate mode. You can also run the Program Compatibility Troubleshooter.
macOS
Operating system designed by Apple for their range of iMac computers, Mac workstations, and MacBook portables. macOS (previously called OS X) is based on the BSD version of UNIX. macOS is well supported by application vendors, especially in the design industry.
OU
Organizational Unit In a network directory, such as Windows Active Directory, a container for network objects that share the same policies or administrative requirements.
MAC flooding
Overloading the switch's MAC cache using a tool such as Dsniff or Ettercap to prevent genuine devices from connecting and potentially forcing the switch into hub or flooding mode.
PCI DSS
Payment Card Industry Data Security Standard Information security standard for organizations that process credit or bank card payments.
biometric devices
Peripherals used to gather biometric data for comparison to data stored in a database.
PII
Personally Identifiable Information Data that can be used to identify or contact an individual (or in the case of identity theft, to impersonate them). A Social Security number is a good example of PII. Others include names, date of birth, email address, telephone number, street address, biometric data, and so on.
port forwarding
Port forwarding means that a router takes requests from the Internet for a particular application (say, HTTP/port 80) and sends them to a designated host on the LAN.
port triggering
Port triggering is used to configure access through a firewall for applications that require more than one port. Basically, when the firewall detects activity on outbound port A destined for a given external IP address, it opens inbound access for the external IP address on port B for a set period.
soft reset
Power cycling a mobile device in an attempt to resolve issues the user is experiencing.
PSK
Pre-shared Key Symmetric encryption technologies, such as those used for WEP, require both parties to use the same private key. This key must be kept a secret known only to those authorized to use the network. A pre-shared key is normally generated from a passphrase.
PXE
Preboot Execution Environment A feature of a network adapter that allows the computer to boot by contacting a suitably configured server over the network (rather than using a local hard disk).
You are watching CPU Usage and notice that it often jumps to 100% and then falls back. Does this indicate a problem?
Probably not—CPU Usage usually peaks and falls. If it stays over 80-90%, the system could require a faster CPU or if it spikes continually, there could be a faulty application.
Incident Response Policy
Procedures and guidelines covering appropriate priorities, actions, and responsibilities in the event of security incidents. The stages will generally be notification, investigation, remediation, and follow-up. Incident response is often handled by a special group—the Computer Security Incident Response Team—made up of staff with both technical skills and decision-making authority.
PHI
Protected Health Information Information that identifies someone as the subject of medical and insurance records, plus associated hospital and laboratory test results.
PKI
Public Key Infrastructure Asymmetric encryption provides a solution to the problem of secure key distribution for symmetric encryption. The main problem is making a link between a particular public-private key pair and a specific user. One way of solving this problem is through PKI. Under this system, keys are issued as digital certificates by a Certificate Authority (CA). The CA acts as a guarantor that the user is who he or she says he or she is. Under this model, it is necessary to establish trust relationships between users and CAs. In order to build trust, CAs must publish and comply with Certificate Policies and Certificate Practice Statements.
challenge question
Questions asked, usually through software but sometimes from a help desk staff member, that only the end-user can answer. A feature of multi-factor authentication or for account recovery.
RDPRA Mode
RDP Restricted Admin Mode A method of mitigating the risk of using Remote Desktop.
RFID badge
Radio Frequency Identification badge An ID badge containing a chip allowing data to be read wirelessly.
RF
Radio Frequency Radio waves propagate at different frequencies and wavelengths. Wi-Fi network products work at 2.4 GHz or 5 GHz.
You need to install a desktop application across a network of 500 Windows PCs. What is the most efficient means of doing this, and what security considerations should you make?
Rather than try to install the application by logging on locally to each PC to run the setup file, you can put the installer file on a network share and use Windows Group Policy Objects (GPO) or some sort of script to "push" deploy the application. You can use a service account with appropriate permissions to install the software on the local machine. You should test this process and the application first in a lab environment to identify potential impacts to the local device and/or network. You must also ensure that the application vendor provides a digitally signed installer file, to prove that the code has not been tampered with.
A file is secured with the numeric permissions 0774. What rights does another user account have over the file?
Read-only.
RSSI
Received Signal Strength Indicator For a wireless signal, an index level calculated from the signal strength level.
