C394

¡Supera tus tareas y exámenes ahora con Quizwiz!

nbtstat

tcp/ip utility used to view and manage Net BIOS over tcp/ip status information. Can disply NetBIOS namee tables for both the local and remote computers

Snapshot feature on linux

the ability to create a volume image of a device at a particular instance without causing a service interruption

Tailgating

the act of gaining unauthorized access credentials without the permission of the authorized person

Which guidelines should you refer to if you find that someone has breached the security of the server room

the company's security policy

As a technician, what should you refer to while explaining the strength of technology to a customer

the manual

Basic partition

the original and default partitioning style used by windows and dos defined by a partition table each partition represents a single contiguous portion of the disk basic disks can be formatted with any file system and accessed by any operating system so they're usually safest to use

Man in the middle attack

when a hacker is positioned on both sides of the attack to intercept communication between two sessions and devices

Primary Partition

where windows boot files should be sotred

WPA encryption

wi-fi protected access encrypts traffic using Temporal Key Integrity Protocol (TKIP), a different implementation of the RC4 cipher.

WPS

wifif protected setup

dism

windows command that repairs windows images, windows setup, and windows pe, use this command when sfc is unable to repair corrupted files

Event Viewer

windows utility that is used to view the application log

Disk Utility Cleanup utility

windows utility that searches a computer for unnecessary files and allows you to remove those files safely

Device Manager

windows utility used to diagnose hardware-related problems

Disk Defragmenter

windows utility used to routinely to improve the access time for files stored on hard disks

Safety Remove Hardware feature

Windows feature used to ensure when that an external device can be removed safely

Mantrap

a set of double doors that are generally monitored by a security guard

Swap Partition

a special partition created to store the paging file that is used a virtual memory

Disk Defragmenter

system utility available in all versions of Windows that scans and analyzes how file fragments are arranged and accessed on the hard disk

DEFRAG

system utility defragments files on your hard drives

REGEDIT

system utility directly edits the windows registry, the database containing most windows settings

DXDIAG

system utility opens the DIrectX diagnostic tool to troubleshoot DIrectX multimedia technologies

MSTSC

system utility opens the remote desktop connection utility to start remote connection to another computer

what is the commet syntax for .sh script for single line

#

Which command switch should you use with the Windows IPCONFIG command to display the other available command switches and their description?

/?

What does AUP denote

Acceptable Use Policy

AD CS

Active Directory Certificate Services Allows active directory network to maintain public key infrastructure

ADFS

Active Directory Federation Services single sign-on system that uses the common internet standard SAML instead of LDAP. Used for over the internet

AD LDS

Active Directory Lightweight Directory Services provides directory services independent of the windows domain model

AD RMS

Active Directory Rights Management Services an information right management service that can encrypt and limit access to specific types of information on the domain such as emails, word documents, web pages, and so on

What should you do if the customer's child is interfering with the troubleshooting process while you are visiting a customer site

Ask the customer to keep the child away from the work area

What should you do if a personal item near the work area is interfering with the troubleshooting procedure

Ask the customer to remove the personal item.

If a person is able to express positive and negative ideas and feelings in an open, honest, and direct way, what would you call this type of behavior

Assertive behavior

BitLocker-To-Go

BitLocker Drive Encryption on removable data drives. This includes the encryption of USB flash drives, SD cards, external hard disk drives, and other drives formatted by using the NTFS, FAT16, FAT32, or ExFAT file systems.

What is the error screen displayed by Windows upon encountering a critical error that causes the system to crash?

Blue screen of death (BSOD)

Which command is used to display the status of a disk in the current drive and can repair them

CHKDSK command

Which command-line utility in Windows can you use to display or alter the compression of files on NTFS partitions?

COMPACT

CHAP

Challenge Handshake Authentication Protocol authenticate PPP(point to point protocol) sessions and can be used with many VPNS

CDFS

Compact disc file system

Which command should you run on a Windows computer to force defragmentation of volume D: regardless of whether it needs to be defragmented or even if free space is low

DEFRAG D: -F

DES

Data Encryption Standard (DES) is a symmetric-key algorithm for the encryption of electronic data. Although its short key length of 56 bits, criticized from the beginning, makes it too insecure for most current applications.

DLP

Data loss prevention used to classify and protect your organization's confidential and critical data

Access control

Determines types of user access, such as read-only access can restrict the risk of unauthorized login as it provides access rights to the authorized user of particular system objects.

Digest

Digest authentication is a method of authentication in which a request from a potential user is received by a network server and then sent to a domain controller.

