CompTIA wk 2 Questions

¡Supera tus tareas y exámenes ahora con Quizwiz!

Your organization has a degausser in the basement. What media can you use it to securely destroy? Select all answers that apply. a. Backup tapes b. CDs and DVDs c. Hard drives d. SSDs

A and C are correct. BitLocker is a volume-based encryption solution, while EFS encrypts individual user files and folders on an NTFS volume.

Disabling System Restore also deletes existing restore points. True or false?

That's true. The benefit of deleting restore points is that it also deletes any malware that might have infected them, so it can't be reinstalled later.

How many primary partitions are supported by MBR? a. 2 b. 4 c. 8 d. unlimited

B is correct. MBR can support four primary partitions. GPT (GUID Partition Table) can support an almost unlimited number of partitions.

Which window would show you bindings for "Local Area Connection 2"? a. Ethernet Properties b. Local Area Connection 2 Properties c. Local Area Connection 2 Status d. Network Connections

B is correct. You could open the Local Area Connection 2 Properties window from the Status or Connections windows, too.

The size of the text and icons on your screen is set by the display's native resolution and is not adjustable. True or false?

That's false. In the main section of the Display utility, you can change the size of text and other items to make them easier to read.

You can connect to the Internet, but not to local network shares. What should you check first? a. DNS settings b. IP address settings c. Network location d. Windows Firewall

C is correct. If the network location is set to Public, Network discovery will be turned off by default.

You want to prevent unauthorized traffic from entering your network by disabling unused ports on your firewall. The best way to accomplish this is to go down the port list and close each one you aren't using. True or false?

That's false. With thousands of ports for the various types of traffic, the best way to accomplish this is to close all ports, then specifically open those you know you need.

If you determine an application error your users are receiving can be fixed by applying an application update from the manufacturer, you should go ahead and do that. True or false?

That's false. You want to make sure that you are complying with any company policies prior to applying the update.

To get help with a particular command's syntax and parameters/options, simply type the command /?. True or false?

That's true. Command /? gives you a command's syntax and parameters/options.

Which items do you need to recycle to prevent soil and water contamination if they are sent to a landfill? Choose all that apply. a. Batteries b. CRTs c. Toner cartridges

A and B are correct. Batteries include heavy metals such as lead, cadmium, zinc, lithium and mercury, which can leak causing soil and ground water pollution. CRT displays contain leaded glass, which if broken can cause soil and water contamination.

Which installation type can be used for identical operating system installations to multiple computers? a. Clean b. Image deployment c. Multiboot d. Remote network e. Unattended

B is correct. Image deployment is an easy way to deploy custom installations to a large number of computers.

Which Control Panel utility would you use to troubleshoot a printer issue in Windows 7? a. Device Manager b. Devices and Printers c. Printers d. Programs and Features

B is correct. In addition to using Devices and Printer to troubleshoot printers that aren't working correctly, you can use it to add a device or printer, verify that a device is working properly, and display configuration information.

Instead of maintaining network services in a number of different departments and locations, a large company is moving them all to a cloud model. The whole system is hosted in a new data center rented by the company but managed by an outside vendor. What deployment model best describes the situation? a. Community b. Private c. Public d. Hybrid

B is correct. It would potentially be a hybrid model if the data center also hosted public services.

What model would describe a cloud accounting service? a. IaaS b. PaaS c. SaaS d. Community

C is correct. It would be an example of software as a service.

Which tool can you use to check system logs when troubleshooting problems with the OS or software? a. Component Services b. Disk Management c. Event Viewer d. Performance Monitor

C is correct. You can use Event Viewer logs to check your computer's health or troubleshoot problems with the operating system or software.

You can't ping any other hosts, even on the local subnet. What should you check next? a. Application settings b. DNS server c. IP address settings d. MTU settings

C is correct. You could also verify lower level connectivity.

What is it called when you connect two devices through a Bluetooth connection? a. Cloud synchronization b. Jumping c. Pairing d. Synchronizing

C is correct. You create an ad-hoc network between two Bluetooth devices by pairing them.

You would like to set your user's Internet Explorer home page to your company's local intranet. Which Control Panel utility would you use to accomplish this? a. Device Manager b. Folder Options c. Internet Options d. Network and Sharing Center e. Programs and Features

C is correct. You use Internet Options to control Internet Explorer settings.

Which class of fire extinguishers is used on electrical fires? Class A Class B Class C Class D

Class C fire extinguishers are specifically designed for electrical fires.

Which Linux command would you use to show the directory you're currently in (the working directory)? a. cd b. ls c. mw d. pwd

D is correct. The pwd command is used to show the directory you're currently in (the working directory).

