CompTIA A+ 220-1002

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Match the command to the description 1. net use 2. chkdsk 3. nslookup 4. gpupdate A. View the route between two devices B. Force a configuration update to a remote computer C. Repair logical file system errors D. Map a network drive E. Resolve the IP address for www.professormesser.com F. Initialize a partition

1. net use D. Map a network drive 2. chkdsk C. Repair logical file system errors 3. nslookup E. Resolve the IP address for www.professormesser.com 4. gpupdate B. Force a configuration update to a remote computer Bonus tracert A. View the route between two devices format F. Initialize a partition

List the command associated with the description: 1. Display a list of currently running Windows processes 2. List contents of a Linux directory 3. Lookup information from a DNS server 4. Remotely reboot a Windows computer 5. Change a Linux account password

1. tasklist 2. ls 3. nslookup 4. shutdown /r 5. passwd 220:1002:

A user would like to upgrade a Windows 7 PC to Windows 10. There is a specialized expansion card that needs to be supported. Which of the the following will be required for the card to work with Windows 10? A. Ease of access B. Compatibility mode C. Device Drivers D. Device Manager

1.3 Summarize general OS installation considerations and upgrade methods.

A user has been adjusting setting in Internet Explorer and now they are not able to browse webpages properly. Which tab in Windows Internet Options is used to reset setting to default? A. Advanced B. Content C. General D. Privacy

1.6 Given a scenario, use Microsoft Windows Control Panel utilities.

You decide to enable system protection features on your Windows PC. One feature will enable restore points. Which feature uses restore points? A. Recovery image B. System reset C. System refresh D. System restore

1.6 Given a scenario, use Microsoft Windows Control Panel utilities.

Fun Fact!

A GPT (GUID Partition Table) can support up to 128 bootable partitions in Windows. An MBR partition style drive can only support a maximum of 4 bootable partitions.

Fun Fact!

A Group policy is created by a domain administrator and is used to create settings for a system or systems. These settings include the desktop appearance, security settings, drive mappings, and more.

Fun Fact!

A mount point is a Windows feature in the Disk Management utility that allows a volume to be mounted at a point in the system folder structure rather than as a disk with a drive letter.

Fun Fact!

A problematic Windows system can be reset to resolve any issues. Within Windows settings a reset can be initiated. Choosing to remove everything will reset all settings, remove applications, and remove personal files. Choosing the option to keep my files will reset all settings, remove applications, and will keep all personal files intact. 220-1002: 1.3 - Summarize general OS installation considerations and upgrade methods.

Fun Fact!

A zero-day attack takes advantage of an unknown vulnerability to gain access to a system or cause a denial of service.

Describe the use of the following Linux terminal commands. A. grep B. chown C. dd D. rsync E. chmod F. pwd G. ls H. dir I. passwd J. cp

A. B. chown - (Change Ownership) Changes a file's owner C. D. E. chmod - Changes file permissions F. pwd - (Print Working Directory) displays the current directory G. ls - Lists files and directories in Linux H. dir - Lists files and directories in Windows I. passwd - (Password) Change's a user's password J.

Local Security Policy settings apply to which of these? A. A single computer B. All of the computers within a Workgroup C. All of the computers on a Domain D. All of the computers that are logged into the same server

A. A single computer

A user's system has been experiencing errors and blue screen crashes. You have decided to look at the Event Viewer to see if system logs show anything out of the ordinary. Which of the following is not an Event Viewer Windows Log? A. Administrative B. Security C. Application D. System E. Setup

A. Administrative (Hint: The next answer is User)

An administrator would like to create a script that runs at the command line during a Windows login. Which of the following would be the BEST choice? A. Batch file B. JavaScript C. AppleScript D. Shell script E. VBScript

A. Batch file (Powershell or Batch files are typically used in Windows systems. Shell scripts are referred to something that is used in a Linux environment) 220-1002: 4.8 - Scripting

Which of the following features would be found in Windows 10 Enterprise but not in Windows 10 Pro? (Choose two) A. BranchCache B. Domain membership C. BitLocker D. HyperV E. Remote Desktop Host F. AppLocker

A. BranchCache & F. AppLocker 220-1002: 1.2 - An Overview of Windows

Which of the following disk types is not supported in Windows 10 Home Edition? A. Dynamic B. Primary C. Basic D. Boot

