Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

A+ Prep

Comptia A+ 220-1102

TermDefinition
Windows Information Protection Microsoft Data Loss Prevention program that protects against the accidental leakage of data. Not Designed to protect against Malicious Attacks
something a user know like a password or a pin Knowledge factors
something a user has like a smart card or other security token possession factor
something a user is like biometric reading of fingerprint or retina scan inherence factors
something a user does like a signature or speaking words behavioral factors
somewhere a user is like at work or at home location-based factors
Multi-Factor Authentication combining multiple security factors for access
User Account Control Windows security component that keeps every user (besides the Admin) in standard user mode
What is a domain network of windows computers that is controlled by a server
Phishing the attempt to fraudulently obtain private information
Social Engineering Techniques Phishing, piggybacking/tailgating, shoulder surfing, impersonation, dumpster diving
Spoofing Attack attacker masquerades as another person by falsifying information (Man-in-the-Middle, phishing)
Zero-day Attack exploit vulnerabilities that havent even been discovered or that do no have proper preventative measures in place
DDoS Distributed Denial of Service -multiple systems are used to attack a server, website, or network
Rainbow tables precalculated encrypted passwords to compass hashed passwords rather than words first
What type of user has full control of an OS Admin
User type that are the normal accounts for people who can log on to the network. They have access to their own data, but cannot access the data of any other user and cannot perform admin tasks Standard User (or just User)
Guest Users have limited access to the system and is sometimes used for temporary workers or vendors
Power Users included in windows for backward compatibility with older versions of applications
"Enforce Password History" in password policy prevents users from using any password that is remembered in the history, can be configured for history length
"Minimum and Maximum Password Age" defines the interval that a password can be used until it needs to be changes
"Minimum Password Length" requires password to be atleast a specified number of characters
"Password Complexity Requirements" ex. uppercase, lowercase, special character, numbers
Enable Debugging enables the use of a debug program to examine the system kernel for troubleshooting
Enable Boot Logging Logs the boot process and creates a ntblog.txt file. This is stored in the %systemroot%
Enable low-resolution video Uses a standard VGA Driver in place of a GPU-Specific display driver but uses all other drivers as normal, typically at 640x480 resolution
Enable Safe Mode Starts system with minimal set of drivers; used in case a driver fails -good option when using System Restore and scanning system for viruses
Disable driver signature enforcement Enables Drivers containing improper signatures to be installed
Disable early launch anti-malware protection (W10/8 Only) Rootkits can infect a system early on as it boots and some anti-malware programs are designed to check for these early on in the boot process
Disable automatic restart after failure prevents windows from automatically restarting, if an error causes windows to fail. -Only use if windows is stuck in boot loop
Troubleshooting "Bootmgr is missing" 1. Boot to WinRE and select Startup Repair 2. WinRE > Command Prompt > bootrec /rebuildbcd 3. Verify that C: partition is active/100MB special partion is not missing 4. bootrec /fixboot and bootrec /fixmbr
bootrec /rebuildbcd rebuilds the data store and might fix the boot issue. Might require system restore from the WinRE
bootrec /fixboot and bootrec /fixmbr these rewrite the boot sector and master boot record respectively. * /fixmbr is ineffective on GPT-based systems b/c they dont use mbr
Troubleshooting "Windows BCD file is missing required information" 1. Startup Repair from WinRE 2. WinRE > Command Prompt > bootrec /rebuildbcd -if bootrec runs, type 'YES' -if bootrec doesn't find anything, remove BCD Store and re-create it (method 3) 3. *new card* BCD commands
*Step 3* BCD Store Re-creation Bcdedit /export C: \BCD_Backup ren c: \boot\bcd bcd.old Bootrec /rebuildbcd
Troubleshooting Spontaneous Shutdowns 1. Check event viewer 2. Use MSConfig > Selective Startup > Load startup items (also under services>Hide all MS services>Disable all) 3. Boot into safe mode 4. Run Virus Scan 5. Check Power 6. Use WinRE
Stop Errors Blue screen of Death 1. event usually written to system logs 2. Kernel Memory dump (or complete if option selected) 3. computer restarts
Methods for Restoring Windows 1. Boot to windows installation media and select system image recovery 2. (W7) Boot to installation media > select "Restore your computer using system image" 3. Reset system to factory image stored on separate partition that was created before issue
Malware removal procedure 1. Identify malware symptoms 2. Quarantine infected systems 3. Disable system Restore 4a. Update AV 4b. Scan/Remove using programs, Safe Mode, WinPE 5. Sched Scans and run updates 6. Enable System Restore and create a restore point 7. Educate user
Malware removable: 1. Identify and research malware symptoms • Odd error messages - Application failures, security alerts • System performance issues - Slow boot, slow applications • Research the malware - Know what you’re dealing with
2. Quarantine Infected System • Disconnect from the network • unplug cable, disable network adapter • Isolate all removable media • Everything should be contained • Prevent the spread 1• Don’t transfer files, don’t try to backup • That ship sailed
3. Disable System Restore systempropertiesadvanced.exe>highlight protected drive>configure>Disable
4a. Remediate: Update Anti-Virus Bring anti-malware software to the latest version
4b. Remediate: Scan and Removal *Initiate Full scan of each volume, best done from Safe Mode *Pre-installation Environment (WinPe), Bootable flash drive with OS and/or repair/recovery Environment can also be used to scan
5. Schedule Scans and Run Updates • Built into the antivirus software • Automated signature updates and scans • Task scheduler • Run any task • Operating system updates • Make sure its enabled and working
6. Enable System Restore Re-enable system restore and create a restore point once you verify that system is working properly
7. Educate the End user • One on one - Personal training • Posters and signs - High visibility • Message board posting - The real kind • Login message - These become invisible • Intranet page - Always available
Virus Symptoms 1. slow performance 2. system locks up 3. frequent restarts/crashes 4. hard drives/apps not accessible or not working 5. Win updates fail 6. file/folder permissions denied 7.internet blocked 8. unusual errors 9. AV cant run 10. files missing
Spyware Symptoms 1. web browser default home page changed 2. particular site comes up no matter the search 3. Pop-Ups 4. FW and AV turn off automatically 5. new programs, icons appear 6. odd windows problems 7. random java console appearing
File History 1. File backup program a. copy ind. files to a backup b. may not store all system files
System Image Backup 1. creates an image of your system drive and user data files for later restoration a. additional info can also be manually selected for backup
Linear Tape-Open (LTO) 1. Large capacity backup option that can hold 12TB of raw data, often used by larger companies a. Full backup b. Incremental - only backs up info that has changed since last full backup *Windows Server has similar options*
File Extension for Script in Windows Command line Batch Files or .bat
Powershell uses what type of file extension? ps1
what is the default port for SSH tcp/22
Created by: aspaulding22
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards