CIT 312 Midterm pt3
Use the C$ administrative share to copy the file.
A help desk technician determines that a user's issue is caused by a corrupt file on their computer. Which of the following would be the FASTEST way to transfer a good file to the computer? Use the C$ administrative share to copy the file. Have the user share the folder as a local share and copy the file to the share. Attach the file to an email and have the user copy the file to the correct folder. Establish remote assistance and transfer the file within the session.
chmod
A technician attempts to run an executable file on a Linux computer and receives a Permission Denied message. Which of the following commands should the technician use? chmod ps grep ls
grep
A technician uses the ps command to find information about a process that is running a browser application on a Linux computer. The technician knows the name of the process, but the list is very long. Which of the following commands would help the technician find and display only the information about the browser process? ls sudo grep cd
Bob can open, read, and write changes to the file.
Bob is a member of the Accounting group. The Accounting group has been granted the Read and Write NTFS permissions for the WeeklyReport.xls file. Bob is also a member of the Everyone group, which has been given the Full Control permission for the WeeklyReport.xls file. Which of the following statements MOST correctly describes Bob's ability to access the WeeklyReport.xls file? Bob can find the file in a search, but he cannot open the file. Bob can open and read the file, but he cannot write changes to the file. Bob has Full Access to the file and can open, read, write, delete, and change permissions on the file. Bob can open, read, and write changes to the file. Bob cannot search for or open the file.
A large screen and a projector
Ida, one of the employees in the sales department, needs a way to display her PowerPoint sales presentation to a large group of potential customers. She has asked you to set up the conference room in preparation for her presentation. You will need to purchase a display system for the conference room. Which of the following display systems would be the BEST to purchase? A large OLED monitor A large plasma monitor A large screen and a projector A large LCD monitor
They generate much more heat than other display types. The gasses inside the cells are sensitive to air pressure fluctuations.
What are the disadvantages of plasma display technology? (Select two.) They generate much more heat than other display types. They usually display colors less accurately than LCD displays. They consume less power than LCDs. They have low contrast and cannot produce true black. The gasses inside the cells are sensitive to air pressure fluctuations.
ip
Which Linux command can you use to display or change IP configuration settings?
xcopy /e
Which command would you use to copy all files and subdirectories in a directory, including empty subdirectories? copy /v copy /n xcopy /e xcopy /s
By default, Windows automatically creates an administrative share for every volume. To connect to an administrative share, you must use the UNC path.
Which of the following statements are true regarding administrative shares? (Select two.) Default administrative shares grant access to the Administrators or Power Users group. By default, Windows automatically creates an administrative share for every volume. To connect to an administrative share, you must use the UNC path. If you are a member of the Administrators group, the administrative shares are visible to you when you browse the network. Adding a ! sign to the end of a share name creates an administrative share.
Duplicate these displays
You are a trainer for your company and often teach courses in a classroom located on campus or in a hotel conference room. In your office, which is separate from the classroom, you have two external monitors connected to your laptop, and you are able to display different content on each monitor. However, when teaching, you only have your laptop and a projection unit. To make teaching easier, you want the same content to show on both the laptop monitor and the projection screen. Which of the following multiple display options would be BEST to select when you are teaching? Show only on 1 Show only on 2 Duplicate these displays Extend these displays
\\Home1\Pictures
You want to use the Universal Naming Convention (UNC) format to access a shared folder called Pictures on a computer named Home1. Which of the following is an example of the UNC format? \\Home1\Pictures Home1:Pictures .Home1:Pictures Home1:\\Pictures
Configure Jill's computer with dual monitors.
You work as the IT administrator for a small news station. Jill, an employee in Building 2, works in the audio-video editing department and would like to increase her productivity. For example, she would like to be able to run multiple programs simultaneously and be able to compare video clips side by side. Which of the following configuration changes would provide the BEST solution for Jill? Configure Jill's computer with dual monitors. Provide Jill with a second computer. Configure Jill's computer with a higher resolution. Grant Jill access to a remote workstation.
shutdown -h +10 message
You would like to completely shut down a system (without rebooting) 10 minutes after notifying all users of your intent. Which of the following commands should you enter at the shell prompt? shutdown -h +10 message shutdown 10 -h message shutdown -r +10 message shutdown -p 10 message
Deny Read for Reports.doc and Allow Full Control for Costs.doc.
Your computer has a single NTFS partition that is used for the C: drive with the folders below. C:\Confidential C:\PublicReports You configure NTFS permissions on the C:\Confidential folder and deny the Read permission to the Users group. For the C:\PublicReports folder, you allow the Full Control permission for the Users group. You have not configured any permissions other than the defaults on any other folders or files. You take the following actions. You: Move Reports.doc from C:\Confidential to C:\PublicReports. Copy Costs.doc from C:\Confidential to C:\PublicReports. Which of the following BEST describes the permission the members of the Users group will have for the two files in the C:\PublicReports folder? Deny Read for Reports.doc and Allow Full Control for Costs.doc. Deny Read for both. Allow Full Control for Reports.doc and Deny Read for Costs.doc. Allow Full Control for both.