If you have an touchscreen that has inaccurate response to your touch, it is broken and you must replace it. True or false?

That's false. Inaccurate response in a touchscreen can also be caused by a dirty screen or by miscalibration.

When configuring laptop power options, what happens when you close the lid is the same as what happens when you press the power button. True or false?

That's false. They are separate settings. You can control what happens when you close the lids separate from what happens when you press the power button.

Dual stack operation lets you use IPv6 as long as both hosts support it, even if routers between do not. True or false?

That's false. Unless every step along the way supports IPv6, you'll need to use translation or tunneling.

Windows Firewall with Advanced Security can be seen as a more powerful interface to the same Windows Firewall application. True or false?

That's true. Windows Firewall with Advanced Security just lets you directly manipulate the underlying rules used by Windows Firewall.

You can implement a RAID array using the Windows Disk Management utility. True or false?

That's true. You can configure RAID-0 (stripped), RAID-1 (mirrored), and RAID-5 arrays using Windows Disk Management.

Complex passwords that are combinations of upper and lower case letters, numbers, and special characters protect your system from which types of attacks? Select all answers that apply. a. Brute force b. Dictionary c. Malware d. Man-in-the-middle e. Zero-day

A and B are correct. Complex passwords are one way to help protect your system against brute force and dictionary attacks.

When troubleshooting failure to boot and "missing operating system" error messages, which steps would you take? a.Verify in the BIOS/UEFI that the computer is booting to hard disk or device with a system partition. b. Boot to safe mode, if possible. Use Event Viewer to attempt to isolate the problem. Use Device Manager to investigate and repair problems with devices and drivers. c. Boot to the Windows Recovery Environment and use REGEDIT or REGEDT32 to restore the Registry from backup. If you can't use Win RE, use the command prompt. d. Use MSCONFIG to choose different types of startups to help isolate which files or services might be causing startup problems.

A and D are correct. When troubleshooting failure to boot and "missing operating system" error messages, you would verify in the BIOS/UEFI that the computer is booting to hard disk or device with a system partition and use MSCONFIG to choose different types of startups to help isolate which files or services might be causing startup problems. Booting into safe mode and booting to the Windows Recovery Environment would be used to troubleshoot a missing graphical interface.

In both Android and Apple devices, which hardware is used to determine which way the phone is being held so they can adjust the screen orientation between portrait and landscape? a. Accelerometers b. Built-in calibration c. Geotracking d. GPS positioning e. Gyroscopes

A and E are correct. Both Android and Apple devices use accelerometers and gyroscopes to determine which way the phone is being held so they can adjust the screen orientation between portrait and landscape.

What issues might you try to fix by adjusting your router's QoS settings? Choose all that apply. a. A critical server keeps experiencing high network latency b. Large file downloads are frequently corrupted c. Network connections frequently drop d. Some Internet websites are frequently slow e. Voice over IP calls are choppy during busy network times

A and E are correct. QoS features are used to prioritize some traffic over others to decrease latency for time-sensitive data.

Which Windows features were not included in Windows Vista? a. Action Center b. Computer Management c. Event Viewer d. Shadow Copy e. System Restore f. Windows PowerShell

A and F are correct. Windows Vista included Computer Management, Event Viewer, Shadow Copy, and System Restore, but not Action Center and Windows PowerShell.

You work about 50% of the time at client sites and the other 50% of the time at your company's offices. Which configuration would be most beneficial? a. Laptop with docking station b. Laptop with cable lock c. Smartphone with headset d .Tablet with credit card reader d. Tablet with wireless keyboard

A is correct. A laptop with docking station would allow you to work more comfortably in an office environment with full size input and output devices, and wired network connection, then quickly disconnect to travel with just the laptop.

Which safety device is used to protect sensitive components from electrostatic discharge during transport and storage? a. Antistatic bags b.ESD straps c. ESD mats d. Self-grounding

A is correct. Antistatic bags are used to transport and store sensitive computer components. ESD straps, ESD mats, and self-grounding are electrostatic protection methods that you use during repair.

A user complains that every time they open their Internet browser, it no longer goes to their preferred home page and advertisements pop up in dialog boxes that they have to close. What is the likely cause? a. Spyware b. Trojan c. Virus d. Worm

A is correct. Spyware is most often used to monitor a user's Internet activity, with a common form being adware, which displays unwanted pop-up advertisements in Internet browsers.

Which command can you use to repair your Windows installation? a. bootrec b. chkdsk c. gpupdate d. sfc

A is correct. The bootrec command can troubleshoot and repair the master boot record (MBR), the boot sector, and boot configuration data.

