ITN 106 Final Exam Study Guide
.In Linux, where are the commands required for system administration stored?
/sbin
.Jorge's supervisor is concerned that the company's security system does not comply with the new standards the company has decided to employ. He has asked Jorge to determine how members of the company are authenticated on the network. What does the computer or server use to verify the access to a specific resource on the network?
Access Control List
8.Your company has decided that security is very important and wants to add a second security check that will identify its employees while they are logging in to their computers. What type of security do you recommend?
Biometric locks
You need to secure your Windows 7 computer in a way that prevents access to the entire HDD even if the drive is moved to another system. Which solution will you implement?
BitLocker
Under the Advanced Options screen, what startup option should be enabled in order to view what did and did not load during the bootup?
Boot Logging
Kevin recently discovered that unknown processes are running in the background on his company's web server. During a performance review, he also noticed that the CPU is working at 80% during downtimes. Kevin believes that software is running in the background and causing the CPU to run at such a high percentage. Kevin discovers that his server along with several other computers in the company have been used to perform a DDoS on another website. What type of attack occurred?
Botnet
Jin travels for business and is always worried that his laptop will be taken from his room. Which type of device will ensure that Jin's laptop will not be stolen while he travels?
Cable lock
A technician is using the Security tab in the Properties dialog box in an attempt to remove the inherited status from a file's permissions but cannot locate where to make the change. Which of the following steps should the technician take to make this change?
Click the Advanced button to open Advanced Security Settings for the file
Your organization recently deployed a Windows domain controller with Active Directory. All the domain OU users need to run the same script file each time they sign in to Windows. How can the settings be configured with the least effort by the admin?
Configure Group Policy to run a logon script
Several computers in your organization are being used from within the building after hours when the company is closed. Your manager has asked you to configure the computers to limit access to business hours. Which of the following steps can be taken to limit access to the computers?
Configure logon time restrictions
The web server at Terry's company recently was attacked by multiple computers. The attack overwhelmed the company's web servers and caused the web servers to crash. What type of attack occurred?
DDoS
The company that you work for has recently had a security breech. During the recover and assessment, it was discovered that the malicious user used the company VPN to gain access to the network. Now your company would like to find a way to verify the identity of a user who requests access to the company through a VPN. What can you recommend to the company?
Digital Certificate
Which of the following security policies can be implemented to prevent removable media from automatically launching potentially harmful programs?
Disable AutoRun
You recently created several new user accounts in the Sales OU and configured them with the appropriate group membership, logon scripts, and printer access. Except for one new sales employee, all employees are actively using the account. The remaining employee will be using the account within the next two weeks. What is best practice for the remaining unused account?
Disable the account until the employee is ready to use it
Tracee works for an insurance company that recently received so much spam that the email server became overwhelmed and shut down. Tracee's supervisor has asked her to make sure this does not happen again. What is the first thing Tracee should do to prevent this problem from happening again?
Email filtering
Jed's computer is not booting properly. The computer begins to boot and then just stops and restarts. After the third restart, the computer attempts to repair the computer using Startup Repair. Startup Repair does not seem to work. Instead the computer asks you to choose an option from the Startup Settings screen. Jed has followed the Troubleshoot screen to the Startup Settings screen and clicked Restart. What setting in the Startup Settings screen will enable Jed to see which driver might be failing and causing his computer not to boot?
Enable Boot Logging
What is the term used to designate that a particular operating system will no longer be supported by its manufacturer or managing entity?
End-of-Life
The Advanced Boot Options screen can be displayed by pressing what key during the boot sequence?
F8
A Mac computer is reporting problems with the HDD, and the user wants to run a check for errors. Which of the following is a disk management tool built into macOS that is useful for finding and repairing disk problems?
First Aid
Which of the following describes the macOS feature that lets you use finger motions to perform functions, for example, spreading two fingers to zoom in?
Gestures
Kareem installed Windows 10 for the first time on his computer. During the installation process, he noticed that a new system partition called ESP partition was created. He cannot access this new partition to see what it contains. What can you tell Kareem about the ESP partition?
It was created by GPT to store Windows boot and startup files
A bootable Linux USB flash drive or CD that can be used to repair system issues is known by what term, respectively?
Live USB or CD
A technician wants to use a Time Machine backup to install a new copy of the macOS onto a Mac. Which of the following tools will the technician use to perform this task?
MacOS Recovery
Your company wants to secure the new data center physically. The company has hired a security guard but wants to find a way so that only one person at a time can enter in the data center. As people enter, they will have to show the security guard identification that authorizes them to enter the data center. What is your company's new security called?
Mantrap
A technician needs to boot macOS over the network using an image stored on a server. What Apple technology will best assist the technician?
