ipconfig | displays configuration of network adapters |
ping | tests reachability of a remote computer over the network |
tracert | displays what network devices a packet goes through to reach a remote computer. |
netstat | displays network statistics on data transfers, ports, and applications |
nslookup | resolves name to IP address, for DNS troubleshooting |
dism | Deployment Image Servicing and Management tool to mount and service Windows image files |
sfc | System File Checker tool checks the status and versions of system files. |
chkdsk | will verify the file system of a volume and fix logical file system corruption. |
diskpart | tool for managing disks, partitions, and volumes. |
taskkill | used to kill system processes given the process ID number PID. |
format | create a file system on a storage device. |
copy | make a copy of one or more files |
xcopy | copy command with numerous options. |
robocopy | replaces xcopy, has numerous options |
net use | connect or map a network share |
net user | manage users. |
/? | adding the /? parameter at the end of a CLI command will display the list of command options and parameters, with their short descriptions. |
msconfig | System Configuration: It allows you to change how Windows boots and what programs start with Windows |
Subnet Mask | determines what hosts are on the same network with the local computer. It needs to match between all the computers and network devices on the local network. |
Gateway | a router that can forward the network traffic from the local network to other remote networks. At least one of its interfaces has to be on the same local network as the computer |
grep | The grep command is a search command. You can use it to search for a string of characters within a file or standard text output. |
chmod | To modify Linux file permissions, you must use the chmod command. |
chown | changes the ownership of a file, directory or other objects. |
iwconfig/ifconfig | The ifconfig command in Linux is very similar to the ipconfig command in Windows. The ifconfig command is used to display networking information of the Linux device such as IP address, DHCP address, and MAC address. The iwconfig command is similar to ifconfig, but it strictly looks at the wireless interface. |
What are the 7 steps for the best practice procedures of malware removal | 1. Identify and research malware symptoms
2. Quarantine infected systems
3. Disable System Restore
4. Remediate the infected systems.
5. Schedule scans and run updates
6. Enable System Restore and create a restore point
7. Educate the end user |
What are the steps in Change Management | 1. Document Business Processes
2. State the purpose of change
3. State the Scope of Change
4. Risk Analysis
5. Make a plan for the change
6. test end-user acceptance
7. create a group to approve changes (change board)
8. create a backout plan
9. document any new processes or changes along the way |
What are the steps in Incident Response | 1. First Response
2. Identify
3. Report
4. Preserve
5. Documentation
6. Chain of Custody
7. Tracking of Evidence
8. Documenting Progress |
Identify file extension .bat | A batch file is a series of commands to be run by the Windows operating system stored in a plain text file. |
Identify File extension .ps1 | A .ps1 file is used to run scripts in Powershell |
Identify file extension .vbs | A .vbs file contains lines of codes in the Visual Basic programming language which are encoded in plain text format |
Identify file extension .sh | A .sh file is like the batch files of Windows but they can be executed in Linux or Unix. |
Identify file extension .py | A .py script is a script written in the Python programming language. |
Identify file extension .js | A .js file is a script written in JavaScript |
What port does telnet typically operate on? | port 23 |
what port does SSH typically operate on? | Port 22 |
What port does RDP typically operate on? | port 3389 |
What are the steps for configuring folder redirection | 1. create a security group for folder redirection and add group members.
2. create a network file share to use for folder redirection.
3. create a folder redirection group policy object.
4. configure Offline Files for folder redirection. |