Final 1102 A+ Review

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the answers listed below refers to a common solution for troubleshooting slow profile load on a Windows domain?

Rebuilding Windows profiles

A Microsoft Windows utility that can be used for freeing up disk space is known as:

cleanmgr.exe

Which of the statements listed below apply to the definition of a computer virus?

-A self-replicating computer program containing malicious segment -Malware that requires its host application to be run to make the virus active -Malicious code that attaches itself to an application program or other executable component

Which of the answers listed below refer(s) to MSRA?

-Access based on one-time password -Temporal remote access -The host and invited user can both see the host's screen -The host and invited user share control over host's mouse and keyboard -Windows tool used for assisted remote troubleshooting

The basic, recommended steps to solve or prevent low memory issues in MS Windows include:

-Adding more RAM -Closing resource-intensive apps/processes -Increasing virtual memory size

Which of the following statements describing share permissions in MS Windows are true?

-Apply only to network users -Can be set on a folder level

The Devices and Printers Control Panel applet (control.exe printer) in Windows 10:

-Allows to add/remove wired and wireless devices -Provides a simplified view of all connected devices -Allows to troubleshoot a device that isn't working properly

Which of the following locations in macOS provide access to multi-touch interface settings (a.k.a. Gestures)?

-Apple menu > System Preferences... > Mouse -Apple menu > System Preferences... > Trackpad

Which of the following steps provide access to Windows Reliability Monitor (perfmon /rel)?

-Control Panel (category view) > System and Security > Security and Maintenance > Maintenance > View reliability history -Control Panel (icon view) > Security and Maintenance > Maintenance > View reliability history

Which of the answers listed below refer to probable causes of the "NTLDR is missing" error message displayed during system boot?

-Corrupt NTLDR file -Attempt to boot from a non-bootable drive

Which of the answers listed below describe(s) (the) possible cause(s) of the "Missing operating system" error message displayed during Windows system boot?

-Damaged storage drive -BIOS does not detect the storage drive -System partition not set as active -Corrupt Master Boot Record (MBR)

Which of the following solutions would be of help in troubleshooting the "NTLDR is missing" error message displayed during system boot?

-Disconnecting any external drives -Safe Mode troubleshooting -Adjusting the boot sequence in CMOS setup utility -Startup Repair utility

The advantages of on-site backups over off-site backups include:

-Greater control over backup media & backup process -Lack of ongoing subscription fees -Faster data access

Which of the following answers refer to the advantages of off-site backups in comparison to on-site backups?

-Improved security -Geo redundancy -Scalability

Which of the answers listed below can be used to describe the 3-2-1 backup strategy?

-Keep at least 1 backup copy offsite -Create 1 primary backup file -Save backups to 2 different storage media types -Create 2 copies of the primary backup file

Which of the statements listed below are true?

-NTFS permissions can be applied to a folder or individual file -NTFS permissions apply to both network and local users

Which of the following answers describe the features of RDP?

-Permanent remote access -Access based on local password (local user account password) -Windows tool used for connecting remotely to the user's own computer

The share permissions on a shared Windows folder grant the user Read access and the local NTFS permissions grant the user Modify access. Which of the following are the effective user permission levels?

-Read when accessing the share remotely -Modify when accessing the folder locally

The share permissions on a shared Windows folder grant the user Full Control access and the local NTFS permissions grant the user Read access. Which of the following are the effective user permission levels?

-Read when accessing the share remotely -Read when accessing the folder locally

Which VPN type is used for connecting computers to a network?

-Remote access -Client-to-site

Which of the following actions in Windows allow to invoke the user access control prompt and run an application with administrator account permissions?

-Right-click on an application icon > select Run as administrator from the pop-up menu -In Windows Start menu press and hold Control + Shift keys > left-click on an application icon -Launch Windows Run dialog box (Windows logo key + R) > type in the application's name > press Control + Shift + Enter

Which sequence of steps in Windows 10 provides access to the AutoPlay settings menu?

-Settings > Devices > AutoPlay -Windows Control Panel (icon view) > AutoPlay -Windows Control Panel (category view) > Hardware and Sound > AutoPlay

Which of the following could be of help while troubleshooting a system that attempts to boot to incorrect device?

