What is the Recycle Bin used for
Deleted files are sent here before being completely deleted from a computer
What must you be to use most of the Security and Administration Tools?
An Administrator
The six types of File Permissions are
- Full Control
- Modify
- Read and Execute
- List Folder Contents
- Write
- Read
Account types include
User and Root
What is the main ingredient in guacamole?
Avocado
Icons and Shortcuts are
Thumbnail pictures that represent folders, files and programs on the OS
The five common Firewall Exceptions are
- Core Networking
- File and Printer Sharing
- Remote Assistance
- Remote Desktop
- UPnP Framework (Universal Plug-and-Play)
If you have Full Control of a File, this means
What is the most popular “flavor“ of Linux
Ubuntu, it is also free and the most user-friendly
What is the national animal of Scotland?
Unicorn
Where can Files and Folders be accessed
They can be accessed through Windows Explorer
System Accounts are consisted of _____ accounts and _____ accounts, and _____ accounts are consisted of _____ accounts and _____ accounts
Admin, User, User, Domain, Local
What does CIA stand for in the CIA Triad?
Confidentiality
Integrity
Availability
There are manny different “flavors” (OSes) built of Linux kernel, including
- Ubuntu
- Mint
- Red Hat
- Fedora
Which planet shares its name with a chemical element?
Mercury
What is an example file path
- C:\Program Files\iTunes\iTunes.exe
- C: - Drive
- \Program Files — Folder
- \iTunes - Folder
- \iTunes.exe - File
What is the difference between User Accounts and Local Accounts?
User Accounts:
- Allows people to share a computer and network resources, but still have their own files and settings
- Have fewer rights and permissions than Admin Accounts
Local Accounts:
- Allows people access to a specific computer only
- Username and password are stored on the computer itself
What are the steps to creating Backups, and what are the two options once you get the last step?
Control Panel — System and Security — Backup and Restore
System Image: contains files, programs, system files, and settings
Create a System repair disc: contains necessary system files
The difference between Authentication and Authorization is
You most AUTHENTICATE your identity by entering your password to be AUTHORIZED to do many different tasks
What was Disney’s first animated feature film?
Name five common file extensions in Windows
- .bat: executable batch files
- .bmp: Bitmap graphics files
- .doc: Word documents (pre-Office 2007)
- .docx: Word documents (Office 2007 and later)
- .exe: executable files/programs
- .ppt: PowerPoint files (pre-Office 2007)
- .pptx: PowerPoint files (Office 2007 and later)
- .wav: Microsoft audio file
- .wmv: Windows Media Video
- .xls: Excel spreadsheet (pre-Office 2007)
- .xlsx: Excel spreadsheet (Office 2007 and later)
What is the difference between Admin Accounts and Domain Accounts?
Admin Accounts:
- The most advanced account
- Typically held by IT Staff only
- Admins can change security settings for other users, install resources, and access and modify all files on a network
Domain Accounts:
- Allows Users to access their accounts from any computer in the network
- Username and password reside on a domain controller (a type of server that manages all the accounts on a network)
Audit Policies set Security Logs. What are Security logs useful for?
Security Logs can be a useful last defense against attacks and a tool for forensics investigations into the source of a past attack or unauthorized entry
The operator in:
cat-n>/home/cyberpatriot/Documents/hello2.txt
is ____ and is _____ for all commands
> , not required
How many keys does a classic piano have?