A user calls saying that her screen occasionally goes blue and the system shuts down. What should you advise her to do?
Record as much information from the blue screen, especially the STOP error number, as she can so that you can research the particular error.
RPO
Recovery Point Objective The amount of data loss that a system can sustain, measured in time. See also recovery time objective.
RTO
Recovery Time Objective The period following a disaster that a system may remain offline. See also recovery point objective.
backup
Recovery of data can be provided through the use of a backup system. Most backup systems provide support for tape devices. This provides a reasonably reliable and quick mechanism for copying critical data. Different backup types (full, incremental, or differential) balance media capacity, time required to backup, and time required to restore.
rpm
Red Hat Package Manager A tool for maintaining packages in Red Hat Linux systems.
RAID
Redundant Array of Independent/Inexpensive Disks A set of vendor-independent specifications for fault-tolerant configurations on multiple-disk system
RJ connector
Registered Jack connector A connector used for twisted pair cabling. 4-pair network cabling uses the larger RJ-45 connector. Modem/telephone 2-pair cabling uses the RJ-11 connector.
RADIUS
Remote Authentication Dial-in User Service Used to manage remote and wireless authentication infrastructure. Users supply authentication information to RADIUS client devices, such as wireless access points. The client device then passes the authentication data to an AAA (Authentication, Authorization, and Accounting) server, which processes the request.
Remote Credential Guard
Remote Credential Guard
An installer program may present up to three options in Programs and Features. Two are Uninstall and Change. What is the third?
Repair
RFC
Request for Change In change management, the formal document submitted to the CAB that has the details of the proposed alteration.
RSA
Rivest Shamir Adelman) The first successful algorithm to be designed for public key encryption. It is named for its designers.
If you suspect improper handling during installation has caused damage to a RAM module, how could you test that suspicion?
Run a Memory Diagnostic. This tests each RAM cell and so should uncover any fault.
A system is experiencing intermittent boot errors. The issue can be fixed temporarily by repairing the boot files. What should you do to fix the problem in the longer term?
Run diagnostic software to rule out a disk problem. Recurrent file errors/corruption are a sign the disk is failing. You might also consider malware as a cause.
encryption
Scrambling the characters used in a message so that the message can be seen but not understood or modified unless it can be deciphered. Encryption provides for a secure means of transmitting data and authenticating users. It is also used to store data securely. Encryption uses different types of cipher and one or more keys. The size of the key is one factor in determining the strength of the encryption product.
SHA
Secure Hash Algorithm) A cryptographic hashing algorithm created to address possible weaknesses in MDA. The earlier SHA-1 has been superseded by SHA-2.
SSH
Secure Shell A remote administration and file copy program that is flexible enough to support VPNs too (using port forwarding). SSH runs on TCP port 22.
SAM
Security Account Manager The Windows local security account database where local system account information is stored.
feature updates
Semi-annual updates to the Windows operating system that include enhanced features that are installed in multiple phases, requiring a reboot after each phase of the update installation. Compare with quality updates.
SSID
Service Set ID Identifies a particular Wireless LAN (WLAN). This "network name" can be used to connect to the correct network. When multiple APs are configured with the same SSID, this is referred to as an E(xtended)SSID.
How can you ensure that an administrator-set default password for an account is not used permanently?
Set the User must change password at next logon option in the user account properties.
To configure a router/modem, what type of IP interface configuration should you apply to the computer you are using to access the device administration web app?
Set the adapter to obtain an IP address automatically. The router/modem will be running a Dynamic Host Configuration Protocol (DHCP) server that will allocate an appropriate IP address and DNS server.
factory default reset
Setting a mobile device back to the original factory settings, creating a clean OS, removing all data and apps, and resetting any configuration done by the user.
security template
Settings for services and policy configuration for a server operating in a particular application role (web server, mail server, file/print server, and so on). In Windows, the current configuration can be compared to the baseline defined in a security template using the Security Configuration and Analysis tool.
entry control roster
Sign-in sheet for managing access to premises.
pharming
Similar to phishing, this type of social engineering attack redirects a request for a website, typically an e-commerce site, to a similar-looking, but fake, website. The attacker uses DNS spoofing to redirect the user to the fake site.
