Master Set #3 - Core 2

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Sync Center

A Windows Control Panel applet used for managing local (offline) versions of files and folders stored on the network is known as:

Privacy

A Windows Internet Properties applet tab containing an option for managing pop-up windows displayed by websites is called:

Programs

A Windows Internet Properties system utility tab containing an option for managing Internet Explorer web browser add-ons is called:

taskkill

A Windows command that uses the process PID to kill a process.

dism

A Windows command-line tool used for preparing and modifying contents of Windows images is known as:

The most restrictive permission.

A Windows resource with conflicting NTFS and share permissions applied to it will assume:

LocalService

A limited account used to run services that cannot make system wide changes. Also it can access the network anonymously

UDF (Universal Disk Format) file system

A file system for optical media used by all DVD discs and some CD-R and CD-RW discs.

Quick format

Which format type in MS Windows does not erase disk data?

Domain groups

Which item resides on a domain controller and provides access to network resources throughout the domain?

Performance

Which of the Windows Task Manager tabs in Windows 8/8.1/10 includes the information about the network resources usage listed under Networking tab in previous releases of the Microsoft OS?

Public

Which of the Windows network profiles imposes the strongest security settings?

Home

Which of the following Windows 10 editions does not include the Bitlocker full drive encryption and Encrypting File System (EFS) features?

ext4

An improved version of the ext3 filesystem with an extended feature set and better performance. 1EB Storage

GPT

GUID Partition Table, part of EUFI, successor to MBR. Windows allows up to 128 partitions at 2TB each. It also has a back up copy for parition entries

shutdown -h

Halt or power off the system

Malware

Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as:

HIPAA

Health Insurance Portability and Accountability Act

Workgroup

In Windows, a logical group of computers and users in which administration, resources, and security are distributed throughout the network, without centralised management or security.

False

In a differential backup strategy, restoring data from backup requires only a working copy of the last full backup.

Which of the following commands would you use to determine if a clients IP address is statically or DHCP assigned?

Ipconfig

MMC

Microsoft Management Console

DISM

Microsoft's Deployment Image Servicing and Management - a tool that reads the contents of a drive and writes the output to a .WIM format file.

nslookup -Option Host Server

Queries a dns server about a host

file attributes

R - read only

A system administrator needs to modify some files at the macOS command prompt. Which of the following would provide this type of access? A) CMD B) Finder C) Console D) Boot Camp E) Terminal

Terminal; -The Terminal utility provides access to the macOS command prompt.

True

The Task Manager's Users tab in MS Windows allows system administrators to disconnect a user (invoke a Windows lock screen) or to sign them off (force a user to log off).

True

The Troubleshooting Control Panel applet introduced in Microsoft Windows 7 provides access to several software tools that can automatically fix common problems related to application compatibility, hardware, sound, networking, operating system, and security.

Change local account name. Change local account type. Change local account password. Manage another local account. Change local User Account Control (UAC) settings.

The User Accounts applet in Windows allows to:

system partition

The active partition of the hard drive containing the boot record and the specific files required to start the Windows launch.

Defrag

Use the ____ command to rearrange parts of files on the drive so they are contiguous. optimize disk space

For the past several days, the print jobs from the inkjet printer are missing colors and leaving gaps. Which of the following will MOST likely resolve the problem?

Use the automatic print head cleaning feature.

Which of the following encryption protocols are recommended for the Small Office Home Office (SOHO)?

WPA2/AES

apt-get

What is the name of a software tool used for finding and installing software packages on Debian and Debian-based Linux distributions?

mv

What is the name of the Linux command used for renaming files and directories?

Hardening

What kind of general term is used to describe the process of securing a computer system?

Power level controls

Which WAP configuration setting allows for adjusting the boundary range of a wireless signal?

Performance Monitor (perfmon.exe). Resource Monitor (resmon.exe). Task Manager (taskmgr.exe).

Which of the following tools in Windows provide access to real-time performance data on CPU, RAM, hard drive, and network interface utilization? (Select 3 answers)

End user education

Which of the following would be the best malware-prevention method/tool?

WWAN

Wireless Wide Area Network

cls

clears the command prompt screen

DD

copies and converts files to enable them to be transferred from one type of medium to another.

Which of the following file systems is optimized for USB flash drive storage? A) NTFS B) exFAT C) NFS D) CDFS E) ext4

exFAT; -Microsoft's exFAT file system has been specifically created to optimize the flash drive file storage process.

Linux distributions

ext3 and ext4 are examples of default file systems used by:

Which of the following would most commonly be used with the Linux operating system? A) CDFS B) ext4 C) NTFS D) FAT32

ext4; -The ext4 (Fourth extended file system) is a commonly used file system for Linux devices.

After removing the printed paper from your laser printer, the toner smudges and can be wiped off in places. Which of the following is the MOST likely problem?

fuser rollers

Force Quit

in Apple menu or press command+option+esc

CD (Lynux)

is used to change the working directory to a specified directory.

IFCONFIG

is used to configure network interfaces for Linux servers and workstations. It is also used to view current TCP/IP configurations of a system.

chkdsk (CheckDisk)

is used to scan a volume to check for and try to repair file and file system errors

ext3 and ext4

linux file system

sfc (System File Checker)

locates damage/corrupted operating system files. after it locates the corrupted files, it ask to replace the files.

Resolves (looks up) the IP address of the specified hostname.

nslookup

Files that exist on the hard drive but are not associated with a directory in the index.

orphaned files

format D: /fs:EXFAT /q

performs a quick format that doesn't scan for boot sectors

A few simple replies to this request from the remote host indicates that a connection exists between sender and receiver.

ping

Performs a continuous connection test when used with the -t option.

ping

telnet

port 23

pwd

print working directory

Administrative shares

print$ IPC$

legal and regulatory or compliance controls

privacy laws, policies, and clauses

virtual memory

process of optimizing RAM storage by borrowing hard drive space

5

r-x

What is your effective permission to a share (accessed across the network) to which you have been assigned Read share permissions and NTFS Modify permissions to?

read

rm -r

removes a directory and its contents recursively

You work for a company that provides technical support for customers. One customer calls wanting to know how to adjust their monitor so they can have the sharpest and most detailed images, words, and icons. Which Control Panel setting should you adjust to BEST meet the customer's needs?

resolution

network mapping

tools used to gather information about the way a network is built and configured

Tests connectivity between devices and shows the routers in the path between the two devices.

tracert

apt-get upgrade

update all packages with latest versions

You need to create a user account on a Windows system that can create files, run applications, and install printers when the driver for the printer already exists on the computer. You want the user to have only the minimum rights necessary on the computer. Which group should this user be a member of?

users

xcopy

utility that allows you to copy the contents of more than one directory at a time and retain the directory structure

VFAT

virtual file allocation table - file system for linux

VMM

virtual memmory monitor - manages the memmory mappings and assignments

windows cardspace

windows vista feature that provides a system for creating relationships with Web sites and online services that use credit cards and membership cards for payment or credentials

You're using a Linux distribution that uses RPM for package management. Which command would you use to check to see if the httpd package, the Apache HTTP Server package, is installed?

yum list installed httpd

A system administrator needs to update a utility on a Linux server. Which of the following would be the BEST choice for this task? A) dd B) yum C) rsync D) update E) vim

yum; -The yum (Yellowdog Updater, Modified) utility provides an easy to way install and maintain Linux software distributions.

MITM attack

Which of the following attacks relies on intercepting and altering data sent between two networked hosts?

Kerberos

Which of the following authentication protocols can be used to enable SSO in Windows-based network environments?

Screen Sharing

Which of the following built-in macOS tools enables remote access to another Mac computer?

Virtual memory. Paging file. Swap partition.

Which of the following can be used as an extension of RAM? (Select 3 answers)

DNS configuration

Which of the following can be used by system administrators to selectively block access to known malware sites?

cd \

Which of the following commands in Windows Command Prompt changes the current directory to the root directory?

diskpart

Which of the following commands in Windows Command Prompt launches a text-based command-line partitioning utility?

help [command name] and [command name] /?

Which of the following commands in Windows can be used to display help information related to a specific command-line utility? (Select 2 answers)

vi

Which of the following commands is used for invoking a text editor in Unix-like operating systems?

cmd

Which of the following commands launches a command interpreter utility in Windows?

Disconnecting any removable drives. Updating boot order in BIOS.

Which of the following could be of help in troubleshooting a system that attempts to boot to incorrect device? (Select 2 answers)

VNC

Which of the following is a non-proprietary RDP alternative that enables control over another computer on the network with the use of a graphical user interface?

ACL

Which of the following is a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object?

EFS (Encrypting File System)

Which of the following is an MS Windows component that enables encryption of individual files?

Android

Which of the following is an open-source mobile OS designed for smartphones and tablets?

Authentication

Which of the following is one of the functions provided by RADIUS and TACACS servers?

WPA2-PSK

Which of the following is the best method to secure a small network lacking an authentication server?

Windows logo key + E

Which of the following key combinations can be used to launch Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) in MS Windows?

diskmgmt.msc

Which of the following launches a GUI system utility for managing HDDs in Windows?

devmgmt.msc

Which of the following launches the Device Manager tool in Microsoft Windows?

Processor Affinity

"CPU pinning" or "cache affinity" enables the binding and unbinding of a process or a thread to a central processing unit or a range of CPUs, so that the process or thread will execute only on the designated CPU or CPUs rather than any CPU. Scheduling that process to execute on the same processor improves its performance by reducing performance-degrading events such as cache misses.

Where are the log files stored?

%SystemRoot%\System32\Winevt\Logs folder

WWAN

(Wireless Wide Area Network) A computer network that enables users to wirelessly connect to their offices or the Internet via a cellular network. Sometimes referred to as wireless broadband.

1

--x

Minimum system requirements for 64-bit (x64) version of Microsoft Windows 7

1 GHz CPU 2 GB of system RAM DirectX 9 graphics device with WDDM 1.0 or higher driver 20 GB of free hard disk space

Minimum system requirements for 32-bit (x86) version of Microsoft Windows 10

1 GHz CPU with support for PAE, NX, and SSE2 1 GB of system RAM DirectX 9 graphics device with WDDM 1.0 or higher driver 16 GB of free hard disk space

Minimum system requirements for 64-bit (x64) version of Microsoft Windows 10

1 GHz CPU with support for PAE, NX, and SSE2 2 GB of system RAM DirectX 9 graphics device with WDDM 1.0 or higher driver 20 GB of free hard disk space

Minimum system requirements for 64-bit (x64) version of Microsoft Windows 8/8.1

1 GHz CPU with support for PAE, NX, and SSE2 2 GB of system RAM DirectX 9 graphics device with WDDM 1.0 or higher driver 20 GB of free hard disk space

Minimum system requirements for 32-bit (x86) version of Microsoft Windows 8/8.1

1 GHz CPU with support for PAE, NX, and SSE2 1 GB of system RAM DirectX 9 graphics device with WDDM 1.0 or higher driver 16 GB of free hard disk space

Partition Types

1. Primary 2. Logical 3. Extended Primary partition is a bootable partition and it contains the operating system/s of the computer, while logical partition is a partition that is not bootable. Multiple logical partitions allow storing data in an organized manner. An extended partition is a partition that can be divided into additional logical drives. Unlike a primary partition, you don't need to assign it a drive letter and install a file system. Instead, you can use the operating system to create an additional number of logical drives within the extended partition.

sudo

A Linux command that temporarily modifies security privileges to allow an execution of a single command that requires root access permissions is called:

passwd

A Linux command-line command allowing a user to change his/her own password is known as:

msinfo32.exe

A Microsoft Windows application utility that displays details about computer's hardware configuration, computer components, software, and device drivers is known as:

BitLocker To Go

A Microsoft Windows feature specifically designed to enable encryption of removable drives is known as:

Windows Update

A Microsoft online service used for patching up system vulnerabilities, improving system performance, and fixing coding errors found in Windows software is known as:

exFAT (Extended File Allocation Table)

A Microsoft-proprietary file system optimized for flash drives is known as:

The Windows 10 Disk Management utility status shows that a volume is "Regenerating." Which of these describes this status message? A) A RAID 5 volume is rebuilding data based on parity B) A scheduled defragmentation is active C) A drive in a RAID array has failed D) A RAID 1 volume is copying data between mirrored drives E) A RAID 0 volume is in the mounting process

A RAID 5 volume is rebuilding data based on parity; -After replacing a bad drive in a RAID 5 array, the new drive will regenerate data based on the remaining data and parity information.

AUP (Acceptable Use Policy)

A Set of rules and guidelines that are set up to regulate Internet use and to protect the user.

bootrec

A Windows Recovery Environment troubleshooting and repair tool that repairs the master boot record (MBR), boot sector, or BCD store. It replaces the fixboot and fixmbr Recovery Console commands used in Windows XP and earlier operating systems.

robocopy (robust file copy)

A Windows command that is similar to and more powerful than the xcopy command, used to copy files and folders.

diskpart

A Windows command to manage hard drives, partitions, and volumes.

dxdiag.exe

A Windows command used to display information about hardware and diagnose problems with DirectX.

BitLocker

A Windows feature that encrypts an entire drive. Built to the NTFS file system. FDE (Full Disk Encryption)

Public

A Windows network profile that hides a computer from other devices on the network and makes it unavailable for file and printer sharing is known as:

Windows Update

A Windows program that launches Internet Explorer and connects to the Windows Update Website.

String

A basic data type designed to contain text information is known as:

A system administrator is working with a third-party to destroy a container of one thousand old hard drives. Which of these would be the BEST way to validate the destruction of these drives? A) The top cover of each drive is returned to the system administrator B) The system administrator attends the drive destruction process C) A certificate is provided to the system administrator D) A video of the destruction process is provided to the system administrator E) All of the destroyed drive contents are returned

A certificate is provided to the system administrator; -A Certificate of Destruction is commonly used to verify the destruction of equipment by a third-party. This certificate provides an easy method of documentation without returning the destroyed equipment or requiring the system administrator to physically view the destruction process.

security group

A collection of user accounts that can be assigned permissionsin the same way as a single user object

diskpart

A command to manage hard drives, partitions, and volumes.; CREATING AND DELETING PARTITIONS, CONVERTING A DISK BACK TO BASIC DYNAMIC

rm

A command-line command in Linux used for deleting files and directories is known as:

gpresult

A command-line command in MS Windows that displays Group Policy information for a machine or user is known as:

Secedit

A command-line tool that is used to apply, export, or analyze security templates.

ping

A command-line utility used for checking the reachability of a remote network host is known as:

tasklist

A command-line version of the Task Manager

Swap Partition

A disk partition configured to be used as an extension to a computer's RAM. This enables a system to run more programs or to process larger data sets than would otherwise be possible.

swap partition

A disk partition disignated for swap space in linux

Accessing Disk Management, right-clicking on a drive and selecting Change Drive Letter and Paths from the context menu.

A drive letter in Windows can be changed by:

Device Manager

A feature in the Windows operating system that lets individuals view and change the properties of all hardware devices attached to the computer.

mission control

A feature of Mac OS X that enables switching between open applications, windows, and more.

Remote Disc

A feature of OS X that gives other computers on the network access to the Mac's optical drive.

WPS (Wi-Fi Protected Setup)

A feature with many wireless devices that allows users to configure wireless security with a push button or a PIN. When enabled, it is vulnerable to attacks using free open source software.

Swap file. Paging file. Virtual memory.

A hidden file (or files) on the hard disk that Windows uses to hold parts of programs and data files that cannot be stored in RAM due to the insufficient memory space is called: (Select 3 answers)

Factory Recovery Partition

A partition that contains an image of the bootable partition created when the computer was built.

Keychain

A password management system in macOS is known as:

Sleep/suspend. Standby.

A power management mode in Windows that draws small amount of power, saves the system state in RAM, and allows for quick resuming of full-power operation with the use of a power button or on command is known as: (Select 2 answers)

VPN (Virtual Private Network)

A private network that is configured within a public network such as the Internet

Physical Address Extension

A processor feature that enables x86 processors to access more than 4 GB of physical memory on capable versions of Windows.

Remote Desktop Protocol (RDP)

A protocol that allows for separate channels for carrying presentation data, serial device communication, licensing information, and highly encrypted data (keyboard, mouse activity).

environment variable

A storage location in the environment of the operating systems command shell.

Zero-day attack

A type of attack aimed at exploiting vulnerability that is present in already released software but unknown to the software developer is called:

Unattended installation

A type of automated OS installation process that uses an answer file and does not require user interaction or presence is known as:

Proximity card

A type of contactless smart card that can be read at a close range from a reader device is commonly referred to as:

True

A type of critical file that a computer system depends on to operate properly is known as a system file. In Microsoft Windows, system files are hidden by default; they might also have Read-only attribute turned on to prevent accidental changes to the file contents. Windows system files can be permanently displayed in Windows Explorer (Windows 7), or File Explorer (Windows 8/8.1/10) after modifying file and folder settings in the Folder Options applet in Windows 7 Control Panel, or File Explorer Options applet in Windows 8/8.1/10 Control Panel.

MMC

A type of customizable framework providing access to a collection of system tools designed to manage networks, computers, services, and other system components in Windows is known as:

zero-day exploit

A vulnerability that is exploited before the software creator/vendor is even aware of its existence.

MSDS

A widely used abbreviation for Material Safety Data Sheet. A MSDS contains details of the hazards associated with a chemical, and gives information on its safe use.

A user's computer is running slow even when only one program is open. A technician discovers the CPU is running at 100%, and there is a significant amount of outgoing network traffic. Which of the following is MOST likely causing the high resource usage? A. A keylogger is running B. The computer is part of a botnet. C. The computer is receiving a DDOS attack D. A software is blocking traffic

A. A keylogger is running

A team needs to deploy a temporary server room at a site to provide support during construction. Which of the following should they use at this site while setting up the server room? A. Air filters B. Privacy screens C. Vacuums D. ESD mats

A. Air filters

Which of the following provide the BEST security for a server room? (Select two.) A. Badge reader B. Bollard C. Biometric lock D. Cable lock E. USB token F. Privacy window shades

A. Badge reader and C. Biometric lock

A technician is called to troubleshoot a user's Windows workstation that fails to boot. The user reports that, after updating the workstation's graphics driver to a beta version, the machine gives a "Stop" error on every boot. Which of the following should the technician complete to resolve the issue? A. Boot the workstation in safe mode and disable the graphics driver system tray menu B. Boot the workstation in safe mode with networking and install the latest stable graphics driver. C. Boot the workstation in safe mode and disable Windows driver signing requirements D. Boot the workstation in safe mode with Command Prompt and enable Driver Verifier with standard settings

A. Boot the workstation in safe mode and disable the graphics driver system tray menu

Which of the following Windows OS technologies is used to store remote data accessed via a WAN connection on local servers for user access? A. BranchCache B. Swap partition C. Domain access D. Proxy server

A. BranchCache

A technician performs a virus cleaning on a computer that has been redirecting all browsers to a phishing website. System Restore was turned off before the cleaning. The technician runs the machine through several scanners, and then tests for redirection. A smaller number of sites are still redirecting to the phishing website. The antivirus software correctly blocks the website. Which of the following should the technician do NEXT? A. Check the contents of the hosts file B. Do a System Restore to a date before the infection C. Rerun the antivirus scan with higher sensitivity D. Rebuild the OS on the machine

A. Check the contents of the hosts file

An employee contacts the help desk because the battery in a company-provided smartphone lasts only a short period of time when the worker is in the office. Which of the following would MOST likely reduce this symptom? (Select TWO) A. Close applications when tasks are completed. B. Increase the time to dim the screen automatically C. Increase the frequency for syncing corporate email D. Set the smartphone display to maximum brightness E. Connect to the office WiFi network automatically F. Disable 802 11ac and use mobile data exclusively

A. Close applications when tasks are completed. and D. Set the smartphone display to maximum brightness

A technician responds to a call from a user who claims to have a virus on a workstation. The technician observes the following notification from the system tray: There are 1033 infected files on this computer. Click here to disinfect. The link is blocked by the corporate content filter and displays a message stating the site contains known malware. Which of the following should the technician complete to secure the computer with MINIMAL impact to the user? A. Compare the startup items and services to a known clean image, and remove any startup items not found in the other image. Run an anti-malware scan. B. Validate that the alerts are false positives, and disable security software on the workstation to prevent further false notifications. C. Back up the user's files. Restore the system to the original system image designated by corporate IT policies. Restore the user's files. D. Request a content filter exception to allow access to the link from the notification. Once available, follow the instructions on the linked site.