-Updating boot order in BIOS -Disconnecting any removable drives

In Windows 10, the contents of the System applet have been moved to a new location and can be displayed in the following ways:

-Windows Control Panel (icons view) > System -Windows Start > Settings > System > About menu -Windows Control Panel (category view) > System and Security > System

In Windows, the power configuration settings can be found in:

-Windows Start > Settings > System > Power & sleep > Additional power settings -Windows Control Panel (category view) > Hardware and Sound > Power Options -Windows Control Panel (icon view) > Power Options

Which of the following encryption schemes is used in WiFi Protected Access 2 (WPA2)?

AES-CCMP

A sticky note with a password kept on sight in user's cubicle would be a violation of which of the following policies?

Clean desk policy

Premium versions of the Microsoft OS contain a built-in component that enables encryption of individual files. This feature is called:

EFS

What is the correct hierarchy of precedence for permissions settings in NTFS?

Explicit Deny > Explicit Allow > Inherited Deny > Inherited Allow

The 4 GB maximum file size limit and 2 TB maximum volume size limit are the characteristic features of:

FAT32

If personal files, such as email, documents, or photos are lost or deleted, Windows System Restore can be used to recover such files.

False

In NTFS, a folder or file copied from one location to another on the same volume retains its original permissions.

False

In NTFS, a folder or file moved from one location to another on the same volume inherits the permissions of its new parent folder.

False

In NTFS, permissions inherited from a parent object (e.g., a folder or user group) take precedence over permissions applied directly to an object (explicit permissions).

False

In a differential backup strategy, restoring data from backup requires a working copy of the last full backup and the most recent copy of the incremental backup.

False

Installing web browser extensions and plug-ins from trusted sources (e.g., Microsoft Store for Microsoft Edge, or Google Play for Google Chrome) instead of third-party sites decreases malware-related security risks.

False

The "View by Category" option in Microsoft Windows Control Panel allows for displaying entire contents of the Control Panel in a single window enabling quick access to each Control Panel applet.

False

Which of the following answers refers to a unique string of characters used to identify hardware, software, and data?

GUID

Which tab of the System Configuration utility in MS Windows allows to prevent all nonessential applications, services, and device drivers from loading during system startup?

General

A company utilizes a backup rotation scheme where backups performed daily during a week are used to create a weekly backup and backups created at the end of each week are used to create a monthly backup. Which of the answers listed below refers to the used backup rotation scheme?

Grandfather-Father-Son

Which formatting type(s) would typically be performed by a user intending to reinstall an OS?

High-level format, Standard format, Quick format

Examples of protocols used for implementing secure VPN tunnels include:

IPsec, TLS

Assigning a unique encrypted key, called a ticket, to each user that logs on to the network is a characteristic feature of:

Kerberos

Which of the following authentication protocols can be used to enable SSO in Windows-based network environments?

Kerberos

Which of the following is an example of spyware?

Keylogger

he /r switch of the chkdsk command-line utility in Windows:

Locates bad sectors and recovers readable information Fixes errors on the disk

Disabling SSID broadcast:

Makes a WLAN harder to discover

Which of the following password policy settings prevents attackers using cracked passwords from gaining permanent access to a Windows workstation?

Maximum password age setting

Which of the answers listed below refers to an SSO account type?

Microsoft account

Which password policy setting prevents users from repeatedly changing their passwords to bypass the password history policy setting and get back to their original/preferred password?

Minimum password age setting

Which of the following answers refers to an example of content filtering configuration setting on a SOHO router?

Parental controls

An account policy setting that forces users to produce a new password every time they are required to change their old password is known as:

Password history

Which user group in Windows (applies to Windows 7 and earlier versions) had rights and permissions that allowed its members to perform specific administrator-level tasks?

Power Users

A Windows Internet Properties applet tab containing an option for managing pop-up windows displayed by websites is called:

Privacy

Which tab of the Windows Internet Properties applet provides access to advanced cookie management options?

Privacy

Which Task Manager tab in Windows 10 provides real-time information about system resources used by running applications and background processes?

Processes

Which of the Windows Internet Properties applet tabs contains an option for managing web browser extensions?

Programs

Which of the following enables remote control over network devices?

RMM

Which of the macOS features enables access to optical drive of another computer over a network?