SSO
Single Sign-on Any authentication technology that allows a user to authenticate once and receive authorizations for multiple services. Kerberos is a typical example of an authentication technology providing SSO.
tailgating
Social engineering technique to gain access to a building by following someone else (or persuading them to "hold the door").
anti-virus
Software capable of detecting and removing virus infections and (in most cases) other types of malware, such as worms, Trojans, rootkits, adware, spyware, password crackers, network mappers, DoS tools, and so on. Anti-virus software works on the basis of both identifying malware code (signatures) and detecting suspicious behavior (heuristics). Anti-virus software must be kept up to date with the latest malware definitions and protect itself against tampering.
remote wipe
Software that allows deletion of data and settings on a mobile device to be initiated from a remote server.
driver
Software that creates an interface between a device and the operating system. It may also include tools for configuring and optimizing the device.
port scanning
Software that enumerates the status of TCP and UDP ports on a target system. Port scanning can be blocked by some firewalls and IDS.
freeware
Software that is available for download and use free of charge.
program
Software that provides functionality such as word processing, graphics creation, database management, or other productivity or entertainment uses.
spyware
Software that records information about a PC and its user. Spyware is used to describe malicious software installed without the user's consent. Aggressive spyware is used to gather passwords or financial information such as credit card details.
shareware
Software that you can install free of charge usually for a limited time of use or with limited functionality. To continue using it or to access additional features, the user will need to register and often pay for the software.
eavesdropping
Some transmission media are susceptible to eavesdropping (listening in to communications sent over the media). To secure transmissions, they must be encrypted.
multifactor authentication
Strong authentication is multifactor. Authentication schemes work on the basis of something you know, something you have, or something you are. These schemes can be made stronger by combining them (for example, protecting use of a smart card certification [something you have] with a PIN [something you know]).
In terms of system hardware, what is the main advantage of a 64-bit version of Windows?
Support for more than 4 GB RAM.
Why isn't the System Protection feature a substitute for making a backup?
System Protection restore points are stored on the local disk and so would not allow recovery from the failure, loss, or destruction of the disk. System Protection is designed only to allow the rollback of configuration changes.
restore points
System Restore takes a snapshot of the system configuration and enables rollbacks to these restore points.
telnet
TCP/IP application protocol supporting remote command-line administration of a host (terminal emulation). Telnet is unauthenticated and has therefore been superseded by SSH or graphical remote configuration utilities. Telnet runs over TCP port 23.
professionalism
Taking pride in one's work and in treating people fairly.
Which Windows tool would you use if you want the defragmenter to run more frequently?
Task Scheduler.
email filtering
Techniques to prevent a user being overwhelmed with spam (junk email). Spam can be blocked from reaching an organization using a mail gateway to filter messages. At the user level, software can redirect spam to a junk folder (or similar). Anti-spam filtering needs to balance blocking illegitimate traffic with permitting legitimate messages. Anti-spam techniques can also use lists of known spam servers (blacklists).
TKIP
Temporal Key Integrity Protocol) Mechanism used in the first version of WPA to improve the security of wireless encryption mechanisms, compared to the flawed WEP standard.
TACACS
Terminal Access Controller Access Control System An alternative to RADIUS developed by Cisco. The version in current use is TACACS+; TACACS and XTACACS are legacy protocols.
What is the equivalent of Explorer in macOS?
The Finder.
Which edition(s) of Windows support connecting to the local machine over Remote Desktop?
The Remote Desktop server functionality is available in Professional, Enterprise, and Ultimate editions.
Task Scheduler
The Task Scheduler is a Windows program that enables the user to perform an action (such as running a program or a script) automatically at a pre-set time or in response to some sort of trigger.
desktop style
The UI elements that allow the user to interact with the OS vary between OS types and versions. For example, the Windows Start Menu has evolved into the Start Screen.
Hives
The Windows Registry is made up of hives. Each hive contains a discrete body of configuration data corresponding to an aspect of the system; for example; the SOFTWARE hive contains all the software configuration information. The files comprising the hives are stored in the %SystemRoot%\System32\Config folder.
Remote Desktop
The Windows feature that allows a remote user to initiate a connection at any time and sign on to the local machine using an authorized account.
Which is or are the main location(s) for system files in Windows?