EFS
A user has a file that contains sensitive data. Which of the following security technologies should he or she use to encrypt the single file? Single sign-on EFS BitLocker Administrative share
net use
A user has a problem accessing several shared folders on the network. After determining that the issue is not from his computer's IP configuration, you suspect that the shared folders are not currently connected. Which of the following commands will MOST likely confirm your suspicions? net use netstat ipconfig tracert
Only the R attribute is retained on the file.
A user needs to copy a file from an NTFS partition to a FAT32 partition. The file has NTFS permissions and the Read-only (R) and Encryption attributes. Which of the following will be true when the file is copied? Only the NTFS permissions are retained on the file. None of the NTFS permissions or attributes are retained on the file. Only the R attribute is retained on the file. Only the R and Encryption attributes are retained on the file. All the attributes and NTFS permissions are retained on the file.
EFS encrypts the FEK by creating a key pair (private and public).
After creating an FEK (file encryption key) for a file, what does EFS do next to add a greater level of security for the file? EFS creates a symmetric key. EFS instructs Windows to create a key pair (private and public). EFS encrypts the FEK by creating a key pair (private and public). EFS stores the FEK with the public key.
Scanner Digitizer
Jamie has been tasked with designing a solution for the paralegals in his office. They need to review old documents that are on paper files and create word processor documents from them that can be searched and cross-referenced. Which of the following devices should Jamie use to create the solution? (Select two.) Scanner Projector Digitizer Printer Biometric scanner
Network share
Jane, an employee in the human resources department, has created several important PDF documents on her computer that all office managers in her building must read. She would like to make locating these files simple and maintain them as little as possible. It is important that no other users are permitted to view these documents. As the IT technician for your company, Jane has asked you to make this possible. Which of the following would MOST likely fulfill Jane's request? Network share Administrative share Hidden share VPN connection Remote Desktop connection
The least expensive, thinnest, and most widely used type of LCD. WLED Able to dim specific regions of the screen. Full-array WLED Superior accuracy (most expensive type of backlighting technology). RGB-LED Produces better colors than WLED (consumes more energy). CCFL
Match each LCD type with the corresponding benefit or characteristic. The least expensive, thinnest, and most widely used type of LCD. WLED Able to dim specific regions of the screen. Full-array WLED Superior accuracy (most expensive type of backlighting technology). RGB-LED Produces better colors than WLED (consumes more energy). CCFL
Used to scan hardware that contains an embedded microchip for authentication. Smart card reader Used to capture some type of analog signal and convert it into digital data. Digitizer Contains an embedded microchip or a magnetic strip. Smart card reader Used to scan users' unique physical features and use them to verify their identity. Biometric scanner Graphics tablets mostly used by graphic artists to capture hand-drawn images. Digitizer Fingerprint scanner. Biometric scanner Most commonly used in retail environments at checkout stands. Barcode reader
Match the peripheral devices on the left with the descriptions or examples on the right. Each peripheral device may be used once, more than once, or not at all. Used to scan hardware that contains an embedded microchip for authentication. Smart card reader Used to capture some type of analog signal and convert it into digital data. Digitizer Contains an embedded microchip or a magnetic strip. Smart card reader Used to scan users' unique physical features and use them to verify their identity. Biometric scanner Graphics tablets mostly used by graphic artists to capture hand-drawn images. Digitizer Fingerprint scanner. Biometric scanner Most commonly used in retail environments at checkout stands. Barcode reader
Edit the file properties and assign Rachel the Deny Full Control permission.
The D:\ drive in your computer has been formatted with NTFS. The Sales group on your computer has been granted Allow Full Control for the D:\Sales folder. The Rachel user account is a member of the Sales group. Which of the following will BEST prevent Rachel from accessing the D:\Sales\2010sales.doc file without affecting her ability to access any other files in that folder and without affecting the abilities of any other users? Edit the file properties and assign Rachel the Deny Full Control permission. Remove Rachel from the Sales group. Edit the folder properties and assign Rachel the Deny Full Control permission. Edit the file properties and assign the Sales group the Deny Full Control permission. Edit the folder properties and assign the Sales group the Deny Full Control permission.
Touch pad
What type of peripheral device is typically found on a laptop computer and allows the user to control the cursor with a finger? Touch pad Scanner Mouse Gamepad Motion sensor
pwd
What would you enter at the shell prompt on a Linux system to display the present working directory?
