CompTIA A+ 1002 (Core 2) - Sections 1.7 to 1.9
Which of the following mobile devices relies on multiple device vendors for operating system updates? A) Android smartphones B) Apple iPads C) Apple iPhones D) Microsoft Surface CA) THESE are manufactured by several different companies. - As a result, updates can be very different from one another for each device. - As THIS is open source software, the operating system can be tailored for the device. WA1 to 2) THESE have consistent hardware and software and do not require different manufacturers or vendors to provide updates. WA3) THIS is a line of tablets and mobile computers running Windows 10. - Updates for these systems are provided by the company producing Windows 10.
A) Android smartphones WAs) iPhones, iPads, Microsoft Surface (in this order.)
Which Linux command is used to rename a file or directory? A) cd B) cp C) ls D) mv CA) THIS command is used to rename a file or folder in a Linux system. - It is similar to the ren command used in Windows. WA1) THIS command is used to navigate and change directories in a Linux system. - It is actually the same syntax used in Windows. WA2) THIS command is used in a Linux system to retrieve and display a directory listing. - It has a similarity to the dir command used in Windows. WA3) THIS command is used in a Linux system to copy files and directories. - It is similar to the copy command that is used in Windows.
D) mv WAs) cd, ls, cp.
Which of the following network card settings allows for simultaneous 2-way data communication? A) Full duplex B) Half Duplex C) Quality of service (QoS) D) Signaling speed CA) THIS form of communication allows for simultaneous 2-way data communication. - This means that both sender and receiver may transmit at the same time. - A basic example of THIS brand of communication is a telephone conversation. WA1) THIS form of communication allows for turn-based 2-way data communication. - This means that the sender and receiver must take turns to transmit. - A basic example of THIS brand of communication is a walkie-talkie conversation. WA2) THIS refers to speed at which the network interface card (NIC) may operate. - 1Gbps (Gigabit per second) is an example of a NIC speed. WA3) THIS refers to managing traffic types. - THESE polices can be put in place to ensure certain traffic types always have bandwidth priority. - THIS is often applied to VOIP (Voice Over IP) traffic.
2) Full Duplex WAs) B, D, C.
You are remotely browsing a Windows server's shared folders in computer management. You see a share called c$ in the list. What type of share is this? A) Administrative B) Boot volume C) Group policy D) Operating system CA) THESE shares are automatically created by Windows. - Each disk volume on the system has THIS associated share. - THESE can be viewed by browsing the server and share name. - For example, \\servername\c$ would display the server's C drive. WA1) THIS is software installed on the system to give it functionality. - While c$ will display what is typically THIS type of volume, there is no share of this type. WA2) THIS is the disk volume that the system boots from. - While the ____ system is typically drive C, THIS volume is not a share of the type our (CA) describes. WA3) THIS is used to create settings for a system or systems, including desktop appearance, security settings, drive mappings, and more.
A) Administrative WAs) D, B, C.
An application that was recently installed has written configuration data to the user's profile. In which folder would this configuration data be found? A) AppData B) Program Files C) Program Files (x86) D) Windows\Systems32 CA) Windows applications usually create configuration data for each user on a system. Often THIS folder is used, and each user would have their own. WA1) THIS folder is a folder found on Windows 64-bit systems. - It is the location where 32-bit software will be most likely be installed. WA2) THIS folder is the default folder on 32-bit only systems and 64-bit systems. - On 64-bit systems, 64-bit software is usually installed in this folder. WA3) THIS folder is the location for Windows operating system files. - Software applications would be installed in either (1) or (2).
A) AppData WAs) C, B, D.
You want to use network QoS (Quality of Service) on Windows systems. Which of the following is applied to a QoS policy? A) DSCP (Differentiated Services Code Point) value B) Internet Protocol V4 C) Internet Protocol V6 D) Microsoft LLDP (Link Layer Discovery Protocol) CA) THIS is assigned to different types of network traffic. - This is then used by routers to determine what priority the network traffic has. WA1) THIS is the most common used IP addressing standard. While QoS uses IP, it is not used in a policy setting. - It uses four 32-bit decimal octets, ranging from 0 to 255 for each octet. WA2) THIS is the latest IP addressing standard. While QoS uses IP, it is not used in a policy setting. - It uses eight 128-bit hexadecimal octets, ranging from 0 to FFFF for each octet. WA3) THIS is a protocol that a system uses to advertise its identity, capability, and more. - It is not used in a QoS policy.
A) DSCP value WAs) C, B, D.
Which of the following is recommended for routine disk maintenance on a computer? A) Defragmenting B) Formatting C) Initializing D) Partitioning CA) DOING THIS to a disk can improve system performance. - It is a process that optimizes disk usage by rearranging and grouping data on a disk. - Scheduling THESE will help to keep a disk running as fast as possible. WA1) DOING THIS to a disk is useful when creating new disk volumes. - It is not a process that is usually routinely scheduled. WA2) DOING THIS to a disk is a process that erases all data, prepares a file system, and prepares it for use by the operating system. - THIS would not be included in a maintenance schedule. WA3) DOING THIS to a disk is a process that is used with a new disk installation. - THIS prepares it for use by the host operating system and is usually followed with (2). - THIS would not be included in a maintenance schedule.
A) Defragmenting WAs) Partitioning, Formatting, Initializing.
What network connection type is slow by today's standards, but is often used as a backup connection method? A) Dial-up B) Ethernet C) Wired D) Wireless CA) THESE connections use a modem on each end of the connection for connectivity. - By today's standards THIS is extremely slow but a cost-effective backup communication method when needed. WA1) THIS is a standard used in modern data communications. - The standard is represented with varying labels such as 802.3. Both modern network cabling and Wi-Fi technology is based on this standard. WA2) THIS network is typically a local area network based on connectivity through ________ access points (AP). WA3) THIS network is typically a local area network based on connectivity through physical (1) cable connections.
A) Dial-up WAs) Ethernet, Wireless, Wired.
Which of the following is a concern when installing multiple operating systems on a single computer for multi-boot purposes? A) Disk Space B) Power Management C) Swap Space D) Configuring RAID (Redundant Array of Independent Disks) CA) THIS is a concern when installing multiple operating systems on a computer. - As each operating system will have published requirements for THIS, it is best to calculate what is needed before starting. WA1) THIS is an area on a disk that is used as temporary virtual memory. - On a Windows system, virtual memory can be managed by Windows or set by the user. WA2) THIS is used to control how system hardware behaves. - THIS can impact performance and energy consumption. WA3) THIS is beneficial for redundancy purposes, even if it is not a requirement.
A) Disk Space WAs) C, B, D.
When using a Mac, sometimes an application can stop responding. How do you terminate an application? A) Force quit B) Reboot C) Task manager D) Time machine CA) THIS can be used to close an application that has stopped responding. - This procedure is the equivalent to using the task manager to end a problem application in Windows. WA1) THIS is the packaged backup and restore software that is included with the Mac OS. - Like traditional backup software, jobs can be configured and scheduled to backup certain files. WA2) THIS is a Windows utility that can be used for a number of system tasks, including the forced closing of a problem application. WA3) DOING THIS is usually not required to close one application.
A) Force quit WAs) Time machine, Task manager, Reboot.
When installing an application from a network, how can the application be automatically deployed? A) Group policy B) NIC (Network Interface Card) C) Shared folder D) USB (Universal Serial Bus) drive CA) THIS is a Windows server feature that allows policies to be pushed to computers that are members of the domain. - Within THESE can be a software installation ______ that automatically installs software on a system. WA1) THESE are folders on a networked computer. Application installation files are made available on THESE. WA2) THESE, such as, a flash drive is often used as an application distribution device. - ___ flash drives are available in many sizes making availability of software convenient. WA3) THIS is a hardware peripheral used to connect a computer to a network.
A) Group policy WAs) C, D, B.
You have installed a new 64-bit application on a 64-bit Windows workstation. You would like to review the installation directory for the application. Where would you find the application's install directory? A) Program Files B) Program Files (x86) C) Windows\Systems32 D) Windows\SysWOW64 CA) THIS folder is the default folder on 32-bit only systems and 64-bit systems. - On a 64-bit system, 64-bit software is usually installed in this folder. WA1) THIS folder is a folder found on Windows 64-bit systems. - It is the location where 32-bit software is installed. WA2) THIS folder is the location for Windows operating system files. - Software applications would be installed in either our correct answer or (1). WA3) THIS is a special folder only found on Windows 64-bit systems that are used to hold 32-bit binary files.
A) Program Files WAs) B, C, D.
What connection type creates a private tunnel over an existing network connection for privacy? A) VPN (Virtual Private Network) B) Wired C) Wireless D) WWAN (Wireless Wide Area Network) CA) THIS connection is a technology that creates a private encrypted tunnel over a network between two endpoints. - THIS is commonly used between business locations over the Internet as a secure and private method for file sharing. WA1) THIS is a network that is available from a cellular provider through a subscription model. WA2) THIS is typically a local area network based on connectivity through ________ access points (AP). WA3) THIS is typically a local area network based on connectivity through physical Ethernet cable connections.
A) VPN WAs) WWAN, Wired, Wireless.
A user is looking to purchase a new Windows 10 computer for work. The computer has the requirement of being on the corporate Windows Active Directory domain. Which operating system does NOT meet this requirement? A) Windows 10 Home B) Windows 10 Enterprise C) Windows 10 Education D) Windows 10 Professional CA) THIS edition is a basic version of Windows that does not contain many business features. - Some of the features are BitLocker and the ability to join a Windows domain. WA1) THIS edition is a popular version of Windows that is found in most business environments. - This version of Windows can be joined to a domain. WA2) THIS edition is a business edition of Windows that is like the professional edition. - Differences include the enterprise edition featuring application virtualization and additional Windows defender functionality. WA3) THIS edition is like (2), but is geared towards the education market.
A) Windows 10 Home WAs) Pro, Enterprise, Educational.
Which Linux command is used to navigate directories? A) cd B) cp C) ls D) rm CA) THIS command is used to navigate and change directories in a Linux system. - It has the same syntax as the command line utility used in Windows. WA1) THIS command is used in a Linux system to retrieve and display a directory listing. - It has a similarity to the dir command used in Windows. WA2) THIS command is used in a Linux system to retrieve and display a directory listing. - It has a similarity to the dir command used in Windows. WA3) THIS command is used in a Linux system to delete files and directories. - It is similar to the del and rd commands in Windows.
A) cd WAs) ls, cp, rm.
Which Linux command is used to copy a file or directory? A) cp B) ls C) mv D) rm CA) THIS is used in a Linux system to copy files and directories. - It is similar to the copy command that is used in Windows. WA1) THIS command is used to rename a file or folder in a Linux system. - It is similar to the ren command used in Windows. WA2) THIS command is used in a Linux system to delete files and directories. - It is similar to the del and rd commands in Windows. WA3) THIS command is used in a Linux system to retrieve and display a directory listing. - It has a similarity to the dir command used in Windows.
A) cp WAs) C, D, B.
You are working on a Linux system and would like to copy and convert some files between different encoding formats. Which command would you use? A) dd B) grep C) ls D) vi CA) THIS is a utility that is used for copying and converting files. - Converting to and from files encoded with either ASCII (American Standard Code for Information Interchange) or EBCDIC (Extended Binary Coded Decimal Interchange Code) standards is possible. WA1) THIS command is used to list file names and attributes. - Using THIS on its own will return basic information. - Command line switches extend the capability of the ls output. WA2) THIS command is used to launch this same-named editor. - The editor can be used to edit text files such as script files. WA3) THIS command is used to find a string of text and return a result. - For example, to find the root user in the password file, the syntax is ____ root /etc/passwd.
A) dd WAs) ls, vi, grep.
You must troubleshoot a Linux workstation. The first step is viewing basic contents of the current directory. Which command do you use? A) ls B) pwd C) ps D) sudo CA) THIS command is used to list file names and attributes. - Using THIS on its own will return basic information. - Command line switches extend the capability of the ____output. WA1) THIS command displays a list of the processes currently running on the system. Optional switches extend the output of the command. WA2) THIS command displays the full name of the current directory. - Optional switches extend the output of the command. WA3) THIS command allows users to run a program with the security privileges of the superuser (root) account. - By using this command credentials of the superuser account are required for the program to execute.
A) ls WAs) ps, pwd, sudo.
Which of the following requires firmware updates? A) Anti-virus definitions B) BIOS (Basic Input Output System) C) Print driver D) Security patches CA) THIS is a set of hardware instructions embedded in the hardware of a computer system. The settings HERE can be manipulated for configuration changes. - Updates HERE are firmware updates that provide improvements to a system. WA1) THIS is required for a system to be able to _______. - The ______ provides an interface for the _______ to receive commands and print jobs correctly. - While THIS may occasionally have a firmware update, it does not apply HERE. WA2) THESE are updated routinely through anti-virus software updates. - They contain virus signatures for infection prevention. - Firmware updates do not apply to THESE. WA3) THESE are updates that are provided to operating systems and applications by the software publisher. - Firmware updates do not apply HERE.
B) BIOS (Basic Input Output System) WAs) C, A, D.
Which Windows firewall setting blocks all traffic except for any that has a specific rule to allow it? A) Allow B) Block C) Block all connections D) Configure Exceptions CA) THIS setting in the Windows firewall blocks all traffic except for any traffic that has an exception configured. - An exception (including with (2) and (3)) can include allowing certain application traffic or port traffic WA1) THIS setting in the Windows firewall allows all traffic. WA2) THIS setting in the Windows firewall blocks all traffic regardless of any exceptions that are configured. WA3) THIS option in Windows firewall allows for an exception to be added.
B) Block WAs) A, C, D.
Which utility allows Windows to be installed on a Mac computer in a dual boot scenario? A) BIOS (Basic Input Output System) B) Boot Camp C) Mission control D) Spotlight CA) THIS is a boot manager package for MacOS X systems. - It enables users to install Windows into a separate partition for a dual boot scenario on an Apple computer. WA1) THIS is the Mac OS multiple virtual desktop feature. - Users can create multiple spaces, and switch between them using THIS. WA2) THIS is a Mac OS search tool search that can find files, images, websites, applications, and more by using keywords and phrases. WA3) THIS is part of the computer system and it is used for managing system hardware settings.
B) Boot Camp WAs) C, D, A.
You need to modify a PC's Windows firewall as it is blocking a program that relies on the Internet to function. You are going to temporarily disable the firewall as a test. Which of the following is NOT one of the profiles that can be enabled or disabled in a Windows firewall? A) Domain B) Exceptions C) Public D) Private CA) THESE are firewall rules. - By default, some applications can communicate through a firewall while others can not. - To allow communications for an application that is being blocked, THIS can be made. WA1) Different firewall profiles allow for different firewall behavior based on the connection. - The Windows firewall ______ profile is applied when a computer is on a network and is connected through Active Directory. WA2) The Windows firewall _______ profile is applied when a computer is on a network and is not connected through an associated account such as Active Directory. WA3) The Windows firewall _______ profile is applied when a computer is on a public network such as at a local coffee shop.
B) Exceptions WAs) Domain, Private, Public.
What is the finder application in Mac OS X used for? A) Ending a program B) File & folder browsing C) Backup and restore D) (Using) Multiple (virtual) desktops CA) Finder is used for THIS and as a management application that is included with Mac OS. - It is similar to the Windows file explorer. WA1) Mission control offers the capability of customizing and DOING THIS on a single system to make a computing experience more efficient. WA2) Time machine is the packaged software for DOING THIS that is included with the Mac OS. - Like traditional ________ & ________ software, jobs can be configured and scheduled to DO THIS to certain files. WA3) Force quit can be used TO DO THIS with Mac OS. - This procedure is the equivalent to using the task manager to DO THIS application in Windows.
B) File & folder browsing WAs) D, C, A.
Which of the following backup types is recommended to be scheduled weekly? A) Differential B) Full C) Incremential D) Off-site CA) THIS backup type is used to backup an entire system's data. - A good backup strategy would include one of THESE at the beginning of the week, and one of (1) and (2) performed daily. WA1) THIS backup requires that there is a ________ backup performed first. - It only does a backup of data that has changed since the last ________ backup. - It is recommended to run daily. WA2) THIS backup requires that there is a ________ backup performed first. - It only does a backup of data that has changed since the last ________ backup. - It is recommended to run daily as an alternative to (1). WA3) THIS backup is not a backup that is scheduled but is a backup that is held at a location other than the location of the original data. - This is done for purposes of safekeeping.
B) Full WAs) Incremential, Differential, Off-Site.
You are troubleshooting a network card on a Windows 10 computer. You need to install additional features within the network card's properties. Which of the following is NOT an item that can be installed? A) Client B) Gateway C) Protocol D) Service CA) A network interface card (NIC) properties window allows a user to modify network card settings. - THIS address is a setting that can be applied to a protocol but is not an installation option. WA1) THIS is an option that can be installed to support client server communication. - An example of THIS is that used for Microsoft networks. WA2) THIS is an option that can be installed to support a service. - An example of THIS is the QoS (Quality of Service) packet scheduler. WA3) THIS is an option that can be installed to support communication for a network type. - An example of THIS is (IPv4/v6).