A. Dynamic 220-1002: 1.3 - Summarize general OS installation considerations and upgrade methods.

A system administrator would like to configure a partition with the NTFS file system. Which of these utilities would be the best choice for this task? A. format B. Filesys C. Chkdsk D. Xcopy E. SFC

A. Format 220-1002:

During startup, a Windows 10 computer enters Safe Mode instead of the normal desktop. Which of the following would be the BEST way to correct this issue? A. Run Startup Repair B. Rebuild the BCD C. Reseat all adapter cards D. Start in VGA mode. E. Restart the DHCP server

A. Run Startup Repair 220-1002: 3.1 - Troubleshooting Windows

Which of the following would provide automated file backups of a macOS system? A. Time Machine B. Disk Utility C. UEFI BIOS D. System Information E. Backup and Restore

A. Time Machine

You are setting up a Windows 10 PC. You plan on partitioning a hard drive. How many partitions can be created on the disk when using MBR-style partitions? A. 2 B. 4 C. 128 D. 1

B. 4 220-1002: 1.3 - Summarize general OS installation considerations and upgrade methods.

A company has purchased a new application to assist with employee benefits. The IT team does not have access to the application source code. Which of the following would BEST describe this software? A. FOSS (Free and Open Source Software) B. Commercial C. EULA (End User Licensing Agreement) D. Encrypted E. DRM (Digital Rights Management)

B. Commercial (When there is no source code given usually the end user gets a compiled executable) 220-1002: 4.6 - Privacy, Licensing, and Policies

You need to register a new server COM application to a Windows 10 PC. Which utility do you use? A. Group policy B. Component services C. Data source administrator D. Regedit

B. Component services 1.5 Given a scenario, use Microsoft operating system features and tools.

You need to register a new server COM application to a Windows 10 PC. Which utility do you use? A. Group policy B. Component services C. Data source administrator D. Regedit

B. Component services 1.5 Given a scenario, use Microsoft operating system features and tools.

A new infrastructure has been put in place at work for web access. A proxy server is now being used for web traffic. Which tab would be used for configuring a proxy server in Windows Internet Options? A. Privacy B. Connections C. Advanced D. General

B. Connections 1.6 Given a scenario, use Microsoft Windows Control Panel utilities.

What utility can be used to clear saved passwords in a Windows system? A. User account control B. Credential manager C. User accounts D. Ease of access center

B. Credential Manager 1.6 Given a scenario, use Microsoft Windows Control Panel utilities.

A system administrator needs to manage the Windows desktop configurations of a large accounting firm. Which of the following would provide this functionality? A. WAN B. Domain C. BranchCache D. Workgroup E. Device Manager

B. Domain (A Domain allows for the remote administration and configuration of all Windows devices in an organization) 220-1002: 1.8 - HomeGroups, WorkGroups, and Domains

Which of the following is the last step of the malware removal process? A. Schedule scans and run updates B. Educate the end user C. Enable System Restore D. Quarantine infected systems E. Update anti-virus engines

B. Educate the end user 220-1002: 3.3 - Removing Malware

Which of the following would be an advantage a GTP partition style over an MBR partition style? A. Built-in file-level encryption B. Increased number of bootable partitions on a single physical drive C. Password-protected boot process D. Support for removable storage devices E. Supports scheduled tasks

B. Increased number of bootable partitions on a single physical drive

A Windows 10 computer has stopped updating information on the screen and appears to be hung. Which of the following would be the BEST next troubleshooting step? A. Unplug the computer and restart B. Launch Trask Manager C. Ping the computer from another device. D. Run the Command Prompt E. Add more memory to the system

B. Launch Task Manager (Bonus: Windows and Linux Task Manager can be accessed using the Hot Keys Ctrl-Alt-Del. macOS uses Force Quit by pressing Command-Option-Esc). 220-1002: 3.2 - Troubleshooting Security Issues

A user's permissions have been set to the minimum rights required to complete their job function. Which of the following would describe this security method? A. Certificate-based authentication B. Least privilege C. ACL D. DLP E. Port security

B. Least privilege 220-1002: 2.2 - Logical Security

You want to enforce a password history policy for local users on a Windows 10 PC. What utility would you use? A. Group policy B. Local security policy C. Task Manager D. Computer Management

B. Local security policy

A system administrator would like to verify the IP address of server www.example.com. Which of the following would provide this information? A. NETVIEW B. NSLOOKUP C. NETSTAT D. IPCONFIG E. DHCP

