Comptia 1102 Core 2 Questions

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following Windows 10 system utilities would be used to test the functionality of the DirectX subsystem for video and sound-related problems?

dxdiag

Jason is building an inexpensive workstation for one of the employees at Dion Training. The workstation will utilize an Intel x86 processor. Which of the following editions of Windows will support installation on this workstation?

Windows 10 Enterprise / Windows 10 Pro

What are the main differences between the Windows Versions?

Windows Home Edition is a retail edition with No BitLocker or EFS included nor RDP nor Active Directory. Windows 10 Pro has BitLocker and EFS included with Group policy editor and RDP included. Windows 10 Enterprise Edition has MDM Management for Devices and Microsoft Dynamic Management. Windows 10 Education Edition is strictly for school purposes.

A Windows user runs the Performance Monitor tool to check disk activity. What counter is the best option the user can evaluate to understand how busy the disk is at any given time?

% Disk time

Which of the following file types are commonly used by network administrators to perform repetitive tasks using a Microsoft proprietary programming language?

.vbs

What is the minimum processor required to install Windows 10 (x86) on a device?

1 GHZ single-core processor

Which of the following components presents the largest risk of electrical shock to a technician?

CRT Monitor

A user contacts an IT help desk to report that when trying to browse a web page for office supplies, a completely unrelated webpage about gambling is presented. What does the help desk determine the causes could be? (Select all that apply.)

Browser redirection / DNS Spoofing

An IPv6 address is made up of bits that identify the network and host of a system. How many bits long is an IPv6 address in total, and how many bits identify the host portion? (Select all that apply.)

128 / 64

What is the minimum amount of storage space required to install Windows 10 (x64) on a device?

32 GB

How would you represent r-xrw-r-- in octal notation?

564

An iOS smart device user notices that AirDrop is not working properly as files are not being received. What should the user check while troubleshooting? (Select all that apply.)

Bluetooth / Contacts

Which of the following data types would be used to store the value of TRUE?

Boolean

A company is implementing enhanced user authentication for system administrators accessing the company's confidential servers. They intend to use two-factor authentication to accomplish this. Which of these BEST represents two-factor authentication?

Add a rule to the ACL to allow traffic on ports 80 and 53

What does ".." do in Windows command line?

Allows you to move above the current directory.

What is APFS?

Apple File System (APFS) is the default file system for solid state drives and flash memory in 2017's macOS High Sierra and later. First released in 2016, it offers all sorts of benefits over Mac OS Extended, the previous default.

A problematic Windows system with multiple operating systems installed does not boot properly. A support technician tries to diagnose by outlining the boot process. The technician determines that the system uses an Extensible Firmware Interface (EFI) system partition. Which file does the technician inspect for problems related to a specific operating system boot problem?

BOOTMGFW

What are the two types of Storage types?

Basic Disk Storage and Dynamic Disk (Enhanced form of partition tables which allows for things like software raid)

A computer user looks to map a network drive using the most basic scripting language possible. Which language does the user implement for a Windows system?

Batch script

A company looks to dispose of old computers, and related, equipment. Which items require special care? (Select all that apply.)

Batteries / Toner / Motherboard

A computer security team investigates a high-level computer breach at a large company. While investigating one of the computers in question, a USB drive is found inserted into the back of the shared user desktop tower. What concerns the team from this action? (Select all that apply.)

Chain of custody / Data integrity

A technician configures a legacy computer for a user. Which account authentication policies does the technician implement? (Select all that apply.)

Change the default admin password. / Disable the guest account.

What is "cd" command?

Changes working directory.

What is CDFS?

Compact Disk File System

Which of the following types of attacks is conducted by injecting malicious programming language statements into otherwise trustworthy websites to attack the user's web browser?

Cross-site scripting

Tim has requested to install a security update to the Dion Training web server during the next maintenance window. At the change control board meeting, Tim presents the requested change and gains approval from the change board. Before Tim installs the update, which of the following should be documented as a result of the change board's approval?

Date and time of the change

A new help desk technician receives a support call from a user. What initial information does the technician ask the user to provide? (Select all that apply.)

Description of the issue / Contact details

The network administrator noticed that the border router has high network capacity loading during non-working hours. This excessive load is causing outages for the company's web servers. Which of the following is the MOST likely cause of the issue?

Distributed DoS

You have just run an anti-virus scan on a workstation, discovered about 25 different malicious items, and successfully removed them. You have scheduled a daily scan of the workstation, enabled the System Restore function, and created a new restore point. What is the NEXT step in the malware removal process?

