C394
nbtstat
tcp/ip utility used to view and manage Net BIOS over tcp/ip status information. Can disply NetBIOS namee tables for both the local and remote computers
Snapshot feature on linux
the ability to create a volume image of a device at a particular instance without causing a service interruption
Tailgating
the act of gaining unauthorized access credentials without the permission of the authorized person
Which guidelines should you refer to if you find that someone has breached the security of the server room
the company's security policy
As a technician, what should you refer to while explaining the strength of technology to a customer
the manual
Basic partition
the original and default partitioning style used by windows and dos defined by a partition table each partition represents a single contiguous portion of the disk basic disks can be formatted with any file system and accessed by any operating system so they're usually safest to use
Man in the middle attack
when a hacker is positioned on both sides of the attack to intercept communication between two sessions and devices
Primary Partition
where windows boot files should be sotred
WPA encryption
wi-fi protected access encrypts traffic using Temporal Key Integrity Protocol (TKIP), a different implementation of the RC4 cipher.
WPS
wifif protected setup
dism
windows command that repairs windows images, windows setup, and windows pe, use this command when sfc is unable to repair corrupted files
Event Viewer
windows utility that is used to view the application log
Disk Utility Cleanup utility
windows utility that searches a computer for unnecessary files and allows you to remove those files safely
Device Manager
windows utility used to diagnose hardware-related problems
Disk Defragmenter
windows utility used to routinely to improve the access time for files stored on hard disks
Safety Remove Hardware feature
Windows feature used to ensure when that an external device can be removed safely
Mantrap
a set of double doors that are generally monitored by a security guard
Swap Partition
a special partition created to store the paging file that is used a virtual memory
Disk Defragmenter
system utility available in all versions of Windows that scans and analyzes how file fragments are arranged and accessed on the hard disk
DEFRAG
system utility defragments files on your hard drives
REGEDIT
system utility directly edits the windows registry, the database containing most windows settings
DXDIAG
system utility opens the DIrectX diagnostic tool to troubleshoot DIrectX multimedia technologies
MSTSC
system utility opens the remote desktop connection utility to start remote connection to another computer
what is the commet syntax for .sh script for single line
#
Which command switch should you use with the Windows IPCONFIG command to display the other available command switches and their description?
/?
What does AUP denote
Acceptable Use Policy
AD CS
Active Directory Certificate Services Allows active directory network to maintain public key infrastructure
ADFS
Active Directory Federation Services single sign-on system that uses the common internet standard SAML instead of LDAP. Used for over the internet
AD LDS
Active Directory Lightweight Directory Services provides directory services independent of the windows domain model
AD RMS
Active Directory Rights Management Services an information right management service that can encrypt and limit access to specific types of information on the domain such as emails, word documents, web pages, and so on
What should you do if the customer's child is interfering with the troubleshooting process while you are visiting a customer site
Ask the customer to keep the child away from the work area
What should you do if a personal item near the work area is interfering with the troubleshooting procedure
Ask the customer to remove the personal item.
If a person is able to express positive and negative ideas and feelings in an open, honest, and direct way, what would you call this type of behavior
Assertive behavior
BitLocker-To-Go
BitLocker Drive Encryption on removable data drives. This includes the encryption of USB flash drives, SD cards, external hard disk drives, and other drives formatted by using the NTFS, FAT16, FAT32, or ExFAT file systems.
What is the error screen displayed by Windows upon encountering a critical error that causes the system to crash?
Blue screen of death (BSOD)
Which command is used to display the status of a disk in the current drive and can repair them
CHKDSK command
Which command-line utility in Windows can you use to display or alter the compression of files on NTFS partitions?
COMPACT
CHAP
Challenge Handshake Authentication Protocol authenticate PPP(point to point protocol) sessions and can be used with many VPNS
CDFS
Compact disc file system
Which command should you run on a Windows computer to force defragmentation of volume D: regardless of whether it needs to be defragmented or even if free space is low
DEFRAG D: -F
DES
Data Encryption Standard (DES) is a symmetric-key algorithm for the encryption of electronic data. Although its short key length of 56 bits, criticized from the beginning, makes it too insecure for most current applications.
DLP
Data loss prevention used to classify and protect your organization's confidential and critical data
Access control
Determines types of user access, such as read-only access can restrict the risk of unauthorized login as it provides access rights to the authorized user of particular system objects.
Digest
Digest authentication is a method of authentication in which a request from a potential user is received by a network server and then sent to a domain controller.
