Per 1 Chapter 11 - Ullrich, M

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354
Across
  1. 4. Displays the DNS resolver cache, which contains host and domain names that have been recently queried
  2. 7. Uses the Advanced Encryption Standard (AES) cipher and a preshared key (PSK) to encrypt communications
  3. 9. This is the name for CLI
  4. 10. Contains most of the files that are used to run the computer and is located in the folder C:\Windows\system32
  5. 17. This is a service provided with Windows that will encrypt an entire volume of disk data so that it cannot be read by unauthorized parties
  6. 18. Releases the IP address learned from the DHCP server and results in a network adapter or adapters no longer having an IP address
  7. 19. A collection of LAN workstations and servers that are designed to communicate and exchange data with one another
  8. 20. Data is sent unencrypted and with no authentication.
  9. 28. Used by most application installation programs to install software. In 32-bit versions of Windows, all programs are 32-bit and are installed in the folder C:\Program Files. In 64-bit systems, 64-bit programs are installed in the folder C:\Program Files, while 32-bit programs are installed in the folder C:\Program Files (x86).
  10. 29. monitors programs on the computer and warns users when an action might present a threat to the computer
  11. 31. Opens the System Information window, which shows a summary of system components, including hardware components and software information
  12. 33. It displays details for all DirectX components and drivers that are installed in a computer.
  13. 35. This command opens its own command prompt under which many of the functions of the Windows Disk Management utility can be performed.
  14. 38. This is the name for GUI
  15. 41. The command that traces the route that packets take from your computer to a destination host and that displays where packets are lost in the network path
  16. 44. A command-line terminal emulation protocol and program that works over port 23
  17. 45. The client requests authentication with a public key. The server generates a challenge with this key which the client must decrypt with the matching private key to complete the authentication.
  18. 47. A basic or dynamic disk that is accessible and shows no problems
  19. 48. A dynamic disk that has been moved to a computer from another computer running Windows
  20. 49. This is used to open or execute a file using elevated permission.
  21. 52. A group of computers and electronic devices with a common set of rules and procedures administered as a unit
  22. 53. A dynamic disk that is corrupted or unavailable
  23. 54. This provides additional protection over host-based authentication. The user must enter a passphrase to access the private key. This helps prevent the private key from becoming compromised.
Down
  1. 1. These are addresses from a reserved range in the 169.254.x.y network space
  2. 2. Forces a DHCP client to renew its DHCP address lease from the DHCP server
  3. 3. Networks which use this authentication protocol, such as Windows Active Directory, allow for Single Sign-On (SSO). SSO allows users to sign in to multiple systems with only one username and password.
  4. 5. Clears the DNS resolver cache on the host
  5. 6. These are identified with a dollar sign ($) at the end of the share name.
  6. 8. The command that tests basic connectivity between devices by using ICMP echo request and reply messages
  7. 11. The command that is used to query the DNS server to discover IP addresses or host names
  8. 12. This is the use of an external flash device to enable Windows to treat an external flash device, such as a USB drive, as hard drive cache to enhance performance.
  9. 13. The Windows 10 network profile disables file and printer sharing and network discovery on the link. The PC is hidden from the network.
  10. 14. A basic or dynamic disk that has experienced hardware failure, corruption, or I/O errors
  11. 15. This command is extremely powerful with many options for the way that files are copied, the types of files to include in the copy action, and the file attributes to include for the destination files.
  12. 16. This is a virtual folder that presents content from different locations within the same view. Windows 10 creates 6 default libraries on installation.
  13. 21. This is used to create customized system image files that will be installed on computers in the enterprise.
  14. 22. A dynamic disk that is corrupted, turned off, or disconnected
  15. 23. Provides very weak security and should not be relied upon for confidentiality
  16. 24. Displays additional network configuration information including DHCP and DNS servers, MAC address, NetBIOS status, and domain name
  17. 25. A disk that does not contain a valid signature
  18. 26. The Windows 10 profile allows the user to customize the sharing options. The PC is discoverable on the network.
  19. 27. Opens Microsoft Management Console
  20. 30. A disk that does not contain a valid signature
  21. 32. The client sends credentials to the SSH host, which are then verified against a local user database or sent to a centralized authentication server.
  22. 34. Authentication is passed from the access point to a centralized authentication server running Remote Authentication Dial-in User Service (RADIUS).
  23. 36. Displays the Group Policy settings that are in effect for a currently logged in user
  24. 37. This is a secure alternative to Telnet and other file copy programs such as FTP, and which communicates over TCP port 22 using encryption to protect the session.
  25. 39. A volume that is functioning properly
  26. 40. I/O errors detected on a dynamic disk
  27. 42. Opens the Remote Desktop utility
  28. 43. A private network that connects remote sites or users together over a public network, like the internet
  29. 46. Windows stores most of the files created by users in the Users Folder, C:\Users\User_name\.
  30. 50. A basic disk that is being converted into a dynamic disk
  31. 51. This is used to update a local machine and verify that the machine is getting Group Policy updates.