Educate the end user

A user loses their company smartphone while traveling. The IT department initiates the securest measure possible to impact work-related data only. What action does the IT department take?

Enterprise wipe

What is exFAT?

Extended File Allocation Table, files much larger than 4 GB, a better choice than FAT32.

What is FAT32?

FAT32 allows you to store files of size up to 4GB and the maximum disk size can go up 2 TB

What is FAT?

File Allocation Table

What is a swap partition?

Frees up memory by moving unused pages onto disk. Copies RAM when needed and usually is a fast drive.

What is the help or [Command] /?

Gives more information about different and specific commands

An attacker uses a script to create fileless malware that requires no compilation. What scripting environment does the attacker utilize?

Identify scenarios for natural and man-made disasters. / Identify tasks, resources, and responsibilities for responding to a disaster.

A Windows user runs the Defragment and Optimize Drives tool (dfrgui.exe) on a solid state drive (SSD). What action will the tool take on the drive? (Select all that apply.)

Identifying blocks that are deletable / Tagging blocks as writable

During the reconnaissance phase of a penetration test, you have determined that your client's employees all use iPhones that connect back to the corporate network over a secure VPN connection. Which of the following methods would MOST likely be the best method for exploiting these?

Identity a jailbroken device for easy exploitation

An engineer configures numerous firewall rules on a system. The system processes the rules in order and then reaches the last default rule which blocks access. Which security function is in place?

Implicit Deny

What is NTFS (New Technology File System)?

Improvement of FAT32 and has features like security, encryption, file compression, and the ability to change file permissions.

Your router has been turning itself off and on again for a few weeks. You begin to think back to when these issues began to occur and remember that each time it happened the lights also dimmed momentarily. You hook up a device to monitor the power being supplied to the router and identify that brownouts are frequently occurring, resulting in the router's power cycling. What should you (a network technician) do to solve this problem?

Install a UPS

You work for Dion Training as a physical security manager. You are concerned that the physical security at the entrance to the company is not sufficient. To increase your security, you are determined to prevent piggybacking. What technique should you implement first?

Install an access control vestibule at the entrance

The Chief Financial Officer has asked Maria for a recommendation on how the company could reduce its software licensing costs while still maintaining the ability to access its application server remotely. Which of the following should Maria recommend?

Install and deploy thin clients without an operating system for each user

A network engineer implements a proxy at a small company. The configuration does not require settings on every client machine. What type of proxy does the engineer deploy? (Select all that apply.)

Intercepting / Transparent

What is ext4?

Latest linux/android filesystem type

What is the dir command?

List the contents of a folder.

What are the different type of Disk Partitions?

MBR (Master boot record) (MBR is the older version of partition disk space, and you get the maximum of 4 primary partitions per hard disk. You get one extended partition if needed per disk. with a max supporting of up to 2 TB) and GPT (Guid Partition Table) (Lastest partition that can have up to 128 partitions but does require UEFI Bios)

A Windows 7 computer user requires help from the IT department. A technician instructs the user to create an invitation file. What type of Windows help session does the user create?

Microsoft Remote Assistance

A user claims that they cannot browse the local shared network by name. After evaluating the computer's IP settings and pinging the local share by IP address with no problem, what does a support technician determine as the cause?

Missing DNS address

What are the specifications for windows 11?

Must have a two-core 1 GHz or faster on a compatible 64-bit processor or system on a chip (SoC), must have 4 GB or more of ram, must have at least 64 GB of ram, at least 64 GB of storage capacity, and must have UEFI and Secure boot capability, and must have a Trusted Platform Module (TPM) 2.0

A user looks to reconfigure an IP address for a network adapter. Which Control Panel applet is the most direct?

Network Connections

You are installing a new firewall for Dion Training's corporate network. Which of the following documents should you update FIRST?

Network topology diagrams

What kind of attack is an example of IP spoofing?

On-path attack

Michael, a salesman, is on a business trip and is trying to access his corporate email over the hotel's Wi-Fi network. Michael's laptop appears to be connected to the hotel's wireless network, but his email client cannot download any new messages and states, "Network Offline." Michael contacts the help desk for assistance. What action should the help desk technician tell Michael to perform to solve this issue?

Open a web browser, enter google.com, and see if a redirect page is displayed

A new support technician interfaces with a user that has a computer problem. While discussing the problem, the technician gives undivided attention to the user and asks questions where the person creates their own response. When discussing the problem, what does the technician practice? (Select all that apply.)

Open-ended questions / Active listening

A systems administrator configures a new Windows workstation. The system uses the New Technology File System (NTFS). The administrator needs the system to interact with a Linux system and support a set of common interface standards for compatibility. Which compliance does the administrator need to ensure?