Disk Cleanup
Disk Cleanup is a system utility available in all versions of Windows that frees up space on the hard disk being used to store unnecessary temporary files.
How can you ensure that your SSID is not seen by computers in other offices
Do not broadcast the SSID
What should you do if you encounter confidential information while troubleshooting at a client site
Do not read or disclose the information. If the information is a document, you should turn the document over so that you cannot read the document
EFS
Encrypting File System the Encrypting File System (EFS) allows encryption of individual drives and folders on any NTFS volume. It is included with Business/Professional/Enterprise/Ultimate editions of Windows, as well as all editions of Windows Server.
Three event types displayed in Event Viewer
Error, Warning, and Information
FAT
File allocation table the system Microsoft originally developed for formatting floppy disk in DOS and early versions of Windows
Swap partition
File system that Linux uses to store virtual memory that the operating system writes to disk in order to free physical RAM
Acceptable use policy(AUP)
targets end users who may be employees or customers using hosted services
Which type of backup uses maximum disks and tapes for storing data
Full backup
GPT
GUID Partition Table new standard supported by modern operating systems can be used with disk of any size and allows an almost unlimited number of partitions less susceptible to errors
What does GDPR mean
General Data Protection Regulation
GDPR
General Data Protection Regulation privacy laws
Face recognition scanner
It determines whether to authenticate a user by scanning the user's face and comparing that scan to face scans already on file
Smart Card
It is an authentication card with an integrated circuit built in
EAP
Extensible Authentication Protocol authentication framework frequently used in wireless networks and point to point connections
What is HFS
Hierarchical file system the family of file systems used by Mac OS and iOS
What are the three parts of first response when an incident occurs
Identify Report through proper channels Data/device preservation
Steps of malware removal
Identify and research malware symptoms. Quarantine the infected systems. Disable System Restore (in Windows). Remediate the infected systems. Update the anti-malware software. Scan and use removal techniques (safe mode, pre-installation environment). Schedule scans and run updates. Enable System Restore and create a restore point (in Windows). Educate the end user.
What should technicians do if they receive a personal call on their mobile phone while servicing a computer at a customer's residence
Ignore the call and focus on the customer's problem
IPsec
Internet Protocol Security is a secure network protocol suite that authenticates and encrypts the packets of data sent over an internet protocol network
IDS
Intrusion detection system a device or software application that monitors a network or systems for malicious activity or policy violations
dumpster diving
Involves digging through trash receptacles to find computer manuals, printouts, or password lists that have been thrown away
/flushdns
Ipconfig /flushdns is used to clear DNS information on the client so that client updates with new configuration information more quickly
/registerdns
Ipconfig /registerdns is used to register the client with its DNS server.
/renew
Ipconfig /renew will enable you to lease IP addressing information from a DHCP server or APIPA. If the computer already has a good IP address leased, it will not renew unless you release the address first.
what is a .sh file
Linus shell executable file
Which operating system uses the ext3 and ext4 file systems?
Linux
What are the three recycling or repurposing methods listed on the A+ exam guide
Low-level format vs. standard format Overwrite Drive wipe
Force Quit
Mac tool that forces an unresponsive app to close
What should you do if you receive an urgent message from your office while working on-site
Make a short call to determine the nature of the urgency
MBR
Master Boot Record Specific area of a hard disk drive where a boot-sector virus places its starting code
Which command should you run to manually start the print spooler service on a Windows computer
NET START SPOOLER
Which file system or systems support file compression and disk quotas
NTFS
Which file system supports encrypting file system(EFS) to increase security
NTFS
Which file systems includes features that are required for hosting Active Directory
NTFS
Which recommended file system format for Windows 7 and higher enables advanced performance, security, and reliability features
NTFS
What does the acronym NAC denote
Network Access Control
NAS
Network Access Server relays all communication between users and the RADIUS server users directly connect to, like dial in server, vpn endpoint, or wap
What happens when MAC filtering is enabled on a wireless network
Only MAC addresses that are specifically allowed connection are granted connection
PAP
Password Authentication Protocol used to authenticate PPP sessions
What does PCI denote
Payment Card Industry
What does PHI denote
Personal Health Information
What does PII denote
Personally Identifiable Information
PII
Personally Identifiable Information uniquely identity an individual
what type of file uses .ps1
Powershell
What is the quickest way to lock a windows computer
Press the Windows + L keys
PHI
Protected health information which concerns and individuals health and is related to hipaa
Three main remote access technologies
RDP Telnet SSH
RTO
Recovery time objective the maximum expected amount of time needed to fully restore service after a disaster
SFC
SYSTEM FILE CHECKER. For attacking errors in WINDOWS SYSTEM FILES sfc /scannow will scan entire system for Windows file errors and repair them-Windows
Which mode should you use if you want to uninstall a device driver, but the computer will not boot properly?
