A+ 220-702 Sections 7 - 9

The flashcards below were created by user mjurgen on FreezingBlue Flashcards.

  1. Authentication Facts
    • Usernames are not case sensitive.
    • Password Policy settings in the Local Security Policy control password characteristics.
  2. Firewalls types
    • Network-based firewall inspect traffic between networks.
    • Host-based firewall inspects traffic received by a host.
    • Firewalls use ACLs (access control lists)
  3. Windows Firewall types of exceptions
    • Program - opens ports while program is running and closes it when it stops, automatically detects ports/protocal used.
    • Port - Opens port perminantly, must know protocal to use TCP/UDP
  4. Port Triggering
    Dynamically opens incoming ports based on outgoing trafic
  5. Port Forwarding
    Allow incoming traffic directed to a specific port through the firewall. 
  6. Proxy Server
    • Acts as an intermediary between host and Internet
    • Specific implementation of a firewall that uses filter rules to allow or deny Internet traffic
    • Every packet is inspected at the firewall (proxy) level
  7. Malware types
    • Viruses that attach to legitimate files and spread when the files are opened.
    • Worms that infect systems and spread automatically through the network.
    • Trojan horse programs that appear to be useful programs but which perform secret or malicious acts.
    • Spyware that tracks your computer or browser activity.
    • Adware that displays pop-up advertisements based on your browser activity.
    • Spam that is unwanted, unsolicited e-mail, often carrying viruses or advertisements for questionable or illegal products.
  8. Security Center is available in?
  9. NAC
    • Network Access Control
    • Prevents unprotected computers from connecting to the network. 
    • Remediation - provides resources to correct any problems that are found
  10. NAP
    • Network Access Protection
    • Microsoft's implementation of NAC.
  11. Hard disk password
    • Password must be given at system startup
    • Part of ATA specifications not dependent on manufacturer
    • cannot read the passwords from the disk.
    • cannot move the drive to another system
    • cannot format the disk to remove
  12. TPM
    • Trusted Platform Module
    • Chip on motherboard that creates hash keys for known hardware.
    • Used for hardware system identification
    • Can be used by applications
  13. File encryption EFS 
    • Encrypting File Service - encrypts individual files. Windows automatically decrypts
    • Can add users who can decrypt
    • Only on NTFS
    • Cannot be used with compression 
  14. Disk encryption
    • At startup key required to unlock drive
    • BitLocker is a Microsoft solution that provides whole disk encryption.
    • Can use with or without TPM
    • With TPM, key stored in TPM, optional require PIN
    • W/O TPM key stored on USB
  15. Data transmission encryption
    • VPNs use IPSec, PPTP, and L2TP  protocols
    • SSL can be added to other protocals to provide encryption
  16. Aero
    • Availible in Vista/7 but not home versions
    • window glass effects
    • window animations
    • live thumbnail previews
    • Flip 3D
    • Windows Experience Index discribes Aero perfomance, 3 or higher to use Aero
  17. Processor utilization
    Should be less then 40%
  18. Processor Affinity
    Specify that a specific process use a certain processor in a multi-processor system.
  19. % Disk Time
    Percentage of time that the disk subsystem is busy reading from and writing to disk.
  20. Average Disk Queue Length
    • Tells you the number of read and write requests that are typically waiting to be processed.
    • Sould be below 2 times the number of disk spindles
  21. Committed Memory
    • Identifies how much memory has been assigned to running processes.
    • The total value identifies the amount actually assigned.
    • The peak value identifies the highest value assigned since the system has been running.
    • The limit value is the amount of physical RAM plus the page file size.
  22. Virtual Memory
    addresses assigned by the operation system to shield the process from the details of the physical memory storage system.
  23. Memory pages per second
    • Identifies the number of hard faults that occur each second
    • Operating system allocates memory to processes in 4,096 KB blocks called pages.
  24. Paging Supervisor
    A process that maintains a table that correlates virtual memory addresses with the actual physical memory locations.
  25. Network Utilization
    • identifies the amount of traffic sent and received by a network connection.
    • listed as a percentage of the total available theoretical bandwidth.
  26. Remote Desktop port
    • Port number 3389
  27. Telnet
    definition and port/protocal
    • plain-text, unsecured, remote console connection
    • TCP port 23
  28. Secure Shell (SSH)
    definition and port/protocal 
    • Same capabilities as Telnet, but encrypts data.
    • TCP port 22
  29. Automated System Recovery (ASR)
    • Availivle in 2000/XP
    • Use Windows Backup to create the ASR backup.
    • ASR backs up the system state data but does not back up user data.
    • During the backup, you create a floppy disk that is used along with the backup files and the Windows installation disc during the restore procedure.
    • In Windows 2000, this feature is called the Emergency Repair Disk (ERD).
  30. Automatic Backups
    • Availible in Vista/7
    • Only backs up user files
    • Select files by type not folder
    • Only for NTFS
    • Windows 7 will let you select  individual folders and files, as well as include system files in the backup.
  31. Complete PC Backup and Restore
    • Complete PC Backup and Restore replaces the ASR/ERD feature of 2000/XP
    • Image-based snapshot of the entire computer. 
    • Vista/7 Business, Enterprise, and Ultimate editions.
  32. Previous Versions/Shadow Copies
    Available in the Business, Ultimate, and Enterprise editions of Windows Vista/7.
  33. Application
    An application is a computer program that is typically started by a user. The program has a user interface for interacting with the application.
  34. Service
    A service is a special type of computer program that runs in the background performing tasks, but which may have little or no direct interaction with the end user. Services typically do not have a user interface, but perform important tasks related to the operating system, networking, or other functions used by multiple applications.
  35. Process
    • A process is a running instance of a computer program. When an application or service starts, the programming code is loaded into memory creating a process.
    • Processes can launch sub-processes (also called daughter processes).
  36. Allow service to interact with desktop
    The Allow service to interact with desktop setting allows the service to present user interface components within Windows to let users control or configure the service.
  37. laser printer roller types
    • feed
    • registration
    • fuser
    • exit
  38. POST
    • The first BIOS process to run
    • Verifies the integrity of the BIOS code.
    • Looks for the BIOS on the video card and loads it.
    • Looks for BIOS programs on other devices (i.e. hard disk)
    • Tests system devices, such as verifying the amount of memory on the system
  39. Boot loader
    Segment of code in a system’s BIOS that scans for an operating system, looks specifically for a valid boot sector, and, when one is found, hands control over to the boot sector; then the bootstrap loader removes itself from memory.
  40. Volume Boot Sector
    First sector of the first cylinder of each partition; stores information important to its partition, such as the location of the operating system boot files.
  41. Operating system startup after MBR point to the boot sector
    • Vista/7 uses BOOTMGR to load WINLOAD.EXE registry, Drivers and HAL for OS load
    • 2000/XP uses NTLDR to read BOOT.INI and load OS
  42. Logon and user configuration
    • 2000/XPWINLOGON 
    • Vista/7WININIT and then WINLOGON run
    • Following logon, the currently-running hardware configuration is copied to the Last Known Good configuration in the registry.
  43. Ways you can select an alternate boot mode:
    • F8 (during start up)
    • Msconfig.exe (by selecting startup options)
  44. Enable Boot Logging
    Enable Boot Logging creates a log file named Ntbtlog.txt which records each driver loaded during the boot process. If the system does not complete a regular boot, you can look at this file to see the last driver to load before the failure occurred.
  45. How to fix a corrupt MBR
    Boot into the recovery console and use the fixmbr command.
  46. How to fix a corrupt boot sector
    Use the fixboot command to fix the VBR (Volume Boot Record).