B) Gateway WAs) Client, Service, Protocol.
You would like to apply a new group policy to a Windows domain computer. Which command will apply all policies to the computer (both new and old)? A) Gpupdate B) Gpupdate /force C) GPresult /user D) GPresult /r CA) THIS is a command line utility that applies group policies to a computer. Using gpupdate alone will only refresh and apply any newly created policies. - The _____ switch also applies any polices that are not newly created and haven't yet been applied. WA1) Using THIS alone (unlike our correct answer) without any switches will only refresh and apply any newly created policies. WA2) THIS is a command line utility that displays the results of group polices when applied to an object. - THIS switch specifies the user account that is displayed. WA3) THIS switch (similar to what (2) uses) specifies that the results will be displayed on screen.
B) Gpupdate /force WAs) Gpupdate, GPresult /user, GPresult /r.
Which anti-virus protection technology uses knowledge of virus-like behavior as a means of defense? A) Definitions B) Heuristics C) Network access control D) Patch management CA) THIS is a method that anti-virus software uses to try to identify viruses based on behavior. - It monitors a computer for activity that seems virus-like. WA1) THESE are also known as signatures or patterns. - THESE are included in an anti-virus software's database of known threats to identify malicious activity and files. WA2) THIS is a method of keeping operating systems and applications routinely up to date for operational and security purposes. WA3) THIS is a method of managing inbound and outbound traffic on a network, with a focus on security measures. - The use of a firewall is a component of THIS.
B) Heuristics WAs) A, D, C.
Which information is required to set up an alternate Internet Protocol (IP) address connection in Windows? A) Active Directory domain name, Domain Name System (DNS) server address, Administrator password B) IP (Internet Protocol) address, subnet mask, gateway address, Domain Name System (DNS) server address C) IP (Internet Protocol), Active Directory domain name, subnet mask, gateway address D) IP address, NETBIOS (Network Basic Input Output System) name, Domain Name System (DNS) server address CA) An alternate IP (Internet Protocol) address is useful for laptop computers that are used on multiple networks, some of which may not have a DHCP (Dynamic Host Control Protocol) server. - An alternate IP address requires the same configuration as the primary. - 4 OTHER THINGS are required. WA1) THESE 3 THINGS would be required to join a computer to an Active Directory domain. WA2) 2 of THESE would be required. - However, 1 of THESE is a naming scheme that does not rely on ___ and is not required. WA3) 3 OF THESE would be required. - However, 1 of THESE would only be required when joining a Windows domain.
B) IP (Internet Protocol) address, subnet mask, gateway address, Domain Name System (DNS) server address WA1) Active Directory domain name, Domain Name System (DNS) server address, Administrator password WA2) IP address, [NETBIOS (Network Basic Input Output System) name], Domain Name System (DNS) server address WA3) IP (Internet Protocol), [Active Directory domain name], subnet mask, gateway address
By using the Linux dd command, you can create a byte-level copy or an image of a disk. What is the purpose of creating a disk image? A) It is used for backing up system files and configurations. B) It is used for a complete system restore. C) It is used in the event of a firmware upgrade failure. D) It is used to measure the read/write performance of a disk. CA) The dd command creates an exact (byte-level) copy of an entire disk in the system, FOR THIS EXACT PURPOSE. - Remember, it's for ALL FILES. WA1) In case of a BIOS (Basic Input Output System) firmware upgrade, a backup of the current firmware would be required for a restoration. - A disk image would not be useful. WA2) The dd command can be used for THIS, but that use is not applicable in this case.
B) It is used for a complete system restore. PC) A. WAs) C, D.
A user needs a mobile computer for traveling. You decide on a Windows 10 S edition mobile computer. Which of the following is the main differing feature of Windows 10 S edition from other editions? A) It allows for joining an Azure cloud domain. B) It only runs applications from the Windows Store. C) It supports BitLocker. D) It supports mobile device management. CA) Windows 10 S edition is found on many new lightweight mobile computers and is not purchased separately. - This edition has several differences from other Windows 10 editions including THIS ABILITY. WA1) Like other editions, this edition does not support the ability to join THIS on-premise, but it does have the ability to join an Azure domain. WA2) Like other editions, this edition of Windows does use THIS, which is a security mechanism for encrypting an entire hard disk. WA3) Like other editions, this edition does support THIS, which is a feature that allows a device to be managed remotely and easily in business environments.
B) It only runs applications from the Windows Store. WAs) A, C, D.
What is the name of the password management system built into Mac OS X? A) Credential manager B) Keychain C) Snapshot D) Time machine CA) THIS is the built-in Mac OS X password manager. - When a user visits a website, uses an email account, or accesses a network resource, THIS will provide an option to remember the credentials. WA1) THIS is a built-in ________ ________ for the Windows operating system. - Similar to our (CA), it stores passwords of websites and network resources. WA2) THIS is the packaged backup and restore software that is included with the Mac OS. - Like traditional backup software, jobs can be configured and scheduled to backup certain files. WA3) THIS is a feature in Mac OS to take a snapshot of any changed files. - These files are saved locally until (2)'s drive becomes available again to the system.
B) Keychain WAs) A, D, C.
How does a user access the Apple iCloud web service application from a Mac computer running OS X? A) Install the iCloud app from the app store B) Log on to icloud.com using a web browser C) Open finder and open iCloud drive D) Use the Apple menu, system preferences, iCloud CA) The iCloud web service application can be accessed THIS EXACT WAY. - A user simply needs to DO THIS. WA1) The iCloud in system preferences is used ONLY FOR for setting up iCloud. WA2) The iCloud drive in finder is an access point to iCloud storage. - It can be used ONLY TO access cloud content easily rather than using a browser-based interface. WA3) The iCloud service is a web-based storage service. THAT means THIS may/may not actually exist.
B) Log on to icloud.com using a web browser WAs) D, C, A.
You are configuring a Windows 10 Enterprise desktop that will be used with many applications opened at the same time. Which system specification will need special attention during the configuration? A) Disk activity B) Memory C) OS version D) Windows services CA) THIS will be impacted the most when multiple windows are open. - An increased amount of THIS will benefit the system's ability to multi-task. WA1) THIS occurs on a system during opening, saving, and manipulating files. - While THIS can impact a system's performance, in this case the amount of memory will have a much higher impact. WA2) What's selected HERE is 64-bit and is more than capable of multitasking. WA3) THESE are applications that can run automatically or manually. - THESE usually run while using a set of credentials AND does not impact this system.
B) Memory WAs) A, C, D.
When selecting applications for installation, proper security considerations are required. Which of the following is a high impact concern for malware in a business environment? A) Group Policy B) Network C) Permissions D) Updates CA) THIS is a major concern for businesses when it comes to malware. - Resources HERE such as file and folder shares could be severely impacted and compromised. WA1) THIS is a Windows server feature that allows policies to be pushed to computers that are members of the domain. - Within SUCH can be a software installation ______ that automatically installs software on a system. WA2) THESE (not a concern here) are used to provide access to resources for users. - These resources include folder and printer shares. WA3) THESE are used to provide security and software updates to the Windows operating system and applications such as Microsoft Office.
B) Network WAs) A, C, D.
You are working on a Linux workstation. You issue the chown bob /stuff command at the terminal. What is the result of issuing this command? A) All files named bob have been removed from the directory /stuff. B) Ownership of the /stuff directory has been assigned to the user bob. C) The name of the directory has been changed from bob to stuff. D) The permissions for the user bob have been removed from the /stuff directory. CA) In a file system, files and directories have owners. - The chown command is used to change ownership. - Thus, THIS occurs. WA1) The mv command is used to rename a folder. To rename a folder syntax such as mv folder1 folder2 would rename folder1 to folder2. WA2) The rm command is used to delete files. To remove all files with the word bob in the name the command would be rm bob*. WA3) The chmod command is used to assign permissions. This command uses numeric values to assign permissions to users and groups.
B) Ownership of the /stuff directory has been assigned to the user bob. WA1) The name of the directory has been changed from bob to stuff. WA2) All files named bob have been removed from the directory /stuff. WA3) The permissions for the user bob have been removed from the /stuff directory.