Safe mode
SSH
Secure Shell is a network protocol for secure transfer of data between computers.
How can you enable some users to access certain files and restrict others form accessing the same files
Set different permissions for the users
exFAT
Supports much larger file sizes and has other improvements over FAT32
Which utility can you use to scan all protected files to verify their versions on a Windows computer
System File Checker (Sfc.exe)
Which Windows command is used to trace the IP traffic route through intermediate routers and system network interfaces, identifying the full path traveled from source to destination
TRACERT
What could be a reason that a scheduled task did not execute at the scheduled time?
Task scheduler service was stopped or disabled.
what occurs when MAC filtering is enabled on a wireless access point
The MAC address of each network interface card(NIC) that attempts to connect to the network is checked
Incident response policy
The incident response policy specifies exactly what steps will be taken in response to a security incident, in order to minimize and repair damage without exposing the network to further risk.
Regulatory compliance policy
The regulatory compliance policy is particularly important for organizations that handle a lot of data owned by other people, do work in specific sensitive fields, or need to integrate their operations with common industry standards.
What is the purpose of chain of custody
Tracking of evidence/documenting process
When should you transfer an angry customer to your supervisor
Transferring a customer to a supervisor should only be done if you cannot handle the customer's problem
How does communication occur in simplex mode
Two separate channels are used for transmitting and receiving the signal
Phishing
Type of attack that is conducted by an email request from a financial institution asking you to login and change your password using the provided link
Which device contains a battery and Automatic Voltage Regulation (AVR) circuitry to protect a computer from power sags
Uninterruptible power supply (UPS)
How should you communicate with a customer if you and the customer do not understand a common language
Use hand gestures and visual aids to give details
Time Machine
Used to backup and restore files on a mac
Which feature of Windows 7 and higher prevents applications from running in privileged mode even when an administrator is logged on
User Account Control (UAC)
UAC
User Account Control. Informs you when a program makes a change that requires administrator-level permission, also adjusts the permission level of your user accounts
USMT
User State migration tool used to migrate user settings from one operating system to another
Disk Utility
Verifies the health of a disk on a mac
what is a .vbs file
Visual basic script file
wpa2 encryption
WPA2 support for 128-bit encryption using the strong and well-regarded Advanced Encryption Standard (AES) cipher
When does a zero-day attack occur
When live environments become vulnerable and targeted before a fix or patch can be created by the vendor
WEP
Wired Equivalent Privacy
Which three protocols provide encrypted communications between 802.11x wireless clients and wireless access points?
Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), and WPA2
WPA
Wireless Protected Access
How does communication occur in full-duplex mode
You can transmit and receive the signal on the same channel at the same time.
Netstat
a TCP/IP utility used to show the status of each active network connection. It displays statistics for both TCP and UDP, including protocol, local address, foreign address, and the TCP connection state.
Rootkit
a code that is intended to take full or partial control of a system at the lowest levels.
Honeypot
a decoy computer system which helps to trap hackers or track unconventional or new hacking methods
hich physical barrier acts as the first line of defense against an intruder
a fence
Trojan Horse
a malicious computer program which misleads users of its true intent, where a user is duped into executing an e-mail attachment disguised to appear not suspicious or by clicking on some fake advertisement on social media or anywhere else.
logic bomb
a piece of code that sits dormat on a user's computer until it is triggered by a specific event such as a specific date
what is a .py file
a python executable script
What is a dependency service
a service that requires another service to be running to operate properly
Extended Partition
a special partiton used on an MBR disk which serves as a container for any number of logical partitions there can be only one extended partition per disk and it takes the place of one primary partition
System volume
a volume containing the startup files
Mission control
a way to see whats open on mac
ACL
access control list
Which terms should NOT be used while explaining the strength of technology to a customer
acronyms and technical jargon
Which is a structured form of listening and responding that focuses the attention on the speaker
active listening
TACACS+
allows a remote access server to forward a user's login password to an authentication server to determine whether access can be allowed to a given system.