    • Files needed for boot
    •      2000/XP =  NTLDR, BOOT.INI, NTDETECT.COM
    •      Vista/7 =   BOOTMGR and the BCD database
  47. How to fix Inaccessible boot disk errors
    "Windows could not start because of a computer disk hardware configuration problem." "Could not read from the selected boot disk. Check boot path and disk hardware."

    • XP, run the bootcfg /rebuild command.
    • Vista/7, run the bootrec /rebuildbcd command
  48. How to fix boot error "Missing or corrupt file"
    • Run chkdsk in the recovery console to verify the disk integrity.
    • If the missing file is the Ntoskrnl, try rebuilding the boot file database.
  49. How to fix a corrupt system hive
    Windows XP could not start because the following file is missing or corrupt: \WINDOWS\SYSTEM32\CONFIG\SYSTEM

    • Run chkdsk in the recovery console to verify the disk integrity.
    • Restore the system to a previous restore point.
  50. SFC switches
    • sfc /scannow - scan the system and replace altered files.
    • sfc /scanonce - start SFC on reboot
    • sfc /scanboot - start SFC every boot
    • sfc /revert -  reset SFC to default (to turn off /scanboot)
  51. Error code 4
    This error indicates that a device is not found in the registry
  52. System Restore as a recovery option
    • Availble on XP/Vista/7
    • Undoes changes, apps, drivers, and patches
    • user data not effected
  53. Repair installation/Startup Repair
    • Repairs the boot sector
    • Verifies windows boot file integrity
    • Checks all system files
  54. Recovery Console (Repair command prompt)
    • Command line utility to allow recovery tasks such as repair MBR and rebuild BOOT.INI
    • 2000/XP install with winnt32.exe /cmdcons
  55. ERD/ASR Vs. Complete PC Restore
    • ERD/ASR only restore the OS, could result in data loss on all disks
    • Complere PC Restore recovers all data that was back up including user data.
Card Set:
A+ 220-702 Sections 7 - 9
2012-07-04 05:16:31
220 702 CompTIA

CompTIA 220-702 A+ Sections 7 - 9
Show Answers: