Comptia A+ November 2019

¡Supera tus tareas y exámenes ahora con Quizwiz!

You can also log boot events by using msconfig. This boot log file is saved to ...?...

%SystemRoot%\ntbtlog.txt.

The parameter ..(?) ... displays processes being run by all users along with a more detailed display.

-ef

Microsoft Office, Adobe Creative Cloud, and Skype are just three examples of apps that are not available in the App Store. To install any of these apps, it is necessary to download them from the vendor site, ensuring that you select the macOS version. macOS download apps are normally distributed as ...(?)...installer files.

.DMG (disk image)

To remove a file from a directory or a disk using the del command, the... (?) ...switch will suppress prompt for read-only files.

/f

To remove a file from a directory or disk using the del command, the... (?) ...switch will prompt a delete for each file.

/p

To remove a file from a directory or a disk using the del command, the ... (?) ... switch will suppress prompt on a wildcard delete.

/q

To remove a file from a directory or a disk using the del command, the... (?) ...switch will delete files from subdirectories.

/s

The Defragmenter requires above ...(?)... of free disk space to work effectively. If insufficient free disk space is available, some files may not be defragmented.

15%

You have been instructed to destroy several old hard drives that contained confidential information, so you take them to a local company that specializes in this process. The IT director wants confirmation that the drives were properly destroyed. What do you need to provide him with?

A certificate of destruction (or certificate of recycling) may be required for audit purposes. Such a certificate, usually issued by the organization carrying out the destruction, is intended to verify that the asset was properly destroyed and usually includes serial numbers, type of destruction done, and so on.

You are disposing of used hard drives, and a network administrator recommends performing a low-level format. What is the difference between a low-level format and a standard format?

A low-level format records the tracks and marks the start of each sector on each track. A standard format creates the file allocation table and root directory.

A recovery disc or factory recovery partition (also called a Rescue Disk) is a tool used by OEMs to restore the OS environment to the same state on which it was shipped. The disc or recovery partition is used to boot the system, then a simple wizard-driven process replaces the damaged installation with an image stored on a separate partition on the hard disk. is a tool used by OEMs to restore the OS environment to the same state on which it was shipped. The disc or recovery partition is used to boot the system, then a simple wizard-driven process replaces the damaged installation with an image stored on a separate partition on the hard disk.

A recovery disc or factory recovery partition (also called a Rescue Disk)

...(?)... is a Windows process that does not require any sort of user interaction and so runs in the background(without a window).

A service

mac: is used to watch CPU, memory, energy, disk, and network usage.

Activity Monitor

In macOS High Sierra and later, HFS Plus updated to the ...(?)... which does support native file encryption. It also provides better support for SSDs.

Apple File System (APFS)

A network user with an Android tablet wants to back up and synchronize her data with her phone. Which service should she use to perform these tasks?

Because problems tend to happen no matter how careful you may be, it is important to back up devices and be able to restore from those backups after an incident. Google Sync is available for backups and synchronization of data between Android-based devices and PCs.

...(?)... is a utility supplied with macOS that allows a full Windows installation to be made on a Mac.

Boot Camp

what are the two ways to open task manger

CTRL>ALT>DEL & CRTL>SHIFT>ESC win 10 windows+x

One of your workstations is running Windows 7 and has been occasionally crashing. You believe it's an OS issue and not a hardware issue. You decide to upgrade the computer to Windows 8.1; however, you want to avoid continuing to have errors if they were software related. What type of installation should you perform?

Clean

A Windows 7 workstation has started exhibiting slow system performance. Where can you go in Windows to find tools to help you troubleshoot this problem?

Control panel > performance information and tools

...?... allow you to collect statistics about resources, such as memory, disk, and processor. These can be used to determine system health and performance.

Counter logs

Use the ...(?)... to set the programs you wish to use for particular tasks or to configure individual file associations (choosing which application is used to open files with a particular extension).

Default Programs applet Note: In Windows 10, select Windows Settings→Apps→Default apps.

You believe that someone has been trying to hack into a Windows 7 workstation by guessing passwords. Another administrator suggests you check the log files to be sure. Which utility can you use to see log files?

Event Viewer. Log files are created to record significant events. Those events can range from security incidents to system problems to just normal user activity. Windows includes Event Viewer for the purpose of looking at log files and identifying problems.

Where Windows uses NTFS and Linux typically uses ext3 or ext4, Apple Mac workstations and laptops use the ...(?)... Plus supports many of the same features as NTFS but cannot perform native file/folder encryption. The maximum volume and file size is 8 ExaBytes. The only reserved characters are : and /

Extended Hierarchical File System (HFS Plus).

T/F Javascript is Java

False.

If a macOS app stops responding, it should be possible to close it down and restart without having to restart the computer. Run ...(?)... from the Apple menu (always available in the Menu Bar) or press ...(?).... You will probably need to switch into another app or window to be able to do this.

Force Quit and or command+option+esc.

to set a computer to remotely install an application from a network folder without any manual intervention from an administrator. Products such as centrally managed anti-virus suites often support "push" deployment tools to remotely install the client or security sensor on each desktop.

Group Policy Objects (GPO)

Which of the following file attributes are turned on by default for system files on a Windows 8.1 workstation? (Choose two.) A. Hidden B. Archive C. System D. Read-only

Hidden and system

Your favorite restaurant locator app on your iPhone won't load. You closed it and tried to reopen it a few times and it still doesn't work. What should you try next?

If an app does not load, try rebooting (forcing the device to restart, if necessary). If that does not work, attempt to remove and reload the app. Be sure to check the vendor's site for any similar problems (and solutions) encountered by others.

You have a Windows 7 workstation with one volume, C:, that is formatted with FAT32. What is the easiest way to enable this volume to have file- and folder-level security permissions?

If you're using FAT32 and want to change to NTFS, the convert utility will allow you to do so. For example, to change the E: drive to NTFS, the command is convert e: /fs:ntfs.

what is the apple control button fx

It's a modifier key you can press to issue keyboard shortcuts to applications. For example, while you press Ctrl+C, Ctrl+X, and Ctrl+V to copy, cut, and paste on Windows, you press Command+C, Command+X, and Command+V to do the same on a Mac. This key has the ⌘ symbol on it.

You are examining shared folders on a Windows 7 workstation. You notice that there is a shared folder named c$ that you didn't create. What is the most likely explanation for this share? A. An attacker has compromised the workstation and is using the share to control it. B. It's a local share that all users have access to. C. It's an administrative share that requires administrative privileges to access. D. It's an administrative share that all users have access to.

It's an administrative share that requires administrative privileges to access

The core of Linux is called ? is the software component that provides the core set of operating system functions

Kernel

You are working on a Windows 7 workstation and need to perform a management task. However, you can't remember the name of the utility that you need to use. Which management tool provides a list of other useful Windows management tools for you and lets you launch them by clicking their name?

MSCONFIG. The System Configuration Tools tab shows you a short list of available administrative tools. System configuration (MSCONFIG.EXE) has five tabs: General, Boot, Services, Startup, and Tools.

This is a catalog of tested devices and drivers. If a device has not passed Windows logo testing, you should check the device vendor's website to confirm whether there is a driver available.

Microsoft maintains a Windows Logo'd Product List (LPL) catalog, previously called the Hardware Compatibility List (HCL).

Introduced with window nt. It includes such features as individual file security, compression, and RAID support as well as support for extremely large file and partition sizes and disk transaction monitoring. It is the file system of choice for higher-performance computing.

NTFS

You are installing a Windows 8.1 client in a Windows Server 2012 R2 domain. The client computer will need to be able to implement file and share permissions. Which Windows-native file system best meets your needs?

NTFS

A system administrator needs to enable windows application access to a sql database. what is the best way to make these changes?

ODBC (open database connectivity) Data services

What concept in Active Directory creates a directory subdivision within which may be placed users, groups and other objects?

Organizational unit

To manage updates and software in Linux, the package manager needs to be configured with the web address of the software repository that you want to use.

Package Manager

...(?)... is the practice of monitoring, obtaining, evaluating, testing, and deploying fixes and updates.