Remote Disc

Which of the system recovery options in Windows 10 provides an option to keep or remove personal files before reinstalling Windows?

Reset

Which of the answers listed below refers to a secure replacement for Telnet?

SSH

The System Configuration utility tab containing a list of background applications that can be enabled/disabled during Windows system startup is called:

Services

Which tab of the Windows' 10 Task Manager provides an interface for managing background processes?

Services

In Microsoft Windows 10, screen lock settings can be accessed via:

Settings > Personalization > Lock screen

Which of the following macOS features allows to create switchable desktop environments?

Spaces

Which of the following user groups in Windows 10 can use most software and change system settings that don't affect other users or computer's security?

Standard Users

Which formatting type in MS Windows prevents data recovery by overwriting the contents of hard drive sectors?

Standard format

Which of the following would be the easiest step to troubleshoot the Blue Screen of Death (BSoD) in MS Windows?

System reboot

Which of the following tabs of the System Configuration utility in MS Windows provides access to MMC snap-ins?

Tools

A type of architecture that simplifies networking by allowing devices to dynamically join a network, autoconfigure, and learn about the presence and capabilities of other devices is known as:

UPnP

Which of the answers listed below refers to a dedicated device for managing encrypted connections established over an untrusted network, such as the Internet?

VPN concentrator

Which of the following allows to check digital certificate validity?

Web browser padlock icon menu

In Windows 10 Settings app, desktop customization settings can be accessed via:

Windows Start > Settings > Personalization

What is the correct syntax for applying the read-only attribute to a file?

attrib +R [drive:] [path] [filename]

During system boot, a user receives "Windows Boot Configuration Data file is missing required information" error message. Which of the following command-line commands should be used by a technician to troubleshoot this error?

bootrec /rebuildbcd

Which of the Windows command-line commands listed below change the current directory to the root directory?

cd \ chdir \

Which Microsoft Windows OS component allows to view and manage installed hardware components and device drivers?

devmgmt.msc

Which command-line commands in Windows can be used to display help information related to a specific utility?

help [command name] [command name] /?

Which of the network command-line tools listed below enables obtaining an FQDN-to-IP address mapping?

nslookup

Which of the following system utilities in Windows provides access to a database containing system configuration information?

regedit.exe

Which tab of the Windows Internet Properties applet provides an option for deleting temporary Internet files, web browsing history, cookies, saved passwords, and data typed into web forms?

General

Which of the acronyms listed below refers to a client authentication method used in WPA3 Personal mode?

SAE

Which Microsoft Windows 10 edition(s) provide(s) the option to join a domain?

Pro Pro for Workstations Enterprise

Which of the following Windows Command Prompt commands can be used to list all directory's files and subdirectories contained in the current directory?

dir dir *.*

A Microsoft-proprietary file system optimized for flash drives is known as:

exFAT

Which Linux command-line utility provides a functionality similar to Windows Task Manager?

top

Which of the following answers describe the characteristics of a public network in Windows?

-The PC can't be used for file and printer sharing -Used for untrusted network, such as a WiFi network at a coffee shop -The PC remains hidden from other devices on the network

The Programs and Features (appwiz.cpl) Windows Control Panel applet can be used for:

-Uninstalling applications -Conducting repair installation of a malfunctioning program -Adding/removing Windows components -Managing installed updates

Which of the statements listed below can be used to describe private network setting in Windows?

-Used for trusted networks, such as home or work networks -Enables the PC to become discoverable to other devices on the network -Enables the PC to be used for file and printer sharing

Windows Task Manager can be launched by:

-Using the Ctrl+Shift+Esc key combination -Pressing Ctrl+Alt+Delete and selecting the Task Manager option from the menu screen -Right-clicking on the Windows Taskbar and selecting Task Manager -Typing taskmgr (or taskmgr.exe) in the Command Prompt and pressing Enter -Pressing simultaneously the Windows and R keys, typing taskmgr (or taskmgr.exe) in the Run window, and pressing Enter -Right-clicking on the Windows Start button and selecting Task Manager

The Network and Sharing Center Control Panel applet (control.exe /name microsoft.networkandsharingcenter) in Windows allows to:

-View active networks -Set up a new connection or network -troubleshoot network problems

Which of the following steps provide access to Windows system settings aimed at users with disabilities?