B. NSLOOKUP 220-1002: 1.4 - Network Command Line Tools

Which file system is a proprietary file system developed exclusively for use with Windows? A. CDFS B. NTFS C. exFAT D. FAT32

B. NTFS 220-1002: 1.3 - Summarize general OS installation considerations and upgrade methods.

Windows 7 has two categories of updates: Important and ______? A. Automatic B. Optional C. Manual D. Recommended

B. Optional Quiz 10: Chapter 14 - Maintaining and Optimizing Operating Systems Quiz

An administrator would like to use a centralized authentication system for all VPN users. Which of the following would provide this functionality? A. AES B. RADIUS C. TKIP D. WPA2 E. CCMP

B. RADIUS Bonus: RADIUS stands for Remote Authentication Dial-in User Service 220-1002: 2.3 - Wireless Security

A user's PC is experiencing severe sluggishness. You decide to try a reinstall of the operating system but want to keep user settings and personal files. Which of the below do you try? A. Recovery image B. Refresh C. System restore D. Reset

B. Refresh 220-1002: 1.3 - Summarize general OS installation considerations and upgrade methods.

You've created a new partition by splitting the original partition on a disk. How do you assign a drive letter to the new partition? A. In Windows Explorer, right-click the Computer object, select Properties B. Right-click the partition in Disk Manager, select Change Drive Letter and Paths C. In Windows Explorer, right-click the Computer, select add a network location, and follow the wizard D. Open a command prompt window, enter net use z: \\computername\partitionname

B. Right-click the partition in Disk Manager, select Change Drive Letter and Paths 1.6 Given a scenario, use Microsoft Windows Control Panel utilities.

You can use the Services applet to manage a service. With what other utility can you manage services? A. Resource Monitor B. Task Manager C. Performance Monitor D. Event Viewer

B. Task Manager

A user has created a Windows Share with the dollar sign on the end of the share name. Which of the following describes this share name? A. All files are read-only B. The share is hidden C. The user has an Active Directory account D. The share is part of a login script E. The computer is expensive

B. The share is hidden

A user is experiencing very slow system performance. After looking at the system you see very high utilization of a process related to svchost.exe. Which of the following is likely causing the high utilization? A. Explorer B. Windows Update C. Notepad D. Services.msc

B. Windows Update

The registry files are stored in the C:\Windows\System32\_____ folder? A. regback B. config C. registry D. reg

B. config

Which symbol in a Bash script indicates the rest of the line is a comment? A. * B. \ C. # D. !

C. #

Which of the following characters is associated with using a switch in a Linux command line interface? A. + B. / C. - D. __ E. -~

C. - (Example: rmdir -r. The -r with allow the rmdir command to remove subdirectories along with the directory being removed.)

A technician is performing a clean install of Windows 10 X64 onto a new system. What is the minimum amount of RAM required to install Windows? A. 512 MB B. 1 GB C. 2 GB D. 4 GB E. 8GB

C. 2 GB 220-1002: 1.2 - An Overview of Windows 10

A user has connected all of their Windows 8.1 devices at home using a single shared password. Which of the following would best describe this architecture? A. Windows Domain B. Remote Desktop C. WorkGroup D. RADIUS E. HomeGroup

C. HomeGroup (Windows HomeGroup is a Windows 7 and 8.1 feature that shares files across Windows devices on the same local network using a shared password) 220-1002: 1.8 - HomeGroups, WorkGroups, and Domains

An administrator would like to automate some functions in a user's local browser. Which of these would be the best choice? A. Batch file B. VBScript C. JavaScript D. Shell script E. Powershell

C. JavaScript

A user's permission have been set to the minimum rights required to complete their job function. Which of the following would describe this security method? A. ACL B. Certificate-based authentication C. Least privilege D. Port security E. DLP

C. Least privilege 220-1002: 2.2 - Logical Security

You are considering setting up a Windows multi-boot system with a few different Windows operating systems. You are deciding between Master Boot Record (MBR) type and GUID Partition Table (GPT) type partitions. What are the limitation with the MBR type partition? A. Limitations of one logical volume on a disk and one extended partition B. Limitations of one primary partition and up to two extended partitions C. Limitations of disk sizes up to 2TB and up to four partitions D. Limitations of the number of primary partitions to one, and the number of operating systems that can be installed to two

C. Limitation of disk sizes up to 2TB and up to four partitions 1.3 Summarize general OS installation considerations and upgrade methods.