Which is a common method used to specify the resources a user is allowed to access? a. Access control lists b. Principle of least privilege c. Share permissions d. User groups

A is correct. The most common method of authorization is through access control lists (ACLs).

Which Windows encryption tool can protect the entire system volume? a. BitLocker b. Encrypting File System c. Both d. Neither

A is correct. To erase a drive securely you'll need to perform a low level format or use a drive wipe utility. Either overwrites all data on the drive.

As a user, what can you do to protect yourself from man-in-the-middle attacks? a. Avoid connecting to open Wi-Fi routers. b. Avoid following links in emails when possible. c. Enable Firewall protection. d. Install only the application software you need. e. Use complex passwords that are combinations of upper and lower case letters, numbers, and special characters.

A is correct. To protect your systems against MiTM attacks, on the user side, avoid connecting to open Wi-Fi routers.

Which connection method would you use to connect your smartphone to your auto's communication and speaker system? a. Bluetooth b. Cellular c. GPS d. Infrared e. Wi-Fi

A is correct. You connect your smartphone to your auto's communication and speaker system using a Bluetooth connection.

What mobile operating system includes pattern lock in a default installation? a. Android b. iOS c. Windows Phone d. All three

A is correct. iOS only supports passcodes and fingerprints.

Which router configuration actions would you take to heighten security? Select all answers that apply. a. Change the default user name and password b. Close unnecessary ports and services c. Configure QoS d. Disable remote administration e. Enable UPnP

A, B, and D are correct. You might want to enable UPnP or configure QoS for compatibility or performance reasons, but not for network security.

What can you manage with the net command? Choose all correct answers. a. Network print jobs b. Network security settings c. Network shares d. Windows services e. Wireless network connections

A, C, and D are correct. To control security settings or network connections you'll need to use different tools.

What password policies can you enforce from the Local Security Policy Console? Select all answers that apply. a. Account lockout settings b. BIOS/UEFI password c. Minimum password length d. Password complexity e. Screen saver password protection

A, C, and D are correct. You need to set BIOS/UEFI passwords in BIOS/UEFI setup, and you can set screen saver password protection in Windows screen saver settings.

Which of the following items should be considered as part of a comprehensive safety plan? Select all answers that apply. a. Injury incident reporting system. b. Personal safety. c. Regulation compliance. d. Safe component handling and storage. e. Toxic waste disposal.

All of the answers are correct. All the items listed should be considered as part of a comprehensive safety plan.

Which network tools are found in Windows but not typically in Unix-like operating systems? Select all answers that apply. a. ifconfig b. ipconfig c. nbtstat d. ping e. traceroute

B and C are correct. ifconfig is not found in Windows, and traceroute is called tracert in Windows.

Which of the following are appropriate addresses for a customer? Select all answers that apply. a. Buddy b. Dr. Smith c. Jimmy d Ms. Jenkins

B and D are correct. As a professional, you should address people appropriately, avoiding first names if possible and using professional titles when applicable.

Which are characteristics of EFS? a. Encrypts entire drives, including removable drives. b. Encrypts files based on user account, which provides security for an individual's files on a multiuser computer. c. Requires administrative-level privileges to turn encryption on and off. d. Doesn't require any special hardware.

B and D are correct. BitLocker encrypts entire drives, while EFS encrypts individual files on a per user basis. BitLocker requires a compatible TPM, while EFS requires no special hardware to function.

What are important security steps on all mobile devices? Select all answers that apply. a. Configuring antivirus software b. Configuring remote backup features c. Installing a firewall app d. Regularly applying operating system updates e. Using biometric authentication

B and D are correct. While updates and backup are always good ideas, biometric authentication isn't always the best option, and antivirus and firewall apps aren't even available for all devices.

Which of the following describes a long-term drop in voltage, typically lasting longer than just a few minutes? a. Blackout b. Brownout c. Power surge d. Surge suppression

B is correct. A brownout is a long-term drop in voltage, typically lasting longer than just a few minutes.

You want to increase security on your WAP. Which change should you make? a. Disable WPA b. Disable WPS c. Enable SSID d. Enable TKIP

B is correct. For a secure network you want to use WPA/WPA2 encryption with AES rather than TKIP, and disabling SSID can make your network less conspicuous.

What troubleshooting step can resolve many issues, such as slow performance, a "stuck" application, or a non-functioning feature? a. Complete a hard reset b. Complete a soft reset c. Uninstall or reinstall apps d. Verify the feature is enabled e. Verify that both the wireless service is enabled and that you are connected

B is correct. Many issues, such as slow performance, a "stuck" application, or a non-functioning feature, can be resolved by powering the device down and then restarting. This closes all running applications and clears the cache.

