The hosts.ini file is a local plain text file that maps servers or hostnames to IP addresses.
Attackers often modify host.ini files to redirect users to a malicious webpage instead of one they would commonly use like Google, Facebook, and others.
Subnet mask
Degauss
Degaussing is the process of erasing/wiping a hard disk drive or magnetic tape.
Degaussing is the guaranteed form of hard drive erasure and is considered fast and efficient, especially with many hard drives.
Radius and SSO
With RADIUS and SSO configured, users on the network can provide their user credentials one time when they initially connect to the wireless access point or another RADIUS client and are then automatically authenticated to all of the network's resources.
Proxy Server settings in internet options
Proxy server settings can be found under the connections tab in the internet options control panel applet
Heuristic Antivirus software
Heuristic antivirus software uses behavior-based technology to detect any new version of an already established computer virus.
A antivirus method used to detect unknown computer viruses and variants of previously detected viruses
Hard Drive Destruction Methods
Degaussing is the most effective and quickest method for destroying large amounts of hard drives
Legal Terms
Legal Hold
A Legal Hold is a process that an organization uses to preserve all forms of potentially relevant information when litigation is pending or reasonably anticipated.
Chain of Custody
Chain of Custody forms list every person who has worked with or who has touched the evidence that is a part of an investigation. These forms record every action taken by each individual in possession of the evidence
Requires for evidence to be admissible in a court of law?
Order of volatility
Order of volatilityrefers to the order in which you should collect evidence.
Right to Audit
A Right to Audit is a clause in a contract or service agreement that allows a company the authority to audit the systems and information processed.
Virtual Machines and Physical Server Comparisons
A virtual machine can usually be restored much faster than a physical server after a disaster.
To restore a virtual machine, all you need is another clone, backup, or instance of the virtual machine that was lost in the disaster.
Physical servers must be modified to fit the right drivers for the disk drives, NIC, and other necessary components whenever they must be rebuilt after a crash.
You’re building the physical server from the ground up again.
This takes a ton of time, a lot longer than the time it takes to restore a virtual machine.
What should have a grounding wire attached to them?
A Server Rack and UPS should be installed with a grounding wire attached to them to avoid electric shock.
Third Practice Test: 81%
Chain of Custody
The chain of custody is the chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of physical or electronic evidence.
The chain of custody must be maintained from when you arrived at the laptop until you turn it over to law enforcement officials.
As first responders, our job is to collect the evidence and maintain the chain of custody.
Rollback Plan
Rollbacks are VERY important in the change management process.
A rollback plan is an IT governance integration approach that specifies the processes required to restore a system to its original or earlier state in the event of failed or aborted implementation.
You are setting up the Remote Desktop Services on a Windows 2019 server. To increase the security of the server, which TWO of the following actions should you take?
To best secure the server, you should logically place the Windows 2019 server into the network's screen subnet and block all unused ports on the switch, router, and firewall.
Allow List
An Allow List is a form of protection where only the items identified specifically on the list are allowed, whereas all others are denied.
For example, if you create an access control list that relies on an allow list, it would block every IP address that is not found in the allow list.
What two processes speed up the boot up process?
Remove any unneeded applications at startup
Defragment the hard drive if the hard drive is a HDD (Disk drive)
What port number is used for sending emails over the network?
SMTP (Simple Mail Transfer Protocol).
Port 25.
Port 25 must be set to OPEN or ALLOW in the firewall for SMTP (Simple Mail Transfer Protocol) to function properly.
Fourth Practice Test 85%
Network Adapter’s Duplex Setting
To manually configure a network adapter’s duplex setting; you’ll have to go into into the device manager setting.
Easiest ways for attackers to get into a wireless network
WPS is enabled
Default Administrative login credentials are still configured.
LTS
LTS stands for Long-Term Support
Meaning that this version of a release is well-supported by the manufacturers and will be regularly updated.
If any of the .DLL files involved with windows update are not correctly registered, you may encounter this problem.
“Operating System” not found Error upon boot up
Use the bootrec/fixboot command to repair the driver’s boot sector.
fixboot is used to fix any damage to the windows OS and the drive’s boot sector
Minimum amount of RAM needed to install Windows 10 32-bit
The minimum amount of RAM needed to install Windows 10 32-bit is 1GB.
Network-based anti-malware
The network-based anti-malware can help prevent malware attacks by scanning all incoming data to prevent malware from being installed and infecting a computer.
Invalid or Expired Security Certificate
There are 2 causes of the “Invalid or Expired Security Certificate” error
A problem with your PC
A problem with the certificate itself
Want to print your doc? This is not the way.
Try clicking the ⋯ next to your doc name or using a keyboard shortcut (