You need to create a remote desktop connection shortcut on a user's Windows laptop. Which command will you use in the shortcut? A. MMC B. Msinfo32 C. MSTSC D. Command

C. MSTSC

A system administrator is concerned that the CPU utilization on a file server is exceeding 50% during the workday. Which of these tools would allow the administrator to monitor and alert on any excessive CPU utilization events during a 24-hour period? A. Event Viewer B. Task Manager C. Performance Monitor D. Component Services E. Computer Management

C. Performance Monitor (The Windows Performance Monitor is designed to monitor system metrics over a long-term period and store the information for future use. Performance Monitor can also be configured to provide alerts is a metric exceeds a particular value.) 220-1002: 1.5 - Windows Administrative Tools

Which choice increases the permissions a command is run with? A. Run Bash Shell in root mode B. Put sudo at the end of a command line C. Precede the command with sudo D. Precede the command with man

C. Precede the command with sudo

Which Windows 7 Task Manager tabs allows a user to view CPU utilization and memory usage or each running task? A. Applications B. Performance C. Processes D. Services

C. Processes 1.5 Given a scenario, use Microsoft operating system features and tools.

Identify which virus becomes active when the application is executed? A. Script virus B. Firmware virus C. Program virus D. Boot sector virus

C. Program virus (A program virus is sequences of code that insert themselves into another executable program. When the application is executed, the virus code becomes active.)

Which of the following devices is typically the default boot device on a Windows PC? A. Optical B. PXE C. SSD D. USB

C. SSD 220-1002: 1.3 - Summarize general OS installation considerations and upgrade methods.

You are working on a Windows PC with multiple hard disks. The system is no booting off the correct disk. You've determined the hardware boot order is correct. What next step could you take in Windows? A. Convert to a dynamic disk B. Create the master boot record C. Set the active partition D Set the boot order

C. Set the active partition 1.3 Summarize general OS installation considerations and upgrade methods.

In Windows 10, a system reset can be performed. What is the result of this process when selecting to remove everything? A. Settings are reset and installed software is removed. Personal files are saved B. The restore point rolls the system back to the selected point in time. Personal files are removed C. Settings are reset and software is removed. Personal files are removed. D. All system files that the SFC (System File Checker) finds corrupted are replaced. Personal files are saved.

C. Settings are reset and software is removed. Personal files are removed. 220-1002: 1.3 - Summarize general OS installation considerations and upgrade methods.

A Windows 10 workstation has a simple volume with plenty of free space. You would like to use some of that space as unallocated space for future use. Which step would you take? A. Import the disk B. Create the partition C. Shrink the volume D. Extend the partition

C. Shrink the volume 1.5 Given a scenario, use Microsoft operating system features and tools.

Before creating a restore point, what must be enabled? A. Restore point creation system B. Windows Repair Environment C. System Protection D. Image Backup

C. System Protection Quiz 10: Chapter 14 - Maintaining and Optimizing Operating Systems Quiz

Which is not preserved by a restore point? A. Applications B. Registry C. User files D. Drivers

C. User files (Restore points do not preserve user files. Restore points preserve applications, drivers, the registry, and other critical system files.) Quiz 10: Chapter 14 - Maintaining and Optimizing Operating Systems Quiz

A user at an offsite location is connecting to a VPN using a local cellular network provider. Which of the following would describe this connection type? A. PAN B. IMAP C. WWAN D. Proxy E. NAS

C. WWAN 220-1002: 1.8 Establishing Windows Network Connections

Which file system is 64-bit file system designed for use with removable media such as flash drives? A. CDFS B. FAT32 C. exFAT D. UDF

C. exFAT 220-1002: 1.3 - Summarize general OS installation considerations and upgrade methods.

A Linux system administrator would like to find all instances of the word error in a log file. Which of the following would be the best choice for this taks? A. chmod B. apt-get C. grep D. tar E. rsync

C. grep 220-1002: 1.9: Best Practices for Linux

Which of the following would be the BEST choice for a Windows 11 computer to share the desktop of a Windows Server device? A. regedit B. mmc C. mstsc D. explorer E. dxdiag