Patch management

Which type of malware will attempt to hide itself by encrypting parts of itself, therefore changing its signature, to avoid detection?

Polymorphic (literally, many forms) viruses change form to avoid detection. These types of viruses attack your system, display a message on your computer, and delete files on your system. The virus will attempt to hide from your antivirus software. Frequently, the virus will encrypt parts of itself to avoid detection. When the virus does this, it's referred to as mutation. The mutation process makes it hard for antivirus software to detect common characteristics of the virus.

If an update causes problems, you can use the ...(?)... to uninstall it.

Programs and Features applet

Priscila is working at a Windows 8.1 workstation, formatted with NTFS. She is a member of the Dev group and the Ops group. The Dev group has Read access to the projects folder, and the Ops group has Write access. What is Priscila's effective permissions for the projects folder?

R/W. When users are granted NTFS permissions from multiple groups, their effective permissions are cumulative, or the most liberal of the permissions assigned. In this case, Write also gives the ability to Read; therefore, the user has both.

...?...displays a log of "system stability" events, so you can see at a glance whether a particular application has stopped responding frequently.

Reliability Monitor

Since 2016, no Apple Mac has been sold with an internal optical drive. While an external USB drive can be used, another option is the ...(?)...., which lets the user access a CD/DVD drive on another Mac or Windows computer. This isn't suitable for audio CDs, DVD movies, recordable CDs/DVDs, or Windows installation disks, however.

Remote Disc app

While working on a Windows 8.1 workstation, a user receives a pop-up message saying that his computer has been infected with a virus and he needs to download a virus scanner now to fix it. The window does not look like it comes from the antivirus software that your company uses. What is this an example of

Rogue virus

ou use an iPad and an iPhone at work. Which of the following represents the greatest threats to leaking personal files or data? (Choose two.) A. Unauthorized root access B. Unintended Wi-Fi connections C. Unauthorized location tracking D. High resource utilization

Root and wifi

If you cannot diagnose a hardware driver or configuration problem via Device Manager, there are other tools you can use to get more information. Which tools are used to get more information? (Select all that apply.) Troubleshooting App Screen Resolution System Information DirectX Diagnostic Tool

Screen Resolution is not a diagnostic tool it is a peronalization setting. It is where you go to adjust the resolution and the color depth of the computer screen.

...(?)... allows another user to view your macOS desktop and operate the computer from another Apple Mac or a computer or device installed with VNC Viewer.

Screen Sharing

In some circumstances, you may want to privilege one task over another, or conversely, set one task to have fewer resources than others. You can do this by right-clicking the process and choosing an option from the ...(?)...

Set Priority

Linux is designed to be a very stable operating system and the server versions often run non-stop for months or even years at a time. However, the desktop versions are likely to be powered on and off much more often. The ...(?)... command has two main parameters: ...(?)... to halt or ...(?)... to reboot the system followed by when the event should take place. Examples of this could be now , +10 (+10 meaning ten minutes from now), or 17:30 (to specify an exact time).

Shutdown -h -r

can be used to find almost anything on macOS

Spotlight search

...(?)... is a means for developers to link software applications and leverage Windows services.

The Component Object Model (COM+, Distributed COM [DCOM], and ActiveX)

You are working on a Windows 8.1 workstation and want to view statistics for how busy the processor is and how much memory is in use. Which two of the following tools will easily allow you to do this? (Choose two.) A. CONTROL.EXE SYSTEM B. COMPMGMT.MSC C. SERVICES.MSC D. PERFMON.EXE

The Computer Management console (COMPMGMT.EXE) contains Performance Monitor, which allows you to view hardware performance statistics. PERFMON.EXE is the executable command for Performance Monitor in its own Microsoft Management Console (MMC) window. You can also use Task Manager and Resource Monitor to check CPU and memory usage statistics.

...(?)... enables you to control data connections set up on the local computer. Allows a client application to share data from a server application. For example, an Excel spreadsheet could be set up with a data connection to an SQL Server.