POSIX

A company is implementing enhanced user authentication for system administrators accessing the company's confidential servers. They intend to use two-factor authentication to accomplish this. Which of these BEST represents two-factor authentication?

Password and Key Fob

A company has had several virus infections over the past few months. The root cause was determined to be known vulnerabilities in the software applications in use by the company. What should an administrator implement to prevent future outbreaks?

Patch management

You have been asked to configure your neighbor's SOHO network. Your neighbor wants to build a Minecraft server so that all their friends can play together over the internet. When configuring their firewall, where should you place the server?

Perimeter network

What might a security engineer suggest as a solution to deter lunchtime attacks?

Policies

An attacker uses a script to create fileless malware that requires no compilation. What scripting environment does the attacker utilize?

Powershell

An organization executes a project to replace all of its servers. A change that is requested by management goes through a risk analysis exercise before moving to approval. What will a qualitative approach use for metrics? (Select all that apply.)

Previous experience / Opinions

What are the specifications for windows 10?

Processor has to be 1 GHz or faster, must have 1 GB (32-bit) or 2 GB (64-bit) of ram, DirectX 9 or later with WDDM 1.0, atleast 16 GB (32-bit) or 20 GB (64-bit) and lastly a resolution of 800x600.

Which type of authentication method is commonly used with physical access control systems and relies upon RFID devices embedded into a token?

Proximity Cards

A recently hired security employee at a bank was asked to perform daily scans of the bank's intranet to look for unauthorized devices. The new employee decides to create a script that scans the network for unauthorized devices every morning at 2:00 am. Which programming language would work best to create this script?

Python

A corporate user has called the enterprise service desk because they believe their computer has become infected with malware. When you arrive at their desktop to troubleshoot the issue, you notice it was powered down. You press the power button, the system loads without any issues. When you open Google Chrome, you notice that multiple pop-ups appear almost immediately. Which of the following actions should you take NEXT?

Quarantine the machine and report it as infected to your company's cybersecurity department for investigation

An engineer configures an Authentication, Authorization, and Accounting (AAA) server to authenticate credentials for remote users. Credentials are forwarded to the AAA server from a firewall. Which AAA method does the engineer utilize?

RADIUS

Which of the following open-source remote access tools allows users to connect to their desktop remotely, see what is on their screen, and control it with their mouse and keyboard?

VNC

One of your Windows services is failing to start when you boot up your laptop. You have checked the service in the Windows Services tool and verified it is set to Automatic. What should you attempt to do NEXT to get the service to startup?

Reboot into Safe Mode and see if the service starts

A user needs to restore a problematic Windows system to its original factory state. What approach does the user utilize to achieve the restoration?

Recovery partition

A user experiences a blue screen of death (BSoD) while using a Windows computer. What does a support technician determine to be a good first troubleshooting step?

Remove any newly installed hardware.

A user with a problematic Windows system tries to use a previously created system image. How does the user access the image? (Select all that apply.)

Repair disk / Advanced boot

A system administrator is assigned an approved change request with a change window of 120 minutes. After 90 minutes, the change is stuck on step five of a five-step change. The server manager decides to initiate a rollback. Which describes what the system administrator should do next?

Return the system to the original state before the change

You are a member of a project team contracted to install twenty new wireless access points (WAPs) for a college campus. Your team has already determined the locations for the new WAPs and notated them in the physical and logical network diagrams. Your team is still finalizing the change request documents for the installation. The project cannot move forward with the installation until the change request is finalized and approved. Which of the following is the MOST important thing to add to the scope of work and change request before its approval?

Rollback plan

Malware infects a user's computer. A support technician determines that the malware is executed without requiring any authorization using system privileges. What type of malware currently infects the system?

Rootkit

An administrator arrives at work and is told that network users are unable to access the shared drive on a Windows server. The administrator logs into the server and sees that some Windows Updates were automatically installed last night successfully, but now the network connection shows ÒlimitedÓ with no availability. What rollback action should the technician perform?

Server's NIC Drivers

What is "shutdown" command?

Shuts down the system

An IT professional for a company wants to deploy an app outside the app store on company-managed devices. What requirement does the user complete to accomplish this?

Sim unlock

A tech firm deploys wireless installations at client sites. As the firm uses Wi-Fi Protected Access (WPA) version 3, which security technology does the deployment utilize? (Select all that apply.)

Simultaneous Authentication of Equals mechanism / AES Galois Counter Mode Protocol mode

Windows allows for several types of installable software. Which type may be transferred between computers when a user utilizes a Microsoft account?