C. mstsc (Microsoft Terminal Services Client) 220-1002: 1.5 - System Utilities

A web server administrator would like to view all IP addresses connecting to a server. Which of the following would provide this information? A. tracert B. nslookup C. netstat D. ipconfig E. ping

C. netstat (Network Statistics) 220-1002: 1.4 - Network Command Line Tools

A Linux system administrator would like to provide an ongoing backup between storage devices. Which of the following would be the best choice for this task? A. var B. apt-get C. rsync D. tar E. sudo

C. rsync (The rysnc command is used to duplicate files across two storage locations) 220-1002: 1.9 - Best Practices for Lunix

A system administrator needs to modify a configuration text file on a Linux server. Which of these tools would be the best choice for this task? A. yum B. forcefsck C. terminal D. rsync E. dd

C. terminal 220-1002: 1.9 - Linux Tools

What does CDFS stand for and what is it used for?

Compact Disc File System. It is the file system used for Compact Disc optical media. (This file system is often referred to as ISO 9660)

Fun Fact!

Compatibility mode is a feature in Windows that allows for an application to be launched as if the operating system was an older version. For example, an application on a Windows 10 PC could be set to launch as if it were running on Windows XP.

Fun Fact!

Component services is a utility to manage COM (Component Object Model) objects. COM is a means for developers to allow software to link through Windows services such as OLE (Object Linking and Embedding)

Which Windows 7 Task Manager tab allows a user to close a problematic program? A. Services B. Processes C. Performance D. Applications

D. Applications

Which file system is a technical standard that is referred to as ISO 9660? A. exFAT B. NTFS C. UDF D. CDFS

D. CDFS 1.3 Summarize general OS installation considerations and upgrade methods.

A user has recently purchased a new Windows 10 computer. After installing software that was installed on the old Windows 7 computer, it was discovered that an application will not launch properly. What might fix this issue? A. Programs and features B. Default programs C. Computer management D. Compatibility mode

D. Compatibility mode 1.3 Summarize general OS installation considerations and upgrade methods.

A user starting their computer has been automatically assigned an IP address of 192.168.1.50. Which of the following would describe this configuration? A. Tunnel B. Loopback C.APIPA D. DHCP E. UEFI

D. DHCP (The IP address range for APIPA is 169.254.0.1 - 169.254.255.254) 220-1002: 1.8 - Windows IP Address Configuration

A macOS user would like to create an image file from the contents of a USB drive. Which of the following tools should they use? A. Time Machine B. Disk Management C. Backup and Restore D. Disk Utility E. DiskPart

D. Disk Utility 220-1002: 1.9 - macOS Tools

A Windows administrator would like to encrypt a single file on an NTFS volume. Which of the following would be the BEST choice for this task? A. BitLocker B. Active Directory C. SFC D. EFS E. chkdsk

D. EFS (Encrypting File System) 220-1002: 2.6 Windows Security Settings

You are troubleshooting a Windows 10 PC. You would like to boot into a diagnostic mode which only loads basic drivers and services. How can you accomplish this? A. Startup tab in msconfig B. Tools tab in msconfig C. Boot tab msconfig D. General tab in msconfig

D. General tab in msconfig

A user's Windows computer is having problems running a software package. A support document suggests using the Registry editor. Which root key in the Registry contains hardware information? A. HKEY_CURRNT_USER B. HKEY_CLASSES_ROOT C. HKEY_CURRENT_CONFIG D. HKEY_LOCAL_MACHINE

D. HKEY_LOCAL_MACHINE 1.5 Given a scenario, use Microsoft operating system features and tools.

When a new hard disk is installed into a Windows system, what action needs to happen to the disk first? A. Partition B. Import C. Mount point D. Initialization

D. Initialization 1.5 Given a scenario, use Microsoft operating system features and tools.

You need to routinely manager a Windows system. Rather than having to open several console windows, you would like to customize a single window to contain the most commonly used management tools. Which command will you use to create this console? A. Services.msc B. Msts C. Regedit D. MMC

D. MMC (Microsoft Management Console)

You're about to start a repair installation of a personal Windows 7 workstation. There is one volume in the system and Windows will no longer boot properly. Which boot device will likely need to be the highest priority? A. PXE B. Hard drive C. Floppy drive D. Optical drive

D. Optical drive (A bootable flash drive would also work in this scenario, however, it is not an option.) 220-1002: 1.3 - Summarize general OS installation considerations and upgrade methods.