The Data Sources or ODBC Data Sources snap-in (from Administrative Tools)

You have a workstation that dual-boots between Windows XP and Windows 8.1. When choosing to boot Windows XP, you receive an error message saying that NTLDR is missing. Which utilities will let you repair or replace this file? (Choose two.)

The NTLDR loader file is a key component of the Windows XP boot process, and the system will not boot without it. The file can be retrieved from the Recovery Console, from SFC, or from bootable media (recovery DVD, repair disk, and so on).

...?... is used to modify various settings and files that affect the way the computer boots and loads Windows.

The System Configuration Utility (msconfig)

...(?)... allows the user to shut down applications that are not responding. An ordinary user can end an unresponsive application that they ran initially, but administrative rights are required to end processes that were not started by the user. This protects the system by ensuring malware cannot disable anti-virus software or other protections. In addition to this functionality, this can be used to monitor the PC's key resources.

The Task Manager utility (taskmgr.exe)

mac: is the equivalent to the Windows Command Prompt window.

The Terminal

is used to configure answer files. An answer file contains the information input during setup, such as product key, disk partitions, computer name, language and network settings (including whether to join a domain or workgroup), and so on. This file is accessed automatically during setup, meaning that an installer does not have to be present.

The Windows System Image Manager

Which Linux command is used to copy and convert files from one format to another?

The dd (data definition) command is used to copy files and can also be used to convert files from one format to another. It can also be used to copy blocks of data from a file and to back up the boot sector of the hard drive. The cp command will copy files but is not used for file conversion.

What is the first-fourth steps in replacing (rather than upgrading) an existing installation?

The first step in replacing an existing installation is to back up data from an existing target system. You can use a backup program supplied with the OS or a third-party backup program. The second step in replacing an existing installation is to install the new OS, overwriting the existing target and optionally reconfiguring the disk partition and file system structure, too. The third step in replacing an existing installation is to reinstall software applications and utilities. The fourth step in replacing an existing installation is to restore data from the previous system using the backup you made

A user reports that his iPhone will not decrypt email. What is the most likely cause of this problem?

There is a problem with the S/MIME certificate

You have a Windows 8.1 workstation. You want to connect to a printer located on a Windows 7 workstation. What do you need to do?

To connect to a printer over the network, you map a network printer. If the printer is on your local computer and you want others to use it, you need to share the printer. You do this by right-clicking the printer, choosing Printer Properties, and then going to the Sharing tab. Check the box to share the printer.

...?... can collect statistics about services, providing you with detailed reports about resource behavior. In essence, trace logs provide extensions to the Event Viewer, logging data that would otherwise be inaccessible.

Trace logs

You have a MacBook Pro and need to run a critical application for work that is compatible only with Windows. Is there any way you can do this?

Use Boot Camp to install windows and dual boot

Which type of malware will often cause critical files to disappear, often while displaying a taunting message, and requires user intervention (usually inadvertent) to spread from computer to computer?

Viruses

You are migrating user files and applications for a few user accounts from Windows Vista to Windows 7. Which tool does Microsoft recommend you use to make this transfer?

WIndows easy transfer (wet) If you are migrating only a few accounts, Microsoft recommends Windows Easy Transfer (WET) instead of USMT. You don't need to use either one if you chose the Upgrade option and are doing an inplace upgrade because user files and applications are preserved.

On a Windows 7 workstation, there is one volume formatted with NTFS. The Developers group has Modify access to the C:\dev directory. You copy the folder to the C:\operations folder, to which the Developers group has Read access. What level of permissions will the Developers group have to the new C:\operations\dev directory?

When a file or folder is copied on NTFS volumes, the new file or folder will inherit its permissions from its new parent folder. The old permissions will be discarded. However, when files and folders are moved, versus copying them, the original permissions are retained at the new location.

On the Internet, you get a news flash that the developer of one of your core applications found a security flaw. They will issue a patch for it in two days. Before you can install the patch, it's clear that the flaw has been exploited and someone has illegally accessed your network. What type of attack is this?