-Windows Control Panel (category view) > Ease of Access > Ease of Access Center -Windows Control Panel (icon view) > Ease of Access Center -Windows Control Panel (category view) > Appearance and Personalization > Ease of Access Center

Which of the following actions in Windows 10 provide(s) access to configuration options for connecting a network printer to a PC (network printer mapping)?

-Windows Control Panel (category view) > Hardware and Sound > Devices and Printers > Add a printer -Windows Start > Settings > Devices > Printers & scanners > Add printers & scanners > Add a printer or scanner > select a printer > Add Device -Windows Control Panel (category view) > View devices and printers > Add a printer -Windows Control Panel (icon view) > Devices and Printers > Add a printer

In computer networking, a computer system or application that acts as an intermediary between another computer and the Internet is commonly referred to as a proxy. In Windows 10, proxy settings can be accessed via:

-Windows Control Panel (category view) > Network and Internet > Internet Options > Connections tab > LAN settings > Proxy server -Windows Control Panel (icon view) > Internet Options > Connections tab > LAN settings > Proxy server -Windows Start > Settings > Network & Internet > Proxy

Which of the actions listed below provide access to a configuration setting that allows to add file server component to Windows 10?

-Windows Control Panel (category view) > Programs > Turn Windows features on or off > Internet Information Services -Windows Control Panel (icon view) > Programs and Features > Turn Windows features on or off > Internet Information Services -Windows Start > Settings > Apps > Apps & features > Optional features > More Windows features > Turn Windows features on or off > Internet Information Services

In Microsoft Windows, the "$" sign appended to the end of the name of a network share indicates that the shared folder or drive is:

Hidden

Which edition(s) of Microsoft Windows 10 include(s) the Remote Desktop client component?

Home Windows 10 Pro Windows 10 Pro for Workstations Windows 10 Enterprise

Which of the Linux commands listed below can be used to display the amount of available disk space?

df

Which of the following answers can be used to describe characteristics of an XSS attack?

-Exploits the trust a user's web browser has in a website -A malicious script is injected into a trusted website -User's browser executes attacker's script

Which of the steps in Windows 10 provide access to a configuration interface that allows to modify public/private network settings?

-Windows Start > Settings > Network & Internet > select any of the following submenus: Status, Wi-Fi, Ethernet, Dial-up, VPN, or Mobile hotspot > Network and Sharing Center > Change advanced sharing settings -Windows Control Panel (category view) > View network status and stats > Change advanced sharing settings -Windows Control Panel (icon view) > Network and Sharing Center > Change advanced sharing settings

Which of the following statements are true?

-Windows-based computers on a network must be part of a workgroup or a domain -Windows-based computers on workplace networks are usually part of a domain -Windows-based computers on home networks are usually part of a workgroup

Which of the following is the physical memory limit for all 32-bit (x86) editions of Windows 10?

4GB

A Windows 10 feature that allows to impose data limit on an Internet connection to save bandwidth is called:

Metered connection

An operating system cross-platform compatibility feature allows certain types of data files created on one type of OS to be seamlessly read and modified on a different OS type.

True

The Security tab of the Internet Properties applet in MS Windows allows to impose restrictions on web content allowed in the built-in web browser.

True

Which of the 64-bit (x64) Windows 10 editions provide(s) support for up to 6 TB of physical memory?

Windows 10 Pro for Workstations Windows 10 Enterprise

Which of the settings listed below is not part of the General tab of the File Explorer Options applet in Windows 10?

Visibility of hidden files, folders, or drives

Which of the following would be the best solution for securing a small network that lacks an authentication server?

WPA3-SAE

An operating system installation type that preserves system settings, personal files, and applications from the older OS version is referred to as an in-place upgrade. Microsoft Windows versions that can be upgraded to Windows 10 via this method include:

Windows 7 Windows 8.1

In Windows 10, Assigned Access is a feature that allows to modify desktop style / user interface by restricting user account access only to a single Windows app (a.k.a. kiosk mode). Windows 10 editions offering this functionality include:

Windows 10 Pro Windows 10 Pro for Workstations Windows 10 Enterprise

Which edition(s) of Microsoft Windows 10 include(s) the BitLocker Drive Encryption feature?