Disk Cleanup

Disk Cleanup is a system utility available in all versions of Windows that frees up space on the hard disk being used to store unnecessary temporary files.

How can you ensure that your SSID is not seen by computers in other offices

Do not broadcast the SSID

What should you do if you encounter confidential information while troubleshooting at a client site

Do not read or disclose the information. If the information is a document, you should turn the document over so that you cannot read the document

EFS

Encrypting File System the Encrypting File System (EFS) allows encryption of individual drives and folders on any NTFS volume. It is included with Business/Professional/Enterprise/Ultimate editions of Windows, as well as all editions of Windows Server.

Three event types displayed in Event Viewer

Error, Warning, and Information

FAT

File allocation table the system Microsoft originally developed for formatting floppy disk in DOS and early versions of Windows

Swap partition

File system that Linux uses to store virtual memory that the operating system writes to disk in order to free physical RAM

Acceptable use policy(AUP)

targets end users who may be employees or customers using hosted services

Which type of backup uses maximum disks and tapes for storing data

Full backup

GPT

GUID Partition Table new standard supported by modern operating systems can be used with disk of any size and allows an almost unlimited number of partitions less susceptible to errors

What does GDPR mean

General Data Protection Regulation

GDPR

General Data Protection Regulation privacy laws

Face recognition scanner

It determines whether to authenticate a user by scanning the user's face and comparing that scan to face scans already on file

Smart Card

It is an authentication card with an integrated circuit built in

EAP

Extensible Authentication Protocol authentication framework frequently used in wireless networks and point to point connections

What is HFS

Hierarchical file system the family of file systems used by Mac OS and iOS

What are the three parts of first response when an incident occurs

Identify Report through proper channels Data/device preservation

Steps of malware removal

Identify and research malware symptoms. Quarantine the infected systems. Disable System Restore (in Windows). Remediate the infected systems. Update the anti-malware software. Scan and use removal techniques (safe mode, pre-installation environment). Schedule scans and run updates. Enable System Restore and create a restore point (in Windows). Educate the end user.

What should technicians do if they receive a personal call on their mobile phone while servicing a computer at a customer's residence

Ignore the call and focus on the customer's problem

IPsec

Internet Protocol Security is a secure network protocol suite that authenticates and encrypts the packets of data sent over an internet protocol network

IDS

Intrusion detection system a device or software application that monitors a network or systems for malicious activity or policy violations

dumpster diving

Involves digging through trash receptacles to find computer manuals, printouts, or password lists that have been thrown away

/flushdns

Ipconfig /flushdns is used to clear DNS information on the client so that client updates with new configuration information more quickly

/registerdns

Ipconfig /registerdns is used to register the client with its DNS server.

/renew

Ipconfig /renew will enable you to lease IP addressing information from a DHCP server or APIPA. If the computer already has a good IP address leased, it will not renew unless you release the address first.

what is a .sh file

Linus shell executable file

Which operating system uses the ext3 and ext4 file systems?

Linux

What are the three recycling or repurposing methods listed on the A+ exam guide

Low-level format vs. standard format Overwrite Drive wipe

Force Quit

Mac tool that forces an unresponsive app to close

What should you do if you receive an urgent message from your office while working on-site

Make a short call to determine the nature of the urgency

MBR

Master Boot Record Specific area of a hard disk drive where a boot-sector virus places its starting code

Which command should you run to manually start the print spooler service on a Windows computer

NET START SPOOLER

Which file system or systems support file compression and disk quotas

NTFS

Which file system supports encrypting file system(EFS) to increase security

NTFS

Which file systems includes features that are required for hosting Active Directory

NTFS

Which recommended file system format for Windows 7 and higher enables advanced performance, security, and reliability features

NTFS

What does the acronym NAC denote

Network Access Control

NAS

Network Access Server relays all communication between users and the RADIUS server users directly connect to, like dial in server, vpn endpoint, or wap

What happens when MAC filtering is enabled on a wireless network

Only MAC addresses that are specifically allowed connection are granted connection

PAP

Password Authentication Protocol used to authenticate PPP sessions

What does PCI denote

Payment Card Industry

What does PHI denote

Personal Health Information

What does PII denote

Personally Identifiable Information

PII

Personally Identifiable Information uniquely identity an individual

what type of file uses .ps1

Powershell

What is the quickest way to lock a windows computer

Press the Windows + L keys

PHI

Protected health information which concerns and individuals health and is related to hipaa

Three main remote access technologies

RDP Telnet SSH

RTO

Recovery time objective the maximum expected amount of time needed to fully restore service after a disaster

SFC

SYSTEM FILE CHECKER. For attacking errors in WINDOWS SYSTEM FILES sfc /scannow will scan entire system for Windows file errors and repair them-Windows

Which mode should you use if you want to uninstall a device driver, but the computer will not boot properly?

