A+ 1002
Which of the following is an MS Windows utility designed both for system administrators and for application developers
Component Services (dcomcnfg.exe
Which of the following locations provide direct access to the Device Manager applet in MS Windows? (Select 3 answers)
Computer Management utility in the Administrative Tools folder in Windows Control Panel Windows Run dialog box (after typing in devmgmt.msc and pressing Enter) Windows Control Panel
Which of the following answers describes the correct sequence of steps for accessing the Speed & Duplex settings of an Ethernet adapter in MS Windows
Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Speed & Duplex settings
The /r switch of the chkdsk command-line utility in Windows
Locates bad sectors and recovers readable information Fixes errors on the disk
Which of the following statements apply to Windows domains
Logging on to any computer on the Windows domain requires a single set of credentials Security policies and permissions on the Windows domain are administered centrally Windows domains are based on the Client-Server networking architecture
What is the name of a logical security access control method in which a 48-bit physical address assigned to each Network Interface Card (NIC) is used to determine access to the network
MAC address filtering
What is the application of No-eXecute bit (NX bit)?
Malware protection
Which of the following password policy settings prevents attackers using cracked passwords from gaining permanent access to a Windows workstation?
Maximum password age setting
Which password policy setting prevents users from repeatedly changing their passwords to bypass the password history policy setting and get back to their original/preferred password?
Minimum password age setting
Which of the Control Panel applets in Windows 8/8.1/10 can be used for checking basic information about the network connection status and setting up network connections?
Network and Sharing Center
A type of feature used by CPUs for isolating areas of memory to prevent the execution of code from non-executable memory locations is known as:
No-eXecute bit (NX bit)
Which of the following allows to hide extensions for known file types in Windows 8/8.1/10?
Open the File Explorer Options applet in Windows Control Panel, then select Hide extensions for known file types in the Advanced settings on the View tab
Which of the following tools in MS Windows is used to examine (both in real time and by collecting log data for later analysis) how programs that are run affect a computer's performance
Performance Monitor (perfmon.exe)
What are the characteristic features of RADIUS?
Primarily used for network access Combines authentication and authorization Encrypts only the password in the access-request packet
Which of the following allow for administering print devices in Microsoft Windows
Printers applet in Control Panel in Windows OSs prior to Windows 7 Devices and Printers applet in Control Panel in Windows 7 and newer Microsoft OSs Print Management utility in the Administrative Tools folder (not available in home editions of MS Windows)
Which of the following solutions is used for controlling network resources and assigning priority to different types of traffic
Quality of Service (QoS)
Which of the following provides access to Remote Assistance and Remote Desktop configuration settings in Windows?
Remote settings in the System applet in Windows Control Panel
A type of user interface that enables the execution of operating system commands is commonly referred to as
Shell
An email sent from unknown source disguised as a trusted source known to the message receiver is an example of
Spoofing social engineering
Which of the following provide access to virtual memory (a.k.a. paging file) configuration options in Windows? (Select 2 answers)
System applet in Control Panel -> Advanced system settings -> Performance -> Settings -> Advanced -> Virtual memory Windows Run dialog box -> type in sysdm.cpl + press Enter -> Advanced tab -> Performance -> Settings -> Advanced -> Virtual memory
Which of the following locations enable adjustments to the volume of sound in Windows 8/8.1/10? (Select 2 answers)
Windows Taskbar notification area Sound applet in Control Panel
Which of the statements listed below apply to Windows workgroups?
Workgroups typically consist of no more than twenty computers Logging on to any computer in the workgroup requires an account on that computer Each computer in the workgroup has its own security policy
Which of the following answers refers to a built-in MS Windows account with complete and unrestricted system access?
administrator
Which of the following is a package management system most often used on Debian and Debian-based Linux distributions
apt
Which of the following are disk storage types used with MS Windows?
basic dynamic
In MS Windows, a newly added drive is by default partitioned as a
basic disc
Which of the Apple software utilities enables installation of an alternative OS in a multiboot environment
boot camp
Which parameter of the cd command in Windows moves the command-line prompt one folder up in the directory tree
cd..