The Windows folder (or system root) contains the files used to run Windows itself. Program Files contains the executable and settings files installed by desktop applications. You might also mention that the Users folder contains user settings files, user-specific application data, and user-generated data files. There are also some additional hidden folders (notably ProgramData) but do not worry if you have not included these.
Partitioning
The act of dividing a physical disk into logically separate storage areas, often referred to as drives.
You are trying to add a computer to a wireless network but cannot detect the access point. What would you suspect the problem to be?
The computer's wireless adapter is not supported by the AP, the computer is not in range, or there is some sort of interference.
A customer with a Windows 10 Home computer contacts you. She stores family photos on the computer's hard disk, but says she has read about disk failure and worries that they might be at risk. Is she right to be concerned and what solutions can you suggest?
The customer is right to consider the risk and take steps to mitigate it. One option is to make a backup of the files so that they are always stored on at least two devices. You could also suggest configuring the RAID-like functionality available with the StorageSpaces feature of Windows 10. Note that you cannot recommend Dynamic Disks as that is not available with the Home edition. Using both Storage Spaces and an offsite backup method, such as copying to a cloud drive, will give the best protection.
desktop
The desktop is at the top of the object hierarchy in Explorer, containing the Computer, Documents, Network, and Recycle Bin objects. The desktop also stores shortcuts to programs, files, and system objects.
You are troubleshooting a problem and find a disk marked as "foreign" listed under Drive Management. What does this mean?
The disk was configured as dynamic under a different computer then installed in this one. You need to import the disk to make it usable.
Finder
The file management GUI in macOS.
system files
The files necessary for the operating system to function properly.
integrity
The fundamental security goal of ensuring that electronic data is not altered or tampered with.
availability
The fundamental security goal of ensuring that systems operate continuously and that authorized individuals can access data that they need.
confidentiality
The fundamental security goal of keeping information and communications private and protecting them from unauthorized access.
You are troubleshooting an issue with a wireless adapter. When you open Device Manager, you find the device's icon is shown with a down arrow superimposed. What does this mean and why might this configuration have been imposed?
The icon indicates that the device has been disabled. It could be that there was a fault, or there may be a network configuration or security reason for disabling the adapter. In this sort of situation, use incident logs and device documentation to establish the reason behind the configuration change.
risk
The likelihood and impact (or consequence) of a threat actor exercising a vulnerability.
OS X
The name of the Apple operating system from 2001 through 2016.
Apart from Windows and macOS, what operating system options are there for client PCs?
The other main choice is one of the distributions of Linux. A company might also use some sort of UNIX. Finally, Chrome OS is installed on Chromebox PCs. These are often used by educational institutions and businesses who rely primarily on web applications, rather than locally installed desktop software.
What is the advantage of setting the pagefile to the same minimum and maximum sizes?
The pagefile will not become fragmented (assuming you defragmented the disk before doing this).
baseline
The point from which something varies. A configuration baseline is the original or recommended settings for a device, while a performance baseline is the originally measured throughput.
Command Interpreter
The portion of an operating system or script language that is able to read and implement commands entered by a user or from a script file.
onboarding
The process in which MDM software logs use of a device on the network and determines whether to allow it to connect or not, based on administrator-set parameters.
geotagging
The process of adding geographic location metadata to captured media such as pictures or videos.
Why are IP addresses entered under DNS, and why should there be two of them?
These are the IP addresses of DNS servers that will process client requests to resolve host and domain names to IP addresses. DNS is a critical service on Windows networks and on the Internet, so a second server should always be specified for redundancy.
forensics
The process of gathering and submitting computer evidence to trial. Digital evidence is latent, meaning that it must be interpreted. This means that great care must be taken to prove that the evidence has not been tampered with or falsified. The key points in collecting evidence are to record every step and action, to gather appropriate evidence, and to bag evidence. To preserve evidence correctly, it should be stored securely. Any investigation should be done on a copy of the digital files, not the originals. Each piece of evidence must be accompanied by a chain of custody form, detailing when, where, and how it was collected, where it has been stored, and who has handled it subsequently to collection.
You take a support call where the user doesn't understand why a program runs at startup when the Startup folder is empty. What is the likely cause and how could you verify this?
The program has added a registry entry to run at startup. You could check this (and optionally disable the program) by using Task Manager.
Which Windows command is probably best suited for scripting file backup operations?