BitLocker with TPM
When you arrive at your company, you discover that a hard drive with your customers' sensitive information has been stolen. You feel confident that the thief will not be able to view the data on the hard drive because you had previously taken security precautions to protect the data in case the hard drive was stolen. Which of the following precautions is the MOST likely solution you used to protect the data on the hard drive? Microsoft Defender Windows Security BitLocker with TPM BitLocker To Go
bash
Which command would you enter at the shell prompt to start a new Bourne-Again Shell (Bash) session?
Archive
Which file attribute identifies the file as having been modified since the last backup? Hidden Archive Encrypted Read-only
Trusted Platform Module (TPM)
Which of the following components is a special hardware chip included on a computer's motherboard that contains software that generates and stores cryptographic keys? BIOS/UEFI USB device Trusted Platform Module (TPM) BitLocker partition
Biometric scanner
Which of the following devices authenticates users based on their physical features? NFC device Barcode reader Biometric scanner VR headset
Bar code reader
Which of the following devices would you add to a computer if you needed to take inventory at a retail store by scanning the UPC symbols on products? Touch screen Trackball Scanner Bar code reader
LED LCD
Which of the following display technologies require backlighting? (Select two.) DMD LED LCD OLED Plasma
Touchscreen
Which of the following is considered a computer input device? Hard disk Projector Touchscreen RAM
LEDs are used to backlight the screen.
Which of the following is true of modern LCD monitors in regards to backlighting? LEDs are used to backlight the screen. Red, green, and blue light provides the least expensive type of backlighting technology. Cold cathode florescent (CCFL) is used for backlighting. LCD monitors have small cells containing electrically charged ionized gas that do not need backlighting.
BitLocker is designed to protect files against offline access only.
Which of the following is true of the Windows BitLocker program? BitLocker is designed for use on the Home version of Windows 10 and later. BitLocker is designed to protect files against offline access only. BitLocker is designed to encrypt individual files. BitLocker is designed to protect files against offline and online access.
Joystick Gamepad
Which of the following peripheral devices are designed specifically for playing games on a computer? (Select two.) Mouse Joystick Gamepad Digitizer Microphone
L2TP PPTP IPsec
Which of the following protocols establish a secure connection and encrypt data for a VPN? (Select three.) WPA FTP L2TP WEP PPTP IPsec RDP
EFS
Which of the following security solutions would prevent you from reading a file that you did not create? EFS IPSec VPN BitLocker
Signature pad
Which peripheral device is best for capturing a customer's signature when they check out at a convenience store or supermarket? Card reader Touchpad Signature pad NFC device
It adds the System file attribute, adds the Read-only attribute, and removes the Archive attribute for myfile.dll.
While researching a fix to a system file issue, you find that using the attrib command should resolve the issue you are experiencing. The instructions you found said to run the following command: attrib +s +r -a myfile.dll Which of the following BEST describes the function of this command? It removes the System file attribute, removes the Read-only attribute, and adds the Archive attribute for myfile.dll. It adds the System file attribute, adds the Write-only attribute, and removes the Archive attribute for myfile.dll. It adds the System file attribute, adds the Read-only attribute, and removes the Archive attribute for myfile.dll. It adds the System file attribute, removes the Read-only attribute, and removes the Archive attribute for myfile.dll.
md
While troubleshooting a Windows computer, you open a Command Prompt to explore the folders (directories) on the hard drive. You notice that one of the folders required for your project is missing. Which of the following Microsoft command line tools would allow you to QUICKLY create the missing folder? rd del cd md sfc
tail cat
While troubleshooting an issue with an Apache web server on your Linux system, you need to look at the last several entries in the log file. Which of the following tools would be best suited for this task? (Select two.) tail head ls dd cat
KVM switch
You are an IT professional that works with home users. One of your customers works from home and uses multiple Windows computers as well as an Apple Mac computer. Your customer wants to be able to switch between his computers without changing the keyboard and monitor currently in use. Which of the following devices would BEST facilitate sharing his monitor and other input devices with all of his computers? USB multi-port hub KVM switch VGA splitter HDMI splitter
DLP projector
You are in charge of putting together the display design for a new conference center at your organization. The conference center will be in a large auditorium with 500 or more seats. Which of the following technologies will provide a large display for such a group and also provide very high resolutions? LCD display panel OLED display panel LCD projector DLP projector
LCD display with TN panel.
You are putting together a gaming system and need to make sure that you find a display that meets your needs. The display needs to have a very good response time, and you would prefer that it be affordable and power-efficient. Which of the following display types will MOST likely meet these needs? Plasma display with no motion blur. OLED display with wide-angle viewing. LCD display with IPS panel. LCD display with TN panel.
LCD display with IPS panel.
