Chapter 14: Maintaining and Optimizing OSs Flashcards

(65 cards)

1
Q

Operating systems that have reached their _______ are typically not eligible to receive feature and security updates.

A

end-of-life (EOL). Every piece of technology will eventually become obsolete, and vendors use the term end-of-life (EOL) to refer to something that has reached the end of its useful life and consequently will no longer be sold, marketed, supported, or upgraded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

______________ is a mandatory component of Windows that aims to improve the security of systems by limiting the permissions that normal application software runs as, until authorized by an administrator.

A

User Account Control (UAC) functions by isolating low-privilege and high-privilege running processes and requiring administrator approval prior to an application’s privilege escalation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why are users strongly encouraged to utilize the 3-2-1 system when backing up crucial data?

A

It contains solid guidelines to help prevent against complete data loss. The 3-2-1 rule states that you should have 3 copies of your backed up data, across two or more media types (CD, DVD, USB), and at least one copy of your backup should be hosted offsite, such as in the cloud. Following this rule helps ensure that you always have a complete backup available no matter the reason for the outage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Update

A

A patch, fix, or correction to existing version of OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Upgrade

A

When you move from one version of an OS to a newer one.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Patch Managment

A

Involves the identification and application of software updates on devices which can include servers, workstations, standalone PCs, Mobile Devices, many peripherals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Patch

A

one or more changes to existing software. In most cases, patches correct known errors, vulnerabilities, flaws, can also include new features.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Delivery Optomization

A

allows updates to be retrieved from other PC on the network. Allows for the second PC to reduce update time by taking the already downloaded update from the first PC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

OS Update Failure

A

Failure notice message has an error code. Can be searched and find solution or cause of problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

EOL

A

End-of-Life. Every piece of technology will eventually become obsolete, and vendors use the term end-of-life (EOL) to refer to something that has reached the end of its useful life and consequently will no longer be sold, marketed, supported, or upgraded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

MacOS Check for Software Update

A

Click Apple Menu -> System settings -> General -> Software Update. During Mac update cannot sleep or close lid, OS must stay open.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

MacOS System Folders

A

MacOS system folders are initially hidden. Cannot be accessed through terminal or finder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

MacOS System Files - “/applications”

A

Holds the apps that display on the launch pad windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

MacOS System Files - “/Users”

A

Holds the home folder of any user with log in account on mac

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

MacOS System Files - “/Library”

A

Holds items used by various apps. Data, log in credentials, Etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

MacOS System Files - “/System”

A

Holds MacOS and its files. Its folder and contents cannot be altered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

MacOS System Files - “/User/Library”

A

Holds personal settings, app data, caches, and preferences for a user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Apple Malware defense best practice Layer 1

A

Malware scanning apps prevent execution of malware or viruses using gatekeeper app and apple notarization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Apple Malware defense best practice Layer 2

A

x protect app remedies any malware that is able to execute.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

RSRs

A

Rapid Security Resources. Provide security updates without waiting for next OS update. Provided as needed by apple.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

apt (linux command):

etc/apt/sources.list

A

Command used to find the source list file which tells system where to look for updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

deb http://http.kali.org/kali kali-rolling Main contrib non-free non-free-fiirmware

A

Deb - Archive

http://http.kali.org/kali - mirror

kali-rolling - Branch

Main contrib non-free non-free-fiirmware - Components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

deb

A

Debian-based package management system (deb)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Contrib (Linux Update Component)

A

Packages may depend on non-free software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Main (Linux update component)
Official distro package from distro manufacturer
26
Non-Free (Linux update component)
Compatible but not meeting free software guidelines
27
Non-Free-Firmware (Linux update component)
Drivers or firmware required by hardware
28
sudo apt update
your system contacts repositories to download latest package list. apt update only refreshes list of packages available doesn't install them
29
sudo apt upgrade
This command downloads and installs any updates available for installed packages. Tells you which package needs to be upgraded, and how many new packages need to be fetched, and how much storage needed. To cancel type N and to proceed type Y
30
DNF command
can search for packages, upgrades and install and remove packages. used by Fadora, rir, etc distros
31
sudo dnf upgrade
will look for and install updates.
32
Installation considerations (Windows Applications)
Making sure system meets hardware and system requirements
33
32-bit vs 64-bit (Windows Applications)
32-bit wont run on 64-bit system. Install 64-bit apps on 64-bit system.
34
Dedicated vs Integrated GPU (Windows Applications)
Visually demanding applications show graphics card requirements. Integrated graphics card are part of the CPU and share system resources with other processes.
35
VRAM
Video random-access memory. Memory for dedicated graphics card or graphic processing unit (GPU). Stores data that forms a graphic, textures, colors, etc. Supports GPU in processing this data.
36
RAM
Random Access Memory. Applications will specify minimum RAM required.
37
CPU
Central Processing Unit. Applications provide Minimum CPU manufacture and model. Manufacture - AMD or Intel. Architecture - X86 or X64. Minimum Cores. Minimum Clock Speed.
38
External Hardware Tokens
enables two factor authentications. Needed for systems that require extra levels of security such as Banking, Hospitals, and others who have protected information.
39
TOTP - Hardware token
Time-based one-time passwords. Last about 30-60 seconds usually.
40
USB Security Tokens
Stores encryption keys, digital certificate, and other credentials.
41
Challenge-Response Tokens
Generate one time security code in response to users providing challenge.
42
Smart Cards
Have a process in them that stores user credentials, ID, etc.
43
Biometric Hardware Tokens
Use fingerprint or other biometric to verify ID
44
Bluetooth Tokens
Use bluetooth pairing to verify ID hands free.
45
App & OS compatibility
Applications made for MacOS can't run on windows and vice versa.
46
Downloadable Application Package
Contains material needed for installing application onto a system.
47
Application Executables
Also called binaries, written in machine language. Instructions, interface, input/output, and processing components for an application
48
Libraries
Resources used by application. Includes routines for graphics, data storage, dependencies, and reporting.
49
Configuration
collection of files that contains customization and user preferences put in by developer or set up by user during installation.
50
Documentation
If something goes wrong, you can check the user guide here.
51
Image Deployment
In an enterprise, captured image of the approved configuration of an application that can be installed on other PCs.
52
Potential Technical Impacts of Applications
Additional hardware required, integration can cause downtime. Application/dependency conflicts.
53
Potential Network Impacts of Applications
Application bandwidth limits, non-distributable application, multiple running server applications.
54
Potential Operational Impacts of Applications
Applications may disrupt workflow, incompatible report formats, workflow interruption possible.
55
Potential Security Impacts of Applications
Excessive bandwidths, not easily distributable, server load degradation.
56
Full Backup
Make copy of everything on the PC. Takes a long time
57
Differential backup
Backup of all the changes since the last full backup. Requires full back up and differential backup
58
Incremental backup
Only backs up changes made from last backup. Restoring requires full back up and every incremental backup leading to the loss.
59
GFS
Grandfather, Father, Son - Back up cycles with multiple modalities daily, weekly, monthly.
60
3-2-1 back up rule
3 back up copies. 2 media forms. 1 Off-site in the cloud.
61
Synthetic Full backup
Combines last full backup with all incremental backups since then into one new full backup
62
tar (linux command)
Tape archive. Makes backup.
63
$tar cvf/dev/rmt/o*
create, verbose, directory, file, archive device
64
$tar cvf/home/backup*
create, verbose, location in home directory
65
MacOS back up strategy
Time machine, built in backup app on MacOS. Media used for backup with time machine should only be used for backups.