A user needs to access a network printer on their Windows 10 computer. Which installation option will automatically install the printer connection and printer drivers? A) Mapped printer B) Shared printer C) Wired networked printer D) Wireless networked printer CA) THIS is installed on a system and is available for other systems to use. - Connecting is quick and easy and is done by doubling clicking the printer in Windows file explorer. - Doing so connects the printer and installs the driver. WA1) THIS is a printer that is available for connections on a network. - Connection is based on a discovery or knowing the printer's address. - Print drivers will also need to be acquired when installing a mapped printer. WA2) THIS is connected through a physical Ethernet cable to the network - THIS can be set up as our (CA) or as (1). WA3) THIS is connected through a ________ access point (AP) to the network. - THIS can be set up as our (CA) or as (1).
B) Shared printer WAs) Mapped printer, Wired, Wireless.
Which term describes how the Mac operating system handles files created, deleted, or modified since the last backup when the backup drive is temporarily missing? A) Disk dump B) Snapshot C) System restore point D) Tarball CA) THIS feature is the ability of the Mac OS to take THIS of any changed files. - These files are saved locally until the Time Machine drive becomes available again to the system. WA1) THIS creates a full image of a disk. - This utility makes a bit-by-bit image regardless of the file system in use. WA2) THIS is a Windows feature that enables a restore point to be created automatically or manually. - It is a collection of settings that can be restored in the event of a system problem. WA3) THIS is a tarred group of files. - Tar is a utility that is used to compress and bundle files into a single file. - The same utility that creates the tar file can be used to unpack the files.
B) Snapshot WAs) A, C, D.
You are working on a Linux workstation. You issue the ps -x command at the terminal. Which processes are displayed with this command? A) All processes from a specific group are displayed. B) The processes owned by the user who issued the command are displayed. C) Processes from a specific process id are displayed. D) Processes from a specific user are displayed. CA) The ps command is used in a terminal to display a list of running processes. - When issuing the ps command with the -x switch, the user who issued the command will only see THIS. WA1) FOR THIS, the -g switch is used along with the group name. WA2) FOR THIS, the -u switch is used along with the group name. WA3) FOR THIS, the -p switch along with the process id should be specified with the ps command.
B) The processes owned by the user who issued the command are displayed. WA1) All processes from a specific group are displayed. WA2) Processes from a specific user are displayed. WA3) Processes from a specific process id are displayed.
You are setting up wireless connectivity for a few Windows 10 laptops. You need to configure an access point with security settings. Which of the following authentication methods is the least secure? A) WPA2 Wi-Fi Protected Access 2) B) WEP (Wired Equivalent Privacy) C) WPA Wi-Fi Protected Access) D) WAP (Wireless Application Protocol) CA) THIS is a security protocol specified in the Wi-Fi standard. - It is an older security method that used a CRC (Cyclic Redundancy Check) as a mechanism and was found to have security flaws. WA1) THIS is a security protocol specified in the Wi-Fi standard. - IT was developed to replace (CA) and uses a message integrity check. - IT also uses TKIP (Temporal Key Integrity Protocol). WA2) THIS is a security protocol specified in the Wi-Fi standard. - It replaced (1) and includes mandatory support for an Advanced Encryption Standard (AES) encryption mode. WA3) THIS is a legacy protocol used by early mobile devices for mobile wireless connectivity.
B) WEP WAs) WPA, WPA2, WAP.
You are adding a new Windows 10 computer to a remote office that already has five computers. You are trying to configure it with BranchCache like the existing five, but you are not able to. Which operating system will you need? A) Windows 10 Home B) Windows 10 Enterprise C) Windows 10 Pro D) Windows 10 S CA) THIS edition supports many more features than other editions of Windows 10. - Among those features is BranchCache which allows client computers to work together to locally cache content from a remote Windows server. WA1) THIS edition is a mainstream operating system for business. - While it contains many business features, BranchCache is not one of them. WA2) THIS edition is an operating that is designed for the home user. - This edition does not contain BranchCache features. WA3) THIS edition is designed for use on mobile business computers. - This edition does not contain BranchCache features.
B) Windows 10 Enterprise WAs) Pro, Home, S.
A system has an on-board (motherboard-integrated) network interface card (NIC) that is not being recognized by Windows. How do you check that the card is enabled for use? A) With control panel B) With the system BIOS (Basic Input Output System) C) With device manager D) With the network and sharing center CA) THIS is a set of instructions located in the system hardware's ROM (Read Only Memory). - An on-board card would be enabled or disabled thru THIS. WA1) THIS is a Windows system utility that is used to manage and troubleshoot hardware. - THESE can be enabled and disabled with device manager, but Windows is not recognizing the card. WA2) THIS contains a collection of system management utilities, including utilities for troubleshooting devices. - However, Windows is not recognizing the card. WA3) THIS is a location in Windows where numerous network settings can be managed and configured. - At the moment, however, Windows is not recognizing the card.
B) With the system BIOS (Basic Input Output System) WAs) C, A, D.
A user reports that they are not able to edit a text file while using a Linux workstation. Investigating reveals that they do not have permissions to the file. Which command can be used to change file permissions? A) chmod B) chown C) grep D) ps CA) THIS command is used to change access permissions to files and folders. - THIS is often used with numerical values of four octal digits. - The three rightmost values refer to user, group, and other permissions, while the first is for setting a special flag. WA1) THIS command is used to change ownership and group information for a file. - The syntax follows _____ new-owner:new-group filename. WA2) THIS command displays a list of the processes currently running on the system. Optional switches extend the output of the command. WA3) THIS command is used to find a string of text and return a result. - For example, to find the root user in the password file, the syntax is _____ root /etc/passwd.
B) chmod WAs) chown, ps, grep.
A user has left the company. You have created a new user account on the Linux workstation that will be used. You need to change ownership to a few files and folders for the new user. Which command can you use to do so? A) chmod B) chown C) grep D) ps CA) THIS command is used to change ownership and group information for a file. - The syntax follows _____ new-owner:new-group filename. WA1) THIS command is used to change access permissions to files and folders. - THIS is often used with numerical values of four octal digits. - The three rightmost values refer to user, group, and other permissions, while the first is for setting a special flag. WA2) THIS command displays a list of the processes currently running on the system. Optional switches extend the output of the command. WA3) THIS command is used to find a string of text and return a result. - For example, to find the root user in the password file, the syntax is _____ root /etc/passwd.
B) chown WAs) chmod, ps, grep.
You are troubleshooting a Linux system that is having network difficulty. The system uses a wired Ethernet connection. Which command do you use to view and modify the network configuration? A) apt-get (Advanced Package Tool) B) ifconfig C) ipconfig D) iwconfig CA) THIS command is a system utility that is used for network configuration of a network interface. - As an example, using ________ -a is used to view the configuration of all interfaces. WA1) THIS command is similar to the ________ command, however, it is directed as use with wireless networking. WA2) THIS command is a Windows command that displays basic network adapter and protocol information. WA3) THIS command is used for handling packages within a Linux distribution. - Using the update command along with THIS will synchronize package index files.
B) ifconfig WAs) iwconfig, ipconfig, apt-get.
You are troubleshooting a Linux workstation. You would like to end an unresponsive process. Which command do you use? A) dd B) kill C) ps D) vi CA) THIS command is used to end a specific process. - Ending a process is based on knowing and referring to the process ID. - The Syntax involved is: ___ processID. WA1) THIS command displays a list of the processes currently running on the system and is not related to (2). = Optional switches extend the output of the command. WA2) THIS command is used to launch this same-named editor. - The editor can be used to edit text files such as script files. WA3) THIS is a utility that is used for copying and converting files. - Converting to and from files encoded with either ASCII (American Standard Code for Information Interchange) or EBCDIC (Extended Binary Coded Decimal Interchange Code) standards is possible.
B) kill WAs) ps, vi, dd.
A user is concerned that someone may know their password on a Linux system that is used for development. You decide to change their password. Which command you use? A) chown B) passwd C) ps D) pwd CA) THIS command is used to change a user's password in Linux. - A superuser can change anyone's password, while a regular user can only change their own password. WA1) THIS command displays the full name of the current directory. - Optional switches extend the output of the command. WA2) THIS command displays a list of the processes currently running on the system. - Optional switches extend the output of the command. WA3) THIS command is used to change ownership and group information for a file. - The syntax follows ______ new-owner:new-group filename.
B) passwd WAs) pwd, ps, chown.
Which Linux command switch is used to reboot after a shutdown? A) -c B) -h C) -r D) -t CA) The Linux shutdown command is used to shut down the operating system. - Using THIS switch with the command instructs the system to reboot. WA1) THIS switch is used to halt the system. - This is different than the -H switch which instructs the system to drop into boot monitor. WA2) THIS switch is used to cancel a pending system shut down. WA3) THIS switch is used to specify a time in seconds between sending processes a warning and a kill signal.
C) -r WAs) -h, -c, -t.
