SEARCH
You are in browse mode. You must login to use MEMORY

   Log in to start

level: More Commands, Command Switches, & Processes

Questions and Answers List

level questions: More Commands, Command Switches, & Processes

QuestionAnswer
ipconfigdisplays configuration of network adapters
pingtests reachability of a remote computer over the network
tracertdisplays what network devices a packet goes through to reach a remote computer.
netstatdisplays network statistics on data transfers, ports, and applications
nslookupresolves name to IP address, for DNS troubleshooting
dismDeployment Image Servicing and Management tool to mount and service Windows image files
sfcSystem File Checker tool checks the status and versions of system files.
chkdskwill verify the file system of a volume and fix logical file system corruption.
diskparttool for managing disks, partitions, and volumes.
taskkillused to kill system processes given the process ID number PID.
formatcreate a file system on a storage device.
copymake a copy of one or more files
xcopycopy command with numerous options.
robocopyreplaces xcopy, has numerous options
net useconnect or map a network share
net usermanage users.
/?adding the /? parameter at the end of a CLI command will display the list of command options and parameters, with their short descriptions.
msconfigSystem Configuration: It allows you to change how Windows boots and what programs start with Windows
Subnet Maskdetermines what hosts are on the same network with the local computer. It needs to match between all the computers and network devices on the local network.
Gatewaya router that can forward the network traffic from the local network to other remote networks. At least one of its interfaces has to be on the same local network as the computer
grepThe grep command is a search command. You can use it to search for a string of characters within a file or standard text output.
chmodTo modify Linux file permissions, you must use the chmod command.
chownchanges the ownership of a file, directory or other objects.
iwconfig/ifconfigThe ifconfig command in Linux is very similar to the ipconfig command in Windows. The ifconfig command is used to display networking information of the Linux device such as IP address, DHCP address, and MAC address. The iwconfig command is similar to ifconfig, but it strictly looks at the wireless interface.
What are the 7 steps for the best practice procedures of malware removal1. Identify and research malware symptoms 2. Quarantine infected systems 3. Disable System Restore 4. Remediate the infected systems. 5. Schedule scans and run updates 6. Enable System Restore and create a restore point 7. Educate the end user
What are the steps in Change Management1. Document Business Processes 2. State the purpose of change 3. State the Scope of Change 4. Risk Analysis 5. Make a plan for the change 6. test end-user acceptance 7. create a group to approve changes (change board) 8. create a backout plan 9. document any new processes or changes along the way
What are the steps in Incident Response1. First Response 2. Identify 3. Report 4. Preserve 5. Documentation 6. Chain of Custody 7. Tracking of Evidence 8. Documenting Progress
Identify file extension .batA batch file is a series of commands to be run by the Windows operating system stored in a plain text file.
Identify File extension .ps1A .ps1 file is used to run scripts in Powershell
Identify file extension .vbsA .vbs file contains lines of codes in the Visual Basic programming language which are encoded in plain text format
Identify file extension .shA .sh file is like the batch files of Windows but they can be executed in Linux or Unix.
Identify file extension .pyA .py script is a script written in the Python programming language.
Identify file extension .jsA .js file is a script written in JavaScript
What port does telnet typically operate on?port 23
what port does SSH typically operate on?Port 22
What port does RDP typically operate on?port 3389
What are the steps for configuring folder redirection1. create a security group for folder redirection and add group members. 2. create a network file share to use for folder redirection. 3. create a folder redirection group policy object. 4. configure Offline Files for folder redirection.