You are putting together a system for a graphic artist and need to make sure that you find a display that meets their needs. The display needs to have very good color reproduction quality and viewing angles. The display also needs to have proper cooling and be power-efficient. Which of the following display types will MOST likely meet these needs? LCD display with TN panel. LCD display with IPS panel. OLED display with wide-angle viewing. Plasma display with no motion blur.
su -
You are the administrator for a Linux server. Following best practices for system security and effective administration, you always log in to the system with a standard non-root user account. You only elevate your privileges to root user level when you need to do an administrative task. What do you enter at the Command Prompt that will, by default, switch you to the root user and require you to enter the root password?
Insert Mode
You are using the vi editor to manage a text file on a Linux system. You want to type new text into the file. When you type, you want the existing text that comes after the cursor to be pushed down. Which mode provides this function? Command Line Mode Replace Mode Command Mode Insert Mode Text Mode
attrib +r -h
You are working at the command line and want to add the Read-only attribute to a file and remove the Hidden attribute. Which command would you use? attrib +r -h attrib +ro -h attrib add r remove h attrib /add r /remove /h
Place the files on an NTFS partition. Configure both share and NTFS permissions.
You have a folder that you would like members of your development team to access. You want to restrict network and local access to only specific users. All other users must not be able to view or modify the files in the folder. Which of the following would be the BEST actions for you to take next? (Select two.) Configure share permissions. Place the files on an NTFS partition. Configure NTFS permissions. Configure both share and NTFS permissions. Place the files on a FAT32 partition.
You can boot the hard drive without providing the startup key.
You have decided to use BitLocker as your whole disk encryption solution for the hard drive on your laptop. The laptop includes a TPM chip. What happens if you store the startup key required to unlock the hard drive in the TPM chip? You are prompted to provide the startup key before booting the hard drive. You can boot the hard drive without providing the startup key. You are prompted to insert a USB drive with the startup key. You can boot the hard drive from another computer without providing the startup key.
C:\Users\username
You have installed Windows 11 on your C: drive. What is the path to the directories that hold user profiles in Windows 11? C:\Users\Documents and Settings\username C:\Documents and Settings\username C:\Users\Profiles\username C:\Users\username
KVM
You have three computers in your office. You would like to reduce the time it takes to switch from one computer to the next, and you would like to use only one keyboard, one monitor, and one mouse for all three computers. Which of the following devices BEST allows this type of setup? USB hub DVI Router KVM
The file will no longer be encrypted.
You have used EFS to encrypt a directory of highly sensitive company files on your hard drive. You then decide to copy one of the files in the directory to a thumb drive to edit the files on a laptop computer while you are travelling to an industry conference. What is the result of copying the file to the thumb drive? The file is compressed and remains secure. The file remains secure and accessible. The file becomes inaccessible. The file will no longer be encrypted.
The wrong file extension was used when saving the file.
You have used a template as the source for a new sales proposal. To avoid overwriting the template, you have saved the proposal using the Save as feature. Knowing that Mark has been your best editor in the past, you decide to send him this new proposal to review and edit. However, when Mark receives the file, he promptly sends you an email stating that the file cannot be opened. You resend the file again, but Mark still cannot open the file. Which of the following is the MOST likely reason the file will not open on Mark's computer? The wrong default app is selected for the type of file that you sent. The wrong file extension was used when saving the file. The file was corrupted during the sending process. Mark's computer does not have the same program you used to write the proposal.
Permissions are removed from both files.
You manage the two folders listed below on your computer. C:\Confidential D:\PublicReports The C:\ drive is formatted with NTFS, and the D:\ drive is formatted with FAT32. On the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: Reports.doc Costs.doc You then take the following actions. You: Move Reports.doc from C:\Confidential to D:\PublicReports. Copy Costs.doc from C:\Confidential to D:\PublicReports. Which of the following BEST describes what happens to the permissions for both files as they are created in the D:\PublicReports folder? Permissions are kept on both files. Permissions are kept for Reports.doc but removed from Costs.doc. Permissions are removed from both files. Permissions are removed from Reports.doc but kept for Costs.doc.
robocopy
You need to duplicate a large number of files from your PC to a network server. Due to the number of files, you start the process and go home for the evening. When you return the next day, you find that only part of the files were duplicated to the server due to the router being temporarily unplugged by the janitor while cleaning. Which of the following Windows command line tools would BEST prevent this type of glitch from happening again? teracopy robocopy xcopy copy
%systemdrive%\Program Files (x86)
You need to install a 32-bit application on a 64-bit version of Windows 11. In which default directory will the application be installed? %systemdrive%\Applications (32-bit) %systemdrive%\Applications %systemdrive%\Program Files %systemdrive%\Program Files (x86)
BitLocker To Go
You need to use a common USB flash drive to transport important sensitive information for your organization. Which of the following would be the BEST program for protecting the data on the flash drive with encryption? Microsoft Defender BitLocker To Go BitLocker EFS
man cat
You want to know more about the usage, command syntax, and options available with the Linux cat command. What would you enter at the Command Prompt to display this information about the cat command?