Windows 10 Pro Windows 10 Pro for Workstations Windows 10 Enterprise

Which sequence of steps in Windows 10 provides access to a configuration setting that enables displaying hidden files, folders, and drives?

Windows Control Panel > File Explorer Options applet > View tab > Advanced settings: > Hidden files and folders > Show hidden files, folders, and drives

Which sequence of steps in Windows 10 provides access to a configuration setting that allows to show or hide extensions for known file types?

Windows Control Panel > File Explorer Options applet > View tab > Advanced settings: > Hide extensions for known file types

Which of the steps listed below provides access to backup, recovery, and OS upgrade options in Windows 10 Settings app?

Windows Start > Settings > Update & Security

Which Command Prompt commands in MS Windows move the command-line prompt one folder up in the directory tree (set the prompt at the parent folder of the current folder)?

cd .. chdir ..

For a newly added storage drive, this command-line command allows to configure it with a file system enabling Windows to store information on the drive.

format

Which of the following answers refers to a Linux command-line utility used for configuring network interfaces?

ip

Which of the following answers refers to a Microsoft Windows tool designed for troubleshooting system startup problems?

msconfig.exe

What is the name of the Linux command used for renaming files and directories?

mv

Which of the following administrative tools in MS Windows provides a detailed real-time information about hardware resources (CPU, disk, network, and memory) and system resources in use by the OS, services, and running applications?

perfmon.exe

The Device Manager applet in Windows 10 Control Panel can be accessed via:

-Control Panel (category view) > Hardware and Sound > Device Manager -Control Panel (icons view) > Administrative Tools > Computer Management > Device Manager -Control Panel (icons view) > Device Manager

Which of the configuration settings listed below can be managed through the Boot tab of the System Configuration utility in Windows?

-Default OS to load in a multiboot environment (boot order) -Safe boot options -Boot logging -Amount of hardware resources to be used by the chosen OS in a multiboot environment (e.g., the maximum amount of RAM)

Windows repair installation:

-Does not affect user applications -Preserves application configuration settings -Does not affect user files

What are the characteristics of TACACS+?

-Encrypts the entire payload of the access-request packet -Primarily used for device administration -Separates authentication and authorization

Which locations in MS Windows provide access to the Internet Properties (inetcpl.cpl) system utility?

-Internet Options applet in Windows Control Panel -Network and Sharing Center applet in Windows Control Panel -Windows Run dialog box (after typing in inetcpl.cpl and pressing Enter)

Which of the answers listed below describe the characteristics of the MBR partition style?

-Legacy BIOS -Maximum disk size limit of 2 TB -Overall number of partitions limited to 4

What are the advantages of organizing hard drive space into multiple partitions?

-Multiboot environment -Separated disk space used for virtual memory -Separation of user files from the operating system and application files

The Network and Sharing Center Control Panel applet in Windows provides access to:

-Network adapter settings -Media streaming options -Advanced sharing settings

What are the characteristic features of RADIUS?

-Primarily used for network access -Combines authentication and authorization -Encrypts only the password in the access-request packet

Which of the steps listed below provide(s) access to an interface that allows to modify how apps communicate through Windows Defender Firewall?

-Windows Control Panel (category view) > System and Security > Allow an app through Windows Firewall -Windows Start > Settings > Update & Security > Windows Security > Firewall & network protection > Allow an app through firewall -Windows Start > Settings > Network & Internet > Windows Firewall > Allow an app through firewall -Windows Control Panel (icon view) > Windows Defender Firewall > Allow an app or feature through Windows Defender Firewall

Which sequence(s) of steps in Windows 10 provide(s) access to configuration options that allow to share a local printer with other PCs on a network?

