Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
11 Cards in this Set
- Front
- Back
What is the delete command (del) to delete hidden and read-only files?
|
del /f /ah
|
|
What EventIDs is used for failed login attempts using expired account credentials?
|
532
|
|
What EventIDs is used for failed login attempts using disabled account credentials?
|
531
|
|
What organization provides state and local law enforcement agencies the tools to prevent internet crimes against children and catch the distributors of child pornography on the internet?
|
Internet Crimes Against Children (ICAC)
|
|
What tool detects software plagiarism in source code files of C#?
|
JPlag
|
|
What tool can investigate file fragments, recovered deleted files, or other data that has been corrupted or destroyed?
|
WinHex
|
|
What methods can be used to investigate cross-site scripting attack?
|
1. Look at the web server logs and normal traffic logging.
2. Use a web proxy to view web server transactions in real time. 3. Review the source of any HTML-formatted email messages for embedded scripts or links in the URL to the company's site. |
|
An MD5 file generator can create a check file and verify a check file. What tool can do this?
|
MD5 Checksum Verifier
|
|
Name two (2) cryptography methods used by NTFS EFS to encrypt data stored on a disk on a file-by-file basis?
|
Public Key and Digital Certificates
|
|
What type of firewall functions by creating two different communications; one between client and firewall and one between firewall and server?
|
Proxy-based firewall
|
|
Five beep codes turning on a PC mean what?
|
Processor Failure
1 beep - memory refresh timer error 2 beeps - parity error in base memory (first 64KB block) 3 beeps - base memory read/write test error 4 beeps - motherboard timer not operational 5 beeps - processor failure |