A. Compare the startup items and services to a known clean image, and remove any startup items

A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LAN do not exhibit this symptom. Which of the following needs to be adjusted on the workstation to fix the issue? A. Date and time B. UEFI boot mode C. Logon times D. User access control

A. Date and time

A company brings in contractors several times a year to perform inventory, and the contractors use company supplied laptops. The company's security policy states that once the inventory is completed, the contractors should not be able to log in to the laptops until the next inventory. Which of the following BEST enforces this policy? A. Delete the user accounts B. Disable the user accounts C. Restrict the user accounts D. Reset the user accounts

A. Delete the user accounts

A network administrator has noticed unusual activity with a user's login credentials on the network. The user is attempting multiple simultaneous logins across the network, some of which are attempting to access workstations and servers to which the user does not have access. Which of the following should the network administrator do NEXT? A. Delete the user's AD account B. Decrease the user's AD privileges C. Disable the user's AD account D. Reset the password on the user's AD account

A. Delete the user's AD account

A security team is auditing a company's network logs and notices that a USB drive was inserted in several of the servers. Many login attempts were then successfully performed using common login information. Which of the following actions should be taken to close the vulnerability? (select two) A. Disable guest account B. Remove admin permissions C. Modify AutoRun settings D. Change default credentials E. Run OS security updates F. Install a software firewall

A. Disable guest account and C. Modify AutoRun settings

A technician receives a phone call regarding ransomware that has been detected on a PC in a remote office. Which of the following steps should the technician take FIRST? A. Disconnect the PC from the network B. Perform an antivirus scan C. Run a backup and restore D. Educate the end user

A. Disconnect the PC from the network

Which of the following features has undergone the most significant changes from Windows 7 to Windows 10 and greatly simplified the operating system installation process? A. Driver detection B. Metro interface C. Account control D. PXE installation

A. Driver detection

Joe, a user, returns his computer to the technician who performed a virus removal on it the week before. Joe states that several symptoms have returned. Which of the following should the technician have covered previously as part of the original repair? A. End-user education B. Pre-installation environment cleaning C. Disabling of System Restore D. Infected system quarantine

A. End-user education

Joe, a customer, calls a technician to report a remote computer is demonstrate erratic behavior while he is working on it. The technician verifies the files and directories Joe is working on locally cannot be open in any application, and the computer is extremely slow. Which of the following is the MOST likely cause of this issue? A. Files disappearing B. File permission changes C. Application crash D. Too many start items

A. Files disappearing

A user's phone contains customer's PII. The user cannot have the phone automatically wiped because the data is very valuable. Which of the following is the BEST method of securing the phone? A. Fingerprint lock B. Passcode lock C. Swipe lock D. PIN lock

A. Fingerprint lock

A customer is presuming manager to get things done on time. Which of the following has the project failed to do this case? A. Follow up with the customer after project completion B. Mention a positive attitude during the project C. Disclose project expenses on social media D. Communicate with the customer clearly

A. Follow up with the customer after project completion

A customer purchased a 3TB HDD to use with a Windows 7 PC and wants to have letter "J" assigned only to the drive. Which of the following types of partitioning should be performed to give the customer full use of the 3 TB drive? A. GPT B. Dynamic C. Basic D. Extended

A. GPT

A sales representative regularly modifies confidential files on a laptop and needs them to be available all the time. The sales representative will be on a six-month business trip in two weeks A technician has been asked to assist the sales representative with saving files. Which of the following is the BEST method to implement to prevent any data loss for the sales representative? A. Give the sales representative a USB security lock. B. Encrypt the laptop's image on the server C. Create a redundant cloud storage drive D. Give the sales representative an external hard drive.

A. Give the sales representative a USB security lock.

A Windows user is attempting to install a local printer and is unsuccessful on permissions. Which of the following user types BEST describes this user? A. Guest B. Power User C. Administrator D. Standard User

A. Guest

A technician is setting up a kiosk. The technician needs to ensure the kiosk is secure and users will have access to only the application needed for customer interaction. The technician must also ensure that whenever the computer is rebooted or powered on it logs on automatically without a password. Which of the following account types would the technician MOST likely set up on this kiosk machine? A. Guest B. Administrator C. Power User D. Remote Desktop User

A. Guest

A technician is PXE booting a computer. Which of the following is the technician MOST likely performing on the computer? A. Image deployment B. Multiboot configuration C. In-place upgrade D. System repair

A. Image deployment

While attempting to install a new program, an end user is notified the workstation meets the memory requirements, but it does not meet the requirements for free space. Due to time constraints the user needs a quick way to install and access the program. Which of the following is the BEST option given the solution? A. Install to a network drive B. Install to a USB drive C. Install to a DVD-RW D. Install to a security internal_HDD

A. Install to a network drive

Joe, a user who is travelling for business, reports that his mobile phone was getting approximately 35 Mbps for the first few days of his trip, but now it is only getting around 500 Kbps. Joe uses the device as a GPS to visit customers and as a hotspot to check work email and watch movies online. Which of the following is the MOST likely cause of Joe's slow data speeds? A. Joe's data transmission is over the limit B. The phone needs to be rebooted from overuse C. The use of GPS interferes with data speeds D. There is unintended Bluetooth pairing

A. Joe's data transmission is over the limit

A technician has been asked to recommend antivirus software for a home PC, but the user does not want to pay for a license. Which of the following license type should the technician recommend? A. Open license B. Personal license C. Corporate license D. Enterprise license

A. Open license

Which of the following is considered government-regulated data? A. PII B. End-user license agreement C. Digital Millennium Copyright Act D. DRM

A. PII

Which of the following built-in accounts was removed in Windows 10? A. Power User B. Administrator C. Guest D. Standard User

A. Power User

A user's computer is suspected of hosting illegal files. The IT department has removed the computer and placed it in a secured, cypher-locked room, where it will remain until the local authorities arrive. Which of the following actions should the IT department perform NEXT? A. Preserve data integrity B. Identify violations of acceptable use C. Collect evidence of illegal activity D. Report through proper channels

A. Preserve data integrity

A systems administrator has discovered a folder on the server with numerous inappropriate pictures and videos, which is in violation of the company's AUP. Which of the following would be the NEXT appropriate act? A. Promptly notify the administrator's immediate supervisor B. Rename the folder on the server, and notify the information security officer C. Move the folder to another location on the server, and notify the local authorities D. Ask the owner to move the files from the server to a local computer

A. Promptly notify the administrator's immediate supervisor

Which of the following BEST describes the purpose of an ESD mat? A. Protects against accidental static discharge B. Protects against dust/dirt contamination C. Protects against accidental scratches D. Protects against accidental water damage

A. Protects against accidental static discharge

A technician repaired a laptop for a customer. The customer then complained the repair took too long and questioned the steps the technician took to fix the problem. Which of the following should the technician do NEXT? A. Provide documentation of the repair to the customer B. Allow the customer to voice concerns and post the story to social media later C. Inform the customer the job is done and return to the office D. Defend each step and why it was necessary

A. Provide documentation of the repair to the customer

A user's computer is displaying a black screen. The technician restarts the computer, but the OS still does not load. The technician discovers the OS was patched the previous evening. Which of the following should the technician attempt NEXT? A. Reboot into safe mode and roll back the updates B. Repair the Windows Registry C. Configure boot options in the BIOS D. Disable Windows services and applications

A. Reboot into safe mode and roll back the updates

A wireless access point is going to be configured in a small office located in a crowded building. Which of the following should the installation technician perform to increase the security of the wireless network? (Select two.) A. Reduce the transmit power B. Reduce the channel availably C. Disable the DHCP server D. Enable QoS management E. Disable the SSID broadcast F. Implement WPA encryption

A. Reduce the transmit power and E. Disable the SSID broadcast

An end user's PC is taking a long time to boot. Which of the following operations would be the BEST to resolve this issue with minimal expense? (Select two.) A. Remove applications from startup B. Defragment the hard drive C. Install additional RAM D. Install a faster hard drive E. End the processes in Task Manager F. Run the Disk Cleanup utility

A. Remove applications from startup and B. Defragment the hard drive

A user reports that when opening a web browser the initial page loads to a search engine the user does not recognize When the user performs searches on the site, the results are often irrelevant, and there are many pop-ups. Which of the following should a technician do to resolve these issues? (Select TWO) A. Reset the user's browser to default settings B. Delete the user's cached images, temporary files, and cookies C. Reboot the user's computer and install a secondary antivirus D. Convince the user to use a different web browser that is currently unaffected E. Download the update to the user's web browser of choice F. Remove any unapproved applications from the user's startup items

A. Reset the user's browser to default settings and F. Remove any unapproved applications from the user's startup items

A technician has installed a second monitor for a customer, but the desktop font sizes do not match. Which of the following display settings should be technician adjust to correct this issue? A. Resolution B. Refresh rate C. Extended monitor D. Color depth

A. Resolution

A user calls the help desk regarding a new Windows issues that started in the morning. The user can no longer use any locally attached devices, such as a mouse or a printer, and a reboot did not fix the problem. Which of the following would MOST likely fix the issue? A. Roll back updates B. Disable the Windows Update service C. Check for updates D. Restore hidden updates

A. Roll back updates

A technician is working on a user's workstation and notices a lot of unknown processes running in the background. The user informs the technician that an application was recently downloaded from the Internet. Which of the following types of infection does the user MOST likely have? A. Rootkit B. Keylogger C. Trojan D. Ransomware

A. Rootkit

After a security audit, a technician is tasked with implementing new measures to help secure company workstations. The new policy states that all workstations must be signed off at night, a password is necessary to boot the computer, and encryption must be enabled. Which of the following features should the technician implement to BEST meet these requirements? (Choose three.) A. Screen locks B. Screensaver passwords C. UEFI passwords D. Login time restrictions E. Strong passwords F. Multifactor authentication G. BitLocker H. Credential Manager I. Smart card J. Biometric authentication

A. Screen locks B. Screensaver passwords and G. BitLocker

Joe, an end user, has been prompted to provide his username and password to access the payroll system. Which of the following authentication methods is being requested? A. Single-factor B. Multifactor C. RADIUS D. TACACS

A. Single-factor

A user's Windows laptop has become consistently slower over time. The technician checks the CPU utilization and sees that it varies between 95% and 100%. After the technician closes some running applications, the CPU utilization drops to approximately 20%, and the laptop runs much faster. The next day the same user calls again with the same problem. Which of the following is a tool the technician can use to resolve the issue? A. Task Manager B. MSTSC C. MSConfig D. PerfMon

A. Task Manager

Which of the following devices are MOST likely to have a grounding wire attached to them based on the manufacturer's design? (Select two.) A. UPS B. Server rack C. PoE phone D. Desktop printer E. Modem F. Patch panel

A. UPS and B. Server rack

Which of the following installation types would require the use of an answer file to install the OS? A. Unattended B. Clean C. Repair D. Upgrade

A. Unattended

A user reports slow performance on a computer. A technician checks the computer and finds the RAM utilization Is very high. The technician restarts the computer, and the RAM use is still high. The technician discovers a program running in the background Is using most of the RAM. The user only uses this program once at the end of the year to produce a report. Which of the following steps should the technician take to improve the computer's performance? A. Uninstall and reinstall the program. B. Perform a repair installation of the program C. Install the latest updates for the program. D. Disable the program on startup.

A. Uninstall and reinstall the program.

A user is requesting a solution that will prevent file corruption and ensure a graceful shutdown while providing at least one hour of uptime in case of extreme weather conditions. Which of the following should a technician recommend? A. Uninterruptible power supply B. Surge protector C. Power strip D. Power distribution unit

A. Uninterruptible power supply

Corporate management is concerned about the security of the company's mobile phones, in the event they are lost or stolen. Management instructs the IT staff to ensure the data on the devices is not accessible by unauthorized users. Which of the following would provide the BEST level of protection in this scenario? (Choose two.) A. Use full device encryption B. Enable a pattern lock C. Implement remote wipe features D. Use device lockout policies E. Require complex administrator passwords F. Disable unknown application installations

A. Use full device encryption and C. Implement remote wipe features

A user who is running Windows XP calls a technician to upgrade the computer to a newer Windows OS. The user states the computer has only 1GB of RAM and 16GB of hard drive space with a 1,7GHz processor. Which of the following OSs should the technician recommended to ensure the BEST performance on this computer? A. Windows 7 B. Windows 8 C. Windows 8.1 D. Windows 10

A. Windows 7

Which of the following devices provides protection against brownouts? A. battery backup B. surge suppressor C. rack grounding D. line conditioner

A. battery backup

Why is Shared Key authentication considered a security risk? a) The access point transmits the challenge text in the clear and receives the same challenge text encrypted with the WEP key. b) The keys are shared through broadcast with all network nodes. c) A hacker can see the keys with a sniffer. d) The WEP keys used on all computers are the same.

A: The access point transmits the challenge text in the clear and receives the same challenge text encrypted with the WEP key.

WPA2

AES-based encryption mode is a characteristic feature of:

How did the computer get its IP configuration information?

APIPA

Identifying and researching malware symptoms

According to the CompTIA's best practice procedures for malware removal, putting a malwareinfected Windows-based system into a quarantine should be the next step after:

True

According to the CompTIA's best practice procedures for malware removal, user education should be the final step of the malware removal process.

Which toolset lets you restore a deleted AD object?

Active Directory Administrative Center

Administrative Tools folder in Windows Control Panel

Active Directory Users and Computers (ADUC) is a Microsoft Management Console (MMC) snapin included in most Windows Server OSs. The Active Directory Users and Computers snap-in allows system administrators to manage resources in the Active Directory (AD) environment (e.g. to create, delete, disable, unlock accounts, or to reset account passwords). On a Windows Server OS, the Active Directory Users and Computers snap-in resides in:

An organization manages user workstations and server login scripts, permissions, and updates from a centralized platform. Which of the following would be the BEST description of this system? A) 802.1X B) Active Directory C) PIV D) 2FA E) MDM

Active Directory; -Active Directory is Microsoft's centralized directory services for Windows computers.

net user dmartin Pa$$w0rd /add /fullname: "David Martin" /Logonpasswordchg:yes

Adds a new user account and forces user to change password at first logon (have to enter these commands in administrative command prompt)

net user

Adds or modifies user accounts, or displays user account information.

Which of the following would be the MOST important consideration when installing a new service on a Windows 10 computer? A) Administrator rights B) Hidden shares C) EFS password D) Guest user disabled E) Safe mode access

Administrator rights; -The Windows operating system will not allow a user to install a service or modify system files without administrator access.

A Windows 10 user would like to configure their computer to use a specific IP address when a DHCP server is not available. Which configuration setting would provide this functionality? A) QoS Packet Scheduler B) VPN Connection C) General IP configuration D) DHCP reservation E) Alternate configuration

Alternate configuration; -The Windows IPv4 properties provides a tab for Alternate Configuration settings that will be used instead of APIPA when a DHCP server is not available.

Your DHCP server is acting up. Every time it does, clients fail to renew their IPs and can no longer communicate on the network. When this happens, you notice every affected machine has an IP address in the 169.254.0.0/16 range. You open the control panel -> network and sharing -> adapter properties -> TCP/IP properties. From there, where will you navigate in order to correct the issue?

Alternative configuration

defrag

An MS Windows system utility designed to improve file access speed by rearranging data stored on a disk or drive is called:

System Restore

An MS Windows system utility that allows to roll back system files and settings to an earlier point in time is called:

NetworkService

An account that has the same privileges as LocalService but can access the network using the computer's machine account's credentials

Signature

An antivirus database entry used for identifying malicious code is known as virus:

Engine updates. Virus signature updates.

An antivirus software is kept up to date via: (Select 2 answers)

Software Token

An app, or other software that generates a token for authentication.

System Information

An application used to provide detailed diagnostic information about your mac

Brute-force attack

An attack against encrypted data that relies heavily on computing power to check all possible password combinations until the correct one is found is known as:

phishing

An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information

Phishing

An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information(combination of spoofing and social engineering)

System image

An exact copy of the entire state of a computer system is known as:

Network Interface Card (NIC)

An expansion card that enables a computer to connect other computers or to a cable modem to facilitate a high-speed Internet connection.

Social engineering

An unauthorized practice of obtaining confidential information by manipulating people into disclosing sensitive data is referred to as:

Force Quit

An unresponsive application/process in macOS can be terminated with the use of:

Which of the following is an open source phone/tablet OS?

Android

Windows Defender

Anti-malware software embedded in Windows 8 that can detect, prevent, and clean up a system infected with viruses and other malware. Antispyware utility included in Windows 8/7/Vista.

APFS

Apple File System - used in macOS High Sierra or later which supports native file encryption

Finder

Apple equivalent of file explorer in Windows

Time Machine

Apple equivalent of system restore

Activity Monitor

Apple version of performance monitor

True

As opposed to the simple Denial of Service (DoS) attacks that usually are performed from a single system, a Distributed Denial of Service (DDoS) attack uses multiple compromised computer systems to perform the attack against its target.

While on a service call at a customer site, you are discussing the problem with the customer when your cell phone rings. You check the caller ID, and you see that the call is related to parts you ordered for another customer. Which of the following is the MOST professional way to handle the situation?

Ask the customer if it is okay to take the call, and then step into the hallway to briefly talk on the phone.

A user must input a set of numbers provided by a phone app during the login process. Which of the following would BEST describe this process? A) Remote backup B) Locator app C) Screen lock D) Authenticator E) Full device encryption

Authenticator; -An authenticator app uses pseudo-random numbers to verify that the user who is logging in has access to the phone and app.

An employee in the sales department received a call asking for the employee's login name and password. The caller said they were with the help desk and they were troubleshooting an account issue. Which of these social engineering principles were in use? A) Consensus B) Scarcity C) Intimidation D) Familiarity E) Authority

Authority; -By stating that they were from the help desk, the attacker was attempting to use authority as a method of social engineering.