The robocopy command offers more options than xcopy, so it will usually be the better choice. The copy command is quite basic and probably not suitable.
How can you confirm that you are connecting to a legitimate SSH server?
The server displays its host key on connection. You need to keep a record of valid host keys and compare the key presented by the server to the record you have.
network topology
The shape or structure of a network is commonly described as its topology. Topologies may be either physical (the actual appearance of the network layout) or logical (the flow of data across the network). In a star topology, nodes are connected to a single point while in a hub topology, all nodes connect to the same media and share bandwidth. A ring topology means that communications travel from node-to-node in a loop. In a full mesh network, each node is linked to every other node, but partial meshes are far more common. A hybrid topology uses elements of different topologies, such as a logical bus but physical star.
What readings would you expect to gather with a Wi-Fi analyzer?
The signal strength of different Wi-Fi networks and their channels within range of the analyzer.
active listening
The skill of listening to an individual so that you give them your full attention and are not trying to argue with, comment on, or misinterpret what they have said.
What is the difference between the boot partition and the system partition?
The system partition contains the boot files; the boot partition contains the system root (OS files).
latency
The time it takes for a signal to reach the recipient. A video application can support a latency of about 80 ms, while typical latency on the Internet can reach 1000 ms at peak times. Latency is a particular problem for 2-way applications, such as VoIP (telephone) and online conferencing.
Microsoft account
The type of account required to get apps from the Microsoft Store, to sync data between devices, access OneDrive, and work with parental controls for a Child account.
You receive a call from a user trying to save a file and receiving an "Access Denied" error. Assuming a normal configuration with no underlying file corruption, encryption, or malware issue, what is the cause and what do you suggest?
The user does not have "Write" or "Modify" permission to that folder. If there is no configuration issue, you should advise the user about the storage locations permitted for user-generated files. If there were a configuration issue, you would investigate why the user had not been granted the correct permissions for the target folder.
You need to assist a user in changing the extension of a file. Assuming default Explorer view settings, what steps must the user take?
The user must first show file extensions, using the View tab in the Folder Options applet. In Windows 8/10, extensions can be shown through a check box on the View menu ribbon. The user can then right-click the file and select Rename, or press F2 and over-type the extension part.
hash
The value that results from hashing encryption as a short representation of data. Also called a hash value or message digest.
data type
The way the data is intended to be used in a program such as character or string, integer, real number, logical, or Boolean.
You receive a call from a Windows 7 user who wants to "speed his computer up." After questioning him, you find that he is actually getting frustrated at having to click through UAC authorizations. He asks how to turn them off. Explain how this is done. Should you offer any other advice?
There are several ways to disable User Account Control (UAC) but the simplest is via the User Accounts applet in Control Panel. You can also just search for "UAC" to open the dialog box. You should advise the customer that UAC is an important security feature, and that by disabling it, his computer will be more vulnerable to malware.
A Windows 7 Professional user is trying to join a video conference and cannot hear any sound from her headset or the computer's built-in speakers. Which tool can you suggest using to try to remedy the fault?
There is an automated Windows Troubleshooting tool for diagnosing and correcting problems with audio playback. You should advise the customer to open the Troubleshooting applet in Control Panel and select the troubleshooter for audio playback.
You are advising a customer with an older model Android smartphone. The customer wants to update to the latest version of Android, but using the update option results in a "No updates available" message. What type of issue is this, and what advice can you provide?
This is an issue with update limitations. Android is quite a fragmented market, and customers must depend on the handset vendor to implement OS updates for a particular model. The customer can only check the handset vendor's website or helpline to find out if a version update will ever be supported for that model.
What tasks would you perform using the regedit tool?
This tool allows you to make manual changes to the Window Registry database. You can also use it to export and back up portions of the registry. You might also import registry files to apply a suggested fix.
If a single physical disk is divided into three partitions, how many different file systems can be supported?
Three—each partition can use a different file system.
What is the name of Apple's backup software for macOS?
Time Machine.
pattern lock
To access a locked device, the user must trace a pre-determined pattern on screen, or join the dots.
permissions
To access files and folders on a volume, the administrator of the computer will need to grant file permissions to the user (or a group to which the user belongs). File permissions are supported by NTFS-based Windows systems.