apt-get command
allows you to update or install packages
Which three types of characters can be used in combination to set a strong password in Windows
alphabetic, numeric, and special characters
What is a locator application
an application that helps locate a mobile device when it is stolen
digital certificate
an electronic file that establishes your identity via a public key infrastructure (PKI) to complete transactions
spear phishing
an email spoofing sttack that targets a specific individual seeking unauthorized access to sensitive information
What should you do when you do not understand a customer's problem while talking to the customer
ask for clarification
Spam
attack in which the attacker sends unsolicited emails or other electronic messages with undesired or malicious content
Which uninterruptible power supply (UPS) feature provides protection from power surges and power drops?
automatic voltage regulation (AVR)
What should be documented to ensure that you can return to normal operations and reverse a change if a change does not work or causes problems
backout plan
Which authentication method uses fingerprint recognition as a method to identify an individual
biometric authentication
Which Recovery Console command is used to correct a corrupted Windows boot sector?
bootrec /fixboot
chown (linux command)
changes ownership of a file
chmod (linux command)
changes permissions of files or directories
cd (linux command)
changes the current directory
What is the FIRST action you should perform if you find that your fellow technician has left the door of the server room open
close the door
gpresult
command displays group policy settings and resultant set of policy(RSoP) for the specified user or computer
What should you configure when setting up a wireless connection
configure the ssid and decide which encryption standard to use
cp (linux command)
copies files and directories
What is the best method to protect network cables from damage due to environmental factors, such as heat and liquid?
cover the cables by using a protective material
Which command should you run to check fragmented files
defrag.exe
CHKDSK
disk maintenance tool that scans hard disk for any potential files system errors or bad sectors on disk
What does the Windows cd command do if entered WITHOUT parameters?
displays the current drive and directory
dir (windows command)
displays the disk's volume label and serial number, followed by a list of directories and files on the disk
ps (linux command)
displays the running system processes
What is the purpose of BitLocker in Windows
drive encryption encrypts entire NTFS volumes, including the system drive. It is available on Enterprise and Ultimate Editions of Windows Vista and 7, Pro and Enterprise versions of Windows 8 and later, and all editions of Windows Server 2008 and later.
Which Windows command-line tool is the DirectX Diagnostic tool that allows you to confirm DirectX settings, including the version of DirectX that is installed and the device driver versions
dxdiag
Which type of electric current can cause severe damage to computer components while a technician is troubleshooting a hardware device
electrostatic discharge (ESD)
What should you do if a user needs an administrative password to install a program on his computer
enter the password yourself and install the program
Which attributes or details of an employee can be used by biometric devices
fingerprint, face, signature, iris, and retina
Rogue antivirus
form of malicious software and Internet fraud that misleads users into believing there is a virus on their computer and to pay money for a fake malware removal tool (that actually introduces malware to the computer).
Piggybacking
getting into a secure area by tagging along right behind someone who has legitimate access with or without their knowledge
privacy policy
governs codified expectations of user privacy and consent to security-based monitoring of user activity
HFS
hierarchical file system is the family of file systems used by mac os and ios
spoofing
human based or software based attack where the goal is to pretend to be someone else for the purpose of identity concealment
linux commands to configure network interfaces
ifconfig and iwconfig
bootcamp
installs windows on a mac by re partitioning the hard drive
IPS
intrusion prevention system a preemptive approach to network security used to identitfy potential threats and respond to them swiftly
What is the purpse of asset tags and barcodes
inventory management
Which TCP/IP command-line utility should you use to display the IP address and subnet mask for a Windows computer?
ipconfig
Which IPCONFIG switch displays the current IP configuration on a workstation?
ipconfig /all
/release
ipconfig switch used to release the IP addressing information assigned to the computer by the DHCP server or APIPA.
What is the purpose of the CONVERT command-line utilty
it changes a FAT partition into an NTFS partition
Iris scanner
it determines whether to authenticate a user by taking a picture of the iris of the user's eye and comparing the picture with iris pictures on file.