True

Auto negotiation is an Ethernet procedure that allows two connected devices to exchange information about their capabilities (such as supported speed and duplex modes) and automatically configure connection parameters based on the highest performance settings supported by both devices.

A user in the marketing department has configured their system to automatically start a third-party audio player when a flash drive containing MP3 files is inserted. Which of these features should be disabled to prevent this from occurring? A) AutoPlay B) App Manager C) Active Directory D) File Manager E) Startup

AutoPlay; -AutoPlay will start an application based on the media type. For example, inserting a DVD video will AutoPlay using the pre-selected DVD player application.

DHCP

Automatic Private IP Addressing (APIPA) addresses are valid only for communications within a network segment that a given host is connected to. A host with APIPA-assigned address (i.e. an IP address in the range between 169.254.0.1 and 169.254.255.254) cannot connect to the Internet. The assignment of APIPA address typically indicates a problem related to:

The Windows PXE allows a properly configured and supported Windows PC to: a) Bypass startup screens and boot directly to repair mode b) Boot from the network c) Start in the RE without intervention d) Launch AIK

B) Boot from the network The PXE (Preboot eXecution Environment) boots the computer to a network server containing the PE (Preinstallation Environment) and performs an unintended installation.

You have been asked to load an image of Windows on 10 computers that just came in. How would this BEST be accomplished? a) Use the retail media on the server. b) Boot to PXE and load image from distribution point. c) Load the image to an SSD card and use on each machine. d) Make 10 copies of the image to DVD and load image from there.

B) Boot to PXE and load image from distribution point. A properly configured PXE distribution point (assuming no password) will allow the system to boot and automatically load the image. The other options all require more physical operations increasing time and labor requirements on the installer. You want this process to be as streamlined as possible.

Which choice is a policy that covers how long data should be retained and how it should be disposed of? a) Data retention policy b) Disposal and destruction policy c) Storage and retention policy d) PII policy

B) Disposal and destruction policy A good disposal and destruction policy will address the length of time data will be kept and subsequently the method to be used for its destruction.

You have a PC that will not run Windows Defender. Defender is disabled and the Action Center reports that another antivirus program is running. There are no other antivirus programs installed. What is the cause? a) Ransomware b) Rogue antivirus c) Invalid certificate d) All of these

B) Rogue antivirus This situation can be attributed to a rogue antivirus program that self-installed and disabled Windows Defender functionality. In this case, you will find that other functions like Windows Update will also fail. Ransomware blocks all system access until the ransom is paid. Your trusted root CA certificate will have no bearing on this situation.

Which of the following is the maximum RAM limit of a Windows 32-bit version? A. no limit B. 4GB C. 8GB D. 32GB

B. 4GB

Ann, a user, calls the help desk regarding an issue on her laptop. While working remotely, she appears to be connecting to WiFi but is unable to retrieve her corporate email. The wireless name is listed as "ConnectMe" and appears as unsecure. Which of the following should the help desk perform to fix the issue? A. Remote into Ann's system and restart the wireless adapter B. Ask Ann to open a browser and watch for a redirect page C. Advice Ann to pug an Ethernet cable into her laptop D. Direct Ann to run an antivirus program on her laptop

B. Ask Ann to open a browser and watch for a redirect page

A technician is working at a help-desk form and receives a call from a user who has experienced repeated BSODs. The technician is scheduled to take a break just after the call comes in. Which of the following is the BEST choice for the technician to make? A. Politely ask the user to call back B. Ask another technician to take the call C. Troubleshoot the issue for the user D. Input the issue as a ticket and escalate to Tier 2 E. Put the user on hold and troubleshoot after the scheduled break

B. Ask another technician to take the call

When a user browses to a favorite website on a Windows laptop, a different website opens. A technician installs an additional web browser, but it also opens to the same unfamiliar site. The technician resets the web browser settings back to default, but the issue persists. Which of the following troubleshooting steps should the technician complete NEXT? A. Change the browser's home page B. Check the Windows host file C. Update the default web browser D. Restore Windows to a previous date

B. Check the Windows host file

A user's smartphone is making the camera shutter noise even when the user is not taking pictures. When the user opens the photo album, there are no new pictures. Which of the following steps should be taken FIRST to determine the cause of the issue? A. Uninstall the camera application B. Check the application permissions C. Reset the phone to factory settings D. Update all of the applications on the phone E. Run any pending OS updates

B. Check the application permissions

A technician recently installed a new secondary hard drive in a Windows 10 desktop. After the installation, the computer displayed the following error message: No Operating System Found. However, after unplugging the new hard drive, the error message no longer appeared. The technician then reconnected the new drive to continue troubleshooting. Which of the following steps should the technician take NEXT? A. Reboot into safe mode B. Check the boot order C. Format the drive D. Perform Windows Recovery E. Run the chkdsk command

B. Check the boot order

A user notices recent print jobs are not printing to the local printer despite printing fine yesterday. There are no errors indicated on the taskbar printer icon. Which of the following actions should the user take FIRST? A. Check to ensure the printer selected is the default printer B. Check the status of the print server queue C. Cancel all documents and print them again D. Check that the printer is not offline print mode

B. Check the status of the print server queue

A SOHO customer has recently experienced a major hurricane. The customer has no backups and has lost all data and hardware associated with the company. The customer calls a contractor to assist in the rebuilding process and needs suggestions on the best way to prevent this from happening again. Which of the following recommendations should the contractor give to the customer? (Select two.) A. Backup testing B. Cloud storage C. Local storage backups D. Data recovery E. Hot site F. Waterproof devices

B. Cloud storage and E. Hot site

A SOHO user calls a technician and wants to secure a home network. The SOHO user needs to have protection from physical connection and ensure that employees cannot applications or personal emails. Which of the following would the technician MOST likely configure on the network device to accommodate the SOHO user's request? (Select TWO) A. MAC filtering B. Default SSID C. Ratio power levels D. Content filtering E. Physical security

B. Default SSID and E. Physical security

A network administrator wants to plan a major OS upgrade of the router, which acts as a default gateway in an organization. The administrator has documented the purpose of the change, scoped the change, and completed a comprehensive risk analysis. Which of the following is an important part of the change request process for which the administrator still must plan? A. Inform management regarding the anticipated amount of downtime B. Document a backout plan to roll back changes to the router C. Configure a redundant data path to eliminate downtime D. Make the downtime window larger than actually anticipated

B. Document a backout plan to roll back changes to the router

Which of the following is a reason to use WEP over WPA? A. Device compatibility B. Increased security C. TACACS D. Multifactor authentication

B. Increased security

An end user is browsing the Internet when multiple browser pages open by themselves. The user notices the PC is running slowly, even while not browsing the internet. Which of the following actions should the user take? A. Update antivirus definitions B. Install anti-malware software C. Enable the pop-up blocker D. Reboot the PC

B. Install anti-malware software

A department in an organization set up a proxy server to manage its Internet stage. A technician is configuring the Windows workstations to use the new proxy server. Which of the following Control Panel utilities should the technician use to configure the setting? A. Internet Options - Advanced B. Internet Options - Connections C. Internet Options - Security D. Internet Options - Content E. Internet Options - Privacy

B. Internet Options - Connections

Joe. a customer, requests to have a technician rename his laptop to the name of his favorite sports team. Which of the following documents MUST the technician consider before performing this action? A. Acceptable use policy B. Inventory management C. EULA D. MDM policy

B. Inventory management

A new company policy states that all end-user access to network resources will be controlled based on the users' roles and responsibilities within the organization. Which of the following security concepts has the company just enabled? A. Certificates B. Least privilege C. Directory permissions D. Blacklists

B. Least privilege

A technician is running updates on a Windows PC. Some of the updates install properly, while others appear as failed. While troubleshooting, the technician restarts the PC and attempts to install the failed updates again. The updates continue to fail. Which of the following is the FIRST option to check? A. Visit the Microsoft Update website to see if there is an issue with a specific update B. Look up the error number associated with the failed update C. Look at the system Event Viewer to find more information on the failure D. Download the failed update to install manually

B. Look up the error number associated with the failed update

A small business has an open WiFi network for employees but does not want customers to connect to the access point. A technician has been dispatched to address the business's concerns. Which of the following configuration settings should the technician change to satisfy the requirements of the business? (Select two.) A. Default SSID B. MAC filtering C. NAT D. QoS E. Signal strength F. Encryption

B. MAC filtering and E. Signal strength

A SOHO technician recently moved some data from one server to another to increase storage capacity. Several users are now reporting they cannot access certain shares on the network. When the users attempt to access the shares, they get the following error: Access Denied. The technician confirms the users are all in the proper security groups and have the proper access, but they are still unable to access the shares. Which of the following are the MOST likely reasons for these issues? (Select two.) A. Administrative share permissions B. Mapped drives C. Group Policy hours restriction D. Denied write/delete permissions E. Disabled proxy settings

B. Mapped drives and D. Denied write/delete permissions

Joe, a technician, has his daily plans forwarded to him by his supervisor. Upon arrival to the external to the second support call of the day, Joe realizes the issue will require much more time than initially scheduled, and several support calls will not be completed. Which of the following would be the appropriate action for Joe? A. Contact his supervisor so the supervisor can make schedule changes. B. Move the appoints to the next business day. C. Reach out to a colleague to assist in completing the jobs. D. Continue to work on the current call, and get to the others as soon as possible.

B. Move the appoints to the next business day.

Which of the following provide the MOST security for PCs and mobile devices? (Choose two.) A. Access control lists B. Multifactor authentication C. Organizational unit D. Trusted software sources E. Data loss prevention F. Pre-shared key

B. Multifactor authentication and D. Trusted software sources

Ann, a user, calls a technician and reports that her PC will not boot. The technician confirms the memory, power supply, and monitor are all working. The technician runs internal diagnostics on the PC, but the hard drive is nor recognized. Which of the following messages will be displayed? A. NTLDR not found B. No boot device available C. Operating system not found D. BIOS ROM checksum error

B. No boot device available

A new business will be using credit cards in a physical location as well as its web presence. Which of the following does the business need? A. PHI certification B. PCI compliance C. POTS implementation D. PII filtering

B. PCI compliance

A network administrator has given a technician documentation detailing the switchports the technician will need to patch in for a network upgrade. Which of the following documents did the network administrator MOST likely give to the technician? A. Process diagram B. Physical network diagram C. Fiber backbone diagram D. Logical topology diagram

B. Physical network diagram

A user calls a technician to report issues when logging in to a vendor's website. The technician is able to log in successfully before going to the office. However, the technician is unable to log in when in the user's office. The user also informs the technician of strange pop-up notifications. Which of the following are the MOST likely causes of these issues? (Choose two.) A. System files have been deleted B. Proxy settings are configured improperly C. The OS has been updated recently D. There are disabled services on the vendor website E. Program file permissions have changed recently F. There is a rogue anti-malware program

B. Proxy settings are configured improperly and F. There is a rogue anti-malware program

A technician is in the process of upgrading Windows 8 to Windows 10. The technician needs to make sure all of the applications, user profiles, documents, and PST files are preserved. Which of the following methods would the technician MOST likely perform on the computer? A. Unattended installation B. Refresh upgrade C. Clean installation D In-place upgrade

B. Refresh upgrade

A manager with a restricted user account receives the following error message: Windows Update cannot currently check for updates because the service is not running. The manager contacts the help desk to report the error. A technician remotely connects to the user's computer and identifies the problem. Which of the following should the technician do NEXT? A. Reboot the computer B. Restart the network services C. Roll back the device drivers D. Rebuild the Windows profiles

B. Restart the network services

A company has hired a new IT firm to manage its network switches and routers. The firm is geographically separated from the company and will need to able to securely access the devices. Which of the following will provide the ability to access these devices? A. Telnet B. SSH C. RDP D. VNC

B. SSH

Joe, a user, calls the help desk from a coffee shop while on a business trip to report the WiFi hotspot on his phone is extremely slow. The technician runs a speed test from a laptop connected to the hotspot and gets 200Kbps. Ann, Joe's coworker with whom he is travelling, also has a hotspot on her phone, and the speed test result on that hotspot is 15Mbps. The technician checks the hotspot settings on Joe's phone and sees the following: Network name: Joe's Hotspot: Security WPA2 PSK Password hotspot Band 2.4 GHz Client DHCP start address 192.168.23.1 Which of the following is the MOST likely cause of the problem? A. Joe should be using WEP security on his hotspot for faster throughput B. Someone else is using Joe's hotspot due to weak password C. Joe's hotspot gave him an invalid IP address D. Joe is likely in a poor signal area and should try another area

B. Someone else is using Joe's hotspot due to weak password

With which of the following types is a man-in-the-middle attack associated? A. Brute force B. Spoofing C. DDoS D. Zero-day

B. Spoofing

An office manager emails a technical support contractor about a new desktop for one of the workers. The office manager provides a specific configuration for the desktop. The technician notes the request will require the purchase of a new system. New system purchases are not in the scope of the support agreement. Which of the following should the technician do NEXT? A. Create a risk analysis report for review B. Submit a change order for approval C. Insist the worker accepts the standard desktop D. Document the request and place the order

B. Submit a change order for approval

A user is attempting to install an application and receives an error stating there is not enough space to install the application. Which of the following did the user overlook? A. Installation method B. System requirements C. OS compatibility D. File permissions

B. System requirements

Which of the following BEST describes the Guest account on a Windows system? A. This account is designed to have the ability to set permissions for other users on the system. Users of this account have the capability to perform any operation or task on the system. B. This account is designed to provide basic permissions for completing common daily tasks. Users of this account are restricted from performing things like installing new software. C. This account is designed for users who require specific administrator rights or permissions. Users of this account are restricted from installing software but can change time zones D. This account is designed for users who require temporary access to a computer and do not need to store user-specific settings. Users of this account have very limited permissions.

B. This account is designed to provide basic permissions for completing common daily tasks. Users of this account are restricted from performing things like installing new software.

A SOHO user reports desktop applications are performing slowly, and no emails have been received all morning. A technician remotes in and determines Internet pages' load slowly or not at all, CPU performance is normal, and the local router can successfully ping. The remote connection drops periodically. Which of the following steps should the technician take NEXT to resolve the problem? A. Reboot into safe mode, uninstall the latest OS update, and run a repair on the OS B. Update the antivirus software, run an antivirus scan, verify the browser settings, and check all email settings C. Reboot to BIOS setup, verify the TPM is enabled, and start a System Restore from safe mode D. Send a test email, open a command prompt to check the file system, and empty the browser cache

B. Update the antivirus software, run an antivirus scan, verify the browser settings, and check all email settings

A technician is setting up a SOHO wireless network for a healthcare office that does not have a server. The user requires the highest level of wireless security and various levels of desktop authentication to access cloud resources. Which of the following protocols and authentication methods should the technician implement? (Select two.) A. WPA B. WPA2 C. WEP D. TKIP E. RADIUS F. Multifactor G. TACACS H. SSO

B. WPA2 and F. Multifactor

. ZomA network administrator notifies a technician that the company is experiencing a DDoS attack. Several internal Windows PCs are the source of the traffic. The network administrator gives the technician the Windows computer names and states they be scanned and cleaned immediately. With which of the following types of infections are the PCs MOST likely infected? (Select two.) A. Spyware B. Zombies C. Virus D. Ransomware E. Worm F. Botnet

B. Zombies and E. Worm

A technician is working on a Windows 10 PC that is running slowly. Which of the following commands should the technician use to correct this issue? (Select two.) A. dir B. chdsk C. dism D. ipconfig E. format F. diskpart

B. chdsk and C. dism

A user Is unable to access a network share out can access email. A technician has confirmed the user has the appropriate permissions to access the share. Which of the following commands should the technician use FIRST? A. ping B. nslooking C. net use D. ipconfig

B. nslooking

When configuring email you must enter: (Choose all that apply) a) Password b) SMTP c) DNS d) POP3 e) Account Name f) ISP

B/D/E SMTP/POP3/Account Name Email configuration requires setting the SMTP server name, the POP3 server name, and the account name. The password can be left to be entered each time you log in to get email. Remember that optionally, you can enter the password during configuration and check off to have it saved. Answers: SMTP, POP3, and Account Name.

True

BIOS/UEFI passwords improve the security of a workstation. These low-level passwords may, for example, prevent unauthorized users to proceed when the computer is powered on, or restrict the scope of changes a user can make in the BIOS/UEFI interface. A type of BIOS/UEFI password with the highest level of permissions is known as supervisor or administrator password; the other type of password is user password.

A security administrator is implementing secure DNS services for all devices in the organization. Which of these features will be provided by this service? A) Block malware from executing on a company computer B) Maintain backups of all user modified documents C) Remove malware infections from boot sectors D) Block known malware sites in real-time E) Evaluate downloaded files for malware characteristics

Block known malware sites in real-time; -A secure DNS provider can be used to provide real-time blocking of known malware sites. If a user's workstation attempts to resolve the IP address for a known malware domain, the DNS server will resolve the address to a notification page or trusted site address.

You are working on a PC that you suspect has malware on it. Which System Restore option would you choose? a) Restore from the latest restore point b) Restore from the oldest restore point c) Disable System Restore d) Any of these

C) Disable System Restore In this case, disable System Restore since malware is capable of infecting restore points. Even when using a restore point that was created before the infection, there is no guarantee that the restore point is clean and that the infection will be removed.

You have an area near the pool and bar at your home that you want to configure for wireless access with no security. The area is remote and secluded enough that you have no security concerns. You have a router in place. How should you configure it? a) No SSID b) No password c) Set encryption to Open d) Set MAC filter to allow all

C) Set encryption to Open All you need to do is disable your encryption to open. This will allow access to any device in range. You may want to decrease the radio power to be a little safer. The SSID is a network name and you will need one. Broadcasting it is not going to alter the need for its existence and in this case you would want it broadcast. Disabling security (open) will eliminate the need for users to have a password but you will still need one to change configurations, don't lose it. The MAC filter is a blocker not an open door, leave it unchanged.