Which of the following commands in Windows Command Prompt changes the current directory to the root directory
cd\
Which Control Panel applet in Windows allows to manage usernames and passwords for websites, connected applications and networks?
credential manager
Which of the following Windows Command Prompt commands can be used to list all directory's files and subdirectories contained in the current directory?
dir dir*.*
Which of the following acronyms refers to software or hardware-based security solutions designed to detect and prevent unauthorized use and transmission of confidential information outside of the corporate network?
dlp
Which of the following can be used by system administrators to selectively block access to known malware sites?
dns configuration
An antivirus software is kept up to date via
engine updates virus signature updates
In the MBR partition style, each logical drive within the extended partition can be transformed into a bootable drive
false
Local Users and Groups (lusrmgr.msc) is a Microsoft Management Console (MMC) snap-in included by default in all editions of MS Windows. It is used to create and manage users and groups that are stored locally on a computer
false
Physical Address Extension (PAE), No-eXecute bit (NX bit), and Streaming SIMD Extensions 2 (SSE2) are mandatory CPU requirements for Microsoft Windows 7/8/8.1/10, therefore Windows 7/8/8.1/10 cannot be installed on computer systems that lack support for these features.
false
The Local Security Policy (secpol.msc) administrative tool in home editions of MS Windows can be used by system administrators to modify account and local policies, public key policies and IP security policies for a local host
false
The Security and Maintenance applet in Windows Control Panel provides access to Windows Firewall (Windows 7) / Windows Defender Firewall (Windows 8/8.1/10) configuration settings.
false
A Linux command-line command that enables searching files for lines containing a match to a given text pattern is called
find
A macOS file manager application is known as
finder
The /f switch of the chkdsk command-line utility in MS Window
fixes errors on the disk
An unresponsive application/process in macOS can be terminated with the use of:
force quit
For a newly added hard drive, this command allows to configure it with a file system so that Windows can store information on the disk
format
What kind of general term is used to describe the process of securing a computer system?
hardening
Which of the following firewall types would provide the best protection for an ingress/egress point of a corporate network?
hardware firewall network based firewall
Which of the following commands in Windows can be used to display help information related to a specific command-line utility
help [command name] [command name] /?
Which of the power-saving states in MS Windows uses the least amount of power?
hibernation
A security technician was asked to configure a firewall so that the protected system would not send echo reply packets. What type of traffic should be blocked on the firewall to accomplish this task
icmp
Examples of secure network protocols used for establishing VPN connections include
ipsec tls
Which of the following is a Linux command-line command used for configuring network interface parameters specific to the wireless communication
iwconfig
A password management system in macOS is known as
keychain
Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as
malware
What are the advantages of organizing hard drive space into multiple partitions
multiboot environment Separated disk space used for virtual memory Separation of user files from the operating system and application files
What is the name of the Linux command used for renaming files and directories
mv
Which of the following Command Prompt commands in Windows is used for listing a computer's connections to shared resources
net use
Which of the MS Windows command-line commands lists the user accounts for the computer
net user
Which of the following enable installation of an OS via network interface? (Select 2 answers)
netboot pxe
Which of the following CLI tools can be used for troubleshooting DNS-related problems
nslookup
A Linux command-line command allowing a user to change his/her own password is known as
passwd
Which user group in Windows (applies to Windows 7 and earlier versions) had rights and permissions that allowed its members to perform specific administrator-level tasks?
power users
Which of the following are examples of partition types?
primary logical extended
What is the name of a Linux command-line utility used for displaying statistics of running processes
ps
A Linux command displaying an absolute path to (i.e. full filename of) the current working directory is called
pwd
Which of the following terms refers to an example of crypto-malware?
ransomware
Which of the built-in options added in Windows 8 enables OS reinstallation without affecting the existing user profiles and settings
refresh
Which of the macOS features enables access to optical drive of another computer over a network
remote disc
The System Protection tab of the System Properties (sysdm.cpl) utility in Windows provides options for managing:
restore points
A command-line command in Linux used for deleting files and directories is known as
rm
Which of the following built-in macOS tools enables remote access to another Mac computer
screen sharing
Which of the following is the correct command for setting the time-out period of 60 seconds before powering off a Windows host
shutdown /s /t 60
Which of the following is a macOS system search utility
spotlight
Which of the following is a Linux command that allows to assume the identity of a different system user and execute commands with security privileges of that user account
su
A hidden file (or files) on the hard disk that Windows uses to hold parts of programs and data files that cannot be stored in RAM due to the insufficient memory space is called: (Select 3 answers)
swap file paging file virtual memory
An MS Windows system utility that allows to roll back system files and settings to an earlier point in time is called
system restore
Which of the answers listed below refers to the correct syntax for a Windows Command Prompt taskkill command that would allow to close notepad.exe by providing its imagename
taskkill /im notepad.exe
A security protocol designed to strengthen WEP implementations is known as
tkip
Windows Memory Diagnostic Tool (mdsched.exe) cannot be run inside Windows. This utility requires a system restart and is launched during next boot before loading the operating system
true
Which of the following can be used as an extension of RAM?