What type of software can you modify and redistribute freely? a. Commercial license software b. Open source software c. Any software d. No software

B is correct. Open source software is freely available to all who want to acquire it and can often be modified and redistributed.

Your network has a dozen computers, all sharing a single public IP address. One of them is an FTP server. What kind of rule will you need to configure to allow FTP users to connect from the internet? a. Port Address Translation b. Port Forwarding c. Port Triggering d. Universal Plug and Play

B is correct. PAT is why you need port forwarding, while port triggering and UPnP are designed for internal clients making outward connections.

A user logs into their computer and is presented with screen showing a Department of Justice logo indicating the computer has been locked due to the operating system being in violation of federal law. The screen gives several details of the violation and indicates that the user must pay a fine of $500 within 72 hours or a warrant will be issued for their arrest. The user cannot unlock their system. What type of malware is likely infecting the computer? a. Keylogger b. Ransomware c. Rootkit d. Trojan e. Worm

B is correct. Ransomware would lock the system and display messages demanding payment in exchange for unlocking the system.

Your coworker has splashed isopropyl alcohol he is using to clean a computer in his eye. Which section of the isopropyl alcohol SDS would you want to refer to immediately? a. Section 2: Hazard(s) Identification b. Section 4: First-Aid Measures c. Section 8: Exposure Controls d. Section 11: Toxicological Information

B is correct. Section 4: First-Aid Measures identifies the initial care that should be given by untrained individuals to an employee who has been exposed to the chemical.

Which of the following governs software ownership rights and what the purchaser (the end user) may do with what he or she has purchased? DRM EULA

B is correct. The EULA governs software ownership rights and what the purchaser (the end user) may do with what he or she has purchased.

How much memory can the 32-bit versions of Windows address? a. 2 GB b. 4 GB c. 16 GB d. 32 GB

B is correct. The Windows 32-bit operating systems are able to address up to 4 GB of memory.

You're installing a CPU and CPU fan when you accidently drop the thermal grease container and get some on the floor. What should you do? a. Call 911. b. Refer to the SDS for the thermal grease on proper clean-up methods. c. Report the incident to your immediate supervisor. d. Wipe it up immediately with a water dampened cloth.

B is correct. When you have an accident release of any chemical substance, you should refer to the SDS for proper clean-up instructions.

You have a folder called Accounting with a dozen subfolders. You have broken permissions inheritance so that you can apply custom access restrictions to each of the subfolders. You just created a new group and need to allow them Modify permissions to the Accounting folder and all subfolders. How would you make the change on the Accounting folder and have it applied to the subfolders? a. Make the change to the Accounting folder, re-enable inheritance on the Accounting folder, and then apply the settings from the parent folder to the child folders. b. Make the change to the Accounting folder, then propagate that change from the parent folder to the child folders. c. It is not possible to make the change at the parent Accounting folder and have it automatically apply down to the subfolders. You must make the change at each folder individually.

B is correct. Where permissions inheritance has been broken, you can make a change to the permissions of a parent folder, and then apply that change to all sub-folders using the Advanced Security Settings propagation feature.

What kind of policy governs a user-owned device on the corporate network? a. Acceptable Use b. BYOD c .MDM d. Offboarding

B is correct. While a bring your own device policy might be enforced by MDM software and include acceptable use and offboarding provisions, it's the overall policy governing use of such devices.

On scanning a system, you've recognized a spyware program that inserted a malicious service into Windows startup. Apart from a malware scanner, what tool could disable the program? a.Event Viewer b. MSCONFIG c. Recovery Console d. WinPE

B is correct. You can disable services on the Services tab.

Which Windows encryption feature can you use to encrypt files on your USB drive? a. BitLocker b. BitLocker-To-Go c. EFS

B is correct. You can use BitLocker-To-Go to encrypt files on removable data drives, such as external hard drives and USB flash drives.

On your laptop, you can see a couple of hotspots, but not the one you want to connect to. What can you try to fix it? Select all answers that apply. a. Double-check the encryption standard being used. b. Make sure the adapter is turned on. c. Move the laptop closer to the WAP. d. Set the network to connect without SSID broadcast.

C and D are correct. You know the adapter is on since you can see other networks, but the WAP you want is either too far away or isn't broadcasting its SSID.

Your crowded building hosts a number of nearby Wi-Fi hotspots. The nearest neighbor is on an adjacent channel to your own. Is that a problem? a. Yes b. No c. Only if it's in the 2.4GHz band d. Only if it's in the 5GHz band

C is correct. On 2.4GHz networks you should use channels 1, 6, 11, or 14.