Joe, an employee, took a company-issues Windows laptop home, but is having trouble connecting to any of the shares hosted on his home media server. Joe has verified he is connected to the Internet. Which of the following would explain why Joe cannot access his personal shares? A. An IP conflict is present B. A corporate VPN is enabled C. A firewall exception must be set D. HomeGroup must be enabled

C. A firewall exception must be set

A technician has just finished installing a secondary OS on a workstation. After rebooting the computer, the technician receives the following error: No OS found. The technician confirms the boot.ini file is correct. Which of the following is MOST likely causing this error? A. The computer has GRUB Legacy installed B. Windows Startup services are not running C. An incompatible partition is marked as active D. An unsupported version of Windows is installed

C. An incompatible partition is marked as active

Joe, a customer, has informed a Tier 2 help desk technician that a computer will not boot up. After about ten minutes of troubleshooting, Joe is increasingly concerned and claims that the technician is wasting his time because he has already tried everything that has been suggested. Which of the following should the technician do? A. Since Joe is concerned about time, suggest calling back later when Joe has more time to troubleshoot B. Record the call and send it to the local intranet for future technicians to learn how to deal with calls like this one C. Ask more open-ended questions to see if the issue can be narrowed down in order to properly identify the issue and save time D. Inform the customer that there is a troubleshooting script that must be followed to get the issue resolved

C. Ask more open-ended questions to see if the issue can be narrowed down in order to properly identify the issue and save time

A project team is organized to implement a new wireless solution for a school. The team has already done the network diagrams and knows the locations that will need to be addressed in the project. The team is in the process of creating an SOW for the project as a whole and needs to add the critical pieces to the SOW to complete it and move to the next stage. Which of the following would the project team MOST likely add to the SOW? A. Risk analysis B. Plan to change C. Backout plan D. Change board approvals

C. Backout plan

Ann, an end user, is utilizing a styles on her table. The recognition point is off when she uses the stylus, but it registers In the correct spool when she her finger. Which of the following would be the BEST resolution to issue? A. Restart the table B. Disable and then renewable Bluetooth C. Calibrate the touchscreen sensor D. Disconnect and then reconnect the stylus

C. Calibrate the touchscreen sensor

Ann, an employee at a company, calls the help disk to report issues logging on to a vendor's website. Joe, the technician, is able to log in successfully with his credentials before going to Ann's office. However, when he attempts to log in from Ann's office, Joe experiences the same issue. Ann asks Joe questions about the new software installed on the laptop from the pop-up notification. Which of the following are the NEXT steps Joe should take to resolve the issue? (Select two.) A. Ask Ann for her credentials to verify and log on to the vendor's website from Ann's laptop B. Verify Ann's laptop has the correct browser settings C. Check all browser cached files on Ann's laptop and log on to another vendor's website D. Attempt to log on to another vendor's website from Ann's laptop E. Ask Ann about the notification and review the installed programs F. Reinstall the browser, reboot the laptop, and check the vendor's website again

C. Check all browser cached files on Ann's laptop and log on to another vendor's website and E. Ask Ann about the notification and review the installed programs

A small office's wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network. Which of the following configurations MOST likely allowed the attack to take place? (Select two.) A. Guest network B. TKIP C. Default login D. Outdated firmware E. WPS F. WEP

C. Default login and F. WEP

Which of the following steps should a technician take FIRST to prevent an electrical hazard when repairing a PC? A. Put on an ESD strap. B. Place components on an ESD mat C. Disconnect the power before servicing the PC D. Place the PC on a grounded work bench

C. Disconnect the power before servicing the PC

An employee reported that a suspicious individual was looking through the recycle bin. Which of the following types of social engineering threats is this? A. Phishing B. Spear phishing C. Dumpster diving D. Impersonation

C. Dumpster diving

A manager requests remote access to a server after hours and on weekends to check data; The manager insists on using the server. Before granting the access, which of the following is the MOST important step a technician can take to protect against possible infection? A. Create a policy to remove Internet access from the server during off hours B. Set the local antivirus software on the server to update and scan daily C. Ensure the server is patched with the latest security updates D. Educate the manager on safe Internet browsing practices

C. Ensure the server is patched with the latest security updates

A technician has been dispatched to resolve a malware problem on a user's workstation. The antivirus program discovered several hundred potential malware items on the workstation and removed them successfully. The technician decides to schedule daily scans on the system, enables System Restore, and creates a restore point. Which of the following should the technician do NEXT? A. Run the scan again to ensure all malware has been removed B. Quarantine the infected workstation from the network C. Install all of the latest Windows Updates to patch the system D. Educate the user on safe browsing practices

C. Install all of the latest Windows Updates to patch the system

An administrator is setting up a Windows terminal server. Which of the following settings should the administrator modify to increase server security? (Select two.) A. Change the default access port B. Enforce password complexity C. Put the terminal server into the router's DMZ D. Disable logon time restrictions E. Block all unused ports on the LAN smart switch F. Use the local client certificate for server authentication

C. Put the terminal server into the router's DMZ and E. Block all unused ports on the LAN smart switch

A user who is running Windows 10 logs into a machine and notices that shared drives are missing, the "My Documents" folder is empty, and personal settings are reset. Which of the following would be required to resolve the issue? A. Remove the registry entry and rename the local account folder B. Delete or rename the local user folder C. Run DISM and re-add the local power user account D. Remove the user account in Credential Manager and restart the PC

C. Run DISM and re-add the local power user account

A technician needs to deploy a remote access technology to be able to access desktop computers. When a technician logs in to a user's computer, the user and the technician must be able to see the desktop simultaneously and use the mouse and keyboard. Which of the following would be BEST suited for this task? A. VNC B. Telnet C. SSH D. RDP

C. SSH

A user calls a technician to report loud beeps that are coming from the server room following a recent rainstorm and power outage. The technician verifies all the servers are online and working properly, and the backup power unit is functioning properly and without errors. Which of the following Is MOST likely the Issue? A. PSU alarm B. Humidity alarm C. Temperature alarm D. Motion alarm

C. Temperature alarm

A user's corporate email is missing the shared inbox folders that were present before the user went on vacation. The technician verifies the user is connected to the domain and can still send and receive email. Which of the following is MOST likely causing the missing folders issue? A. The Internet security options have changed B. The operating system updates have changed C. The network directory permissions have changed D. The user account permissions have changed

C. The network directory permissions have changed

A user's smartphone is experiencing limited bandwidth when at home. The user reports to a technician that the device functions properly when at work or in the car. Which of the following troubleshooting steps should the technician take NEXT? A. Reset the device's network settings B. Check the data usage statistics on the device C. Verify the SSID with which the device is associated D. Run any pending application or OS updates

C. Verify the SSID with which the device is associated

A company's security policy does not allow USB drives to be available in workstations. However, an exception needs to be made for a user. The network administrator changes the policy for the user. Which of the following commands should the administrator run on the user's workstation? A. chkdsk B. netstat C. gpupdate D. diskpart

C. gpupdate

A technician is installing the latest OS on a user's system. The user wants all of the settings and file to remain intact during the installation. Which of the following upgrade methods should the technician use? A. network installation B. clean install C. in-place upgrade D. image deployment

C. in-place upgrade

net use

Command Prompt commands in Windows is used for listing a computer's connections to shared resources

Command Prompt

Command Prompt, or CMD.exe (or just CMD) is a Command-Line Interpreter (CLI) for WindowsOperating Systems. This interface allows a user OR an admin to directly communicate to the operating system using a TEXT BASED interface.

shutdown /s /t 60

Command for setting the time-out period of 60 seconds before powering off a Windows host

xcopy

Command in the command-line interface used to copy multiple directories at once, which the copy command could not do.

Format command

Command in the command-line interface used to format a storage device.

TASKLIST Command

Command line to see a list of all the running processes

shutdown /a

Command switch enables aborting a system shutdown

shutdown /r

Command switch in Microsoft Windows Command Prompt forces full system shutdown and restart of a Windows host

An application running on a macOS desktop has frozen and will not respond to keyboard input or mouse controls. Which of the following would be the best way to terminate this application? A) Command-Option-Escape B) Apple menu / Terminate C) Help / Application D) VNC E) Command-Option-Q

Command-Option-Escape; -The Command-Option-Escape key combination will open the Force Quit window and allow the user to terminate an application.

shutdown /r /t 120

Command-line commands enables a full system shutdown and restart of an MS Windows host after a time-out period of two minutes

help [command name] [command name] /?

Commands in Windows can be used to display help information related to a specific command-line utility

Monitor connectivity issues. Video adapter driver updates. Recent updates or installations.

Common causes for a black/blank PC screen include:

CDFS

Compact Disc File System. The 32-bit file system for CD discs and some CD-R and CD-RW discs.

COM+ (Windows Component Services)

Component Object Model: Manage Network Communication for Distributed Apps. - - - Device COM+ Management - - - Event Viewer - - - Services

A system administrator is troubleshooting a Windows computer and needs to boot into Safe Mode. Which of the following would be the BEST way to provide this functionality? A) Configure Safe Mode in System Configuration B) Choose the Safe Mode option in Disk Management C) Enable Safe Mode in the BIOS D) Use the SHUTDOWN command with the Safe Mode option E) Configure Safe Mode in Windows Services

Configure Safe Mode in System Configuration; -Booting into Safe Mode can be configured as a setting in the System Configuration utility.

remote settings location

Control Panel ->System -> Remote Settings

services.msc

Control Panel\All Control Panel Items\Administrative Tools\ Services Opens the services window in this window, services can be started, stopped, restarted enabled and disabled

Occurs when two files claim the same cluster.

Cross-linked file.

What is modified when changing the system startup boot sequence? a) CMD.EXE b) BOOTMGR c) BOOT.INI d) BIOS/CMOS

D) BIOS/CMOS The CMOS memory holds the BIOS settings. The boot sequence is a BIOS setting.

You have one physical drive partitioned into two partitions C: and D:. You add a second drive and create a primary DOS partition. What will the drive letter of the new partition be? a) C: b) D: c) E: d) F:

D) F The OS assigns drive letters to the primary partitions first. This would make the first partition on the second disk D: and the extended partition on the first disk E:.

Which technique allows the path of local folders, such as Pictures or Documents, to appear as a network location while also being cached locally? a) OUs b) Groups c) Home folders d) Folder redirection

D) Folder Redirection Folder redirection allows the path of local folders to be redirected to a network share while also being stored locally, allowing for increased speed and reliability. OUs, Groups, and Home Folders are not factors in this process.

A customer calls and states that they are suddenly receiving emails from unknown parties that are automated replies of delivery failures or vacation messages. What do you suspect? a) Misconfigured email program b) Malware c) Spam d) Hijacked email

D) Hijacked email

What should be the first step when configuring a hard drive into a system? a) Format b) Install OS c) Configure DMA d) Partition

D) Partition The Disk Management is used to create logical boundaries which encompass all of the available space on a disk. After partitions are created, they must be formatted. This creates the file system which will store data.

All of the following fall into one security classification: Lock Doors, Shredding documents, Biometrics, RSA tokens, Retinal. a) Digital security b) Strong passwords c) User Education d) Physical Security

D) Physical Security All the areas covered are considered Physical.

In Windows 8, what should be done if a 32-bit Windows based program stops responding? a) Click on Start, Shutdown and select ~Shutdown the computer~. b) Press CTRL-ALT-DEL and select Shutdown. c) Press CTRL-ALT-DEL and select End Task. d) Press CTRL-ALT-DEL, select the program that is not responding and press EndTask.

D) Press CTRL-ALT-DEL, select the program that is not responding and press EndTask. Because of the nature of preemptive multitasking in the Windows O.S. you can selectively End a program that is not responding.

During the firmware upgrade of a web server, a power outage occurred. The outage caused a failure within the upgrade. Which of the following plans must be implemented to revert back to the most recent version of the firmware? A. Backout plan B. Contingency plan C. Alternative plan D. Backup plan

D. Backup plan

A user contacts a technician to troubleshoot server errors. The user explains that some files will not open on the server, the data backups are operational, and the weather has been bad. The technician notices missing time slots in the event log. Which of the following should the technician replace to prevent these issues in the future? A. System memory B. Surge protector C. Hard drives D. Battery backup

D. Battery backup

Following an incident, an administrator is gathering forensic evidence from a server for a human resources investigation. Which of the following best practices is MOST important to document throughout the process to maintain integrity of the findings? A. Acceptable use policy violations B. Server configuration C. Chain of custody D. Data loss incidents

D. Data loss incidents

A technician received 300 old desktops following a recent computer upgrade. After taking inventory of the old machines, the technician must destroy the data on the HDDs. Which of the following would be the MOST effective method to accomplish this task? A. Drill B. Hammer C. Low-level format D. Degaussing

D. Degaussing

Which of the following installation methods will allow a technician to resolve issues that may arise while the installation is being performed? A. Unattended installation B. Remote installation C. Repair installation D. Image deployment installation

D. Image deployment installation

An employee is unable to view in-office network folders while working at home. Which of the following is the MOST likely cause of the problem? A. Untrusted software B. Outdated antivirus C. MDM policies D. Inactive VPNs

D. Inactive VPNs

A computer becomes infected with malware, which manages to steal all credentials stored on the PC. The malware then uses elevated credentials to infect all other PCs at the site. Management asks the IT staff to take action to prevent this from reoccurring. Which of the following would BEST accomplish this goal? A. Use an antivirus product capable of performing heuristic analysis B. Use a host-based intrusion detection system on each computer C. Disallow the password caching of accounts in the administrators group D. Install a UTM in between PC endpoints to monitor for suspicious traffic E. Log all failed login attempts to the PCs and report them to a central server

D. Install a UTM in between PC endpoints to monitor for suspicious traffic

Joe, a user, reports that several of his colleagues have received a suspicious email from his account that he did not send. A technician asks one of the colleagues to forward the email for inspection. After ruling out spoofing, the technician verifies the email originated from the corporate email server. Which of the following is the FIRST step the technician should take to correct this issue? A. See if Joe's email address has been blacklisted B. Change the password on Joe's email account C. Update the antivirus and perform a full scan on the PC D. Isolate Joe's computer from the network

D. Isolate Joe's computer from the network

A technician has set up a new computer for a customer and needs to add a login with administrative privileges. Which of the following tools should the technician use? A. Component Services B. System Configuration C. Security Policy D. Local Users and Groups

D. Local Users and Groups

A technician has identified malware on a user's system. Which of the following should the technician do NEXT according to malware removal best practices? A. Enable System Restore and create a restore point so no data is lost B. Educate the user about how to avoid malware in the future C. Update the antivirus software and run a full system scan D. Move the infected system to a lab with no network connectivity

D. Move the infected system to a lab with no network connectivity

A customer's computer is powered on and working, but the customer is unable to get to any wired network resources, shared drives, printers, or the Internet. Which of the following command-line tools should be used to troubleshoot this scenario? A. Ping B. Iwconfig C. Nbtstat D. Nslookup

D. Nslookup

A user's computer reports it has many virus infections and directs the user to call a phone number for assistance. A technician removes the hard drive and virus scans the drive with another computer. The scan does not identify any viruses. Which of the following is MOST likely the problem? A. Rootkit B. Zero-day malware C. Rogue antivirus D. Old virus definitions

D. Old virus definitions

A technician is troubleshooting a print issue on a Windows computer and want to disable the printer to test a theory, Which of the following should the technician use to accomplish this? A. Devices and Printer B. Sync Center C. Device Manager D. Power Option

D. Power Option

Ann, an end user, is working with highly regulated data and often notices the high volume of traffic in her work area; Ann requests help with limiting the exposure of data as people walk by. Which of the following security measures should be used? A. Biometric device B. Common access card C. Cable lock D. Privacy screen E. Mantrap

D. Privacy screen

A Linux user report that an application will not open and gives the error only one instance of the application may run at one time. A root administrator logs on ot the device and opens terminal. Which of the following pairs of tools will be needed to ensure no other instance of the software are correctly running? A. Pad and chmod B. Node and vi C. Is an chown D. Ps and kill E. Op and rm

D. Ps and kill

Which of the following technologies can be utilized in a wireless network environment to provide secure SSO access for WiFi and network resources? A. WPA2 B. AES C. MAC filtering D. RADIUS E. WPS

D. RADIUS

A user who is running Windows 10 logs Into a machine and notices that shared drives are missing, the "My Documents* folder is empty, and personal settings are reset. Which of the following would be required to resolve the issue? A. Remove the registry entry and rename the local account folder. B. Delete or rename the local user folder. C. Run DISM and re-add the local power user account. D. Remove the user account In Credential Manager and restart the PC.

D. Remove the user account In Credential Manager and restart the PC.

A corporate network was recently infected by a malicious application on a flash drive that downloaded sensitive company files and injected a virus, which spread onto the network. Which of the following best practices could have prevented the attack? A. Implementing strong passwords B. Changing default credentials C. Disabling AutoRun D. Removing Guest account E. Encrypting data

D. Removing Guest account

A technician is installing a private PC in a public workspace. Which of the following password practices should the technician implement on the PC to secure network access? A. Remove the guest account from the administrators group B. Disable single sign-on C. Issue a default strong password for all users D. Require authentication on wake-up

D. Require authentication on wake-up

Joe. a technician, receives notification that a share for production data files on the network Is encrypted. Joe suspects a crypto virus Is active. He checks the rights of the network share to see which departments have access. He then searches the user directories of those departmental users who are looking for encrypted files. He narrows his search to a single user's computer. Once the suspected source of the virus is discovered and removed from the network, which of the following should Joe do NEXT? A. Educate the end user on safe browsing and email habits. B. Scan and remove the malware from the infected system. C. Create a system restore point and reboot the system. D. Schedule antivirus scans and perform Windows updates.

D. Schedule antivirus scans and perform Windows updates.

Joe, a systems administrator, is setting up a risk management plan for the IT department. Part of the plan is to take daily backups of all servers. The server backups will be saved locally to NAS. Which of the following can Joe do to ensure the backups will work if needed? A. Frequently restore the servers from backup files and test them B. Configure the backups to restore to virtual machines for quick recovery C. Set up scripts that automatically rerun failed backup jobs D. Set up alerts to let administrators know when backups fail E. Store copies of the backups off-side in a secure datacenter

D. Set up alerts to let administrators know when backups fail

Which of the following technologies is used by malicious employees to obtain user passwords? A. Main-in-the-middle B. Phishing C. Tailgating D. Shoulder surfing

D. Shoulder surfing

Which of the following threats uses personalized information in an attempt at obtaining information? A. Whaling B. Impersonation C. Spoofing D. Spear phishing

D. Spear phishing

A user calls a technician to report issues when logging in to a vendor's website. The technician is able to log in successfully before going to the office. However, the technician is unable to log in when in the user's office. The user also informs the technician of strange pop-up notifications. Which of the following are the MOST likely causes of these issues? (Select TWO) .A. System files have been deleted B. Proxy settings are configured improperly C. The OS has been updated recently. D. There are disabled services on the vendor website. E. Program file permissions have changed recently. F. There is a rogue anti-malware program.

D. There are disabled services on the vendor website. and F. There is a rogue anti-malware program.

Joe, a customer, calls a technician to report a remote computer is demonstrating erratic behavior while he is working on it. The technician verifies the files and directories. Joe is working on locally cannot be opened in any application, and the computer is running extremely slow. Which of the following is the MOST likely cause of this issue? A. Files disappearing B. File permission changes C. Application crash D. Too many startup items

D. Too many startup items

A technician arrives on site to find that two users who have the same model on Android smartphone are having the same issue with a specific application. Whenever they attempt to launch the application, it fails and gives an error message. Which of the following should the technician do FIRST? A. Reinstall the application B. Roll back the application to the earlier version C. Clear the application cache D. Update the OS of the smartphones

D. Update the OS of the smartphones

A user reports malware activity on an isolated workstation used for testing It is running an end-of-life OS. and a USB drive is the only method used to transfer files After removing the malware and replacing the USB drive with a brand new one. the technician gives the approval to use the equipment. The next day the user reports the same malware activity is present after powering on the system. Which of the following did the technician forget to do to prevent reinfection? A. Connect to the network and update the OS with the latest security patches B. Scan and dean the USB device used to transfer data from the equipment C. Disable System Restore and remove all restore points from the system D. Update the local antivirus and set it to scan automatically every evening

D. Update the local antivirus and set it to scan automatically every evening

Users notify the help desk of an email that was just received. The email came from the help desk's email address and asked the users to click on an embedded link. This email is BEST described as: A. phishing. B. zombie. C. whaling. D. spoofing.