Which of the following boot methods can obtain boot information from a specially configured server? A. Optical B. HDD C. FDD D. PXE

D. PXE 220-1002: 1.3 - Summarize general OS installation considerations and upgrade methods.

A user is reporting a PC is running slow. You would like to log utilization statistics over time and run a report of the results. Which utility do you use? A. System properties B. Device manager C. Task manager D. Performance monitor

D. Performance monitor 1.5 Given a scenario, use Microsoft operating system features and tools.

Which partition type is bootable and can be marked as active? A. Extended B. MBR C. Logical D. Primary

D. Primary (MBR- type is a type of boot sector. Information about partitions is stored in the MBR, which is located in the first sector on the disk.) 1.3 Summarize general OS installation considerations and upgrade methods.

What Windows utility allows a user to view installed updates? A. System B. File History C. Programs and Features D. Default Programs

D. Programs and Features 1.6 Given a scenario, use Microsoft Windows Control Panel utilities.

The system protection tab in system properties allows a user to configure which of the following? A. PC reset B. Windows backup C. Windows firewall D. Restore points

D. Restore points (Search system protection in Settings) 1.6 Given a scenario, use Microsoft Windows Control Panel utilities.

An application has stopped working after a recent update. Which of the following would be the best FIRST step to resolve the issue? A. Reinstall Windows B. Run SFC C. Disable all startup services D. Run an application repair E. Recover from a known-good back up

D. Run an application repair 220-1001: 3.1 - Troubleshooting Solutions

Which of the following would be the BEST way to automate the Linux OS? A. PowerShell B. Javascript C. VBScript D. Shell script

D. Shell script 220-1002: 4.8 - Scripting

A macOS administrator needs to find a single file containing a specific phrase. Which of the following would be the best way to accomplish this task? A. Mission Control B. Spaces C. Disk Utility D. Spotlight E. Keychain

D. Spotlight (Spotlight is the indexing and search engine for files on a macOS system) 220-1002: 1.9 macOS Features

A user has replaced their monitor with a new model, but Windows now shows a blank screen after the Windows startup logo. Which of the following would be the BEST next troubleshooting step? A. Reseat the video adapter B. Update the BIOS C. Run SFC D. Start in VGA mode E. Reinstall the boot partition

D. Start in VGA mode 220-1002: 3.1 - Troubleshooting Windows

A Windows system is performing slow. Multiple users remote into the system at the same time which might be taxing resources. What utility can be used to user connections? A. Performance Monitor B. System Properties C. Group Policy D. Task Manager

D. Task Manager (The users tab in the Task Manager offers a display of currently connected users and the ability to disconnect them.) 1.5 Given a scenario, use Microsoft operating system features and tools.

Which macOS tool would be the best choice for automated backups? A. Mission Control B. Spotlight C. Boot Camp D. Time Machine E. Keychain

D. Time Machine 220-1002: - 1.9 macOS Tools

A technician is restoring a macOS system after a drive failure. Which of the following would provide this functionality? A. Carbon Copy B. Data Restore C. Finder D. Time Machine E. Backup and Restore

D. Time Machine 220-1002: 1.9 - macOS Tools

A technician at a corporate headquarters needs to view the screen of a client located in another country. The client is running Windows 10 Home on a laptop computer. Which of the following would be the easiest way to accomplish this screen sharing session? A. Use Remote Desktop Connection B. Install a third-party screen-sharing utility C. Have the client email screenshots to the technician D. Use Remote Assistance E. Configure the client's firewall for UPnP

D. Use Remote Assistance 220-1002: 1.8 - Windows Network Technologies

Which of these is not a valid event category in the Event Viewer Windows Log? A. Application B. Security C. Setup D. User E. System

D. User

If you encounter boot problems, which tool is a good place to start your troubleshooting? A. Network Troubleshooter B. System Troubleshooter C. WinPE D. WinRE

D. WinRE

A home user would like to share videos and pictures between Windows 7 and Windows 8.1 devices without adding separate usernames and passwords on every computer. Which of these would be the best way to provide this file sharing? A. Windows Domain B. FTP server C. Windows server D. Windows HomeGroup E. NTFS file share

D. Windows HomeGroup 220-1002: 1.8 - HomeGroup, WorkGroup, and Domains

A system administrator has discovered a virus that has infected a system, but has not received a notification from the systems anti-virus software. Which of the following would best describe this attack? A. Spoofing B. DoS C. Brute force D. Zero day E. Phising