You need to make sure an adapter is configured to use the network's QoS settings. Which advanced Ethernet property should you check? a. Duplexing b. MTU c. Priority d. WoL

C is correct. QoS settings might be listed under a Priority property, depending on the driver.

Which protocol lets you log securely into a command line terminal interface? a. FTP b. LDAP c. SSH d. Telnet

C is correct. SSH was designed to securely replace both Telnet and FTP.

What protocol would you use to connect to a shared drive on another Windows system? Choose the best answer. a. AFP b. FTP c. SMB d. SNMP

C is correct. Server Message Block is the default file sharing protocol used by Microsoft networks.

What feature can help keep unauthorized clients from connecting to the network? a. Content filtering b. DHCP server c. MAC filtering d. Port forwarding

C is correct. Since MAC addresses can be spoofed, it's not a very strong security measure in itself.

Which Windows Firewall option is useful when you're troubleshooting network connectivity to determine if a change you made is affecting connectivity? a. Allow a program or feature through Windows Firewall b. Change notification settings c. Restore defaults d. Turn Windows Firewall on or off

C is correct. The Restore Defaults setting is helpful when you're troubleshooting network connectivity and you want to start over with the original settings to determine if a change you made is affecting connectivity.

The Windows Store was introduced with which product line? a. Windows Vista b. Windows 7 c. Windows 8 d. Windows 8.1

C is correct. The Windows Store was first introduced with the Windows 8 product line and is included with Windows 8.1.

A frozen operating system on a mobile device can be cause by which? a. Excessive processor use b. Improper ventilation c. Lack of sufficient storage d. Low battery e. Security response to failed logon attempts f. Too many apps running at one time

C, D, and F are correct. A frozen system can be caused by a lack of sufficient storage, too many apps running at one time, or low battery.

Which input devices are typically used for computer gaming? Select all answers that apply. a. Barcode reader b. Biometric device c. Digitizer d. Game pad e. Joy stick f. MIDI device

D and E are correct. The game pad and joy stick are typically used for gaming applications.

You require your users to log on using a username, password, and rolling 6-digit code sent to a keyfob device. They are then allowed computer, network, and email access. What type of authentication have you implemented? Select all answers that apply. a. Access control lists b. Basic single-factor authentication c. Principle of least privilege d. Single sign-on e. Multi-factor authentication

D and E are correct. You have implemented single sign-on where the operating system log on passes the user credentials off to network and email servers, and multi-factor authentication with two knowledge factors (username and password) and a possession factor (rolling 6-digit code off the security keyfob.)

What kind of network connection could you use to connect to your workplace LAN through your existing home Internet connection? a. Dial-up b. PPPoE c. VLAN d. VPN

D is correct. Dialup and PPPoE are separate network connection types, and VLANs are used inside of Ethernet LANs.

Humidity above which percentage can cause condensation, potentially destroying electronic equipment? a. 10-20% b. 20-25% c 25-45% d. 50-60%

D is correct. Humidity above 50% to 60% can cause condensation, which can destroy electronic equipment. Lower humidity levels breed static electricity, which can fry delicate computer components.

Which protocol can you use to remotely manage a network switch? a. CIFS b. RDP c. SMTP d. SNMP

D is correct. Simple Network Management Protocol is designed to monitor and manage network devices.

Which disk management command would you use to check your hard disk for corrupt files and repair them? a. bootrec b. diskpart c. chkdsk d. sfc

D is correct. The sfc command runs the System File Checker, which checks your hard disk for corrupt files and repairs them.

What was the first version of Windows to include real-time antivirus scanning? a, Windows XP Service Pack 2 b. Windows Vista c. Windows 7 d. Windows 8 e. Windows 8.1

D is correct. Windows Defender was first included with Windows Vista as an anti-spyware application, but wasn't a real antivirus scanner until Windows 8.

you want to copy a subfolder and its contents from one location to another with a single command, which file management command would you use? a. COPY b. MD c. MOVE d. XCOPY

D is correct. You can use XCOPY to copy files, directories, and subdirectories from one location to another.

If you have an application that is not responding and you want to force it to shut down, which system utility can you use? a. Disk Management b. MSCONFIG c. Services d. Task Manager

D is correct. You can use the Applications tab of Task Manager to stop, start, and switch between applications.

Which system utility would you use to repair the computer if it continues to improperly shutdown after a reboot? a. Device Manager b. REGEDIT c. REGSRV32 d. System File Checker

D is correct. You would use System File Checker to verify the integrity of system files.