Why might you run the shutdown command with the /t switch?
To specify a delay between running the command and shutdown starting. You might do this to give users a chance to save work or to ensure that a computer is restarted overnight.
rainbow table
Tool for speeding up attacks against Windows passwords by precomputing possible hashes.
network mapping
Tools used to gather information about the way the network is built and configured and the current status of hosts.
updates
Updates are made freely available by the software manufacturer to fix problems in a particular software version, including any security vulnerabilities. Updates can be classified as hotfixes (available only to selected customers and for a limited problem), patches (generally available), and service packs (installable collections of patches and software improvements).
How would you configure a PC to join a domain during installation of Windows 7?
Use an answer file with the appropriate settings, and ensure that a domain controller is available to the PC during setup. You cannot join a domain during attended setup (though you could immediately after setup finishes).
branch
Used to control the flow within a computer program or script, usually based on some type of logic condition. Often implemented with If or Goto statements.
UAC
User Account Control A security system in Windows designed to restrict abuse of accounts with administrator privileges. Actions such as installing hardware and software can be performed without changing accounts but the user must authorize the use of administrative rights by clicking a prompt or re-entering user credentials.
A user asks you how they can change Ease of Access settings. In which management interface(s) are these settings located in the different versions of Windows?
User-level features like this are configured via the Control Panel in Windows 7. In Windows 8 and Windows 10, there are Ease of Access settings in both the Control Panel and in the PC Settings/Windows Settings app but don't worry if you just answered "Settings app." It is also worth remembering that you can use Instant Search to return a list of user configuration options quickly.
You receive a call from a customer who is confused after upgrading his Windows 7 Home Premium edition computer to Windows 10. The user cannot find the All Programs menu. What should you advise?
Users often need assistance when an OS version changes the desktop-style or user interface. In Windows 10, the Start Menu may be swapped to a Start Screen while in Tablet Mode. It is possible the user has a tablet-styled computer or may have enabled Tablet Mode unintentionally.
Which three principal user security groups are created when Windows is installed?
Users, Administrators, and Guests. You might also include Power Users, though use of this group is deprecated. There are also system groups, but users cannot be assigned manually to these. Going beyond the account types listed in the exam objectives, you might include groups such as Remote Desktop Users, Remote Management Users, or Backup Operators.
Which troubleshooting tool is most likely to identify whether a problem is related to a device driver or to a faulty system component?
Using Safe Mode boots with a minimal set of drivers and services. If Safe Mode boot is successful but normal boot is not, the issue is likely to be with driver software. Re-enable each driver in turn to identify the culprit. If the problem also manifests in SafeMode, it is more likely to have an underlying hardware cause.
disk wiping
Using software to ensure that old data is destroyed by writing to each location on the media, either using zeroes or in a random pattern. This leaves the disk in a "clean" state ready to be passed to the new owner.
VNC
Virtual Network Computing Remote access tool and protocol. VNC is the basis of macOS screen sharing.
VBR
Volume Boot Record Loads the boot manager, which for Windows is bootmgr.exe.
WoL
Wake on LAN Where a host has a compatible network card, a network server can be configured to transmit a "magic packet" that causes the host to power up.
You are assisting a laptop user. While she was away from her desk, the laptop has powered off. The user was in the middle of working on a file and had forgotten to save changes. Can you reassure her and advise on the best course of action?
When a computer goes into a power saving mode, it will either maintain a small amount of power to the memory modules or write the contents of memory to a hibernation file on disk. Consequently, the user should be able to start the laptop again and the desktop will resume with the open file still there. You should advise the customer to save changes to files regularly however.
dim display
When a mobile device has the backlightset to its lowest setting and the automatic light adjustment is disabled, or the phone is set to conserve power by auto-dimming the light.
2-step verification
When a user connects to a service using a device that was not previously registered with the service, the authenticator application sends a one time password to a smartphone or alternate email address that the user then enters to complete the authentication process.
data transmission overlimit
When apps, especially malware or rogue apps, trying to collect data in the background use excessive amounts of data on a mobile device.
redirection (browser)
When the user tries to open a web page but is sent to another page (which may or may not look like the page the user was attempting to access).
When should you use FAT32 for the system partition?