D. spoofing.

You are using the Performance Monitor on a Windows 7 Professional workstation and make note of the following counters: Memory: Pages/sec 80; Processor: %utilization 90; Physical disk: % disk time 85. Which of the following solutions would overcome the bottleneck indicated by these results? a) Add a SCSI hard disk drive b) Upgrade to a faster processor c) Add a second CPU d) Add RAM

D: Add RAM These measurements from Performance Monitor are indicating overuse of virtual memory. Note the heavy paging per second, hard drive usage, and the CPU usage. Adding RAM is the right solution. Answer: Add RAM.

What would you call an attach that used many devices to simultaneously make requests of your cloud services, overwhelming them to the pint where no one gets a response?

DDoS

A network administrator has identified a server that is sending a large number of packets to an external IP address. Which of the following would be the MOST likely reason for this? A) Bad network cable B) Invalid subnet mask C) DDoS attack D) APIPA addressing E) Man-in-the-middle attack

DDoS attack; -A DDoS (Distributed Denial of Service) attack often uses many remote computers to overwhelm a single device.

A system administrator has received a call that the company web server is not responding. A review of the server shows that the WAN link is at 100% utilization, and the server is receiving random requests from thousands of devices. Which of the following would BEST describe this attack? A) Man-in-the-middle B) Brute force C) Zero-day D) Social engineering E) DDoS

DDoS; -A DDoS (Distributed Denial of Service) attack uses devices from different locations to consume all of the resources of a service.

Makes a WLAN harder to discover

Disabling SSID broadcast:

An anti-virus alert has just identified malware on a laptop used by a member of the remote sales team. Which of the following would be the BEST next step? A) Install the latest operating system patches on the laptop B) Disconnect the laptop from the network C) Discuss malware prevention with the end user D) Run a stand-alone malware removal utility E) Enable System Protection

Disconnect the laptop from the network; -Once malware has been identified, it's important to quarantine the system as quickly as possible to prevent the malware from spreading.

True

Disk Defragmenter is a software tool used to rearrange data on magnetic drives in order to improve system performance. Defragmentation results in faster read/write operations of a magnetic hard drive's read/write heads because defragmentation consolidates data into the smallest contiguous regions. This means that the heads can access data sequentially without seeking data fragments in different areas of a disk.

dfrgui.exe

Disk Defragmenter: Arranges stored data on a disk into contiguous blocks (defragmentation). Because individual files are stored on disks in multiple separate blocks, the used and empty storage areas on a disk can become fragmented and scattered.

You have physically installed a new hard disk drive in your computer and configured the disk in the BIOS using the CMOS setup program. You try to access the hard disk drive in Windows Explorer, but the drive is not displayed. Which of the following utilities will you MOST likely use to solve the problem?

Disk Management

diskmgmt.msc

Disk Management: Drive Status | Mounting | Initializing | Extending Partitions | Splitting Partitions

Which of the following utilities would you use to shrink an existing drive partition?

Disk Manager

A macOS user needs to restore a file from an Apple Disk Image. Which of the following tools would provide this access? A) Disk Utility B) Image Finder C) Terminal D) System Information E) Console

Disk Utility; -The Disk Utility application is used to create and mount disk image files, view disk information, and more.

A system administrator is troubleshooting a macOS laptop and would like to view the configured volumes on the internal storage device. Which of the following would be the BEST choice for this information? A) Disk Utility B) diskpart C) ls D) Disk Management E) dd

Disk Utility; -The macOS Disk Utility can display volume information, create and erase volumes, and perform first aid on existing volumes.

net user <username>

Displays user account information

DDoS Attack

Distributed denial of service attack - uses multiple bots/zombie that overwhelm a web server and shut it down

Full Control

Do anything with the object, including change its permissions and its owner

Modify

Do most things with an object but not to change its permissions or owner

Local Group Policy(gpedit.msc)

Exposes the whole registry configuration using a dialog-based interface(Offers a wider range of settings than Local Security Policy)

GDPR

General data protection regulation (2016) companies have 2 years to transition to GDPR compliance (from EU directive) after the final text is published

True

In MS Windows, a set of troubleshooting utilities (including tools for solving network-related problems) can be found in the Troubleshooting applet located in Windows Control Panel.

True

In MS Windows, dynamic disks provide features that basic disks do not, such as the ability to create volumes that span multiple disks (spanned and striped volumes) and the ability to create fault-tolerant volumes (mirrored and RAID-5 volumes).

Hidden

In MS Windows, the "$" sign appended to the end of the name of a network share indicates that the shared folder or drive is:

True

In MS Windows, the attrib command is used to display or change file attributes. Some of the available options for this command include read-only (R), archive (A), system (S), and hidden (H). With attrib, the "+" symbol sets an attribute for a file, the "-" sign removes the attribute.

attrib command

In MS Windows, this command is used to display or change file attributes. Some of the available options for this command include read-only (R), archive (A), system (S), and hidden (H). The "+" symbol sets an attribute for a file, the "-" sign removes the attribute.

False

In NTFS, a folder or file copied from one location to another on the same volume retains its original permissions.

True

In Windows 10, the Windows Firewall system component was renamed to Windows Defender Firewall. In similar fashion, the Windows Firewall with Advanced Security known from previous Windows versions changed its name to Windows Defender Firewall with Advanced Security.

Windows Firewall Control Panel applet. Windows Firewall Control Panel applet -> Advanced settings -> right-click on Windows Firewall with Advanced Security -> Properties.

In Windows 7, Windows Firewall can be enabled/disabled in: (Select all that apply)

True

In Windows 8 and newer releases of the Microsoft OS, the real-time information about resources used by user applications and system processes in Task Manager can be found grouped in one place under the Processes tab.

Windows Defender Firewall Control Panel applet. Firewall & network protection menu in Windows Settings (accessed via Start menu). Windows Defender Firewall Control Panel applet -> Advanced settings -> right-click on Windows Defender Firewall with Advanced Security -> Properties.

In Windows 8/8.1/10, Windows Defender Firewall can be enabled/disabled in: (Select all that apply)

Group Policy

In Windows Active Directory environment, this feature enables centralized management and configuration of operating systems, applications, and user account settings.

Foreign

In Windows Disk Management utility on a local computer, a dynamic disk that has been moved from another computer and found by the OS is labeled as:

Cannot be started automatically. Is damaged. Contains corrupted file system.

In Windows Disk Management utility, a disk status set to Failed indicates that the basic or dynamic volume: (Select 3 answers)

Powered down. Corrupted. Disconnected.

In Windows Disk Management utility, a dynamic disk status set to Offline/Missing indicates that the missing disk may be: (Select 3 answers)

Online

In Windows Disk Management utility, a normal disk status indicating that the disk is ready for read/write operations is labeled as:

Adjacent space on the same disk. Unallocated space on the same disk.

In Windows Disk Management utility, a partition's size can be extended into: (Select 2 answers)

True

In Windows Disk Management utility, a volume status set to Failed Redundancy indicates that the data on a mirrored or RAID 5 volume is no longer fault tolerant because one of the underlying disks is not online.

True

In Windows Disk Management utility, assigning a mount point folder path to a drive enables a newly added drive to show up in File Explorer as a regular folder.

True

In Windows Disk Management utility, disk arrays can be created by right-clicking on a disk and selecting array type from the context menu.

Prepares a newly added disk for use by Windows. Erases data on disk.

In Windows Disk Management utility, initializing a disk: (Select 2 answers)

False

In Windows domain environment, the term "Home Folder" refers to a directory on a local PC where users can back up their data and files.

You have implemented a regular backup schedule for a Windows system, backing up data files every night and creating a system image backup once a week. For security reasons, your company has decided to not store a redundant copy of the backup media at an offsite location. Where would be the next best place to keep your backup media?

In a locked fireproof safe.

True

In computer security, the term "Dumpster diving" is used to describe a practice of sifting through trash for discarded documents containing sensitive data. Found documents containing names and surnames of the employees along with the information about positions held in the company and other data can be used to facilitate social engineering attacks. Having the documents shredded or incinerated before disposal makes dumpster diving less effective and mitigates the risk of social engineering attacks.

DNS server

In order to connect to a website and display its contents, a URL entered in the web browser address bar needs to be translated into an IP address. Which of the servers listed below is used to handle this type of request?

Enabled in the advanced BIOS settings menu.

In order to operate, an integrated component such as Network Interface Card (NIC) may need to be first:

Which of the following would be the best way to upgrade a computer from Windows 8.1 Enterprise x64 to Windows 10 Enterprise x64? A) Insert the Windows 10 installation media and run the setup from the Windows 8.1 desktop B) Perform a Custom (Advanced) installation of Windows 10 C) Use the Windows 10 Upgrade Checker D) Backup all personal files, perform a fresh install of Windows 10, and restore all personal files E) Use the Windows Upgrade Assistant

Insert the Windows 10 installation media and run the setup from the Windows 8.1 desktop; -Microsoft provides an upgrade path between Windows 8.1 Enterprise x64 and Windows 10 Enterprise x64, so the upgrade process can be started by launching the setup program from the Windows 10 Enterprise x64 installation media on the Windows 8.1 desktop.

chkdsk C: /i /c

On NTFS volumes only skips part of the checking process

Login script

On a Windows domain, this tool can be used by system administrators to configure initial desktop environment (which may include mapping a network drive or setting up access to a shared printer) for a specific user.

You have been having trouble with your laptop crashing. You would like your computer to create a memory dump file when it crashes. Where should you place the paging file?

On the system volume

True

One of the ways of confirming that a software application comes from a trusted source is the verification of its digital signature. A digitally signed software proves the identity of the developer and guarantees that the application code hasn't been tampered with since it was signed. The authenticity and integrity of the application's code can be verified by comparing results of a cryptographic hash function (original hash published by the application developer vs. hash obtained from a downloaded app).

The Schneier method

One of the ways to prevent data recovery from a hard drive is to overwrite its contents. The data overwriting technique is used by drive wipe utilities which might employ different methods (including multiple overwriting rounds) to decrease the likelihood of data retrieval. As an example, a disk sanitization utility might overwrite the data on the drive with the value of one in the first pass, change that value to zero in the second pass, and finally perform five more passes, overwriting the contents with random characters

True

One of the ways to prevent data recovery from a hard drive is to overwrite its contents. The data overwriting technique is used by drive wipe utilities which might employ different methods (including multiple overwriting rounds) to decrease the likelihood of data retrieval. As an example, a disk sanitization utility might overwrite the data on the drive with the value of one in the first pass, change that value to zero in the second pass, and finally perform five more passes, overwriting the contents with random characters (the Schneier method).

Paging File

PAGEFILE.SYS A hidden, optional system storage file on a hard disk. Only one is installed on each hard disk, although more can be added. The paging file can support system crashes and expand the amount of system-committed memory, or virtual memory, that a system can back. Windows uses a page file to store data that can't be held by your computer's RAM when it fills up. While you can tweak the page file settings, Windows can manage the page file fine on its own.

taskkill /pid

Process ID used to specify a process to kill

taskkill /pid 1230

Provided that the process ID of notepad.exe obtained with the tasklist command is 1230, which of the following answers lists the correct syntax for a Windows Command Prompt taskkill command that would allow to close this application?

Action Center

Provides important messages about critical security and maintenance components on your computer, such as the firewall, antivirus protection, and spyware protection, security center was replaced by action center

msinfo32

Provides information about hardware resources, components, and thesoftware environment. Also known as System Information.

While running a full system scan using your anti-malware software, three files have been identified as possible problems. You want to keep the files intact so you can review them later, but you also need to ensure they can't harm anything else on your computer. Which of the following is the BEST next step?

Quarantine the files.

RISC

Reduced Instruction Set Computer (AKA: the instruction set architecture (ISA)) which allows a computer's microprocessor to have fewer cycles per instruction (CPI) than a complex instruction set computer (CISC).

PXE (preboot execution environment)

Refers to a client that can boot from a NIC. Enabled clients include a NIC and BIOS that can be configured to boot from the NIC instead of a hard drive. Often used to allow clients to download images.

SFC

SYSTEM FILE CHECKER. This command will be your best friend when attacking errors in WINDOWS SYSTEM FILES specifically. A common command used by techs is SFC /SCANNOW, which will basically scan an entire system for Windows file errors and repairs them.

SDLC

Software Development Life Cycle

False

Solid-State Drives (SSDs) require periodic defragmentation to improve system performance.

A macOS user would like to have multiple desktops with different applications running on each desktop. Which feature would provide this functionality? A) Finder B) Spaces C) App Control D) iCloud E) Boot Camp

Spaces; -The Spaces feature of macOS provides a way to create multiple customizable desktops.

attrib +R [drive:] [path] [filename]

Syntax for applying the read-only attribute to a file

Which Control Panel applet in Windows provides access to computer name, domain, and workgroup settings?

System

msconfig.exe

System Configuration Utility in MS Windows: General | Boot | Services | Startup | Tools

Which of the following would be the best choice for managing Windows boot options for the number of processors, maximum memory, and Safe Mode? A) Device Manager B) Task Manager C) System Information D) Computer Management E) System Configuration

System Configuration; -The System Configuration utility provides options for booting the computer, general settings, services, and more.

sfc

System File Checker - a utility that provides a manual interface for verifying system files and restoring them from cache if they are corrupt or damaged

A system administrator is gathering information for an upcoming operating system migration. Which of these utilities would be the best choice for obtaining information about the Windows hardware resources, components, and software environment? A) DXdiag B) Registry Editor C) Services D) MSTSC E) System Information

System Information; -The Windows System Information utility, or msinfo32, provides a summary of information about hardware, components, and software inside of a Windows computer.

sysdm.cpl

System Properties

Jack, a system administrator, is troubleshooting performance issues on a workstation used for graphic design. Jack believes that the issue may be related to the amount of virtual memory. Which of the following would allow Jack to view virtual memory information? A) System Properties B) Programs and Features C) Device Manager D) Folder Options E) Disk Manager

System Properties; -The virtual memory settings are located in the Control Panel's System applet.

What is the volume containing the boot configuration database called?

System Volume

PXE

Technology that enables a PC to boot without any local storage by retrieving an OS from a server over a network.

NX bit

Technology that enables the CPU to protect certain sections of memory. This feature, coupled with implementation by the operating system, stops malicious attacks from getting to essential operating system files. Microsoft calls the feature Data Execution Prevention (DEP)

True

The "Run as administrator" option in MS Windows allows users with lower-level permissions to perform tasks reserved for system administrators. This feature requires providing Administrator account credentials and temporarily elevates the current user's privileges to perform a given task. It also simplifies common system tasks, such as installation of new software, which would otherwise require logging out and switching to an admin account.

True

The "Run as administrator" option in MS Windows available after right-clicking on the Command Prompt application icon allows for execution of shell commands reserved for a system administrator.

False

The "View by Category" option in Windows Control Panel allows for displaying entire contents of the Control Panel in a single window enabling quick access to each Control Panel applet.

Fixes errors on the disk

The /f switch of the chkdsk command-line utility in MS Windows:

Locates bad sectors and recovers readable information and Fixes errors on the disk

The /r switch of the chkdsk command-line utility in Windows: (Select 2 answers)

Driver updates. Firmware updates. Antivirus updates. Anti-malware updates.

The App Store menu in macOS provides access to:

During the startup process, a computer is assigned the IP address 169.254.77.14. Which of the following would best describe this addressing? A) The device is on a public IP network B) The firewall is blocking udp/161 C) The device uses a NAT to communicate to the Internet D) The DHCP server is down E) It's very number-centric

The DHCP server is down; -The address range of 169.254.1.0 through 169.254.254.255 is the APIPA (Automatic Private IP Addressing) range. If a DHCP server is not available to assign an IP address, a device will default to an APIPA address.

A new computer has recently been added to the network. The system administrator is able to ping a remote device at 8.8.8.8, but cannot connect to any web sites using a fully-qualified domain name. Which of the following would be the most likely reason for this issue? A) The DHCP server is down B) The DNS settings are incorrect C) The subnet mask is invalid D) The IP address is for a different VLAN E) There is a speed and duplex mismatch

The DNS settings are incorrect; -The DNS is responsible for converting a FQDN (fully-qualified domain name) to an IP address.

Startup

The Task Manager utility in Windows 8/8.1/10 contains a tab previously included as part of the System Configuration (MSConfig) utility. The tab allows system administrators to control user applications that should be enabled/disabled during system boot. This tab is called:

True

The term "Power plan" refers to a collection of hardware and system settings that manage how a Windows-based computer uses power. Available configuration options for managing power in MS Windows 8/8.1/10 can be accessed via Power Options applet in Control Panel. Windows 10 provides additional way for managing basic power settings in the Settings menu.

True

The term "Unified Threat Management" (UTM) refers to a network security solution, commonly in the form of a dedicated device (called a UTM appliance or a web security gateway), which combines the functionality of a firewall with additional safeguards such as URL filtering, content inspection, spam filtering, gateway antivirus protection, IDS/IPS functionality, or malware inspection.

A user generates printouts consisting of several pages of seemingly random characters every time he prints to a network printer. The printer seems to work fine for all other users. What is the most likely cause of the problem?

The user is using an incorrect printer driver

vi

The vi editor is the most popular and commonly used Linux text editor

EXPAND

This command will expand or EXTRACT one or more compressed files from a .CAB file.

FORMAT

This command will format a partition to a selected file system. File system examples: FAT16, FAT32, FAT64 (exFAT), NTFS, CDFS, ReFS.

IPCONFIG /RELEASE (or RELEASE6)

This command will release your IP address back into the SCOPE.

CHKDSK

This command will scan a HDD for logical errors. NOTE: CHKDSK /F will scan and FIX and errors! You'll use this often as a tech!

IPCONFIG / RENEW

This command will select your new IP address from the SCOPE.

NETSTAT

This command will show all inbound and outbound traffic in a specific WORKSTATION

Interactive Group

This group contains the user account of the person currently working at the computer

True or False: you can create an inbound firewall rule to ensure that a particular application can always connect to the client in order to push update the latest application data regardless of the network the client is connected to?

True

You have determined that a block-level file corruption on the disk has damaged the driver files for a critical piece of hardware. Multiple reboots have failed to correct the problem. You open device manager, what is step 1 to fix this error?

Uninstall the device

Your computer seems to be running slowly. In particular, you notice that the hard drive activity light stays lit constantly when running multiple applications and switching between open windows, even though you aren't saving large files. What could you do to troubleshoot the problem? (Select two.)

Use task manager to monitor memory utilization Use resource monitor to monitor memory utilization

How can you keep a Windows 10 system from automatically restarting after a critical system error occurs?

Use the Disable automatic restart after failure option on the Advanced Startup Options menu.

What is the difference between UXGA and WUXGA displays?

WUXGA has a widescreen aspect ratio.