When a hole is found in a web browser or other software and attackers begin exploiting it the very day it is discovered by the developer (bypassing the one- to two-day response time that many software providers need to put out a patch once the hole has been found), it is known as a zero-day attack (or exploit).

One of your users has a MacBook Pro, and an application appears to have crashed. What can she use to force the app to close?

When an app hangs inside the Mac OS, you can use Force Quit to force it to close. Most devices, whether running Mac OS or iOS, offer similar options. You get to Force Quit by looking at the Apple menu or by pressing Command+Option+Esc, which is analogous to pressing Ctrl+Alt+Del on a PC.

ou are setting up a new wireless router for a home office. Which of the following should you change when initially configuring the network? (Choose two.) A. The router administrator's username and password B. The default SSID C. The radio power level D. The WPS setting

When configuring a new wireless router, always change the username and password first. This prevents would-be hackers from having easy access to the router. Then change the default SSID

You need to install Windows 7 onto several client computers that currently have no OS. You have created a PXE server and will perform the installation over the network. What is required to create the PXE environment?

WinPE. You can boot a PC over the network (rather than from a DVD, USB, or hard disk) with the Windows Preinstallation Environment (WinPE), which is a stub operating system that creates a Pre-boot Execution Environment (PXE).

You are configuring a secondary hard drive using Disk Management in Windows Vista. When setting up basic storage, which two types of partitions can you create? (Choose two.)

Windows supports both basic and dynamic storage. Basic storage can have a primary partition and an extended partition, while dynamic storage can be simple, spanned, or striped.

Apple option button is the equivalent to window

alt

—install a new application.

apt-get install PackageName

refresh the local database with information about the packages available from the repository.

apt-get update

—update all packages with the latest versions.

apt-get upgrade

Remember that in Microsoft's terminology, the ...(?)... is where the boot files are and the boot partition is where the ...(?)... is installed.

boot files operating system

linux: Change directory

cd

shell aka

cli (command line interface)

hiw to configure services

compmgmt>services and applications>services

how to access recovery in mac

control r

linux: copy files

cp

Apple command button is the windows equivalent

ctrl

linux: make a copy of an input file (if=) to an output file (of=) and apply optional conversions to the file data

dd

One of the designers on your network has an iMac running OS X El Capitan. Which of the following is not considered necessary with this workstation?

defragment the hard drive

check free space and report usage by directories and files.

df and du

if you have created a disk image (.DMG) as a restore point, use the ...(?)... option to restore from that file. It's also possible to restore disk images from a web link.

disk utility

You are talking to a friend about purchasing a gift, and he recommends a website to purchase it. When you put the website's address into your browser, you receive a message stating that there is an invalid certificate. What should you do?

do not visit it

A ...(?)... is a Microsoft client/server network model that groups computers together for security and to centralize administration.

domain

An answer file is an ...(?)... text file that contains all of the instructions that the Windows Setup program will need to install and configure the OS without any administrator intervention.

eXtensible Markup Language (XML)

A technician is fixing a Windows 7 workstation that has contracted a virus. He is following the best practices for malware removal and has enabled system restore and created a restore point. What is the next step he should take?

educate the end user

linux: used to create and manage partitions on a hard disk.

fdisk

The ...(?)... is the macOS equivalent of Explorer in Windows. It lets the user navigate all the files and folders on a Mac. It is always present and open in the dock.

finder

linux-check a partition for errors. Note that the partition should be unmounted before running this tool.

fsck

linux: filter files

grep

tools display the current state of the network interfaces within Linux. ...(?)... is the original tool designed for cabled Ethernet interfaces, whereas ...(?)... displays information about the wireless adapters configured within the system.

ifconfig/iwconfig

Mobile device users on your network report that the network has very slow data speeds. Which of the following are likely contributors to this problem? (Choose two.) A. Low battery life B. Signal interference C. Unintended Wi-Fi connections D. Weak signal

interference and weak signal

An ...(?)... file contains all of the contents from an optical disc in a single file.

iso

Before you install a new antivirus program, a technician recommends that you manually create a restore point. What will the restore point do?

it will create a copy of system configuration data

An administrator would like to automate some functions in a user's local brower

javascript

Each process has a system generated process ID which can be used with the ... (?) ... command to end the process.