Personally identifiable information includes which of the following? a. Address b. Name c. Names of co-workers d. Phone number e. All of the above

E is correct. Personally identifiable information includes names and addresses, phone numbers, names of family members or co-workers, and any information that a customer would deem private.

Even if you use other web browsers, you might only need to configure proxy settings for Internet Explorer. True or false?

Even if you use other web browsers, you might only need to configure proxy settings for Internet Explorer. True or false?

Windows Vista, Windows 7, Windows 8, and Windows 8.1 all include the security features Windows Defender, Windows Firewall, and Windows Security Center. True or false?

That's false. All four versions include Windows Defender and Windows Firewall, but only Windows Vista includes Security Center.

By default AutoPlay and AutoRun only run media files, not executables, and so aren't a real security risk. True or false?

That's false. AutoRun could easily be tricked into running malicious executables, and while AutoPlay is better protected it can still be a vulnerability.

Desktop synchronization will synchronize items from multiple locations and devices, including from both the device and the desktop. True or false?

That's false. Desktop synchronization will synchronize items between the device and a desktop computer. Centralized cloud storage can allow synchronization from multiple locations and devices, including from both the device and the desktop.

Linux is an operating system that runs on only desktop and laptop computers. True or false?

That's false. Linux can be run on personal computers, servers, tablets, and smartphones.

Both iOS and Android enable data encryption on most devices by default. True or false?

That's false. Modern iOS devices enable encryption by default, but on Android you usually need to enable it yourself. Remember that data encryption is only effective if you securely lock your device.

A full Windows format of a hard drive will securely remove sensitive files. True or false?

That's false. To erase a drive securely you'll need to perform a low level format or use a drive wipe utility. Either overwrites all data on the drive.

To clean accumulated debris from around and inside equipment, such as computer cases, you must use a special vacuum meant specifically for electronics. True or false?

That's false. You can use a special vacuum or compressed air to loosen and remove unwanted debris from around and inside equipment.

B is correct. The EULA governs software ownership rights and what the purchaser (the end user) may do with what he or she has purchased.

That's true. Criminal investigations rely on a chain of custody to ensure that any evidence presented in a criminal matter has been collected properly, tracked, and protected from interference or tampering.

Even if your router uses DHCP, it might be able to make sure a given client always receives the same IP address. True or false?

That's true. DHCP itself won't guarantee a different client gets the same address, but some routers allow DHCP reservations that identify clients by their MAC addresses.

Both iOS and Android include a built-in feature to find and secure a lost device. True or false?

That's true. For all features to work, Android Device Manager and Find my iPhone both still require you to ensure your device is connected to the network and allows location tracking.

Defense in depth is a good idea for any network, but not all layers are equally important on every network. True or false?

That's true. For example, a small network might not really be separated into internal and perimeter networks.

In general, you should leave the Guest account in Windows disabled. True or false?

That's true. If you do enable the Guest account, you should make sure it's secured.

It's generally a good idea to run scans using multiple separate antimalware applications. True or false?

That's true. It's best to run one scan then the next, rather than performing two at one time.

When quarantining a system you should consider disconnecting from the network entirely. True or false?

That's true. You might still need to stay on the network to download definition updates or repair tools, but disconnecting entirely is the surest way of not infecting other systems.

Order the steps of the malware removal process in Windows. a. Disable System Restore b. Educate the end user d. Enable System Restore d. Identify symptoms e. Quarantine the system f. Repair the system g. Update the system

The correct order is identify symptoms, quarantine the system, disable system restore, repair the system, update the system, enable system restore, and then educate the end user. The repair step might be the important part of the work, but the steps before and after are vital to minimizing reinfection.

The Windows user interface feature "Aero" was included in which Windows product lines? Select all answers that apply. a. Windows Vista b. Windows 7 c. Windows 8 d. Windows 8.1

A and B are correct. The Windows 8 and Windows 8.1 product lines switched to the Metro UI.

You have a computer with Windows 7 on it. You need to upgrade it to Windows 8.1 and deploy it to a new employee. Which is the best upgrade type for this situation? a. Clean installation b. In-place upgrade

A is correct. In-place upgrades from Windows 7 to Windows 8.1 aren't supported. You also do not need to retain any user settings, so a clean installation is the best choice.

What protocol is used to find the MAC address of a given IP address? a. ARP b. DHCP c. APIPA d. DNS

A is correct. It stands for Address Resolution protocol.

Which of the following boot methods can be used to install Mac OS from a network location? a. Netboot b. Netexe c. PXE d. USB device

A is correct. Netboot can be used to boot the computer to the network to begin an installation of the Mac OS. Netboot is the Apple equivalent of PXE.