Windows 7 Starter Install Windows 7 Home Basic Install Windows 7 Home Premium Install Windows 7 Professional Upgrade Windows 7 Enterprise Install Windows 7 Ultimate Upgrade

What are the upgrade options for switching from Windows 7 to Windows 10 Enterprise edition?

Windows 8.1 (Core) Install Windows 8.1 Professional Upgrade Windows 8.1 Enterprise Upgrade

What are the upgrade options for switching from Windows 8.1 to Windows 10 Enterprise edition?

Malware protection

What is the application of No-eXecute bit (NX bit)?

Explicit Deny -> Explicit Allow -> Inherited Deny -> Inherited Allow

What is the correct hierarchy of precedence for permissions settings in NTFS?

Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> rightclick on the device -> select Properties from the pop-up menu -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields

What is the correct sequence of steps for accessing the manual configuration interface for IPv4 connections in MS Windows?

System applet in Control Panel -> Advanced system settings -> Performance -> Settings -> Advanced -> Virtual memory -> Change... -> enable Automatically manage paging file size for each drive. Windows Run dialog box -> type in sysdm.cpl + press Enter -> Advanced tab -> Performance -> Settings -> Advanced -> Virtual memory -> Change... -> enable Automatically manage paging file size for each drive.

What is the correct sequence of steps for enabling automatic virtual memory management in MS Windows? (Select 2 answers)

File Explorer

What is the name of a GUI-based file and folder manager application in Windows 10?

ps

What is the name of a Linux command-line utility used for displaying statistics of running processes?

BitLocker

What is the name of a Microsoft Windows feature that allows for encrypting entire drives?

Privacy

What is the name of a Windows Internet Properties applet tab providing access to advanced cookie management options?

Chrome OS

What is the name of a lightweight operating system designed by Google for small-factor PCs, laptops, tablets and mobile devices?

MAC address filtering

What is the name of a logical security access control method in which a 48-bit physical address assigned to each Network Interface Card (NIC) is used to determine access to the network?

Dock

What is the name of a macOS equivalent of Windows Taskbar?

IP

What is the name of a network layer protocol that specifies the format of packets and addressing scheme in network communications?

MAC filtering

What is the name of a network security access control method in which a 48-bit physical address assigned to each network card is used to determine access to the network?

BYOD

What is the name of a policy that allows employees to use private mobile devices for accessing company's restricted data and applications?

Port triggering

What is the name of a router configuration feature that allows to open an inbound port based on the outbound requests made by hosts placed inside a private network?

Worm

What is the name of a standalone malicious computer program that typically propagates itself over a computer network to adversely affect system resources and network bandwidth?

ipconfig

What is the name of an MS Windows command-line utility that can be used to display TCP/IP configuration settings?

In-place upgrade

What is the name of an operating system installation type that preserves system settings, personal files, and applications from the older OS version?

Network name. Encryption type. Security type. Security key.

What type of configuration info is used for setting up a wireless connection in Windows? (Select all that apply)

Door lock. Proximity card reader. Smart card reader.

What type of preventive physical access controls would provide a basic means for securing door access? (Select 3 answers)

Low Level Format

When a new harddisk leaves the manufacturer, creates cylinders, tracks and sectors on the platters

Event Viewer

When a program installed in Windows stops responding or encounters an error, logs describing the error can be examined with the use of:

Credential Manager.

Which Control Panel applet in Windows allows to manage usernames and passwords for websites, connected applications and networks?

System

Which Control Panel applet in Windows can be used to check the OS version and basic hardware statistics such as the CPU type and amount of installed RAM?

System

Which Control Panel applet in Windows provides access to computer name, domain, and workgroup settings?

cp

Which Linux command enables copying files and directories?

Services (services.msc). Task Manager (taskmgr.exe).

Which MS Windows utilities provide an interface for managing applications/services that might affect the system by slowing down the boot process? (Select 2 answers)

Education. Enterprise.

Which Microsoft Windows 10 editions include the BranchCache feature? (Select 2 answers)

System Configuration (msconfig.exe)

Which Microsoft Windows tool can be used by system administrators to find and isolate problems that might prevent the OS from starting correctly?

/v

Which copy command switch verifies that the new files are written correctly?

Standard format

Which formatting type in Windows 7/8/8.1/10 prevents data recovery by overwriting the contents of hard drive sectors?

Quick format. Standard format. High-level format.

Which formatting type(s) would typically be performed by a user to reinstall an OS? (Select all that apply)

Public

Which network profile in Windows by default disables the network discovery feature?

Boot Camp

Which of the Apple software utilities enables installation of an alternative OS in a multiboot environment?

Network and Sharing Center.

Which of the Control Panel applets in Windows 8/8.1/10 can be used for checking basic information about the network connection status and setting up network connections?

kill

Which of the Linux command-line commands allows to terminate a running process?

net user

Which of the MS Windows command-line commands lists the user accounts for the computer?

xcopy and robocopy

Which of the Microsoft Windows command-line commands allow for copying multiple files or entire directory trees from one directory to another and for copying files across a network? (Select 2 answers)

Folder redirection

Which of the Windows Active Directory Group Policy settings allows network administrators to map a folder on a user's PC to a server-based location?

Connections

Which of the Windows Internet Properties system utility tabs provides access to proxy settings?

taskkill /im notepad.exe

Which of the answers listed below refers to the correct syntax for a Windows Command Prompt taskkill command that would allow to close notepad.exe by providing its imagename?

gpupdate

Which of the command-line commands listed below allows for updating multiple Group Policy settings in MS Windows?

Boot logging. Default OS to load in a multi-boot environment. Amount of hardware resources to be used by the chosen OS in a multi-boot environment (e.g. the maximum amount of RAM). Safe boot options.

Which of the configuration features listed below can be managed through the MSConfig Boot tab? (Select all that apply)

/y

Which of the copy command switches suppresses the confirmation prompt displayed when Windows is about to overwrite the contents of an existing file?

net use

Which of the following Command Prompt commands in Windows is used for listing a computer's connections to shared resources?

Programs and Features

Which of the following Control Panel applets in Windows provides options to uninstall, change, or repair applications?

Windows Firewall (Advanced settings)

Which of the following Control Panel applets provides access to the Windows Firewall with Advanced Security tool?

Dial-up

Which of the following Internet access types takes advantage of PSTN lines?

cd

Which of the following Linux command-line commands enables directory traversal?

ls

Which of the following Linux commands is used to display information about files and directories contained within the current working directory?

Local Users and Groups in Computer Management & User Accounts in Control Panel.

Which of the following Microsoft Windows components allow system administrators to enable/disable user accounts? (Select 2 answers)

Chrome OS

Which of the following OSs uses a Web browser as its main user interface?

ipconfig

Which of the following Windows command-line utilities can be used to renew an IP address?

Services (services.msc)

Which of the following Windows utilities provides access to print spooler settings?

Login time restrictions

Which of the following account management security measures narrows down a user's computer access to specified hours?

Timeout period between login attempts. Failed attempts lockout.

Which of the following account management security solutions provide countermeasures against brute-force attacks? (Select 2 answers)

DLP

Which of the following acronyms refers to software or hardware-based security solutions designed to detect and prevent unauthorized use and transmission of confidential information outside of the corporate network?

Changing default admin credentials. Implementing MAC address filtering. Blocking unwanted traffic via firewall settings. Disabling unused physical ports. Implementing content filtering. Performing firmware updates. Implementing physical security controls (e.g. a door lock).

Which of the following actions allow(s) to improve the security of a SOHO router?

Right-click on an application icon -> select Run as administrator from the pop-up menu. Launch Windows Run dialog box (Windows logo key + R) -> type in the application's name -> press Control + Shift + Enter. In Windows Start menu press and hold Control + Shift keys -> Left-click on an application icon.

Which of the following actions in Windows allow to invoke the User Account Security (UAC) access control feature and run an application with administrator account permissions? (Select 3 answers)

Run Startup Repair utility. Use bootrec.exe to fix Master Boot Record (MBR) errors. Verify that the drive is detected in BIOS. Use diskpart utility to label the system partition as active.

Which of the following actions would be of help in troubleshooting the "Missing operating system" error message displayed during system boot?

Press Windows logo key + Ctrl + Shift + B to wake the screen. Press Ctrl + Alt + Delete and try logging in. Check the video output connection / Reconnect the monitor. Remove third-party antivirus software (safe mode). Roll back the video adapter driver (safe mode). Check video adapter's compatibility (HCL).

Which of the following actions would be of help while troubleshooting a black/blank screen on a Windows-based PC?

Unplug and restart the printer. Check cables or wireless connection. Uninstall and reinstall the printer. Install the latest printer driver. Clear and reset the print spooler. Change printer's status to "online" Print a test page.

Which of the following actions would be of help while troubleshooting printing issues in Windows OS?

Updating Windows and installing the latest device drivers. Closing unnecessary applications and web browser tabs. Making sure the system has enough virtual memory available. Checking for low disk space and freeing up space (deleting unused programs / using Disk Cleanup utility). Defragmenting installed magnetic hard drives. Adjusting system visual effects, such as animations and shadow effects. Disabling unnecessary startup programs. Checking for and removing viruses and malware. Adjusting power configuration settings. Restoring the PC from a system restore point. Restarting the system regularly to clear out the memory. Adding more RAM.

Which of the following actions would help in optimizing Windows for faster performance?

Turning off airplane mode if enabled. Adjusting wireless signal range. Checking physical cable connections. Rebooting router/modem. Using Windows built-in troubleshooting utilities. Checking network resources permissions. Temporarily turning off firewalls. Temporarily turning off antivirus and anti-malware. Reinstalling the network adapter driver. Restarting Windows. Manually updating network settings.

Which of the following actions would help in resolving Windows network connectivity issues?

localhost. ::1. 127.0.0.1.

Which of the following addresses can be pinged to test the functionality of a Network Interface Card (NIC)? (Select 3 answers)

File fragmentation. Excessive paging / disk thrashing. Insufficient amount of RAM.

Which of the following adversely affect performance of a magnetic hard drive? (Select 3 answers)

Printers applet in Control Panel in Windows OSs prior to Windows 7, Devices and Printers applet in Control Panel in Windows 7 and newer Microsoft OSs, Print Management utility in the Administrative Tools folder (not available in home editions of MS Windows)

Which of the following allow for administering print devices in Microsoft Windows? (Select 3 answers)

Drive imaging

Which of the following allows to create a backup copy of the entire contents of a disk drive (which may include a pre-configured OS installation) and replicate the drive to a new computer?

Subnet mask

Which of the following allows to determine which network segment an IP address belongs to?

Remote wipe

Which of the following allows to erase data on a lost or stolen mobile device?

Open the Folder Options applet in Windows Control Panel, then select Hide extensions for known file types in the Advanced settings on the View tab.

Which of the following allows to hide extensions for known file types in Windows 7?

Open the File Explorer Options applet in Windows Control Panel, then select Hide extensions for known file types in the Advanced settings on the View tab.

Which of the following allows to hide extensions for known file types in Windows 8/8.1/10?

Open the Folder Options applet in Windows Control Panel, then select Show hidden files, folders, and drives in the Advanced settings on the View tab.

Which of the following allows to view hidden files, folders, and drives in Windows 7?

Open the File Explorer Options applet in Windows Control Panel, then select Show hidden files, folders, and drives in the Advanced settings on the View tab.

Which of the following allows to view hidden files, folders, and drives in Windows 8/8.1/10?

Accessed via BitLocker Drive Encryption applet in Windows Control Panel. Does not require a TPM microcontroller to work. Not included in basic versions of Windows 8/8.1/10 (Windows 8/8.1 Core and Windows 10 Home).

Which of the following answers apply to Windows BitLocker? (Select 3 answers)

Permanent remote access. Access based on local password (local user account password). Windows tool used for connecting remotely to the user's own computer.

Which of the following answers describe the features of Windows Remote Desktop tool? (Select 3 answers)

1 GHz CPU. 2 GB of system RAM. DirectX 9 graphics device with WDDM 1.0 or higher driver. 20 GB of free hard disk space.

Which of the following answers describe the minimum system requirements for 64-bit (x64) version of Microsoft Windows 7? (Select 4 answers)

Damaged hard drive. BIOS does not detect the hard drive. System partition not set as active. Corrupt Master Boot Record (MBR).

Which of the following answers describe(s) possible cause(s) of the "Missing operating system" error message displayed during system boot? (Select all that apply)

Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> rightclick on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Speed & Duplex settings.

Which of the following answers describes the correct sequence of steps for accessing the Speed & Duplex settings of an Ethernet adapter in MS Windows?

Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> rightclick on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Magic Packet settings.

Which of the following answers describes the correct sequence of steps for accessing the magic packet settings of an Ethernet adapter in MS Windows?

Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> rightclick on the device -> select Properties from the pop-up menu -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields.

Which of the following answers describes the correct sequence of steps for accessing the manual configuration interface for IPv4 connections in MS Windows?

On the Processes tab, right-click the program/process that isn't responding, click End Task button.

Which of the following answers describes the correct sequence of steps required to close a non-responsive user application or process in Task Manager in Windows 8/8.1/10?

IP address. Subnet mask. Default gateway. DNS server address.

Which of the following answers list(s) data required for manual configuration of network adapter settings in MS Windows? (Select all that apply)

attrib +R [drive:] [path] [filename]

Which of the following answers lists the correct syntax for applying the read-only attribute to a file?

.ps1

Which of the following answers lists the filename extension of a Microsoft PowerShell script files?

Offline & Standby

Which of the following answers refer to a very basic UPS type commonly used for protecting a single PC? (Select 2 answers)

Access based on one-time password. Temporal remote access. The host and invited user can both see the host's screen. The host and invited user share control over host's mouse and keyboard. Windows tool used for assisted remote troubleshooting.

Which of the following answers refer(s) to the Windows Remote Assistance utility? (Select all that apply)

Fingerprint lock. Face lock. Swipe lock. Passcode lock.

Which of the following answers refers to (a) screen lock type(s) used for securing access to a mobile device?

Loop

Which of the following answers refers to a basic programming construct that repeats a sequence of instructions until a specified condition is reached?

Administrator

Which of the following answers refers to a built-in MS Windows account with complete and unrestricted system access?

Rebuilding Windows profiles

Which of the following answers refers to a common solution for troubleshooting user login problems on a Windows domain?

sh

Which of the following answers refers to a script file type designed to be run in Unix command line?

DNS

Which of the following answers refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses?

Smart card

Which of the following answers refers to an example implementation of certificate-based authentication?

Parental controls

Which of the following answers refers to an example of content filtering configuration setting on a SOHO router?

.py

Which of the following answers refers to an example of filename extension used in a cross-platform, general-purpose programming language?

MSTSC

Which of the following answers refers to the MS Windows client application for Remote Desktop Services (RDS)?

Hash/Password

Which of the following answers refers to the contents of a rainbow table entry?

print$ IPC$

Which of the following are examples of administrative share names in Windows? (Select 2 answers)

Key fob. RFID badge. Smart card

Which of the following are examples of hardware tokens? (Select 3 answers)

MBR and GPT

Which of the following are examples of partition styles? (Select 2 answers)

AUP. Group Policy. Principle of least privilege. MDM solutions.

Which of the following can be used by system/network administrators to restrict a user's ability to install software?

Computer Management. Windows Run dialog box. Quick Access Menu (displayed after right-clicking on the Windows Start button).

Which of the following can be used to launch the Disk Management utility in Windows? (Select 3 answers)

$

Which of the following characters indicates that a Windows network share is intended for administrative access?

tasklist

Which of the following command-line commands in Windows displays a list of currently running processes on a local or remote host?

AES

Which of the following cryptographic algorithms is the least vulnerable to attacks?

BitLocker (drive-level encryption). EFS (file-level encryption).

Which of the following data encryption tools can be used to secure a Windows workstation? (Select all that apply)

Guests

Which of the following default local groups in Microsoft Windows has the least amount of system access privileges?

Allows to close a non-responsive application in Windows. Displays information on programs, processes, and services that are currently running on the computer. Provides real-time reports on how a computer running Windows OS is using system resources (CPU/RAM/HDD/Network usage). Allows system administrators for managing the currently logged-in users.

Which of the following describe(s) the function of Windows Task Manager? (Select all that apply)

Online (Errors). Healthy (At Risk).

Which of the following disk status options in Windows Disk Management utility indicates Input/Output (I/O) errors on a dynamic disk/volume? (Select 2 answers)

Unreadable

Which of the following disk status options in Windows Disk Management utility indicates that a basic or dynamic disk is not accessible and might have experienced hardware failure, corruption, or I/O errors?

The disk needs to be initialized. The disk requires a drive letter. The disk can be mounted as a folder.

Which of the following enable a newly added disk to show up in Windows File Explorer? (Select 3 answers)

Face lock. Fingerprint lock.

Which of the following enable(s) biometric authentication on a mobile device? (Select all that apply)

Right-click on a disk and select the Shrink Volume menu option.

Which of the following enables decreasing partition size in Windows Disk Management utility?

Jailbreaking.

Which of the following enables installation of software that is not available through the official Apple App Store? Carrier unlocking. Sideloading. Rooting. Jailbreaking.

Shrink a volume, then create a new simple volume from the adjacent unallocated space.

Which of the following enables partition split in Windows Disk Management utility?

Recovery console

Which of the following enables troubleshooting a malware-infected system that doesn't boot up?

Tunneling

Which of the following ensures the privacy of a VPN connection?

Fingerprint scan and password

Which of the following examples meets the requirement of multi-factor authentication on a mobile device?

MDM

Which of the following facilitates the enforcement of mobile device policies and procedures?

Hardware firewall. Network-based firewall.

Which of the following firewall types would provide the best protection for an ingress/egress point of a corporate network? (Select 2 answers)

mv

Which of the following is a Linux command for transferring files/directories to a different directory?

su

Which of the following is a Linux command that allows to assume the identity of a different system user and execute commands with security privileges of that user account?

iwconfig

Which of the following is a Linux command-line command used for configuring network interface parameters specific to the wireless communication?

Windows Firewall

Which of the following is a Windows built-in software component that monitors network traffic and depending on the configuration settings applied to each data packet either blocks it or allows it to pass through?

System Restore

Which of the following is a Windows system utility that allows to roll back system files and settings to an earlier point in time?

chkdsk

Which of the following is a Windows, OS/2 and DOS command-line tool used for checking the file system and status of the system's hard drives?

Integer

Which of the following is a basic variable type designed to store whole numbers?

Host-based firewall. Software firewall.

Which of the following is a common firewall type used for protecting a single computer? (Select 2 answers)

VPN concentrator

Which of the following is a dedicated device designed to manage encrypted connections established over an untrusted network such as the Internet?

Spotlight

Which of the following is a macOS system search utility?

APT

Which of the following is a package management system most often used on Debian and Debianbased Linux distributions?

Whitelist

Which of the following is a set of firewall entries containing information on traffic considered safe enough to pass through?

DxDiag

Which of the following is an MS Windows diagnostic tool for detecting display, sound, and input related problems?

Component Services (dcomcnfg.exe)

Which of the following is an MS Windows utility designed both for system administrators and for application developers?

Content filter

Which of the following is an application software that selectively blocks access to websites?