You are setting up a remote desktop connection from a Windows 7 PC to a Windows 10 PC for a user at work. It seems that a hardware firewall is blocking the connection. Which port should be allowed for the RDP (Remote Desktop Protocol) session to work? A) 21 B) 443 C) 3389 D) 80, 8080 CA) RDP (Remote Desktop Protocol) uses port ____ by default. - If an RDP session is not connecting properly, firewall settings should be checked. - For security purposes it is recommended to use a non-standard port for RDP. WA1) SSL (Secure Sockets Layer) uses port ___. - SSL is used for secure communications between a web host and a web browser. WA2) HTTP (HyperText Transfer Protocol) uses port __for web communications and services. - Port ____ is used as an alternative port. WA3) FTP (File Transfer Protocol) uses port __ for file transfers between systems.
C) 3389 WAs) 443, 80 & 8080, 21.
Which of the following does NOT support multi-touch gestures? A) A magic mouse B) A magic trackpad C) A monitor D) A multi-touch trackpad CA) Multi-touch gestures allow a user to tap, swipe, pinch, or spread with one or more fingers to perform an action on a Mac system. - THESE do not currently support multi-touch gestures. WAs) It supports multi-touch gestures. WA1) THIS is a peripheral similar to a traditional mouse that is designed by Apple to be used with Mac OS computers. WA2) THIS is a peripheral designed by Apple to be used with Mac OS computers. WA3) THIS is an internal peripheral found on mobile Mac OS computers.
C) A monitor WAs) A, B, D.
A user who travels often needs a remote solution for connectivity while using a laptop. You install a WWAN (Wireless Wide Area Network) card. Which technology does this type of card NOT use? A) 3G B) 4G C) Bluetooth D) Cellular CA) THIS is a short-range communications protocol. - It is commonly used by mobile devices and computer systems for peripheral connections such as headphones and game controllers. WA1) THIS is a wireless mobile communications technology. - Mobile devices can use __ communications for Internet access via an internal or mobile WWAN (Wireless Wide Area Network) card. WA2) THIS is a wireless mobile communications technology. - There have been network improvements to the __ network since its introduction, including LTE (long Term Evolution) and LTE Advanced. - Mobile devices can use __ communications for Internet access via an internal or mobile WWAN (Wireless Wide Area Network) card. WA3) THIS is a wireless network that spans over land areas called cells. - Each of THESE is serviced by at least one fixed-location transceiver.
C) Bluetooth WAs) 3G, 4G, Cellular (Cells).
A user has a Windows 10 laptop that is used at home and at work. At work, the laptop receives an IP address dynamically. At home the laptop requires a static IP. The user is having difficulty remembering how to change IP settings between static and dynamic when changing locations. What configuration change could you make? A) Set up DHCP at the work location. B) Set up the laptop to use an APIPA address. C) Configure an alternate IP address on the laptop. D) Use the network and sharing center. CA) DOING THIS on a Windows computer allows the computer to use a secondary IP address. - This is helpful when the computer is used on multiple networks. - The primary network address has priority and the alternate works when the primary is not active. WA1) DOING THIS is not necessary as the addressing scheme is already set to dynamic. WA2) Setting THIS is not helpful. - THIS is used when a computer cannot find a DHCP server. - An address here is automatically assigned. WA3) Using THIS is not helpful. - The network card properties is required to modify the network adapter.
C) Configure an alternate IP address on the laptop. WAs) A, B, D.
You are trying to connect a new user's Windows 10 laptop to the corporate Active Directory domain. You keep receiving an error message stating that the domain cannot be found. What should you check first? A) BitLocker Settings B) Compatibility mode C) DNS settings D) Group policy settings CA) Active Directory (AD) is tightly integrated with and depends on ___. - For a computer to be able to join a domain, THESE must be properly set. When using a PC in an AD environment, the primary ___ server should be set to the AD server's IP address. WA1) THIS is a security mechanism that is used to encrypt a hard drive's data. - THIS relies on the computer having a TPM (Trusted Platform Module) chip. WA2) THIS is used to run legacy applications as prior version of Windows for THESE purposes. WA3) THIS is used to create settings for a system or systems. - Desktop appearance, security settings, drive mappings, and more can be set with THIS.
C) DNS settings WAs) A, B, D.
Which of the following alternate IP (Internet Protocol) settings serves as a router setting when DHCP (Dynamic Host Configuration Protocol) is not available? A) Alternate DNS (Domain Naming System) B) Preferred DNS (Domain Naming System) C) Default gateway D) Subnet mask CA) THIS address is used by a computer to find remote networks and hosts. - For example, when a computer browses a web site, this identifies the site as non-local and routes the request to the Internet. WA1) THIS server translates domain names into IP (Internet Protocol) addresses. - THIS is the server that is contacted first. WA2) THIS server translates domain names into IP (Internet Protocol) addresses. - THIS is used when (1) is not available. WA3) THIS is used to identify what network a computer belongs to. - THIS works in conjunction with the system's IP (Internet Protocol) address.
C) Default gateway WAs) B, A, D.
What folder permissions are required for a user to run an application? A) Dir B) Delete C) Execute D) Write CA) THIS permission is required for a user to be able to run an application located in a folder. Additionally, a read permission would be required as well in order to see the folder contents. WA1) THIS permission would allow a user to save content to the folder. - In this case, nothing is being saved to the application folder. WA2) THIS command is a utility used to delete files. - It is not used to run an application. WA3) THIS command is a utility used to browse a folder directory. - It is not used to run an application.
C) Execute WAs) Write, Delete, Dir.
How may a deployed application be granted rights to perform a successful installation? A) It is run with a standard user account. B) It is deployed with a group policy. C) It can run using a service account. D) it is made available in a shared folder. CA) THIS is an account used by the operating system for various management tasks. - THIS would have the authority to perform an installation and could be used for the deployed application. - A deployed application could be set to use THIS. WA1) THIS is a Windows server feature that allows policies to be pushed to computers that are members of the domain. - Within SUCH can be a software installation ______ that automatically installs software on a system. WA2) THIS is a folder on a networked computer. Application installation files can be made available inside THIS. WA3) THIS is a default user account on a computer system. - THIS account type does not have administrative privileges and will not be able to perform the application installation.
C) It can run using a service account. WAs) B, D, A.
What is the purpose of a Remote Disc entry in the Finder navigation pane in Mac OS X? A) It is a standard mount point for external Universal Serial Bus (USB) drives. B) It is there to restore a Mac from an external backup. C) It is there for systems that don't have built-in optical disk drives. D) It is used when mapping a Network File System (NFS) drive. CA) A Remote Disc entry in finder is a placeholder for systems that do not have THESE. WA1) THIS, such as an external hard disk drive, will have its own separate mount point in Mac OS. WA2) A Time Machine restore point has its own separate mount point. - Time Machine is the system backup and restore software included with Mac OS. WA3) THIS, such as a shared server drive, will have its own separate mount point in Mac OS.
C) It is there for systems that don't have built-in optical disk drives. WAs) A, B, D.
You need to modify a PC's Windows firewall as it is blocking a program that relies on Internet communication to function. Where would you NOT make exceptions in the firewall? A) Advanced settings B) Inbound rules C) Location Awareness D) Outbound rules CA) THESE features in software are typically IP and/or GPS based. - The location data can be used for advertising, navigation, and other purposes. - THIS is not firewall settings related. WA1) THESE are firewall rules that are used by both TCP and UDP for ________ connections to a system. - An exception rule would allow communications that may normally be blocked by the firewall. WA2) THESE are firewall rules that are used by both TCP and UDP for ________ connections to a system. - An exception rule would allow communications that may normally be blocked by the firewall. WA3) THESE, within the Windows firewall, is where (1) & (2) can be viewed and edited.
C) Location Awareness WAs) Inbound, Outbound, Advanced.
A user's Windows 10 computer is not able to communicate with a network printer. You decide to check the computer's network connection settings. Which of the following settings would you NOT be required to modify? A) Gateway address B) IP (Internet Protocol) address C) MAC (Media Access Control) address D) Subnet mask CA) THIS is a physical address embedded into the network card by the manufacturer. - It cannot be modified. WA1) THIS is a logical address that is either statically assigned or dynamically assigned by a DHCP (Dynamic Host Protocol) server to a system. - Each device on a network needs a unique IP address. WA2) THIS is a logical address to the nearest router that holds routing information to internal network resources or to the public Internet. WA3) THIS is used along with an IP address to determine the system's subnet. - The subnet is used to determine what part of a system's IP address is the host address and what part is the network address. - Host on a local network should have THIS be matching.
C) MAC address WAs) B, A, D.