What is the purpose of the diskpart command-line utility
it extends a partition to include unpartitioned spaced on the hard drive creates partitions on a hard disk
what is a.j file
javascript
Which documentation is maintained by hardware or software vendors
knowledge base/articles
War chalking
leaving notations about the wireless network on the outside of a building
Application Log
log to find events logged by programs
Spotlight
mac feature that searches the system for all kinds of files including documents,music,photos, and so on
Which documentation states hazardous nature, ingredients, precautions to follow, health effects, safe handling information, and other important information about chemicals?
material safety data sheets (MSDS)
MTTF
mean tiem to failure the average amount of time between when you install a device and when it will fail it is usually used to describe non repairable components
MTBF
mean time between failures describe as the average amount of time a component or system can remain online before it needs to be taken down for repair
MTTR
mean time to repair the average amount of time a component or system will remain offline for repair in the event of disaster
MDM
mobile device management ' software designed to centrally administer devices in order to assign device permissions, verify security compliance, apply updates, and even monitor activity
mv (linux command)
moves a file to a specific directory
unattended os installation
needs to use an answer file to install os, installs without user input
nslookup (windows command)
network admin command line tool that is used to troubleshoot DNS-related problems
Which documentation will show the layout of the network
network topology diagrams
What should you do to help a customer if you notice that your coworker is unable to provide resolution to customer queries and the customer is becoming irritated?
offer your help to the co-worker and the customer
ctrl+alt+T on a linux computer
opens a terminal window
Swap
partition used to store virtual memory that the operating system writes to disk in order to free physical RAM
Which two default elements should you change to secure a newly configured wireless network from unauthorized access
password and SSID
Keychain
password management system on mac
Which windows command-line tool launches Performance Monitor
perfmon
Which common command is used to check the Internet connectivity from the command prompt?
ping
pwd(linux command)
print working directory shows the name of the current directory and writes the full pathname of it
What is the first step you should take to troubleshoot a computer that is behaving erratically?
reboot the computer
RPO
recovery point objective the maximum period of dad which will be lost in the case of a disaster
What is the only way to switch back to FAT32 file system after you convert the file system from FAT32 to NTFS
reformat the drive or partition
What is the purpose of the gpudate command
refreshes local and active directory-based group policy settings
rm (linux command)
removes(deletes) files or directories
Which type of shoes should you wear while working around electronics?
rubber-soled shoes
grep (linux command)
searches a file for a particular pattern of characters and displays all lines that contain that pattern
Dumpster Diving
searching the garbage collection area or dustbin to look for non-shredded confidential documents
You found an exposed electric wire, which can be dangerous for people working near it. What should you do FIRST before repairing the wire
shut down the electricity
Which authentication method uses a small card with an embedded silicon chip which stores information on it
smart card authentication
Malware
software that damages or disrupts a system without the owner's permissions
Spyware
software that gathers the user's information through the user's internet connection without the user's knowledge
What does three factor authentication use
something you know (i.e. username or password), something you have (i.e., smart card), and something you are (i.e., biometric authentication)
Why does WPA use Temporal Key Integrity Protocol (TKIP)
to ensure that a new encryption key is provided for every packet that is sent
After malware removal, why should you educate the end user?
to prevent future malware infection
Why should a company document all incidents
to provide incident documentation to help with future incidents
Remote Assistance
tool a user should use to request help from an expert user
Remote Desktop Connection
tool used to perform installation on another user's computer with administrative rights
What should you do to prevent your computer from increased voltage or brownouts?
use an uninterruptible power supply (UPS)
Degaussers
use powerful electromagnets to destroy all data on magnetic media like tapes and hard drives but not optical or flash storage
su (linux command)
used by a user to execute commands with the privileges of another user account
boot partition
used for a partition containing the operating system files
dd (linux command)
used to convert and copy files
vi (linux command)
used to edit text files
format (windows command)
used to format a drive
DISKPART
used to manage computer drives including disks, partitions, volumes, and virtual hard disks
Dynamic partition
uses logical volume management technology to arrange data more flexible on the disk -can span non-contiguous disk segments or even multiple physical drives (incompatible with with older versions of windows and other operating systems)
wep encryption
uses the RC4 encryption cipher
Which device can be installed to monitor visitor entry in server room when there is not enough manpower to escort the visitor
video surveillance cameras or closed circuit television (CCTV)
ls (linux command)
view a list of directories on the computer
VPN
virtual private network
What should a technician wear to prevent electrostatic discharge (ESD) while installing sensitive memory chips?
war an anti-static wrist strap
Shoulder surfing
watching someone when he enters his login credentials
shoulder surfing
watching someone who is viewing or entering sensitive information or eavesdropping on confidential conversations
Which wireless security protocol is most secure: WPA, WPA2, or WEP
wpa2
which command-line utility is used to copy multiple files and folders at the same time from a command prompt
xcopy.exe
What happens when Windows Defender is turned on
you are notified when spyware or other potentially unwanted software tries to install itself or run on your computer
Whom should you consult if you are working on-site and your customer asks you to perform a task that is not in your scope
your supervisor