Authenticator app

Which of the following is an example of a soft token?

Keylogger

Which of the following is an example of spyware?

Windows Taskbar notification area. Sound applet in Control Panel.

Which of the following locations enable adjustments to the volume of sound in Windows 8/8.1/10? (Select 2 answers)

Control Panel (Icon view) -> Devices and Printers -> right-click on a selected printer -> Printer Properties -> General tab -> Print Test Page.

Which of the following locations in MS Windows allows to print a test page?

Control Panel (Icon view) -> Troubleshooting -> Hardware and Sound -> Printer. Control Panel (Category view) -> System and Security -> Troubleshoot common computer problems - > Printer. Control Panel (Icon view) -> Devices and Printers -> right-click on a selected printer -> Troubleshoot.

Which of the following locations in MS Windows provide access to an automated printer troubleshooting tool? (Select 3 answers)

Windows Run dialog box -> type in sysdm.cpl + press Enter -> System Protection -> Configure... Control Panel (Icon view) -> Recovery -> Configure System Restore -> Configure...

Which of the following locations in MS Windows provide access to an interface containing options for configuring restore settings, managing disk space, and deleting restore points? (Select 2 answers)

Internet Options applet in Windows Control Panel . Network and Sharing Center applet in Windows Control Panel. Windows Run dialog box (after typing in inetcpl.cpl and pressing Enter). Internet Options menu item in Internet Explorer's Tools menu.

Which of the following locations in MS Windows provide(s) access to the Internet Properties (inetcpl.cpl) system utility? (Select all that apply)

Windows Start button -> Settings -> Devices -> Printers & scanners -> Add printers & scanners -> Add a printer or scanner -> select a printer -> Add Device. Control Panel -> Devices and Printers applet -> Add a printer.

Which of the following locations in Windows 10 provide access to configuration options for connecting a network printer to a PC (network printer mapping)? (Select 2 answers)

Windows Start button -> Settings -> Devices -> Printers & scanners -> select a printer -> Manage -> Printer Properties -> Sharing tab. Control Panel -> Devices and Printers applet -> right-click on a selected printer -> Printer Properties - > Sharing tab.

Which of the following locations in Windows 10 provide access to configuration options that allow to share a local printer with other PCs on a network? (Select 2 answers)

Windows Explorer -> Computer -> Map network drive.

Which of the following locations in Windows 7 allows to create a shortcut to a shared folder or computer on a network?

Startup tab of the System Configuration (msconfig.exe) utility

Which of the following locations in Windows 7 allows to enable/disable startup applications?

File Explorer -> This PC -> Computer tab -> Map Network drive

Which of the following locations in Windows 8/8.1/10 allows to create a shortcut to a shared folder or computer on a network?

Windows Settings (Settings -> Apps -> Startup). Startup tab of the Task Manager utility.

Which of the following locations in Windows 8/8.1/10 provide access to an interface for managing startup applications? (Select 2 answers)

Windows Defender Firewall applet in Control Panel -> Turn Windows Defender Firewall on or off menu item. Windows Start button -> Settings -> Update & Security -> Windows Security -> Firewall & network protection -> Allow an app through firewall. Windows Defender Firewall applet in Control Panel -> Allow an app or feature through Windows Defender Firewall.

Which of the following locations in Windows 8/8.1/10 provide access to configuration options for managing apps or features allowed through Windows Defender Firewall? (Select 3 answers)

Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound Rules -> New Rule... -> Custom -> All programs (or a single app)

Which of the following locations in Windows 8/8.1/10 provides access to configuration options that would allow to block incoming echo requests?

Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound/Outbound Rules -> New Rule... -> Port.

Which of the following locations in Windows 8/8.1/10 provides access to configuration options that would allow to create an exception for a TCP or UDP port?

Internet Options (Connections tab). Network and Sharing Center. Settings menu.

Which of the following locations in Windows provide access to dial-up and VPN settings? (Select 3 answers)

Services (services.msc)

Which of the following locations in Windows provides an interface for managing background applications?

Apple menu -> System Preferences... -> Mouse. Apple menu -> System Preferences... -> Trackpad.

Which of the following locations in macOS provide access to multi-touch interface settings (a.k.a. Gestures)? (Select 2 answers)

App Store

Which of the following locations in macOS provides access to application updates menu?

Windows Start button -> Settings -> System -> Display. Display settings pop-up menu launched after right-clicking on the Windows Desktop screen area.

Which of the following locations provide access to display settings in Windows 10? (Select 2 answers)

Windows Settings menu -> Network & Internet -> Proxy. Windows Control Panel -> Internet Options -> Connections tab -> LAN settings -> Proxy server.

Which of the following locations provide access to proxy settings in Windows? (Select 2 answers)

Computer Management utility in the Administrative Tools folder in Windows Control Panel. Windows Run dialog box (after typing in devmgmt.msc and pressing Enter). Windows Control Panel.

Which of the following locations provide direct access to the Device Manager applet in MS Windows? (Select 3 answers)

Windows Defender Firewall applet in Control Panel. Windows Start button -> Settings -> Update & Security -> Windows Security -> Firewall & network protection.

Which of the following locations provides access to Windows Defender Firewall settings in Windows 8/8.1/10? (Select 2 answers)

Windows Firewall applet in Control Panel.

Which of the following locations provides access to Windows Firewall settings in Windows 7?

Windows Command Prompt -> net share -> Enter (all network shares). Windows Run dialog box -> \\computer name -> Enter (user shares only). Shared Folders menu in the Computer Management utility (all network shares). Windows Command Prompt -> net view \\computer name -> Enter (user shares only). Windows Command Prompt -> net view \\computer name /all -> Enter (all network shares).

Which of the following locations/steps allows to view network shares in Windows?

Email filtering

Which of the following logical security controls provides a countermeasure against unsolicited electronic messages (a.k.a. spam)?

Spaces

Which of the following macOS features allows to create switchable desktop environments?

Disk Utility

Which of the following macOS utilities allows to create/restore a disk image?

First Aid (in Disk Utility)

Which of the following macOS utilities can be used for detecting and repairing disk-related problems?

Boot from installation media. In Power menu, hold down the Shift key and select Restart. Boot from Recovery Drive. Perform system restart from the Settings menu.

Which of the following methods can be used to launch Windows Recovery Environment (WinRE) in Windows 8/8.1/10?

Degaussing

Which of the following methods provides the most effective way for permanent removal of data stored on a magnetic drive?

-n

Which of the following netstat parameters displays addresses and port numbers in numerical form?

Visibility of hidden files, folders, or drives.

Which of the following options is not part of the General tab of the Folder Options applet (Windows 7) / File Explorer Options applet (Windows 8/8.1/10) in MS Windows?

Password expiration

Which of the following password best practices would mitigate the security risk posed by temporary workers?

Password history setting

Which of the following password policy settings determines the number of unique new passwords that must be associated with a user account before an old password can be reused?

Maximum password age setting

Which of the following password policy settings prevents attackers using cracked passwords from gaining permanent access to a Windows workstation?

G$L3tU8wY@z

Which of the following passwords is the most complex?

System applet in Control Panel -> Advanced system settings -> Performance -> Settings -> Advanced -> Virtual memory. Windows Run dialog box -> type in sysdm.cpl + press Enter -> Advanced tab -> Performance -> Settings -> Advanced -> Virtual memory.

Which of the following provide access to virtual memory (a.k.a. paging file) configuration options in Windows? (Select 2 answers)

Remote settings in the System applet in Windows Control Panel.

Which of the following provides access to Remote Assistance and Remote Desktop configuration settings in Windows?

File Explorer Options applet in Windows Control Panel.

Which of the following provides access to file/folder management settings in Windows 10?

Folder Options applet in Windows Control Panel.

Which of the following provides access to file/folder management settings in Windows 7?

Control Panel

Which of the following provides access to the User Accounts applet in MS Windows?

Cable lock

Which of the following provides physical security measure against laptop theft?

Internet address (domain name or IPv4/IPv6 address). Destination name. Smart card (optional).

Which of the following settings are used for establishing a VPN connection in Windows? (Select 3 answers)

Dial-up phone number. User name. Password.

Which of the following settings are used for establishing a dial-up connection in Windows? (Select 3 answers)

Quality of Service (QoS)

Which of the following solutions is used for controlling network resources and assigning priority to different types of traffic?

Port forwarding

Which of the following solutions will allow a server with a private IP address to handle requests from an outside (public) network?

Logging on to any computer on a Windows domain requires a single set of credentials. Security policies and permissions on a Windows domain are administered centrally. Windows domains are based on client-server networking architecture.

Which of the following statements apply to Windows domains? (Select 3 answers)

A self-replicating computer program containing malicious segment. Requires its host application to be run to make the virus active. Attaches itself to an application program or other executable component.

Which of the following statements apply to the definition of a computer virus? (Select 3 answers)

NTFS permissions apply to both network and local users. NTFS permissions can be applied to a folder or individual file.

Which of the following statements are true? (Select 2 answers)

Apply to both network and local users. Can be applied to a folder or individual file.

Which of the following statements describing NTFS permissions in MS Windows are true? (Select 2 answers)

Windows-based computers on a network must be part of a workgroup or a domain. Windows-based computers on workplace networks are usually part of a domain. Windows-based computers on home networks are usually part of a workgroup.

Which of the following statements describing different methods for organizing Windows-based computers in networks are true? (Select 3 answers)

Communication between HomeGroup computers is encrypted with a pre-shared password. An ad hoc home networking system for file and printer sharing. HomeGroups are available only in Windows 7/8/8.1 and early versions of Windows 10.

Which of the following statements describing features of Windows HomeGroups are true? (Select 3 answers)

Apply only to network users. Can be set on a folder level.

Which of the following statements describing share permissions in MS Windows are true? (Select 2 answers)

Control Panel -> Folder Options -> View tab -> Advanced settings -> clear the checkbox next to Hide protected operating system files Control Panel -> Folder Options -> View tab -> Advanced settings -> select Show hidden files, folders, and drives

Which of the following steps enable displaying protected system files in Windows 7? (Select 2 answers)

Control Panel -> File Explorer Options -> View tab -> Advanced settings -> select Show hidden files, folders, and drives Control Panel -> File Explorer Options -> View tab -> Advanced settings -> clear the checkbox next to Hide protected operating system files

Which of the following steps enable displaying protected system files in Windows 8/8.1/10? (Select 2 answers)

Control Panel (Icon view) -> Device Manager -> expand Network Adapters list -> right-click on the network adapter -> select Properties from the pop-up menu -> select the required action from the Driver tab Windows Run dialog box -> type in devmgmt.msc + press Enter -> expand Network Adapters list -> right-click on the network adapter -> select Properties from the pop-up menu -> select the required action from the Driver tab

Which of the following steps in MS Windows allows to update/roll back the network adapter driver or disable/uninstall the device? (Select 2 answers)

Control Panel (Category view) -> System and Security -> Security and Maintenance -> Maintenance - > View reliability history. Control Panel (Icon view) -> Security and Maintenance -> Maintenance -> View reliability history.

Which of the following steps provide access to Windows Reliability Monitor? (Select 2 answers)

Windows Run dialog box -> type in sysdm.cpl + press Enter -> Advanced tab -> Performance -> Settings... -> Visual Effects. Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) -> right-click on the Computer icon (Windows 7) / This PC icon (Windows 8/8.1/10) -> Properties -> Advanced system settings -> Advanced tab -> Performance -> Settings... -> Visual Effects. Control Panel -> System applet -> Advanced system settings -> Advanced tab -> Performance -> Settings... -> Visual Effects.

Which of the following steps provide access to configuration settings for Windows system visual effects, such as animations and shadow effects? (Select 3 answers)

Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) -> right-click on a drive -> Properties -> General tab -> Disk Cleanup. Windows Control Panel -> Administrative Tools folder -> Disk Cleanup shortcut icon. Windows Run dialog box -> type in diskmgmt.msc + press Enter -> right-click on a drive -> Properties -> General tab -> Disk Cleanup.

Which of the following steps provide access to the Disk Cleanup utility in MS Windows? (Select 3 answers)

Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) -> right-click on a drive -> Properties -> Tools tab -> Optimize and defragment drive -> Optimize. Windows Control Panel -> Administrative Tools folder -> Defragment and Optimize Drives shortcut icon. Windows Run dialog box -> type in diskmgmt.msc + press Enter -> right-click on a drive -> Properties -> Tools tab -> Optimize and defragment drive -> Optimize.

Which of the following steps provide access to the disk defragmenter utility in MS Windows? (Select 3 answers)

services.msc

Which of the following system utilities in Windows enables managing background applications?

Terminal

Which of the following system utilities provides access to different command-line shells in macOS?

General

Which of the following tabs of the Windows Internet Properties applet provides an option for deleting temporary Internet files, cookies, web browsing history, Internet Explorer saved passwords, and saved data typed into web forms?

Advanced

Which of the following tabs of the Windows Internet Properties applet provides an option for rolling back all the Internet Explorer web browser configuration settings to the state they were in when Internet Explorer was first installed?

WWAN

Which of the following takes advantage of cell towers that provide wireless signal coverage for mobile devices?

Windows domain

Which of the following terms describes a large network of Windows-based PCs under single administration?

Ethernet

Which of the following terms describes the most common type of wired connections used in modern networks?

Image-level backup

Which of the following terms is used a synonym for the bare-metal backup concept?

Botnet

Which of the following terms is used to describe a collection of intermediary compromised systems that are used as a platform for a DDoS attack?

Low-level format

Which of the following terms is used to describe initial hard drive formatting typically performed at the factory by the drive manufacturer?

EOL (End of Life)

Which of the following terms refers to a software that no longer receives continuing support?

Ransomware

Which of the following terms refers to an example of crypto-malware?

Jailbreaking

Which of the following terms refers to removing software restrictions imposed by Apple on its iOS operating system?

Storage Spaces. Disk Management.

Which of the following tools enable creation of disk arrays in Windows? (Select 2 answers)

Performance Monitor (perfmon.exe)

Which of the following tools in MS Windows is used to examine (both in real time and by collecting log data for later analysis) how programs that are run affect a computer's performance?

Wi-Fi analyzer

Which of the following tools would be of help in determining the optimal WAP placement?

Standard Users

Which of the following user groups in Windows 7/8/8.1/10 can use most software and change system settings that don't affect other users or computer's security?

Adding more RAM

Which of the following would resolve problems related to excessive paging and disk thrashing?

Display settings pop-up menu launched after right-clicking on the Windows Desktop screen area. Appearance and Personalization menu of the Windows Control Panel (Category view). The Display applet icon in Windows Control Panel (Icons view).

Which of the locations listed below enable access to computer display configuration settings in Windows 7/8/8.1? (Select 3 answers)

Hibernation

Which of the power-saving states in MS Windows uses the least amount of power?

Workgroups typically consist of no more than twenty computers. Logging on to any computer in the workgroup requires an account on that computer. Each computer in the workgroup has its own security policy.

Which of the statements listed below apply to Windows workgroups? (Select 3 answers)

General

Which of the tabs of the System Configuration utility in Windows contains the Diagnostic startup option?

Simple volume. Spanned volume. Striped volume.

Which of the volume types available in Windows Disk Management utility do not offer fault tolerance? (Select 3 answers)

regedt32

Which other command-line command besides regedit can be used to launch registry editor in Windows?

Dictionary attack

Which password attack takes advantage of a predefined list of words?

Minimum password age setting

Which password policy setting prevents users from repeatedly changing their passwords to bypass the password history policy setting and get back to their original/preferred password?

/scannow

Which sfc switch enables a type of file check that scans integrity of all protected system files and repairs corrupted files when possible?

Impersonation

Which social engineering attack relies on identity theft?

View

Which tab of the Folder Options applet (Windows 7) / File Explorer Options applet (Windows 8/8.1/10) in MS Windows contains the Advanced settings menu for files, folders, and Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) navigation pane?

General

Which tab of the MSConfig utility in Windows lists choices for startup configuration modes?

Advanced

Which tab of the System Properties (sysdm.cpl) applet in MS Windows provides access to system performance settings menu?

Online. Double-conversion.

Which type of UPS provides the best power outage protection? (Select 2 answers)

bat

Which type of script file would be used to store a series of commands designed to automate tasks in DOS, OS/2 and Microsoft Windows?

.js

Which type of script filename extension would be used to create a script file that extends the scope of interaction between a user and a web page?

MDM

Which type of software enables a centralized administration of mobile devices?

Power Users

Which user group in Windows (applies to Windows 7 and earlier versions) had rights and permissions that allowed its members to perform specific administrator-level tasks?

Striped volume

Which volume type in Windows Disk Management utility uses RAID 0 setup for performance gains?

Striped with parity volume

Which volume type in Windows Disk Management utility uses RAID 5 setup for performance gains and fault tolerance?

bootrec /rebuildbcd

While trying to start their Windows machine, a user receives "Windows Boot Configuration Data file is missing required information" error message. Which of the following bootrec options should be used by a technician for manual CLI troubleshooting of this error?

WPA-TKIP

Wi-Fi Protected Access and Temporal Key Integrtiy Protocol. Replacement for WEP. Uses WEP algorithm with TKIP to encrypt packets. New keys used for each packet.

NSLOOKUP

Will allow a user to find the IP address to a FQDN, or to find a FQDN if they have the IP address. When you see NSLOOKUP, Think DNS-lookup!

XCOPY

Will copy a specified file, AND if desired, a directory tree to a specified destination.

A Windows computer has been infected with malware and shows a Windows Stop Error before a user can login. Which of the following would be the BEST choice for gaining access to the file system? A) WinRE B) SSH C) Windows Explorer D) Move the boot drive to a different computer E) Safe Mode

WinRE; -WinRE (Windows Recovery Environment) can be used to boot the system to a command prompt to access files or make configuration changes.

What OS would you choose if you required 64-bit processing, a user-friendly GUI, support for an encrypted file system and a command line interface?

Windows

Which version of Windows introduced Bitlocker To Go?

Windows 7

A client has purchased a new Windows 7 laptop, but the option to connect to the company's Active Directory domain is not available in the operating system options. Which of the following is installed on this laptop? A) Windows 7 Professional B) Windows 7 Ultimate C) Windows 7 Enterprise D) Windows 7 Home Premium

Windows 7 Home Premium; -Windows 7 Home Premium does not include integration with Windows Domains.

Windows 7 Editions

Windows 7 Starter Windows 7 Home Basic Windows 7 Home Premium Windows 7 Ultimate Windows 7 Professional Windows 7 Enterprise

Which version of Windows introduced Bitlocker in the Professional edition?

Windows 8

what was the first windows pro edition to include Bitlocker

Windows 8

Storage Spaces

Windows 8 introduces a virtualization technology that enables organization of multiple physical disks into logical volumes in a fashion similar to RAID levels. What is the name of the Control Panel applet providing access to this functionality?

True

Windows Active Directory service allows for grouping users and computers into containers known as Organizational Units (OUs). An OU is the smallest unit to which system administrators can assign Group Policy settings to manage the configuration and use of accounts and resources within a given OU.

wbadmin

Windows Backup and restore command line utility and not used to create restore points

dcomcnfg.exe

Windows Component Services: MS Windows utility designed both for system administrators and for application developers.