Safe mode

SSH

Secure Shell is a network protocol for secure transfer of data between computers.

How can you enable some users to access certain files and restrict others form accessing the same files

Set different permissions for the users

exFAT

Supports much larger file sizes and has other improvements over FAT32

Which utility can you use to scan all protected files to verify their versions on a Windows computer

System File Checker (Sfc.exe)

Which Windows command is used to trace the IP traffic route through intermediate routers and system network interfaces, identifying the full path traveled from source to destination

TRACERT

What could be a reason that a scheduled task did not execute at the scheduled time?

Task scheduler service was stopped or disabled.

what occurs when MAC filtering is enabled on a wireless access point

The MAC address of each network interface card(NIC) that attempts to connect to the network is checked

Incident response policy

The incident response policy specifies exactly what steps will be taken in response to a security incident, in order to minimize and repair damage without exposing the network to further risk.

Regulatory compliance policy

The regulatory compliance policy is particularly important for organizations that handle a lot of data owned by other people, do work in specific sensitive fields, or need to integrate their operations with common industry standards.

What is the purpose of chain of custody

Tracking of evidence/documenting process

When should you transfer an angry customer to your supervisor

Transferring a customer to a supervisor should only be done if you cannot handle the customer's problem

How does communication occur in simplex mode

Two separate channels are used for transmitting and receiving the signal

Phishing

Type of attack that is conducted by an email request from a financial institution asking you to login and change your password using the provided link

Which device contains a battery and Automatic Voltage Regulation (AVR) circuitry to protect a computer from power sags

Uninterruptible power supply (UPS)

How should you communicate with a customer if you and the customer do not understand a common language

Use hand gestures and visual aids to give details

Time Machine

Used to backup and restore files on a mac

Which feature of Windows 7 and higher prevents applications from running in privileged mode even when an administrator is logged on

User Account Control (UAC)

UAC

User Account Control. Informs you when a program makes a change that requires administrator-level permission, also adjusts the permission level of your user accounts

USMT

User State migration tool used to migrate user settings from one operating system to another

Disk Utility

Verifies the health of a disk on a mac

what is a .vbs file

Visual basic script file

wpa2 encryption

WPA2 support for 128-bit encryption using the strong and well-regarded Advanced Encryption Standard (AES) cipher

When does a zero-day attack occur

When live environments become vulnerable and targeted before a fix or patch can be created by the vendor

WEP

Wired Equivalent Privacy

Which three protocols provide encrypted communications between 802.11x wireless clients and wireless access points?

Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), and WPA2

WPA

Wireless Protected Access

How does communication occur in full-duplex mode

You can transmit and receive the signal on the same channel at the same time.

Netstat

a TCP/IP utility used to show the status of each active network connection. It displays statistics for both TCP and UDP, including protocol, local address, foreign address, and the TCP connection state.

Rootkit

a code that is intended to take full or partial control of a system at the lowest levels.

Honeypot

a decoy computer system which helps to trap hackers or track unconventional or new hacking methods

hich physical barrier acts as the first line of defense against an intruder

a fence

Trojan Horse

a malicious computer program which misleads users of its true intent, where a user is duped into executing an e-mail attachment disguised to appear not suspicious or by clicking on some fake advertisement on social media or anywhere else.

logic bomb

a piece of code that sits dormat on a user's computer until it is triggered by a specific event such as a specific date

what is a .py file

a python executable script

What is a dependency service

a service that requires another service to be running to operate properly

Extended Partition

a special partiton used on an MBR disk which serves as a container for any number of logical partitions there can be only one extended partition per disk and it takes the place of one primary partition

System volume

a volume containing the startup files

Mission control

a way to see whats open on mac

ACL

access control list

Which terms should NOT be used while explaining the strength of technology to a customer

acronyms and technical jargon

Which is a structured form of listening and responding that focuses the attention on the speaker

active listening

TACACS+

allows a remote access server to forward a user's login password to an authentication server to determine whether access can be allowed to a given system.

apt-get command

allows you to update or install packages

Which three types of characters can be used in combination to set a strong password in Windows

alphabetic, numeric, and special characters

What is a locator application

an application that helps locate a mobile device when it is stolen

digital certificate

an electronic file that establishes your identity via a public key infrastructure (PKI) to complete transactions

spear phishing

an email spoofing sttack that targets a specific individual seeking unauthorized access to sensitive information