-Windows Control Panel (icon view) > Devices and Printers > right-click on a selected printer > Printer properties > Sharing tab -Windows Control Panel (category view) > Hardware and Sound > Devices and Printers > right-click on a selected printer > Printer properties > Sharing tab -Windows Start > Settings > Devices > Printers & scanners > select a printer > Manage > Printer properties > Sharing tab -Windows Control Panel (category view) > View devices and printers > right-click on a selected printer > Printer properties > Sharing tab

he USB selective suspend setting in Windows can be accessed via:T

-Windows Control Panel (icon view) > Power Options > Change plan settings > Change advanced power settings > USB settings > USB selective suspend setting -Windows Start > Settings > System > Power & sleep > Additional power settings > Change plan settings > Change advanced power settings > USB settings > USB selective suspend setting -Windows Control Panel (category view) > Hardware and Sound > Power Options > Change plan settings > Change advanced power settings > USB settings > USB selective suspend setting

Do nothing/Sleep/Hibernate/Shutdown setting can be accessed via the following steps:

-Windows Control Panel (icon view) > Power Options > Choose what closing the lid does -Windows Control Panel (category view) > Hardware and Sound > Power Options > Choose what closing the lid does -Windows Start > Settings > System > Power & sleep > Additional power settings > Choose what closing the lid does

Which of the actions listed below provide access to startup setting?

-Windows Control Panel (icon view) > Power Options > Choose what the power buttons do > Change settings that are currently unavailable > Turn on fast startup -Windows Control Panel (category view) > Hardware and Sound > Power Options > Choose what the power buttons do > Change settings that are currently unavailable > Turn on fast startup -Windows Start > Settings > System > Power & sleep > Additional power settings > Choose what the power buttons do > Change settings that are currently unavailable > Turn on fast startup

Which of the steps listed below provide(s) access to Windows 10 configuration settings that allow to join a domain or workgroup?

-Windows Control Panel (icon view) > System > About > Rename this PC (advanced) > click on the Network ID... button -Windows Control Panel (category view) > System and Security > System > About > Rename this PC (advanced) > click on the Network ID... button -Windows Start > Settings > System > About > Rename this PC (advanced) > click on the Network ID... button -Windows Control Panel (category view) > System and Security > See the name of this computer > System > About > Rename this PC (advanced) > click on the Network ID... button

In Windows 10, Windows Defender Firewall can be enabled/disabled via the following steps:

-Windows Start > Settings > Update & Security > Windows Security > Firewall & network protection > select a network profile (Domain network, Private network, or Public network) > under Microsoft Defender Firewall, switch the setting to On or Off -Windows Control Panel (category view) > System and Security > Check firewall status > Turn Windows Defender Firewall on or off > select network type (Private or Public) > select the Turn on or Turn off Windows Defender Firewall setting -Windows Control Panel (icon view) > Windows Defender Firewall > Turn Windows Defender Firewall on or off > select network type (Private or Public) > select the Turn on or Turn off Windows Defender Firewall setting

Which of the statements listed below apply to Windows workgroups?

-Workgroups typically consist of no more than twenty computers -Logging into any computer in a workgroup requires an account on that computer -Each computer in a workgroup has its own security policy

Which of the answers listed below refers to a file extension used in macOS for a file that contains an exact copy of the contents of a storage device?

.dmg

Which of the following answers refers to a macOS application installer file?

.pkg

Which shutdown command switch enables aborting a system shutdown?

/a

Which shutdown command switch forces full system shutdown and restart of a Windows host?

/r

Which sfc switch enables a file check that scans integrity of all protected system files and attempts to repair corrupted files?

/scannow

Which copy command switch in Windows verifies that the new files are written correctly?

/v

Which of the copy command switches suppresses the confirmation prompt displayed when Windows is about to overwrite the contents of an existing file?

/y

For the purpose of encryption, WiFi Protected Access 3 (WPA3) takes advantage of:

AES-GCMP, AES-CCMP

A Windows Control Panel folder containing shortcuts to various system utilities is called:

Admin Tools

Which tab of the Windows Internet Properties applet provides an option to reset the built-in web browser to its default state (i.e., roll back all the configuration settings to the state they were in when the browser was first installed)?

Advanced

On a Windows domain, this tool can be used by system administrators to configure initial desktop environment (which may include mapping a network drive or setting up access to a shared printer) for a specific user.

Login script

Which of the following choices provides the most effective means for malware removal?

OS Reinstallation

In Windows 8 and newer releases of the Microsoft OS, contents of the System Configuration Startup tab can be viewed and managed via:

Task Manager


Conjuntos de estudio relacionados

American Republic Chapter 1 Activity 5

View Set

U.S. Citizenship and Immigration Services (AMERICAN HISTORY)

View Set

Chapter 6: Networks, Groups, and Organizations

View Set