When installing software from an unknown source, a system can be placed at risk. Which of the following would NOT be a system impact? A) Compatibility B) Performance C) Malware D) Stability CA) THIS can hide itself within an executable that is obtained from an unknown source. - THIS would be a cause of system impacts, but not an impact itself. WA1) For a system, THIS can be impacted by installing software from an unknown source. - Malicious code can cause a system to freeze or crash routinely. WA2) For a system, THIS can be impacted by installing software from an unknown source. - Malicious code can cause a system to perform poorly. - This includes using up too much memory or excessive CPU (Central Processing Unit) utilization. WA3) For a system, THIS can be impacted by installing software from an unknown source. - Malicious code can cause a system to stop functioning with other applications and services.
C) Malware WAs) Stability, Performance, Compatibility.
When building a custom computer for Windows, which of the following will likely lead to poor performance? A) Configuring a standard client B) Configuring a thin client C) Meeting minimum hardware requirements D) Meeting recommended hardware requirements CA) DOING THIS for an operating system will likely lead to poor performance. - THESE are the lowest hardware specifications that the operating system is supported to run on. WA1) DOING THIS for an operating system will allow a system to run efficiently. - THESE are the hardware specifications that are expected to provide a user with a positive experience. WA2) THIS refers to configuring a system with an operating system and applications for a user. WA3) THIS refers to configuring a system to interface with a much more powerful system to access applications as they are not installed locally.
C) Meeting minimum hardware requirements WAs) D, A, B.
You are setting up an older PC as a spare for testing purposes. You would like to view the speed of the NIC (Network Interface Card). How can this be achieved? A) Computer management B) Ipconfig /all C) Network and sharing center D) Windows system properties CA) THIS control panel tool in Windows is used for viewing network information and connection settings. - By viewing an active network connection, the NIC speed can be identified. WA1) THIS is a Windows command line utility that displays network adapter settings. - By using switches, the functionality of ipconfig can be extended. - The /all switch displays extended IP address information whereas only basic information is displayed without. - The network card speed is not displayed with using ipconfig. WA2) THIS is used for viewing basic system information including operating systems specifics, memory, and the type of CPU. - Domain and workgroup settings can also be modified with system properties. WA3) THIS is a utility within Windows that is used to view event logs, manage and edit disk storage, folder shares, local users, and more. - It is not used to view network properties or settings.
C) Network and sharing center WAs) B, D, A.
You have five Windows 10 Home edition computers that need to share files. Which method would be secure but simple to configure? A) Domain B) HomeGroup C) OneDrive D) Workgroup CA) THIS is a file hosting and synchronization service operated by Microsoft as part of its suite of Office Online services. - It can serve as a file sharing tool among different computers, and is built into Windows 10, so it is very simple to configure. WA1) THIS is a group of Windows computers that are configured to share resources such as files with one another, but it was removed from Windows 10 in Version 1803 (April of 2018). WA2) THIS allows a group of computers to share resources such as files with one another. - With THIS, accounts for each user must be created on each computer to enable access. WA3) THIS is an advanced method of grouping computers and devices into a shared network environment. - This environment would require a Windows Server.
C) OneDrive WAs) HomeGroup, Workgroup, Domain.
Which alternate IP (Internet Protocol) setting below serves as a primary name resolution setting when DHCP (Dynamic Host Configuration Protocol) is not available? A) Alternate DNS (Domain Name System) B) Default gateway C) Preferred DNS (Domain Name System) D) Subnet mask CA) THIS server translates domain names into IP (Internet Protocol) addresses. - THIS is the server that is contacted first. WA1) THIS server translates domain names into IP (Internet Protocol) addresses. - THIS is used when our correct answer is not available. WA2) THIS address is used by a computer to find remote networks and hosts. - For example, when a computer browses a web site, this identifies the site as non-local and routes the request to the Internet. WA3) THIS is used to identify what network a computer belongs to. - THIS works in conjunction with the system's IP (Internet Protocol) address.
C) Preferred DNS WAs) A, B, D.
You have installed a new 32-bit application on a 64-bit Windows workstation. You would like to review the installation directory for the application. Where would you find the application's install directory? A) AppData B) Program Files C) Program Files (x86) D) Windows\Systems32 CA) THIS folder is a folder found on Windows 64-bit system. - It is the location where 32-bit software is installed. WA1) THIS folder is the default folder on 32-bit only systems and 64-bit systems. - On a 64-bit system, 64-bit software is usually installed in this folder. WA2) THIS folder is the location for Windows operating system files. - Software applications would be installed in either our correct answer or (1). WA3) Windows applications usually create configuration data for each user on a system. Often THIS folder is used, and each user would have their own.
C) Program Files (x86) WAs) B, D, A.
A user mentions that when visiting a local coffee shop, Windows prompts for a network type while using the free wireless network. Which type of network should be selected? A) Ethernet B) Private C) Public D) Wi-Fi CA) THIS network type should be selected. - However, it may be vulnerable to malicious activity. - By selecting THIS type, the Windows firewall and sharing features will be more stringent. WA1) THIS network is a wireless or wired network that uses technology that adheres to a standard defined by the Institute of Electrical and Electronics Engineers (IEEE). - It would NOT be a choice. WA2) THIS network type should not be selected. - THIS is a trusted network such as a home or business network. WA3) THIS, basically, is a wireless network. - In this case, the user is already connected to THIS and should provide a network type to the operating system for security purposes.
C) Public WAs) Ethernet, Private, Wi-Fi
Which of the following is NOT typically used as an application distribution method? A) DVD (Digital Versatile Disk) B) Internet download C) RAM (Random Access Memory) D) USB (Universal Serial Bus) CA) THIS hardware is used in a system to hold data. - It is not used as an application distribution resource. WA1) THIS device, such as, a flash drive is often used as an application distribution device. - ___ Flash drives are available in many sizes making availability of software convenient. WA2) THIS is a popular method for application distribution. - With THIS, there is no media cost and the latest version of the software is usually available. WA3) THIS is an optical media storage type. - Many large applications are distributed by these.
C) RAM (Random Access Memory) WAs) USB, Internet, DVD.
Most computers come with a built-in gigabit Ethernet adapter. What type of connector will the adapter use for network cabling? A) BNC (Bayonet Neill-Concelman) B) RJ-11 (Registered Jack) C) RJ-45 (Registered Jack) D) SATA (Serial Advanced Technology Attachment) CA) THIS connector is a standard connector for voice and data network communications. - It is an 8-contact connector. - Modern Ethernet networks use THESE with Ethernet cable to connect to computers and network equipment. WA1) THIS connector is a standard connector for voice and data network communications. - THIS connector is used with phone lines and computer modems. WA2) THIS is a standard connector used for storage devices such as a hard disk in a computer system. WA3) THIS connector is a connector commonly used in a variety of applications including radio. - THIS was also used in early computer networks that were connected with coaxial cable.
C) RJ-45 WAs) RJ-11, SATA, BNC.
You want to enable Remote Assistance capabilities to the CEO's Windows 10 laptop. How can this be done quickly? A) Administrative tools B) Programs and features C) Remote settings under system properties D) The network and sharing center CA) THIS is a Windows feature that allows someone to remotely connect to a computer by invitation. - By using the control panel and modifying the remote settings under system properties, this feature can be enabled. WA1) THIS, which is found in the Windows control panel is used for modifying network adapter and connection properties. WA2) THIS is a control panel settings area that allows for management of installed software and features on a Windows system. WA3) THESE are a set of systems management tools found within Windows computers.
C) Remote settings under system properties WAs) D, B, A.
What is the name of Mac OS X's powerful search feature that locates files, websites, applications, web content, and more? A) Finder B) Mission Control C) Spotlight D) Windows Search CA) THIS is a Mac OS search tool that can find files, images, websites, applications, and more by using keywords and phrases. WA1) THIS is the file and folder management application that is included with Mac OS. - A simple search feature that is included searches only the local system. WA2) THIS is the Mac OS multiple virtual desktop feature. - Users can create multiple spaces and switch between them using THIS. WA3) THIS is a desktop search platform available on Microsoft Windows systems and is not applicable to Mac OS.
C) Spotlight WAs) A, B, D.
Which application do you use in Mac OS X to access the command line? A) CMD B) Safari C) Terminal D) Time Machine CA) THIS is the command window that allows you to interact directly with the operating system at the shell or command line level. - Using THIS allows for management of the operating system without using a GUI (Graphical User Interface). WA1) THIS is the Windows command line utility. Using this command displays a DOS-like (Disk Operating System) terminal Window. WA2) THIS is an Apple web browser and is not used for operating system command line management. WA3) THIS is the backup utility for Mac OS X and is not used for operating system command line management.