D. Zero day 220-1002: 2.5 - Zero Day Attacks

Which command would be the best choice for changing the ownership of a file? A. dd B. chmod C. pwd D. chown E. xcopy F. mv

D. chown 220-1002: 1.9 - Basic Linux Commands

A Linux administrator would like to back up an entire partition from one server to another. Which of the following would be the best choice for this task? A. tar B. yum C. apt-get D. dd E. vi

D. dd (The dd command is commonly used to backup and restore Linux partitions) 220-1002: 1.9 - Basic Linux Commands

Which mobile operating system is derived from Unix? A. Google Chrome B. Android C. Windows 10 Mobile D. iOS

D. iOS 1.1 Compare and contrast common operating system types and their purposes.

A web server administrator would like to view all IP addresses connecting to a server. Which of the following would provide this information? A. tracert B. ipconfig C. ping D. netstat E. nslookup

D. netstat Bonus Think of netstat as standing for Network Statistics 220-1002: 1.4 - Network Command Line Tools

A network technician is troubleshooting a Windows laptop with network connectivity issues. Which of the following would display the IP address associated with a remote Linux web server? A. ipconfig B. gpresult C. netstat D. nslookup E. net view

D. nslookup

Fun Fact!

Default programs is a Windows utility that is used to manage applications and associated files. For example, a particular image viewing application could be selected as the default to open all image files.

Which of the following would be the best way to manage a group of a hundred Windows 10 computers? A. Workgroups B. Safe Mode C. SSH D. RDP E. Active Directory

E. Active Directory (Reminder: Workgroups aren't as centralized as Active Directory. Mostly used from home) 220-1002: 2.7 - Workstation Security Best Practices

A Windows 10 user would like to configure their computer to use a specific IP address when a DHCP server is not available. Which configuration setting would provide this functionality? A. QoS Packet Scheduler B. VPN Connection C. General IP configuration D. DHCP reservation E. Alternate configuration

E. Alternate configuration 220-1002: 1.8 - Windows IP Address Configuration

A security administrator is used a dictionary to determine if any of the passwords on their systems are not following best practices. Which of the following would BEST describe this process? A. Denial of service B. Zero-day C. Social engineering D. Spoofing E. Brute force

E. Brute force (The key word in the question is the use of a dictionary. It is called a Dictionary Attack, where are dictionary is used to locate common words, and to see if those common words are being used as a password) 220-1002: 2.5 - Brute Force Attacks

Which is not a root key in the registry? A. HKEY_CLASSES_ROOT B. HKEY_CURRENT_USER C. HKEY_LOCAL_MACHINE D. HKEY_USERS E. HKEY_CURRENT_MACHINE

E. HKEY_CURRENT_MACHINE

A user has connected all of their Windows 8.1 devices at home using a single shared password. Which of the following would BEST describe the architecture? A. Windows Domain B. Workgroup C. Remote Desktop D. RADIUS E. HomeGroup

E. HomeGroup

Put the following malware removal best practices in order. A. Quarantine infected systems B. Schedule scans and run updates C. Educate the end user D. Disable System Restore E. Identify malware symptoms F. Remediate G. Enable System Restore

E. Identify malware symptoms A. Quarantine infected systems D. Disable System Restore F. Remediate B. Schedule scans and run updates G. Enable System Restore C. Educate the end user 220-1002: 3.3 - Removing Malware

A user in the accounting department needs to edit a file that's shared on the \MARKETING server. Which of these would be the best way for the accounting team to identify the share name on \MARKETING? A. NETSTAT B. NSLOOKUP C. NET USE D. SHARE E. NET VIEW

E. NET VIEW (The NET VIEW command can be used to list the available resources on a remote server.) 220-1002: 1.4 - Network Command Line Tools

A server admin is building a series of scripts to run in Windows, Linux, and macOS. Which of the following would be the BEST choice for this task? A. Shell script B. PowerShell C. VBScript D. Batch file E. Python

E. Python 220-1002: 4.8 - Scripting

A user states that an application has been unstable for that past couple of weeks. Which of these would be the best way to view the problem history over this timeframe? A. Task Manager B. Servies C. Device Manager D. Performance Monitor E. Reliability Monitor

E. Reliability Monitor 220-1002: 3.2 - Troubleshooting Security Issues

What does EULA stand for?

