click below
click below
Normal Size Small Size show me how
A+ Prep
Comptia A+ 220-1102
| Term | Definition |
|---|---|
| Windows Information Protection | Microsoft Data Loss Prevention program that protects against the accidental leakage of data. Not Designed to protect against Malicious Attacks |
| something a user know like a password or a pin | Knowledge factors |
| something a user has like a smart card or other security token | possession factor |
| something a user is like biometric reading of fingerprint or retina scan | inherence factors |
| something a user does like a signature or speaking words | behavioral factors |
| somewhere a user is like at work or at home | location-based factors |
| Multi-Factor Authentication | combining multiple security factors for access |
| User Account Control | Windows security component that keeps every user (besides the Admin) in standard user mode |
| What is a domain | network of windows computers that is controlled by a server |
| Phishing | the attempt to fraudulently obtain private information |
| Social Engineering Techniques | Phishing, piggybacking/tailgating, shoulder surfing, impersonation, dumpster diving |
| Spoofing Attack | attacker masquerades as another person by falsifying information (Man-in-the-Middle, phishing) |
| Zero-day Attack | exploit vulnerabilities that havent even been discovered or that do no have proper preventative measures in place |
| DDoS | Distributed Denial of Service -multiple systems are used to attack a server, website, or network |
| Rainbow tables | precalculated encrypted passwords to compass hashed passwords rather than words first |
| What type of user has full control of an OS | Admin |
| User type that are the normal accounts for people who can log on to the network. They have access to their own data, but cannot access the data of any other user and cannot perform admin tasks | Standard User (or just User) |
| Guest Users | have limited access to the system and is sometimes used for temporary workers or vendors |
| Power Users | included in windows for backward compatibility with older versions of applications |
| "Enforce Password History" in password policy | prevents users from using any password that is remembered in the history, can be configured for history length |
| "Minimum and Maximum Password Age" | defines the interval that a password can be used until it needs to be changes |
| "Minimum Password Length" | requires password to be atleast a specified number of characters |
| "Password Complexity Requirements" | ex. uppercase, lowercase, special character, numbers |
| Enable Debugging | enables the use of a debug program to examine the system kernel for troubleshooting |
| Enable Boot Logging | Logs the boot process and creates a ntblog.txt file. This is stored in the %systemroot% |
| Enable low-resolution video | Uses a standard VGA Driver in place of a GPU-Specific display driver but uses all other drivers as normal, typically at 640x480 resolution |
| Enable Safe Mode | Starts system with minimal set of drivers; used in case a driver fails -good option when using System Restore and scanning system for viruses |
| Disable driver signature enforcement | Enables Drivers containing improper signatures to be installed |
| Disable early launch anti-malware protection | (W10/8 Only) Rootkits can infect a system early on as it boots and some anti-malware programs are designed to check for these early on in the boot process |
| Disable automatic restart after failure | prevents windows from automatically restarting, if an error causes windows to fail. -Only use if windows is stuck in boot loop |
| Troubleshooting "Bootmgr is missing" | 1. Boot to WinRE and select Startup Repair 2. WinRE > Command Prompt > bootrec /rebuildbcd 3. Verify that C: partition is active/100MB special partion is not missing 4. bootrec /fixboot and bootrec /fixmbr |
| bootrec /rebuildbcd | rebuilds the data store and might fix the boot issue. Might require system restore from the WinRE |
| bootrec /fixboot and bootrec /fixmbr | these rewrite the boot sector and master boot record respectively. * /fixmbr is ineffective on GPT-based systems b/c they dont use mbr |
| Troubleshooting "Windows BCD file is missing required information" | 1. Startup Repair from WinRE 2. WinRE > Command Prompt > bootrec /rebuildbcd -if bootrec runs, type 'YES' -if bootrec doesn't find anything, remove BCD Store and re-create it (method 3) 3. *new card* BCD commands |
| *Step 3* BCD Store Re-creation | Bcdedit /export C: \BCD_Backup ren c: \boot\bcd bcd.old Bootrec /rebuildbcd |
| Troubleshooting Spontaneous Shutdowns | 1. Check event viewer 2. Use MSConfig > Selective Startup > Load startup items (also under services>Hide all MS services>Disable all) 3. Boot into safe mode 4. Run Virus Scan 5. Check Power 6. Use WinRE |
| Stop Errors | Blue screen of Death 1. event usually written to system logs 2. Kernel Memory dump (or complete if option selected) 3. computer restarts |
| Methods for Restoring Windows | 1. Boot to windows installation media and select system image recovery 2. (W7) Boot to installation media > select "Restore your computer using system image" 3. Reset system to factory image stored on separate partition that was created before issue |
| Malware removal procedure | 1. Identify malware symptoms 2. Quarantine infected systems 3. Disable system Restore 4a. Update AV 4b. Scan/Remove using programs, Safe Mode, WinPE 5. Sched Scans and run updates 6. Enable System Restore and create a restore point 7. Educate user |
| Malware removable: 1. Identify and research malware symptoms | • Odd error messages - Application failures, security alerts • System performance issues - Slow boot, slow applications • Research the malware - Know what you’re dealing with |
| 2. Quarantine Infected System | • Disconnect from the network • unplug cable, disable network adapter • Isolate all removable media • Everything should be contained • Prevent the spread 1• Don’t transfer files, don’t try to backup • That ship sailed |
| 3. Disable System Restore | systempropertiesadvanced.exe>highlight protected drive>configure>Disable |
| 4a. Remediate: Update Anti-Virus | Bring anti-malware software to the latest version |
| 4b. Remediate: Scan and Removal | *Initiate Full scan of each volume, best done from Safe Mode *Pre-installation Environment (WinPe), Bootable flash drive with OS and/or repair/recovery Environment can also be used to scan |
| 5. Schedule Scans and Run Updates | • Built into the antivirus software • Automated signature updates and scans • Task scheduler • Run any task • Operating system updates • Make sure its enabled and working |
| 6. Enable System Restore | Re-enable system restore and create a restore point once you verify that system is working properly |
| 7. Educate the End user | • One on one - Personal training • Posters and signs - High visibility • Message board posting - The real kind • Login message - These become invisible • Intranet page - Always available |
| Virus Symptoms | 1. slow performance 2. system locks up 3. frequent restarts/crashes 4. hard drives/apps not accessible or not working 5. Win updates fail 6. file/folder permissions denied 7.internet blocked 8. unusual errors 9. AV cant run 10. files missing |
| Spyware Symptoms | 1. web browser default home page changed 2. particular site comes up no matter the search 3. Pop-Ups 4. FW and AV turn off automatically 5. new programs, icons appear 6. odd windows problems 7. random java console appearing |
| File History | 1. File backup program a. copy ind. files to a backup b. may not store all system files |
| System Image Backup | 1. creates an image of your system drive and user data files for later restoration a. additional info can also be manually selected for backup |
| Linear Tape-Open (LTO) | 1. Large capacity backup option that can hold 12TB of raw data, often used by larger companies a. Full backup b. Incremental - only backs up info that has changed since last full backup *Windows Server has similar options* |
| File Extension for Script in Windows Command line | Batch Files or .bat |
| Powershell uses what type of file extension? | ps1 |
| what is the default port for SSH | tcp/22 |