kill

linux: list files

ls

You are at a Windows Vista command prompt. You need to create a directory named files on the D: drive. What is the proper command and syntax to do this? A. cd d:\files B. cd files d:\ C. md d:\files D. md files d:\

md d:\files

It is possible to configure macOS with multiple desktops (or spaces) using the ...(?)... feature. This enables the user to set up one or more desktops with different sets of apps, backgrounds, and so on, which is an easy way of managing tasks more effectively.

mission control

linux: used to format a partition.

mkfs

linux: used to format a swap partition. The swapon command is used to activate the partition as swap space.

mkswap

If a user needs multiple operating systems, they can be set up on the same computer in a ...(?)... environment.

multiboot

linux command is used to either move files from one directory to another or rename a file.

mv

You are working on a Linux workstation. A file named docs needs to be renamed to newdocs. What is the right command to execute this?

mv = linux ren=windows

macOS supports a similar network boot method to PXE called?

netboot

To manage updates and software in Linux, the ...(?)... needs to be configured with the web address of the software repository (or repositories) that you want to use. It can then be used to install, uninstall, or update the software.

package manager (such as yum or apt-get)

Linux command displays the Linux processes (programs) that are currently running.

ps

linux: print working directory

pwd

Using ...(?)... (called Just remove my files in Windows 10) recopies the system files and reverts most system settings to the default, but can preserve user personalization settings, data files, and apps installed via Windows Store. Desktop applications are removed.

refresh

Using the ...(?)... option (called Fully clean the drive) deletes the existing OS plus apps, settings, and data ready for the OS to be reinstalled.

reset

linux: remove files

rm

linux superuser is aka

root user

Motherboards now use a type of system firmware called Unified Extensible Firmware Interface (UEFI). In UEFI, there is an option called ...(?)...., which restricts OS installation to trusted software.

secure boot

You are working at a Windows 7 command prompt. Which of the following commands require administrative privileges to run? (Choose two.) A. chkdsk B. diskpart C. tasklist D. sfc

sfc and diskpart

cli (command line interface) aka

shell

what does command+option+esc. do in mac

starts force quit

command allows a Linux user to switch to another user account, including superuser (or root) if another user id is not specified. The command will prompt the user for the password of the account (or root) before switching to it.

su

command allows a normal user to run specified commands with superuser privilege level.

sudo

linux root user aka

superuser

In macOS, ...(?)... can be used to verify or repair a disk or file system. It can also be used to erase a disk with security options in case you are selling or passing on a Mac.

the Disk Utility app

The ...(?)... records error and log messages and helps you to diagnose problems within macOS

the consule

macOS includes a set of utilities that you can use to restore a Mac from the ...(?)... backup program, to reinstall macOS from a system image, or to reformat or repair the system disk.

time machine

User Access Control

uac

Several workstations in your office are running Windows XP Professional. You want to upgrade them to Windows Vista. To which versions of Vista can you upgrade Windows XP Professional? (Choose two.) A. Windows Vista Enterprise B. Windows Vista Home Premium C. Windows Vista Ultimate D. Windows Vista Business

ultimate and bussiness

You can sometimes use automated ...(?)... software to check whether the existing computer hardware (and software applications) will be compatible with a new version of Windows. An ...(?)... might be bundled with the setup program or available from the vendor website.

uprgrade advisor

linux text file editor derived from a UNIX original

vi or vim

A ...(?)... is a Microsoft peer-to-peer network model in which computers are grouped together with access to shared resources for organizational purposes

workgroup


Conjuntos de estudio relacionados

ABC UNIT 1 basic study of canines

View Set

Module 8 - Sleep and Dreams - Quiz #2

View Set

L4M6 Supplier Relationships all chapters revision

View Set

CCNA Security Final Exam - CCNAS v2.0

View Set

Sequence of Blood Flow Through the Heart and Body

View Set

Chapter 13: Savings, Investment, and the Financial System

View Set

Statistics Exam 2 Definitions (Ch 4, 5, 6)

View Set