Which file system is used on Linux? a. ext4 b. exFAT c. FAT32 d. NTFS e. UDF

A is correct. ext3 and ext4 (Third extended file system, and Fourth extended file system) are used on Linux computers.

You make and sell crafts at local art festivals. Which mobile device accessory would be appropriate? a. Cable lock b. Credit card reader c. Docking station d. Headset e. Power pack f. Wireless keyboard

B is correct. A credit card reader would allow you to process debit and credit card.

Which set of Windows Firewall rules is generally least permissive? a. Incoming connections on private networks b. Incoming connections on public networks c. Outgoing connections on private networks d. Outgoing connections on public networks

B is correct. By default, on a public network Windows Firewall only lets in unsolicited packets if they're from essential network services.

Which IPv4 address might be valid on the Internet? a. 127.0.0.1 b 150.50.101.32 c. 169.254.121.68 d. 192.168.52.52

B is correct. The others are a loopback address, an APIPA address, and a private address. None can be reached from the Internet.

Which of the following Windows editions can receive incoming Remote Desktop connections? Select all answers that apply. a. Windows 7 Home Basic b. Windows 7 Home Premium c. Windows 7 Professional d. Windows 8.1 e. Windows Vista Business

C and E are correct. Any Windows edition can connect to a remote system, but only Business, Professional, Enterprise, and Ultimate editions can receive incoming Remote Desktop connections.

In which Macintosh OS 10 version was AirDrop file sharing introduced? a. 10.0 Cheetah b. 10.5 Leopard c. 10.7 Lion d. 10.11 El Capitan

C is correct. AirDrop file sharing, emoji support, and Recovery Partition were all introduced with version 10.7 Lion.

A user has complained that whenever she presses the space key on her keyboard, she gets a bunch of spaces not just one. Which keyboard setting do you adjust for her? a. Cursor blink rate b. Repeat rate c. Repeat delay

C is correct. By moving the repeat delay slider towards Long, you increase the amount of time she can hold down the space key without triggering the keyboard repeat feature.

Which Windows utility do you use to access system tools such as Event Viewer and Device Manager? a. Component Services b. Disk Management c. Computer Management d. Windows Services

C is correct. Computer Management is a tool that you can use to manage a Windows operating system and the computer on which it is running, accessing tools such as Event Viewer and Device Manager.

In which troubleshooting step are manufacturer Web sites and technical support forums helpful? a. Identifying the problem. b. Establishing a theory of probably cause. c. Testing the theory to determine cause. d. Establishing a plan of action to resolve the problem and implement the solution. e. Verifying full system functionality. f. Documenting findings, actions, and outcomes.

C is correct. Establishing a theory of probable cause involves using your knowledge of common symptoms for various problems and conducting research based on the symptoms. Good places to look for information on troubleshooting issues include manufacturer Web sites, technical support forums, and online technical articles and reviews.

Which Mac OS feature stores and manages passwords for applications, web sites, and network shares? a. Finder b. iCloud c. Keychain d. Mission Control

C is correct. Keychain stores and manages passwords for applications, web sites, and network shares. In addition to passwords, Keychain stores private keys and certificates.

Master Boot Record Partitions can't support hard disks that are larger than what size? a. 2 MB b. 2 GB c. 2 TB d. 2 PB

C is correct. MBR partitions can't handle hard disks that are larger than 2 TB in size.

Which system utility can you use to troubleshoot a computer that's slow to start by enabling or disabling startup programs? a. Disk Management b. DXDIAG c. MSCONFIG d. SERVICES.MSC

C is correct. MSCONFIG, also known as the System Configuration utility, is used to modify and troubleshoot system startup processes and services.

You share a folder on your computer and assign the following permissions: Share permission Change to the Everyone group. NTFS permission Read to the Accounting user group. NTFS permission Full Control to Tamara, who is a member of the Accounting group. What are Tamara's effective permissions when connecting to the shared folder? a. Read b. Read & Execute c. Change d. Full Control

C is correct. The most restrictive effective permissions apply. Her effective NTFS permission is Full Control and her effective Share permission is Change. The most restrictive is the Share permission, therefore when Tamara accesses the folder through the share, she has Change permissions.

What will any link-local IPv6 address begin with? Choose the best answer. a. 0000: b. 2000: c. fe80: d. ff0e:

C is correct. The others are loopback, global, or multicast addresses.