What should you do when you do not understand a customer's problem while talking to the customer

ask for clarification

Spam

attack in which the attacker sends unsolicited emails or other electronic messages with undesired or malicious content

Which uninterruptible power supply (UPS) feature provides protection from power surges and power drops?

automatic voltage regulation (AVR)

What should be documented to ensure that you can return to normal operations and reverse a change if a change does not work or causes problems

backout plan

Which authentication method uses fingerprint recognition as a method to identify an individual

biometric authentication

Which Recovery Console command is used to correct a corrupted Windows boot sector?

bootrec /fixboot

chown (linux command)

changes ownership of a file

chmod (linux command)

changes permissions of files or directories

cd (linux command)

changes the current directory

What is the FIRST action you should perform if you find that your fellow technician has left the door of the server room open

close the door

gpresult

command displays group policy settings and resultant set of policy(RSoP) for the specified user or computer

What should you configure when setting up a wireless connection

configure the ssid and decide which encryption standard to use

cp (linux command)

copies files and directories

What is the best method to protect network cables from damage due to environmental factors, such as heat and liquid?

cover the cables by using a protective material

Which command should you run to check fragmented files

defrag.exe

CHKDSK

disk maintenance tool that scans hard disk for any potential files system errors or bad sectors on disk

What does the Windows cd command do if entered WITHOUT parameters?

displays the current drive and directory

dir (windows command)

displays the disk's volume label and serial number, followed by a list of directories and files on the disk

ps (linux command)

displays the running system processes

What is the purpose of BitLocker in Windows

drive encryption encrypts entire NTFS volumes, including the system drive. It is available on Enterprise and Ultimate Editions of Windows Vista and 7, Pro and Enterprise versions of Windows 8 and later, and all editions of Windows Server 2008 and later.

Which Windows command-line tool is the DirectX Diagnostic tool that allows you to confirm DirectX settings, including the version of DirectX that is installed and the device driver versions

dxdiag

Which type of electric current can cause severe damage to computer components while a technician is troubleshooting a hardware device

electrostatic discharge (ESD)

What should you do if a user needs an administrative password to install a program on his computer

enter the password yourself and install the program

Which attributes or details of an employee can be used by biometric devices

fingerprint, face, signature, iris, and retina

Rogue antivirus

form of malicious software and Internet fraud that misleads users into believing there is a virus on their computer and to pay money for a fake malware removal tool (that actually introduces malware to the computer).

Piggybacking

getting into a secure area by tagging along right behind someone who has legitimate access with or without their knowledge

privacy policy

governs codified expectations of user privacy and consent to security-based monitoring of user activity

HFS

hierarchical file system is the family of file systems used by mac os and ios

spoofing

human based or software based attack where the goal is to pretend to be someone else for the purpose of identity concealment

linux commands to configure network interfaces

ifconfig and iwconfig

bootcamp

installs windows on a mac by re partitioning the hard drive

IPS

intrusion prevention system a preemptive approach to network security used to identitfy potential threats and respond to them swiftly

What is the purpse of asset tags and barcodes

inventory management

Which TCP/IP command-line utility should you use to display the IP address and subnet mask for a Windows computer?

ipconfig

Which IPCONFIG switch displays the current IP configuration on a workstation?

ipconfig /all

/release

ipconfig switch used to release the IP addressing information assigned to the computer by the DHCP server or APIPA.

What is the purpose of the CONVERT command-line utilty

it changes a FAT partition into an NTFS partition

Iris scanner

it determines whether to authenticate a user by taking a picture of the iris of the user's eye and comparing the picture with iris pictures on file.

What is the purpose of the diskpart command-line utility

it extends a partition to include unpartitioned spaced on the hard drive creates partitions on a hard disk

what is a.j file

javascript

Which documentation is maintained by hardware or software vendors

knowledge base/articles

War chalking

leaving notations about the wireless network on the outside of a building

Application Log

log to find events logged by programs

Spotlight

mac feature that searches the system for all kinds of files including documents,music,photos, and so on

Which documentation states hazardous nature, ingredients, precautions to follow, health effects, safe handling information, and other important information about chemicals?

material safety data sheets (MSDS)

MTTF

mean tiem to failure the average amount of time between when you install a device and when it will fail it is usually used to describe non repairable components

MTBF

mean time between failures describe as the average amount of time a component or system can remain online before it needs to be taken down for repair

MTTR

mean time to repair the average amount of time a component or system will remain offline for repair in the event of disaster