virtual memory paging file swap partition
Which of the following is a non-proprietary RDP alternative that enables control over another computer on the network with the use of a graphical user interface
vnc
Which of the following is a dedicated device designed to manage encrypted connections established over an untrusted network such as the Internet?
vpn concentrator
Which of the following is the best method to secure a small network lacking an authentication server?
wpa2-psk
Which of the Microsoft Windows command-line commands allow for copying multiple files or entire directory trees from one directory to another and for copying files across a network
xcopy robocopy
Which of the copy command switches suppresses the confirmation prompt displayed when Windows is about to overwrite the contents of an existing file
/y
What are the minimum system requirements for 32-bit (x86) version of Microsoft Windows 8/8.1?
1 GHz CPU with support for PAE, NX, and SSE2 1 GB of system RAM Microsoft DirectX 9 graphics device with WDDM 1.0 or higher driver 16 GB of free hard disk space
Which of the following answers describe the minimum system requirements for 32-bit (x86) version of Microsoft Windows 10?
1 GHz CPU with support for PAE, NX, and SSE2 1 GB of system RAM ( Your answer) Microsoft DirectX 9 graphics device with WDDM 1.0 or higher driver 16 GB of free hard disk space
What are the minimum system requirements for 64-bit (x64) version of Microsoft Windows 10?
1 GHz CPU with support for PAE, NX, and SSE2 2 GB of system RAM Microsoft DirectX 9 graphics device with WDDM 1.0 or higher driver 20 GB of free hard disk space
Which of the following are the minimum system requirements for 64-bit (x64) version of Microsoft Windows 8/8.1?
2 GB of system RAM Microsoft DirectX 9 graphics device with WDDM 1.0 or higher driver 20 GB of free hard disk space 1 GHz CPU with support for PAE, NX, and SSE2
Which of the following statements apply to the definition of a computer virus?
A self-replicating computer program containing malicious segment Requires its host application to be run to make the virus active Attaches itself to an application program or other executable component
Windows Task Scheduler (taskschd.msc) is a component of Microsoft Windows that provides the capability to schedule the launch of programs or scripts at pre-defined times or after specified time intervals. Which of the following locations contains the application icon shortcut used for launching the Task Scheduler MMC snap-in
Administrative Tools menu in Windows Control Panel
Which of the following locations in macOS provide access to multi-touch interface settings (a.k.a. Gestures)
Apple menu -> System Preferences... -> Mouse Apple menu -> System Preferences... -> Trackpad
Which of the following is a macOS disk maintenance tool
Disk Utility
Which of the following macOS utilities allows to create/restore a disk image
Disk Utility
Netstat is a command-line utility used for
Displaying active TCP/IP connections Displaying network protocol statistics
Which of the following allows to create a backup copy of the entire contents of a disk drive (which may include a pre-configured OS installation) and replicate the drive to a new computer
Drive imaging
Premium versions of the Microsoft OS contain a built-in component that enables encryption of individual files. This feature is known as
Encrypting File System (EFS)
What are the characteristics of TACACS+?
Encrypts the entire payload of the access-request packet Primarily used for device administration Separates authentication and authorization
Which of the following provides access to file/folder management settings in Windows 10?
File Explorer Options applet in Windows Control Panel
The Programs and Features Windows Control Panel applet can be used for: (Select all that apply)
Uninstalling applications Conducting repair installation of a malfunctioning program Adding/removing Windows components Managing installed updates
Which of the following options is not part of the General tab of the Folder Options applet (Windows 7) / File Explorer Options applet (Windows 8/8.1/10) in MS Windows?
Visibility of hidden files, folders, or drives