NetBoot
A technician is configuring the Windows computers on a network to print to a printer that is directly connected to the network via UTP cable. What term best describes this method of printer connectivity?
Network Printer
Alexandria works for a non-for-profit company that asks for donations to help the homeless people in her community. Recently the database that holds all the contact information about the donners was hacked, and all the data was copied. What type of data was taken?
PII
Zach wants to install Windows 10 over his existing copy of Windows 10. He wants to keep his personal files, apps, and Windows settings. He currently has a USB drive with a Windows 10 ISO. What type of installation will you recommend for Zach?
Repair Upgrade
Recently, Tova's computer has slowed down dramatically. She has also noticed that the time on the computer is not accurate. Tova has run several antivirus scans, but has not found an issue. Today while surfing the web, she was redirected several times to a website that she did not request. Then a BSOD error occurred on his computer, and when she turned on her computer, the antivirus software was disabled. What kind of malware could be causing the issues on Tova's computer?
Rootkit
Which of the following is a major advantage to using SSH over Telnet for remotely accessing a Linux system?
SSH is a secure, encrypted alternative to Telnet
A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The coworker recalls there is a setting in the Internet Options dialog box to prompt the user before downloading ActiveX controls, but can't remember which tab to use. Which of the following tabs will you suggest to the coworker?
Security tab
The users in the sales department need a central location on the network to share data files. All the client computers in the organization are running Windows 10 and have network and Internet connectivity. The file server that hosts the network drive for the sales department is running Windows Server 2016. Which of the following is the first step in implementing this data share?
Share the folder or volume on the file server that will store the shared data files
What key will cause the Windows Boot Manager to appear as long as it is pressed during the Windows 7 startup process?
Spacebar
What is responsible for getting a system up and going and finding an OS to load?
Startup BIOS/UEFI
Which of the following are natively supported by the Windows, Mac, and Linux operating systems?
Support for reading and writing to FAT32 partitions
.Your company is using RADIUS for AAA services to connect wireless users to the Windows Active Directory domain. However, the company wants to upgrade to a Ciscobased wireless network and would like to upgrade the older RADIUS. What will you recommend as an upgrade to RADIUS?
TACACS+
Which of the following is a hardware component used to hold the BitLocker encryption key and ensures encrypted data is not accessed in the event a hard drive is lost or stolen?
TPM
A technician wants to limit access to a group of folders and is using Group Policy to prevent the users in the sales department from accessing folders assigned to the accounting department. The technician is having difficulty achieving acceptable results. Which of the following is the most likely reason the technician is having difficulties?
The technician should be setting NTFS permissions instead of using Group Policy
A Windows user called the help desk to request that her local user account password be reset on her computer. The help desk technician connected to the computer using RDC and reset the password using the Network Places Wizard. After the password was reset, the user lost access to all the data files on the local HDD. Which of the following describes the most likely reason for the lost data files?
The user had previously encrypted her data files and folders using EFS
Today you turned on your computer after being on vacation for a week. You see spinning white dots on a black screen. You decide that an update might be installing, so you allow the computer to work for approximately 20 minutes. After 20 minutes, you turn off your computer and then restart it, and it fails two more times. What tool should you use first to help repair your computer?
Use Safe Mode to boot
How can you eliminate the need to open a dedicated TCP port on your corporate firewall when using Mac computers to share screens from the local and remote computers?
Use a third-party remote access app that uses a browser
You have noticed that your computer is running slower than normal and that the amount of storage space on the hard drive is decreasing, even though you have not been doing anything different on your computer. You believe a program is replicating by attaching itself to other programs. What type of malware is on your computer?
Virus
Henry wants to create a bootable flash drive with Windows 10. He wants to use it on multiple computers to troubleshoot Windows 10 startup issues. What tool can Henry use to create a bootable flash drive in Windows 10?
Windows Media Creation Tool
Asha is working on a computer that has a device driver error. Asha can find the name of the device driver however the actual device is not available. Unfortunately, Asha does not have access to the Internet. Where can Asha go to look up the device driver's filename to determine what device uses the device driver?
Windows\System32\drivers folder
Gwen has discovered a program that has copied itself throughout the network. The program does not appear to have a host program and is overloading the network as it replicates. It has even installed a web server on the network and is allowing other computers to connect. What type of malware has Gwen discovered?
Worm
A technician is logged in to a Linux computer as johnd and needs to reset group ownership for the file report.txt in the johnd home directory. Which of the following commands will perform this function?
chown
What command can be used to totally wipe a hard drive clean, including the partitioning system?
diskpart
Windows 10 Professional will not boot on Jackson's computer. During the boot process, the computer fails. While troubleshooting, Jackson determines that the graphical user interface did not load. Which file in the boot process is responsible for loading the graphical user interface and starting the client/server runtime subsystem?
smss.exe