End User License Agreement

What does FOSS stand for?

Free and Open Source Software

Put these malware removal best practices in order: A. Enable System Restore B. Remediate C. Quarantine infected system D. Educate the end user E. Disable System Restore F. Schedule scans and run updates E. Identify malware symptoms

G. Identify malware symptoms C. Quarantine infected system E. Disable System Restore B. Remediate F. Schedule scans and run updates A. Enable System Restore D. Educate the end user 220-1002: 3.3 - Removing Malware

What are the features of the NTFS filing system?

It provides 64-bit addressing, compression, access security, and indexing features.

What does MSTSC stand for and what is it used for?

MSTSC stand for Microsoft Terminal Services Client and it is a command executable that is used for Remote Desktop Connection.

What does MMC stand for?

Microsoft Manager Console

Fun Fact!

NETSTAT stands for Network Statistics. It is a commands line tool that is used to display the current network connections and port activity on your computer

Fun Facts! (File Systems)

NTFS (New Technology File System) is a file system developed by Microsoft for use with Windows systems. It provides 64-bit addressing, compression, access security, and indexing features. exFAT is a 64-bit version of FAT (File Allocation Table). Designed for removable hard drives and flash media, exFAT supports large volumes and large file sizes. exFAT supports access permissions but not compression or encryption. FAT32 (File Allocation Table) is a file system created as an improvement over FAT16, such as larger volumes. A characteristic of FAT32 is a maximum file size of 4GB minus 1 byte. CDFS (CD File System) is a legacy file system used for Compact Disc optical media. CDFS has two writing modes and an extension called Joliet that allows for long file name support. 220-1002: 1.3 - Summarize general OS installation considerations and upgrade methods.

Fun Fact!

PC reset is a startup recovery option that a user can use to reinstall Windows on a computer. With a reset system files are recopied and setting are returned to factory default.

What does PCI DSS stand for?

Payment Card Industry Data Security Standard

What does PII stand for?

Personally Identifiable Information

What does PXE stand for?

Preboot Execution Environment

Fun Fact!

The Windows Registry is structured as a set of five root keys that contain databases. The HKEY_LOCAL_MACHINE contains hardware information such as bus type, system memory, and device drivers. The HKEY_CLASSES_ROOT key contains OLE (Object Linking and Embedding) data as well as file association data. The HKEY_CURRENT_USERS key contains profile information for the currently logged in user. This includes desktop setting, environment variables, and application preferences. The HKEY_CURRENT_CONFIG key contains system and software configuration information specific to a session.

Fun Fact!

The mstsc (Microsoft Terminal Services Client) command is an executable that is used for remote desktop connections.

What is the purpose of swap space?

Virtual RAM

Fun Fact!

When a new disk is installed in a Windows system, the Disk Management console will show a status of not initialized. By selecting the disk, it can be initialized. Once initialized it may be partitioned and formatted.

Fun Fact!

Windows 10 Enterprise is only available as a 64-bit operating system. 220-1002: 1.3 - Summarize general OS installation considerations and upgrade methods.

Fun Fact!

Windows 8.1 is directly upgradeable. Windows 8, however, is not. To upgrade Windows 8 to Windows 10, the 8.1 update is required first. 220-1002: 1.3 - Summarize general OS installation considerations and upgrade methods.

Fun Fact!

Windows Pro can be upgraded to Windows Enterprise. This is possible with both Windows 7 Pro, and Windows 8.1 Pro. Windows 8 is not supported. 220-1002: 1.3 - Summarize general OS installation considerations and upgrade methods.

Fun Fact!

Windows Remote Assistance is the one-time remote access feature available by default in Home editions of Windows 7, 8.1, and 10

Fun Fact!

Windows backup allows a user to create a system image of a Windows computer. The backup and restore utility can be found in Control Panel.

Fun Fact!

Windows update is a system process that is used to provide operating system, security, and driver updates to a Windows system. It can also keep applications such as Microsoft Office up to date. Windows update can be a very system intensive process that will appear in Task Manger as svchost.exe.


Kaugnay na mga set ng pag-aaral

Statistics 125 - Module 1 Homework 1.3

View Set

G4《你今天上了什么课》第6页

View Set

Nurs 200 Midterm Chaminade University

View Set

Business Law - Chapter 24 LearnSmart

View Set

Chapter 13 Cyber Risk, Terrorism, International Insurance

View Set