When using UEFI system firmware, the EFI system partition should be formatted with a FAT file system. Another scenario is when you are configuring a multiboot system with an older version of Windows or with Linux.
ACE
access control entry Within an ACL, a record of subjects and the permissions they hold on the resource.
WPA
Wi-Fi Protected Access An improved encryption scheme for protecting Wi-Fi communications, designed to replace WEP. The original version of WPA was subsequently updated (to WPA2) following the completion of the 802.11i security standard. WPA features an improved method of key distribution and authentication for enterprise networks, though the pre-shared key method is still available for home and small office networks. WPA2 uses the improved AES cipher, replacing TKIP and RC4.
Which standard represents the best available wireless network security?
Wi-Fi Protected Access version 2 (WPA2). It is also worth noting that this can be configured in personal mode (using a passphrase shared between all users) or enterprise mode. Enterprise mode is more secure. Each user connects with his or her network credential, which is validated by an authentication server (typically RADIUS).
WPS
Wi-Fi Protected Setup Mechanism for auto-configuring a WLAN securely for home users. On compatible equipment, users just have to push a button on the access point and connecting adapters to associate them securely.
Windows Settings
Windows 10 app for configuring and managing the Windows 10 computer.
Data Sources
Windows applications can import data from various data sources. The links to different data files and database drivers can be configured from Administrative Tools.
Component Services
Windows applications use various component (COM) models and APIs to share data. Component Services in Administrative Tools allows configuration of component servers.
counter logs
Windows log files that allow you to collect statistics about resources and can be used to determine system health and performance.
trace logs
Windows log files that allow you to collect statistics about services, including extensions to Event Viewer to log data that would otherwise be inaccessible.
service
Windows machines run services to provide functions; for example, Plug-and-Play, the print spooler, DHCP client, and so on. These services can be viewed, configured, and started/stopped via the Services console. You can also configure which services run at startup using msconfig. You can view background services (as well as applications) using the Processes tab in Task Manager.
homegroup
Windows networking feature designed to allow Windows 7 and later home networks to share files and printers easily through a simple password protection mechanism. Earlier versions of Windows are not supported. Support for homegroups was discontinued in later versions of Windows 10.
Microsoft windows
Windows started as version 3.1 for 16-bit computers. A workgroup version provided rudimentary network facilities. Windows NT 4 workstations and servers (introduced in 1993) provided reliable 32-bit operation and secure network facilities, based around domains. The Windows 9x clients (Windows 95, 98, and Me) had far lower reliability and only support for workgroups, but were still hugely popular as home and business machines. Windows 2000 and Windows XP workstations married the hardware flexibility and user interface of Windows 9x to the reliability and security of Windows NT, while the server versions saw the introduction of Active Directory for managing network objects. The subsequent client releases of Windows (Vista and Windows 7) featured a substantially different interface (Aero) with 3D features as well as security improvements. The latest client versions— Windows 8 and Windows 10—are designed for use with touchscreen devices
quality updates
Windows updates that are typically released each Tuesday designed to address security vulnerabilities, usually installed in one group of patches and requiring a single reboot. Compare with feature updates
WEP
Wired Equivalent Privacy A mechanism for encrypting data sent over a wireless connection. WEP is considered flawed (that is, a determined and well-resourced attack could probably break the encryption). Apart from problems with the cipher, the use and distribution of a pre-shared key (effectively a password) depends on good user practice. WEP has been replaced by WPA.
WWAN
Wireless Wide Area Network A large wireless network, such as a cellular data network or line-of-sight microwave transmission.
You are advising a customer whose business is expanding. The business owner needs to provision an additional 30 desktop computers, some of which will be installed at a second office location. The business is currently run with a workgroup network of five Windows 7 Home Premium desktop computers and one file server. Why might you suggest licenses for an edition of Windows 10 that supports corporate needs for the new computer and has upgrades for the old computers? Which specific edition(s) could you recommend?
Without a domain, accounts must be configured on each computer individually. With over 30 computers to manage at two locations, this would be a substantial task so switching to a domain network, where the accounts can be configured on the server, is likely to save costs in the long term. The BranchCache feature would also allow computers at the second office to minimize bandwidth usage when downloading documents (Enterprise edition only) and updates from the main office. You can suggest either Windows 10 Pro or Windows 10 Enterprise for use on a domain. As Windows moves towards a service model, subscription-based licensing of the Enterprise edition is becoming the mainstream choice.