Store apps

You just installed a flat panel television in a conference room in your office building. The facilities manager is concerned that a lightning strike could damage it. The company is not worried about the threat of power outages because the conference room is only used a few times per week. Which of the following should be installed to BEST mitigate the facilities manager's concerns without spending too much money?

Surge Suppressor

A systems administrator looks to have a daily backup of a server located across a wide area network (WAN) link. As the link is not fast, the administrator creates a backup scheme that uses little to no bandwidth and acquires an entire backup of the system. Which scheme does the administrator implement?

Synthetic

Which of the following authentication protocols was developed by Cisco to provide authentication, authorization, and accounting services?

TACACS+

A user calls the service desk and states that their workstation has a virus. The user states that they were browsing their favorite website when the antivirus displayed a full-screen message stating, "1532 file infected on this computer - Click to remove infected files NOW!" The user states that when they click the button, a message from the company's content filter states it is blocked, and they need your assistance to remove the infected files. Which of the following has MOST likely occurred?

The user is the victim of a rogue antivirus attack

How might a mobile-device management suite of software detect that a user has rooted an Android device?

There is no valid developer code signature.

What is ext3?

Third extended file system used only in Linux.

A user attempts to authenticate from one Windows system to another in a domain but fails with no error message. The user verifies the username and password as correct. What does the user determine the issue to be?

Time drift

What are the three types of boot methods?

USB (Must have 8GB for installing windows 10 and 11), CD-ROM & DVD-ROM (Must have at least 16GB or storage for windows 10 32-bit and 64GB for Windows 10 & 11), PXE *Pixie* (This is a network install in a preboot execution environment.

Which of the following Windows 10 power options will turn off individual devices connected to a laptop to save energy?

USB Selective suspend

What are the different types of Installation methods?

Unattended install (offers no interruptions and requires answer file *Unattend.xml*, In-place upgrade (the option to keep remaining data on PC and will reinstall window OS), Clean install (wipes the entire OS of all personal files and programs basically brand new), Repair installation (Help troubleshoot the windows OS), Multiboot (When you want to run two or more different OS on the same PC (for example wanting to run MAC OS or Windows OS when booting your system up)

A new support technician works on entry-level trouble tickets. Which question does the technician use as a closed type of question?

What did the message say?

You attempt to boot a Windows 10 laptop and receive an "Operating System Not Found" error on the screen. You can see the hard disk listed in the UEFI/BIOS of the system. Which of the following commands should you use to repair the boot sector of the hard disk?

bootrec /fixboot

A technician troubleshoots a Windows system by using the command prompt. If the technician is currently in the directory named C:\Backup and wishes to enter the directory C:\Backup\02102022, what command does the technician use?

cd 02102022

A user would like to delete a mapped drive labeled as "X" on a Windows system. Which command will the user issue at the command prompt?

net use X: /delete

Which command would a Linux user need to enter to change their password?

passwd

You are troubleshooting a network connectivity issue and need to determine the packet's flow path from your system to the remote server. Which of the following tools would best help you identify the path between the two systems?

tracert

Which of the following Linux command-line options would shut down a Linux server 11 minutes from now?

shutdown +11

A user interacts with a Linux distribution that has no desktop graphical user interface (GUI). As the user types, which stream handles the interaction?

stdin

You are working as a service desk analyst. This morning, you have received multiple calls from users reporting that they cannot access websites from their work computers. You decide to troubleshoot the issue by opening up your command prompt on your Windows machine and running a program to determine where the network connectivity outage is occurring. This tool tests the end-to-end connection and reports on each hop found in the connection. Which tool should you use to determine if the issue is on the intranet portion of your corporate network or if it is occurring due to a problem with your ISP?

tracert

Which of the following commands is used on a Linux system to edit a text file on a server?

vi


Kaugnay na mga set ng pag-aaral

Physiology Exam 2: name 4 hormones involved in the hormonal control of metabolic fuel and describe what the target cells for these hormones is, the cells that produce the hormones, and what function changes in the target cells

View Set

Cognitive Psychology Final Exam Review

View Set

How Ancient Oceans of Magnia May have Boosted Earth's Oxygen Levels.

View Set

FIN 5213 - Ch 1 - The Corporation

View Set

Abdomen, Musculoskeletal, EENT, and Reproductive/Anal

View Set

7. How daylight saving time saved human lives in Israel?

View Set

AP Euro Multiple Choice Study Guide

View Set

U-world: Gen-Chem: Solution Chemistry #3

View Set

Ap bio chapter 40 concept checks

View Set