C) Terminal WAs) CMD, Safari, Time Machine.
While troubleshooting a Linux workstation you notice that some software is out of date. Which command do you use to update package index files? A) chmod B) apt-get C) apt-get update D) apt-get upgrade NOTE) apt == (Advanced Package Tool). CA) THIS command is used for handling packages within a Linux distribution. - Using THIS SPECIFIC command along with ________ will synchronize package index files. WA1) Using THIS SPECIFIC command along with ________ will upgrade packages to the newest versions based on the synchronized package index files. WA2) THIS by ITSELF would need to be issued with the update command to update package index files. WA3) THIS command is used to change access permissions to files and folders. - THIS is often used with numerical values of four octal digits. - The three rightmost values refer to user, group, and other permissions, while the first is for setting a special flag.
C) apt-get update WAs) D, B, A.
A Linux workstation is performing poorly. Which utility would be used to check the system's disk? A) cd B) cp C) fsck D) ls CA) THIS command is short for file system check. It is used to check a file system for errors on a Linux system. - It is similar to the Windows chkdsk command. WA1) THIS command is used to navigate and change directories in a Linux system. - It has the same syntax as what's used in Windows. WA2) THIS command is used in a Linux system to retrieve and display a directory listing. - It has a similarity to the dir command used in Windows. WA3) THIScommand is used in a Linux system to copy files and directories. - It is similar to the copy command that is used in Windows.
C) fsck WAs) cd, ls, cp.
You are working on a Linux system and need to search some plain-text data for a name. Which command do you use? A) apt-get B) chown C) grep D) ls CA) THIS command is used to find a string of text and return a result. - For example, to find the root user in the password file, the syntax is ______ root /etc/passwd. WA1) THIS command is used to change ownership and group information for a file. - The syntax follows ______ new-owner:new-group filename. WA2) THIS command is for handling packages. Issuing the ______ update command is used to synchronize the package indexes from their sources. WA3) THIS command is used to list file names and attributes. - Using THIS on its own will return basic information. - Command line switches extend the capability of the ls output.
C) grep WAs) chown, apt-get, ls.
A Linux system is running much slower than usual. Which command could you use to determine what processes are currently running on the system? A) apt-get (Advanced Package Tool) B) ls C) ps D) su CA) THIS command displays a list of the processes currently running on the system. - Optional switches extend the output of the command. WA1) THIS command allows a user to run a command as another user. - The username of the intended user is provided within the command line. - It also launches another shell instance when invoked. WA2) THIS command is used to list file names and attributes. - Using THIS on its own will return basic information. - Command line switches extend the capability of the ____ output. WA3) THIS command is used for handling packages within a Linux distribution.
C) ps WAs) su, ls, apt-get.
You are working on a Linux workstation. You need to resync index package sources to prepare for an upgrade. Which command do you use? A) sudo apt-get check B) sudo apt-get clean C) sudo apt-get update D) sudu apt-get upgrade CA) Linux stores a local package index that includes the sources of installable software. - To resync the available package list, THIS command is used. - Using sudo in the command allows the command to run as an elevated user (usually root). WA1) Using THIS will upgrade software on the system based on the packages that are available as found via the (CA) command. WA2) THIS command will check the local package cache while looking for broken dependencies. WA3) THIS command will clear the local repository of any packages that were retrieved.
C) sudo apt-get update PC) sudo apt-get upgrade WAs) Check, Clean.
What is the Mission Control feature in Mac OS X used for? A) Ending a program B) File & folder browsing C) Backup and restore D) (Using) Multiple (virtual) desktops CA) Mission control offers the capability of customizing and DOING THIS on a single system to make a computing experience more efficient. WA1) Finder is used for THIS and as a management application that is included with Mac OS. - It is similar to the Windows file explorer. WA2) Time machine is the packaged software for DOING THIS that is included with the Mac OS. - Like traditional ________ & ________ software, jobs can be configured and scheduled to DO THIS to certain files. WA3) Force quit can be used TO DO THIS with Mac OS. - This procedure is the equivalent to using the task manager to DO THIS application in Windows.
D) (Using) Multiple (virtual) desktops WAs) B, C, A.
What is the Mac OS X Dock? A) It is the equivalent to the Windows control panel. B) It is the equivalent to the Windows task manager. C) It is the Mac OS X password management system. D) It is the row of app shortcuts at the bottom of the screen. CA) DOING THIS in Mac OS X, the dock shortcuts allow easy access to favorite and frequently used applications. WA1) THIS is a utility that contains many application tools to manage the system. WA2) THIS is Keychain's function. - When a user visits a website, uses an email account, or accesses a network resource; keychain will provide an option to remember the credentials. WA3) THIS is a Windows utility that can be used for a number of system tasks, including the forced closing of a problem application.
D) It is the row of app shortcuts at the bottom of the screen. WAs) A, C, B.
Which of the below is NOT one of the three profile state settings that need to be configured for the Windows firewall to provide security? A) Firewall state B) Outbound connections C) Inbound connections D) Logging CA) THIS is a feature that allows for activity within the Windows firewall to be recorded to a file. - The log file can then be reviewed for reporting or investigative purposes. - THIS also does not provide any security protection. WA1) THIS in Windows firewall refers to on or off. This setting completely turns off the firewall, which is useful for testing, or turns it on. WA2) THESE in Windows firewall refers to all traffic that is being received on the computer. - Received Traffic can be allowed or blocked. WA3) THESE in Windows firewall refers to all traffic that is being sent from the computer. - Sent Traffic can be allowed or blocked.
D) Logging WAs) A, C, B.
When an application is being installed on many computers from a shared folder, what type of file is used? A) Compressed archive B) DLL file C) Internet download D) Network-based installer CA) THIS is a file that is used as a setup file to install an application on networked computers. Often, THIS is different than a regular setup file as it has settings for network use. WA1) THIS is a file type within Windows that contains shared code. - THESE are accessed by the operating system and numerous applications to perform particular functions. WA2) THIS is a group of files and folders that are complexly shrunken and bundled into a single file. - Having a single file makes distribution of an application convenient. WA3) THIS is a popular method for application distribution. - With THIS, there is no media cost and the latest version of the software is usually available.
D) Network-based installer WAs) B, A, C.
Which strategy keeps operating systems and applications routinely up to date for operational and security purposes? A) Definitions B) Heuristics C) Network access control D) Patch management CA) THIS is a method of keeping operating systems and applications routinely up to date for operational and security purposes. - THIS includes retrieving, reviewing, and approving patches for installation on systems. WA1) THESE are also known as signatures or patterns. - THESE are included in an anti-virus software's database of known threats to identify malicious activity and files. WA2) THIS is a method that anti-virus software uses to try to identify viruses based on behavior. - It monitors a computer for activity that seems virus-like. WA3) THIS is a method of managing inbound and outbound traffic on a network, with a focus on security measures. - The use of a firewall is a component of THIS.
D) Patch management WAs) A, B, C.
A windows 10 workstation is having difficulty reaching a network server. You decide to troubleshoot the physical wired connection. You see blinking LEDs (Light Emitting Diodes) while looking at the network adapter connection on the back of the computer. What would these LEDs NOT indicate? A) Connection B) Link speed C) Network activity D) Protocol CA) An Ethernet port contains LEDs (Light Emitting Diodes) to display the status of a connection. - THIS, such as IP (Internet Protocol), being used by the adapter, would NOT be indicated by an LED. WA1) THIS is indicated by a difference in one of the LED colors. WA2) THIS is indicated by a blinking or flickering LED. WA3) THIS (being in good shape) is indicated by the solid illumination of an LED .
D) Protocol WAs) B, C, A.
You are using vi (Visual Editor) to create a script on a Linux system. Which of the following is NOT one of the three modes of the editor? A) Command B) Ex C) Input D) Ps CA) THIS command displays a list of the processes currently running on the system and is not related to the vi editor. - Optional switches extend the output of the command. WA1) THIS very mode of the editor is the default starting mode. In this mode the editor can be navigated (up, down, left, right) with the defined movement keys on the keyboard. WA2) THIS mode of the editor allows for the input or appending of text. - While in this mode, command mode movement is not available. WA3) THIS mode is an extension of the command mode. - In this mode, the file can be saved, and the editor can be exited.
D) Ps WAs) Command, Input, Ex.