With which Windows product line did Microsoft cut back the number of audience-targeted versions from five to three? a. Windows Vista b. Windows 7 c. Windows 8 d. Windows 8.1 e. Windows 10

C is correct. Windows 7 had five versions: Starter, Home Premium, Professional, Ultimate, and Enterprise. Windows 8 had three versions: plain Windows 8, Pro, and Enterprise.

Which sharing model is designed to let independent users share individual folders and printers? Choose the best reply. a. Domain b. Homegroup c. Private d. Workgroup

D is correct. Domains are for centralized client-server networks, and homegroups are designed for simple sharing of whole libraries or all printers.

Which of the following describes a network scenario where a secure connection to your internal network is made over an insecure external network? a. Data loss prevention (DLP) b. Digital security c. Hardware firewall d. Virtual private network (VPN)

D is correct. A Virtual Private Network (VPN) describes a network scenario where a secure connection to your internal network is made over an insecure external network, allowing your users to connect to internal network resources from a variety of locations without worry about their data being intercepted as it travels over insecure networks.

Network Discovery is typically off for private networks, and on for public networks. True or false?

That's false. Network discovery is used to browse private networks, and is disabled on public networks.

You should always disable the administrative shares on your computer to improve security. True or false?

That's false. Some programs use the administrative shares, so disabling them can cause these programs to fail or generate error messages.

If you're running a VM that's isolated from the network, you shouldn't have to worry about malware infections spreading to or from it. True or false?

That's false. While the risk is lower, some malware is designed to jump between VMs.

Windows Update provides you with updates to the operating system and security patches, but it will not alert you to updates to Microsoft applications such as Office. True or false?

That's false. Windows Update provides notification of updates for general update, security updates, application updates, and available service packs.

There is no way to upgrade from Windows 7 to Windows 8.1 and preserve the existing user files, such as documents and photos, and most (if not all) of the current system settings, including applications, networking settings, hard disk configuration, and device settings. True or false?

That's false. You can do an intermediate in-place upgrade from Windows 7 to Windows 8, then complete another in-place upgrade from Windows 8 to Windows 8.1 to preserve the existing user files, such as documents and photos, and most (if not all) of the current system settings, including applications, networking settings, hard disk configuration, and device settings.

You have a user who has a touchpad on their laptop. They complain that when they double-tap on the touchpad, it moves the cursor but doesn't select or open an item like it should. You can fix this by slowing down the double-click speed. True or false?

That's true. By slowing down the double-click speed, you increase the amount of time given to the user between their taps for the computer to still register it as a double-click instead of two individual clicks.

Cloud services are often easier to join or expand than they are to leave. True or false?

That's true. Cloud vendors have ä strong incentive to make their services easy to set up, but less to make it easy to switch to another.

GRUB is the boot loader in newer Linux systems. True or false?

That's true. GRUB is the boot loader in newer Linux systems, while LILO is the older.

HTTPS adds security to HTTP and uses a different port, but otherwise is fundamentally the same. True or false?

That's true. HTTPS uses port 443 and SSL or TLS security, but is otherwise unchanged.

All else being equal, bare metal hypervisors are more efficient than hosted ones. True or false?

That's true. Hosted hypervisors are easier to set up, but they have a host operating system consuming resources and can't control the hardware as directly.

You can't access BIOS/UEFI using a wireless keyboard. True or false?

That's true. If you need access to a keyboard to access BIOS/UEFI, you must use a wired keyboard.

For a local server, you might not need the full domain name to perform a DNS lookup. True or false?

That's true. If you're querying a local DNS server you might just be able to use the host name rather than the FQDN.

All Windows product lines from Windows Vista through Windows 10 come in versions to run on both 32-bit and 64-bit architectures. True or false?

That's true. Microsoft has released Windows for both 32-bit and 64-bit processors.

S/MIME must be supported by the mobile email client if users need to view and send encrypted email messages. True or false?

That's true. S/MIME enables users to send and receive S/MIME email messages from wireless email clients. Without S/MIME, users are unable to read encrypted email and can't send encrypted email themselves.

The entire hard drive of a VM is typically a file on the host system which you can copy and back up like any other. True or false?

That's true. This helps make VMs easier to maintain.

Airplane mode suspends communications between your mobile device and a cellular network, but allows you to use any applications that don't require an Internet connection. True or false?

That's true. To suspend communications between your device and a cellular network, use your device's networking settings to enter airplane mode, which will leave your device with complete functionality for any apps that don't require an Internet connection.


Conjuntos de estudio relacionados

Medical Terminology: Mod 12 Exam 2

View Set

Chapter 3 - social and mobile marketing

View Set

Drug and Alcohol Training - Employee

View Set

NUR 130 Final: Infection & Inflammation

View Set

Introduction to the Nursing Process

View Set