Is the command format d: /fs:exfat /q valid? If so, what is its effect, and what precaution might you need to take before running it?
Yes, it is valid. It formats drive D with the exFAT file system by using a quick format (does not scan for bad sectors). This will delete the file table on the drive so existing data files can be overwritten—the formatted drive will appear to be empty in Explorer. If there are existing files that need to be preserved, they should be backed up before running the format command.
What tool would you use to add a user to a local security group?
You can change the account type between Standard and Administrator via the basic Users app, but the Local Users and Groups management console is the main tool to use. You could also use the net command suite or PowerShell.
What is the advantage of using a USB thumb drive to install Windows?
You can install images larger than will fit on a DVD. This might be useful if you want to install multiple software applications at the same time as Windows itself.
What sort of configuration options are available to apply parental controls, as opposed to packet filtering via a firewall?
You can set restrictions to block access at times of the day or night. You can blacklist web addresses (URLs), optionally on the basis of site rating schemes. You may also be able to block access on the basis of keyword filtering.
What security method could you use to allow only specific hosts to connect to a SOHO router/modem?
You could configure a whitelist of permitted Media Access Control (MAC) addresses.
A single PC on a network cannot connect to the Internet. Where would you start troubleshooting?
You could test the PC's IP configuration, specifically the default gateway or name resolution, or you could check that the cable is good.
Android
an open-source operating system supported by a wide range of hardware and software venders
What Linux command allows file and directory permissions to be changed?
chmod
CI
configuration item In change management, an asset that requires specific management procedures for it to be used to deliver the service. Each CI is identified with a label and defined by its attributes and stored in a CMDB.
In Linux, what command is used to view tasks scheduled by the current user?
crontab -l
Which tool is used to verify file system integrity in Linux?
fsck
FDE
full disk encryption Encryption of all data on a disk (including system files, temporary files, and the pagefile) can be accomplished via a supported OS, third-party software, or at the controller level by the disk device itself. Used with a strong authentication method, this mitigates against data theft in the event that the device is lost or stolen. The key used to encrypt the disk can either be stored on a USB stick or smart card or in a Trusted Platform Module.
boot partition
in Microsoft terminology. the partition that contains the operating system (that is, the\WINDOWS folder) is referred to as the boot partition. This is typically a different partition to the system partition (the partition containing the boot files).
ICM
information content management The process of managing information over its lifecycle, from creation to destruction.
You have restarted the DHCP server following a network problem. What command would you use to refresh the IP configuration on Windows 7 client workstations?
ipconfig /renew
Which Linux command will display detailed information about all files and directories in the current directory, including system files?
ls -la
What command could you use to move a file names.doc from your current directory to the USB stick linked to folder /mnt/usb?
mv names.doc /mnt/usb
Keychain
macOS app for managing passwords cached by the OS and supported browser/web applications.
dock
macOS feature for managing applications from the desktop, similar to the Windows taskbar.
MAC filtering
media access control filtering Applying an access control list to a switch or access point so that only clients with approved MAC addresses can connect to it.
What command would you normally need to run in order to access the contents of a USB memory stick inserted into Linux?
mount
OTP
one time password A password that is generated for use in one specific session and becomes invalid after the session ends.
PAT
port address translation Another term for NAT overloading or NAPT.
PDU
power distribution unit) A device designed to provide power to devices that require power, and may or may not support remote monitoring and access.
apps
programs installed via a vendor store interface that extended the functionality of computing device. An app must be written and compiled for the particular operating system used by the device.
regex
regular expressions Strings of characters that denote a word, a set of words, or a sentence
What command would allow you to delete the folder /home/fred/junk, its contents, and all of its subdirectories?
rm -r /home/fred/junk
Which Linux command allows a user to run a specific command or program with superuser/root privileges?
sudo
You want your Linux PC to close gracefully at 9:00 p.m., as a scheduled power outage is planned at 12:00 midnight. How could you do this?
shutdown -h 21:00
SOHO network
small office/home office network A small network that provides connectivity and resource sharing for a small office or home office.
What Windows tool is used to test the end-to-end path between two IP hosts on different IP networks?
tracert