Which one of the below is NOT one of three basic settings that are required to configure a proxy server? A) Address B) Port C) Protocol D) QoS CA) THIS is a technique that is used for bandwidth management. - By using policies, THIS can be applied to a certain traffic type to improve service quality. WA1) THIS is required to use a proxy. Based on the protocol and port types, a proxy's address can refer to a variety of traffic types that it will manage including web or ftp (File Transfer Protocol). WA2) THIS is used for a proxy to provide a connection based on a protocol. - For example, web based traffic will use ____ 80 and ftp (File Transfer Protocol) traffic will use____ 21. WA3) THIS is used by a proxy in conjunction with (1) and (3) to determine what type of traffic the proxy will be managing. - For example, HTTP (Hypertext Transfer Protocol) would be used for web. - For another example, FTP (File Transfer Protocol) would be used for file transfers.
D) QoS WAs) A, B, C.
When installing software, most applications are installed from which of the following options? A) Configuration file B) DLL file C) Media file D) Setup file CA) THIS file is commonly used to install software on a computer system. - Often THIS is a single file that self-extracts other files that are required for setup and for the application to run. WA1) THIS file is a file type within Windows that contains shared code. - THESE can be accessed by the operating system and numerous applications to perform particular functions. WA2) THIS file is used for an application during installation and at run-time. - This file could hold information such as file paths and computer network addressing information. WA3) THIS is a type of file that contains audio and/or visual content. - Example files include digital photographs, digital music, and digital videos.
D) Setup file WAs) DLL, Configuration, Media.
A user has tried installing an application that was not digitally signed and was from an unknown source. What company resource could be severely impacted by potential malicious activity? A) Computer Management B) Device Drivers C) Shared Printers D) Shared Folders CA) THESE FOUND on a company network contain company files and possibly very sensitive data. - Malware found in executables may target network shares by deleting, encrypting, or stealing the data within. WA1) THESE allow users on a network to print. It is possible that malicious activity could target and disable a printer share. - Doing so would be more of a nuisance compared to the severity of data loss. WA2) THESE are used to enable the use of devices on a computer system. - They may be impacted by types of malware, but they are not a company resource. WA3) THIS (not a company resource) is Windows utility that is used to manage different areas of the computer system.
D) Shared Folders WAs) C, B, A.
You want to make an application on the local network available for manual installation. What would you need to create to make the application available? A) Internet download B) Group policy C) Setup file D) Shared folder CA) THESE are folders on a networked computer. Application installation files can be made available inside THESE. WA1) THIS is commonly used to install software on a computer system. - Often THIS is a single file that self-extracts other files that are required for setup and for the application to run. WA2) THIS is a Windows server feature that allows policies to be pushed to computers that are members of the domain. - Within these can be a software installation ______ that automatically installs software on a system. WA3) THIS is a popular method for application distribution. - With THIS, there is no media cost and the latest version of the software is usually available.
D) Shared folder WAs) C, B, A.
Which alternate IP (Internet Protocol) setting below serves as a network identification setting when DHCP (Dynamic Host Configuration Protocol) is not available? A) Alternate DNS (Domain Name System) B) Default gateway C) Preferred DNS (Domain Name System) D) Subnet mask CA) THIS is used to identify what network a computer belongs to. - THIS works in conjunction with the system's IP (Internet Protocol) address. WA1) THIS address is used by a computer to find remote networks and hosts. - For example, when a computer browses a web site, this identifies the site as non-local and routes the request to the Internet. WA2) THIS server translates domain names into IP (Internet Protocol) addresses. - THIS is the server that is contacted first. WA3) THIS server translates domain names into IP (Internet Protocol) addresses. - THIS is used when (2) is not available.
D) Subnet mask WAs) B, C, A.
You can easily use your Mac remotely by setting up Screen Sharing. Where do you set up screen sharing in Mac OS X? A) Control panel B) Display settings C) Services D) System preferences CA) THIS is a menu that can be used for screen sharing on a Mac computer. - First, select the Apple menu. - Next, select THIS, then sharing, and lastly screen sharing. WA1) THIS is a Windows utility that contains many application tools to manage the system. WA2) THIS is a Windows utility to manage applications that can run at boot-up or as needed. - THESE usually run in the context of a user account for permissions. WA3) THIS is a Windows utility that is used to set screen resolution and to manage and adjust multiple monitors.
D) System preferences WAs) A, C, B.
Which of the following is the backup and restore software that is included with Mac OS? A) Crontab B) Disk dump C) Snapshot D) Time machine CA) THIS is the packaged backup and restore software that is included with the Mac OS. - Like traditional backup software, jobs can be configured and scheduled to backup certain files. WA1) THIS is a scheduling tool that is useful for scheduling and running script files. WA2) THIS feature is the ability of the Mac OS to take a snapshot of any changed files. - These files are saved locally until our correct anwser's drive becomes available again to the system. WA3) THIS creates a full image of a disk. - This utility makes a bit-by-bit image regardless of the file system in use.
D) Time machine WAs) Crontab, Snapshot, Disk Dump
What security threat conceals itself as trustworthy software but has a true purpose of being malicious? A) Digitally signed software B) Malware C) Setup file D) Trojan Horse CA) is a type of malware that disguises itself as legitimate and trustworthy software. - Once the software is executed, the true malicious nature of the software is released. WA1) THIS is malicious content that negatively impacts a system. - Protecting a system from THIS is a serious security concern. - The impact of THIS can be serious by resulting in lost or compromised data. WA2) THIS is commonly used to install software on a computer system. - THIS should only be executed if it is from a trustworthy source and is digitally signed. WA3) THIS is verified as being legitimate and untampered with. - THIS is distributed by the software publisher.
D) Trojan Horse WAs) B, C, A.
Which of the following is NOT a system requirement for operating systems and software applications? A) CPU (Central Processing Unit) speed B) Disk space C) Memory D) Virtual Memory CA) THIS improves a system's performance by using an area of a hard disk as temporary memory. This is a feature automatically implemented by the Windows operating system and not a requirement. WA1) THIS dictates how quickly a computer can process instructions. - ___ speed & models are often published as requirements for operating systems and software applications. WA2) THIS amount dictates how well a system can multitask and deal with multiple applications at the same time. - This requirement is often published for operating systems and software applications WA3) THIS is necessary to store software applications and data. - This requirement is often published for operating systems and software applications.
D) Virtual Memory WAs) CPU, RAM, Disk Space.
You need to troubleshoot a system remotely. The system is currently offline. How can you remotely bring the system back online? A) PXE (Preboot Execution Environment) boot B) RDP (Remote Desktop Protocol) C) VPN ((Virtual Private Network) D) Wake-on-LAN CA) THIS is a technology that enables a system to fully power itself on via a message received on its network card. - It is configured in both the system's BIOS and within the network interface card's (NIC) configuration settings in Windows. WAs) THESE will not power the system on. WA1) THIS is an industry standard client/server network boot interface. - It allows a system to be booted remotely for configuration purposes. WA2) THIS is used to create a remote session to a system. WA3) THIS is used to create a secure tunnel from one endpoint to another. - Any activity through THIS is private and secure.
D) Wake-on-LAN WAs) PXE, RDP, VPN.
When installing an application, what folder permissions are required? A) Execute B) Hidden C) Read D) Write CA) THIS permission would allow a user to save content to the folder. - In this case, the application install running under the user's account would need THIS permission to be successful. WA1) THIS permission would allow a user to see the folder contents. Having our correct answer also implies THIS permission. WA2) THIS permission is required for a user to be able to run an application located in a folder. WA3) THIS file attribute marks a file as being hidden from normal view and is not a permission.
D) Write WAs) Read, Execute, Hidden.
Which Linux command is used to delete a file or directory? A) cp B) ls C) mv D) rm CA) THIS command is used in a Linux system to delete files and directories. - It is similar to the del and rd commands in Windows. WA1) THIS is used in a Linux system to copy files and directories. - It is similar to the copy command that is used in Windows. WA2) THIS command is used to rename a file or folder in a Linux system. - It is similar to the ren command used in Windows. WA3) THIS command is used in a Linux system to retrieve and display a directory listing. - It has a similarity to the dir command used in Windows.
D) rm WAs) cp, mv, ls.
You are troubleshooting a Linux workstation. A command you are trying to use requires that you are the root user. You decide to use the command as the root user. Which command do you use? A) chown B) ps C) su D) sudo CA) THIS command allows users to run a program with the security privileges of the superuser (root) account. - By using this command credentials of the superuser account are required for the program to execute. WA1) THIS command allows a user to run a command as another user. - The username of the intended user is provided within the command line. - It also launches another shell instance when invoked. WA2) THIS command displays a list of the processes currently running on the system. Optional switches extend the output of the command. WA3) THIS command is used to change ownership and group information for a file. - The syntax follows _____ new-owner:new-group filename.
D) sudo WAs) su, ps, chown.