MDM

mobile device management ' software designed to centrally administer devices in order to assign device permissions, verify security compliance, apply updates, and even monitor activity

mv (linux command)

moves a file to a specific directory

unattended os installation

needs to use an answer file to install os, installs without user input

nslookup (windows command)

network admin command line tool that is used to troubleshoot DNS-related problems

Which documentation will show the layout of the network

network topology diagrams

What should you do to help a customer if you notice that your coworker is unable to provide resolution to customer queries and the customer is becoming irritated?

offer your help to the co-worker and the customer

ctrl+alt+T on a linux computer

opens a terminal window

Swap

partition used to store virtual memory that the operating system writes to disk in order to free physical RAM

Which two default elements should you change to secure a newly configured wireless network from unauthorized access

password and SSID

Keychain

password management system on mac

Which windows command-line tool launches Performance Monitor

perfmon

Which common command is used to check the Internet connectivity from the command prompt?

ping

pwd(linux command)

print working directory shows the name of the current directory and writes the full pathname of it

What is the first step you should take to troubleshoot a computer that is behaving erratically?

reboot the computer

RPO

recovery point objective the maximum period of dad which will be lost in the case of a disaster

What is the only way to switch back to FAT32 file system after you convert the file system from FAT32 to NTFS

reformat the drive or partition

What is the purpose of the gpudate command

refreshes local and active directory-based group policy settings

rm (linux command)

removes(deletes) files or directories

Which type of shoes should you wear while working around electronics?

rubber-soled shoes

grep (linux command)

searches a file for a particular pattern of characters and displays all lines that contain that pattern

Dumpster Diving

searching the garbage collection area or dustbin to look for non-shredded confidential documents

You found an exposed electric wire, which can be dangerous for people working near it. What should you do FIRST before repairing the wire

shut down the electricity

Which authentication method uses a small card with an embedded silicon chip which stores information on it

smart card authentication

Malware

software that damages or disrupts a system without the owner's permissions

Spyware

software that gathers the user's information through the user's internet connection without the user's knowledge

What does three factor authentication use

something you know (i.e. username or password), something you have (i.e., smart card), and something you are (i.e., biometric authentication)

Why does WPA use Temporal Key Integrity Protocol (TKIP)

to ensure that a new encryption key is provided for every packet that is sent

After malware removal, why should you educate the end user?

to prevent future malware infection

Why should a company document all incidents

to provide incident documentation to help with future incidents

Remote Assistance

tool a user should use to request help from an expert user

Remote Desktop Connection

tool used to perform installation on another user's computer with administrative rights

What should you do to prevent your computer from increased voltage or brownouts?

use an uninterruptible power supply (UPS)

Degaussers

use powerful electromagnets to destroy all data on magnetic media like tapes and hard drives but not optical or flash storage

su (linux command)

used by a user to execute commands with the privileges of another user account

boot partition

used for a partition containing the operating system files

dd (linux command)

used to convert and copy files

vi (linux command)

used to edit text files

format (windows command)

used to format a drive

DISKPART

used to manage computer drives including disks, partitions, volumes, and virtual hard disks

Dynamic partition

uses logical volume management technology to arrange data more flexible on the disk -can span non-contiguous disk segments or even multiple physical drives (incompatible with with older versions of windows and other operating systems)

wep encryption

uses the RC4 encryption cipher

Which device can be installed to monitor visitor entry in server room when there is not enough manpower to escort the visitor

video surveillance cameras or closed circuit television (CCTV)

ls (linux command)

view a list of directories on the computer

VPN

virtual private network

What should a technician wear to prevent electrostatic discharge (ESD) while installing sensitive memory chips?

war an anti-static wrist strap

Shoulder surfing

watching someone when he enters his login credentials

shoulder surfing

watching someone who is viewing or entering sensitive information or eavesdropping on confidential conversations

Which wireless security protocol is most secure: WPA, WPA2, or WEP

wpa2

which command-line utility is used to copy multiple files and folders at the same time from a command prompt

xcopy.exe

What happens when Windows Defender is turned on

you are notified when spyware or other potentially unwanted software tries to install itself or run on your computer

Whom should you consult if you are working on-site and your customer asks you to perform a task that is not in your scope

your supervisor


Conjuntos de estudio relacionados

HW16: Homework - Ch. 16: Externalities

View Set

Unit 5: Civil Liberties and Civil Rights

View Set

NJ Real Estate Unit 19: Legal Descriptions and Deeds

View Set

BIOL 1130 Chapter 11 Study Guide

View Set

Managerial Accounting - Performance Evaluation Measures

View Set