A home user would like to share videos and pictures between Windows 7 and Windows 8.1 devices without adding separate usernames and passwords on every computer. Which of these would be the best way to provide this file sharing? A) Windows Domain B) FTP server C) Windows Server D) NTFS file share E) Windows HomeGroup

Windows HomeGroup; -Windows HomeGroup allows for easy sharing between home computers using a single password across all systems.

True

Windows Memory Diagnostic Tool (mdsched.exe) cannot be run inside Windows. This utility requires a system restart and is launched during next boot before loading the operating system. (True or False)

WSUS

Windows Server Update Services - a program on a server that allows the network administrator to approve updates for certain groups

Provide access to proxy settings in Windows

Windows Settings menu -> Network & Internet -> Proxy Windows Control Panel -> Internet Options -> Connections tab -> LAN settings -> Proxy server

User Account Control (UAC)

Windows Vista and newer releases of the Microsoft OS offer a security feature which limits privileges of software applications and access to administrative tasks. When a program makes a change that requires administrator-level permission or a user attempts to modify system settings that require administrative access, it triggers an on-screen prompt requiring an administrator password to proceed. This functionality is known as:

Settings menu (Windows 8/8.1/10). Power Options applet in Windows Control Panel.

Windows power plans manage how the computer is using power. The Balanced (recommended) power plan (used by default in certain Windows versions) scales the CPU performance based on its current utilization, which might have a degrading effect on system performance. If the system is running slow, one of the troubleshooting methods is to enable the High performance power plan or customize the current plan settings. In Windows, the power configuration settings can be found in: (Select 2 answers)

DXDIAG

Windows run-line utility for testing the DirectX support. Launch this program when experiencing video problems and/or audio problems when running DirectX applications. (11)

Where do users find additional Windows 10 themes?

Windows store

chkdsk

Windows, OS/2 and DOS command-line tool used for checking the file system and status of the system's hard drives

True

Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) are encryption standards designed for securing wireless networks. WEP is an older standard and due to its vulnerabilities is not recommended. WPA was designed as an interim replacement for WEP, and WPA2 was introduced as the official standard offering the strongest security of the three.

Which configuration would you choose if you managed an office of less than 10 users?

Workgroup

WLAN (Wireless Local Area Network)

a LAN communication technology in which radio, microwave or infrared links take the place of physical cables

MSTSC

a command that allows you to start Remote Desktop Connection to remote in to your host computer using Remote Desktop.

Your laser printer prints a vertical black line on every page. You change the toner cartridge, but the problem does not go away. What is the MOST likely problem?

a corona wire is dirty

Mission Control

a feature of macOS that enables a user to set up one more desktops with different sets of apps and backgrounds

homegroup

a feature to secure access to shared folders and printers. (exists in windows 7 and 8 but not in later versions of windows 10)

Bitlocker

a microsoft utility to encrypt a drive

firewall

a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.

Credential Manager

a place where you can store authentication credentials for logging on to other computers remotely

Trojan Horse

a program that appears desirable but actually contains something harmful

Rootkit

a set of tools designed to gain control of a computer without revealing its prescence

symmetric encryption

a single key is used to encrypt and decrypt data

Worm

a software program capable of reproducing itself that can spread from one computer to the next over a network

MSCONFIG

a system utility to troubleshoot the Microsoft Windows startup process.

vi/vim

a text file editor in linux

03. An end user has requested assistance from the help desk to install new video editing software. The user wants to create several .wma files. Which of the following should the help desk consider before installing the software? a) Disk space b) Network connection c) Aspect ratio d) Power supply

a) Disk space

05. A user reports a phone battery does not last the entire day, and the phone's navigation is slow. Which of the following should a technician do FIRST to troubleshoot the device? a) Examine the running apps. b) Update the firmware. c) Reinstall the most-used application. d) Turn off all network services.

a) Examine the running apps.

When upgrading a system from Windows 7 Home Premium Edition (SP1) to Windows 10, which Windows 10 Edition is recommended? a) Home b) Home Premium c) Professional d) Any edition that the hardware supports

a) Home Answer & Explanation: Windows 10 Home Edition is the recommended upgrade from Windows 7 Starter, Home Basic, and Home Premium editions. Windows 10 Professional Edition is the recommended upgrade for Windows 7 Professional and Windows 7 Ultimate Editions. Answer: Home.

10. A new security requirement for logging on to a company network has been put in place for all users. Which of the following should a systems administrator enforce to BEST meet this requirement? (Select TWO). a) Strong passwords b) Folder redirection c) Email filtering d) Multifactor authentication e) Remote desktop f) Anti-malware

a) Strong passwords d) Multifactor authentication

01. A technician implements a Group Policy change and needs to apply it without restarting the workstation. Which of the following commands can be used to accomplish this task? a) gpupdate b) gpresult c) netstat d) Dism

a) gpupdate

You manage two folders in your computer as follows: • C:\Confidential • D:\PublicReports Both the C:\ and D:\ drives are formatted with the NTFS file system. In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: • Reports.doc • Costs.doc The D:\ drive allows the Full Control permission to the Users group. There are no other permissions assigned except for the default permissions. You then take the following actions: • Move Reports.doc from C:\Confidential to D:\PublicReports. • Copy Costs.doc from C:\Confidential to D:\PublicReports. Which of the following BEST describes the permission the members of the Users group will have for the two files in the D:\PublicReports folder?

allow full control to both

answer file

an xml text file that contains all the instructions a Windows Setup program would need to install and configure an OS with out any administrator intervention

Rainbow Table Attack

attempts to discover the password from the hash using databases of precomputed hashes

You are working at the command line and want to add the read-only attribute to a file and remove the hidden attribute. which command would you use?

attrib +r -h

By default, which type of script file will a script written with Windows 10 PowerShell ISE be saved as? a) .bat b) .ps1 c) .sh d) .py

b) .ps1

Which device should not be plugged into a UPS? a) A monitor b) A laser printer c) A scanner d) A modem

b) A laser printer

07. A user connects a printer to a workstation. As the printer drivers are installed, an error message appears. The default drivers appear to be incompatible with the OS. Which of the following should a technician use FIRST to troubleshoot the problem? a) Services b) Device Manager c) Programs and Features d) Task Manager

b) Device Manager

02. Which of the following is the proper way to dispose of batteries? a) Shred b) Recycle c) Dispose in trash d) Incinerate

b) Recycle

dock

bottom of screen gives one-click access to favorite apps and files in macOS

Which operating system will be installed on your new Chromebook by default? a) macOS b) Google OS c) Chrome OS d) Windows 10

c) Chrome OS

09. Joe, a user, forgot his password and was unable to log in to a workstation. Joe remembers the password later, but he is still unable to log in. Which of the following is the MOST likely cause of the issue? a) Reset account b) Deleted account c) Locked account d) Limited-user account e) Unprovisioned account

c) Locked account

06. To prevent electrical damage to a PC while working on it, which of the following should be disconnected before work begins? a) Video cable b) Serial cable c) Power cable d) USB cable

c) Power cable

08. Which of the following password choices increases the chance that a brute force attack will succeed? a) Capital letters b) Long passwords c) Special characters d) Dictionary words

d) Dictionary words

04. Which of the following is the BEST use-case scenario for a Chrome OS device? a) Database queries b) Application development c) Photo and video editing d) Web browsing and email

d) Web browsing and email

A Linux administrator needs to create an image of a server partition. Which of the following would provide this functionality? A) grep B) dd C) yum D) terminal E) vnc

dd; -The dd utility is commonly used to backup and restore entire partitions on a Linux device.

Which of the following commands will mount the wim file E:\wims\install.wim to the mount directory E:\mount?

dism /mount-wim /wimfile:E:\wimsinstall.wim /index 2 /mountdir:E:\mount

dir *.*

displays all files and directories in the current directory

dir *.doc

displays all files with the DOC extension in the current directory

dir let *.doc

displays all files with the DOC extension that start with the letters LET

dir let *.doc /s

displays all files with the DOC extension that start with the letters LET and searches for subdirectories

dir *.

displays all files without an extension.

ps

displays linux processes that are running on current user

PS

displays processes run by the current shell with additional details (such as the PID).

ifconfig/iwconfig

displays the current state of network interfaces within linux

Nathan, a long-time Mac user, has been using his Mac computer for some time now with no issues. Recently, however, he reported that his Mac will unexpectedly tell him that his computer must be restarted by holding down the Power button for several seconds or by pressing the Restart button. Assuming that this is a symptom of kernel panic, which of the following steps would be the BEST first step for troubleshooting this issue?

do a safe boot

Since it has no moving parts, a CPU will usually work properly for several years. Which of the following is a common factor that MIGHT cause a CPU to fail prematurely?

electrostatic discharge (ESD)

Employees complain to the company IT division that they are spending considerable time and effort discarding unwanted junk email. Which of the following should be implemented?

email filtering

apt-get install (package name)

install new application

IPCONFIG

is a command line tool used to control the network connections on Windows! It will show most of the network information you'll need.

PID

is a number used by most operating system (Linux, Mac OS X and Microsoft Windows) to uniquely identify an active process

Windows Safe Mode

is used for testing and troubleshooting.

iwconfig

is used in Linux to configure WIRELESS network interfaces

MV

is used to rename files (some consider this an appropriate command to remove files as well as it can move files to the trash)

What is the primary security concern around credential manager?

it allows passwords to be displayed

A Linux administrator needs to switch from one wireless network to another. Which of the following would provide this functionality? A) iwconfig B) chmod C) ps D) apt-get E) ifconfig

iwconfig; -The iwconfig command is used to modify wireless network settings, such as SSID, channel, modes, and other options.

iCloud Keychain

keeps account information up-to-date across your devices, without having to remember every password. keeps account names, passwords, and settings that are added to Internet Accounts preferences up to date

Displays current connections and incoming and outgoing connections.

netstat

Jane, an employee in the human resources department, has created several important PDF documents on her computer that all office managers in her building must read. She would like to make locating these files simple and maintain them as little as possible. It is important that no other users are permitted to view these documents. As the IT technician for your company, Jane has asked you to make this possible. Which of the following would MOST likely fulfill Jane's needs?

network share

Which of the following can you use to strip all the formatting away from data to make it nearly universally portable?

notepad

A user is having problems connecting to other computers using hostnames. Which of the following commands will BEST help you troubleshoot this problem?

nslookup

Device manufacturers are constantly finding bugs, vulnerabilities, or better ways for their devices to communicate with the operating system. Because of this, which of the following is the BEST practice to do before installing a new device?

obtain the latest driver from the manufacturer's website

GPEDIT

opens Group Policy... which provides the centralized management and configuration of operating systems, applications, and users' settings in an Active Directory environment.

devmgmt.msc

opens device manager from runline

diskmgmt.msc

opens disk management console from runline

compmgmt.msc

opens the Computer Management console from runline

Identifies the requirements for credentials used to authenticate to company-owned systems.

password policy

Specifies that user accounts should be locked after a certain number of failed login attempts.

password policy

PCI DSS

payment card industry data security standard - governs the processing of credit card and other bank payments

Sends an ICMP echo request/reply packet to a remote host.

ping

A technician assists Joe, an employee in the sales department who needs access to the client database, by granting him administrator privileges. Later, Joe discovers he has access to the salaries in the payroll database. Which of the following security practices was violated?

principle of least privilege

During an airline flight, a laptop user makes last-minute changes to a presentation that contains sensitive company information. Which of the following would make it difficult for other passengers to view this information on the laptop display?

privacy filter

taskkill /im

specify image name to kill

kill

stops a process using its Process ID

SU

superuser - allows regular users to run programs with the security privileges of the specified user.

SUDO

superuser do - is a command that will allow a user to execute a command as a superuser (at the ROOT).

system protection tab

tab in system properties that provides option for system restore

Hank is the system administrator for a new set of Linux servers, and he would like to automate a backup process for each server to occur every night. Which of the following would be the best choice for this task? A) tar B) backup C) yum D) ps E) chmod

tar; -The tar (tape archive) command is commonly used to backup and restore files on Linux systems.

A service running on your Windows system has hung badly and will not respond when you try to use the Services console to restart it. You run the tasklist command at the command prompt and find that the service's process has a PID of 1234 assigned to it and that it has an image name of telecom.exe. Which commands could you run to shut down the service? (Select TWO.)

taskkill /F /PID 1234 taskkill /F /IM telecom.exe

Ctrl + Shift + Esc

taskmgr.exe

A Linux system administrator needs to delete old log files from a web server. Which of the following would be the BEST utility for this task? A) dd B) iwconfig C) chmod D) pwd E) terminal

terminal; -The terminal utility provides command-line access to the Linux operating system.

taskkill /f /pid processid

terminates process without any user notification

multiboot

the capability for choosing between two or more operating systems to boot from when a computer is turned on. A separate partition is required for each operating system.

convert exe

the convert utility is used to convert a FAT partition to NTFS

diskpart

tool to setup partitions on a hard drive. Sets up active partition

A network administrator believes that a router has failed between a workstation and web server. Which of the following would help identify which router has failed? A) ipconfig B) netstat C) traceroute D) nslookup E) route

traceroute; -The traceroute command will show the list of routers between two devices.

True or False: You can enable all profiles to ensure that a particular application can always connect to the client in order to push update the latest application data regardless of the network the client is connected to?

true

You have a computer that runs Windows 7, and you want to install Windows 10. You are not concerned about keeping any of the existing data currently on the drive, and you want to do a clean install. After placing the Windows 10 installation DVD in the optical drive, you restart the computer, but it does not boot to the DVD, and you are unable to install Windows. Which of the following are the BEST methods for installing Windows from the DVD? (Select TWO. Each choice is a complete solution.)

while the computer is rebooting, press the boot menu function key from the UEFI or BIOS firmware, change the boot order

Windows 7 Professional

• 64-bit version supports up to 192 GB RAM • Multi-user fast switching • Remote Desktop hosting • Support for domain networking • Location aware printing • Dynamic disks • Encryption File System (EFS) • Windows XP Mode with Windows Virtual PC • Volume licensing • No Bitlocker

Overall number of partitions limited to four. Up to three primary partitions and one extended partition. Up to four primary partitions.

Which of the following answers describe the available options of the Master Boot Record (MBR) partition style? (Select 3 answers)

At the end of a session, user desktop reverts to its original state. Virtual desktop is shared among multiple users.

Which of the following answers describe the characteristics of a non-persistent VDI? (Select 2 answers)

1 GHz CPU with support for PAE, NX, and SSE2. 1 GB of system RAM. Microsoft DirectX 9 graphics device with WDDM 1.0 or higher driver. 16 GB of free hard disk space

Which of the following answers describe the minimum system requirements for 32-bit (x86) version of Microsoft Windows 10? (Select 4 answers)

Disk quotas. Compression. Object permissions. Encryption.

Which of the following are advantages of the New Technology File System (NTFS) over FAT32 file system?

Basic and Dynamic

Which of the following are disk storage types used with MS Windows? (Select 2 answers)

Primary, Logical, and Extended

Which of the following are examples of partition types? (Select 3 answers)

DFS (Distributed File System). NFS (Network File System)

Which of the following are methods of storing and accessing data over computer network? (Select 2 answers)

Linux & Android OS

Which of the following are not examples of proprietary software? (Select 2 answers)

Windows 7 Starter 2 GB Windows 7 Home Basic 4 GB Windows 7 Home Premium 4 GB Windows 7 Professional 4 GB Windows 7 Enterprise 4 GB Windows 7 Ultimate 4 GB

Which of the following are the limits on physical memory for 32-bit (x86) Microsoft Windows 7? (Match each OS edition on the left with the correct answer from the corresponding drop-down list)

Windows 8 (Core) 128 GB Windows 8 Professional 512 GB Windows 8 Enterprise 512 GB

Which of the following are the limits on physical memory for 64-bit (x64) Microsoft Windows 8/8.1? (Match each OS edition on the left with the correct answer from the corresponding drop-down list)

2 GB of system RAM. Microsoft DirectX 9 graphics device with WDDM 1.0 or higher driver. 20 GB of free hard disk space. 1 GHz CPU with support for PAE, NX, and SSE2.

Which of the following are the minimum system requirements for 64-bit (x64) version of Microsoft Windows 8/8.1? (Select 4 answers)

Windows 7 Starter Upgrade Windows 7 Home Basic Upgrade Windows 7 Home Premium Upgrade Windows 7 Professional Upgrade Windows 7 Enterprise Upgrade Windows 7 Ultimate Install

Which of the following are the upgrade options for switching from Windows 7 to Windows 10 Pro edition? (Match each Windows 7 edition on the left with the correct upgrade option from the corresponding drop-down list)

Windows 8.1 (Core) Upgrade Windows 8.1 Professional Upgrade Windows 8.1 Enterprise Install

Which of the following are the upgrade options for switching from Windows 8.1 to Windows 10 Pro edition? (Match each Windows 8.1 edition on the left with the correct upgrade option from the corresponding drop-down list)

shutdown /r /t 120

Which of the following command-line commands enables a full system shutdown and restart of an MS Windows host after a time-out period of two minutes?

ipconfig /release and ipconfig /renew

Which of the following command-line commands in MS Windows are used for resetting the DHCP configuration settings for all adapters? (Select 2 answers)

Netboot. PXE.

Which of the following enable installation of an OS via network interface? (Select 2 answers)

Media Center

Which of the following is a Microsoft Windows home theater software included in MS Windows versions prior to Windows 10?

SSE2

Which of the following is a complimentary instruction set that extends the capabilities of a CPU?

CDFS (Compact Disc File System)

Which of the following is a file system designed for optical media?

shutdown /s /t 60

Which of the following is the correct command for setting the time-out period of 60 seconds before powering off a Windows host?

Recovery partition

Which of the following replaced removable media used for reformatting hard drives and restoring an operating system to the original factory condition?

Permission to modify and redistribute the application. Free access to the application code.

Which of the following statements describe the characteristic features of open-source applications and OSs? (Select 2 answers)

Image deployment.

Which of the installation types provides a simpler and less costly alternative to manual OS installation in an environment consisting of multiple hosts requiring the same configuration settings?

cd..

Which parameter of the cd command in Windows moves the command-line prompt one folder up in the directory tree (sets the prompt at the parent folder of the current folder)?

/a

Which shutdown command switch enables aborting a system shutdown?

/r

Which shutdown command switch in Microsoft Windows Command Prompt forces full system shutdown and restart of a Windows host?

Does not affect user applications. Preserves application configuration settings. Does not affect user files.

Windows repair installation: (Select 3 answers)

Which of the Windows network profiles imposes the strongest security settings?

Public

.py

Python file extension #!/user/bin/python3

A system administrator would like to prioritize network traffic by application type. Which of the following technologies would be the BEST choice for this task? A) WoL B) BIOS C) ICMP D) QoS E) TRACEROUTE

QoS; -QoS (Quality of Service) describes the process of prioritizing certain traffic flows over others. In Windows, QoS policies can be created based on DSCP (Differentiated Services Code Points) fields.

Which format type in MS Windows does not erase disk data?

Quick format

Sam is a manager in the accounting department at a company's remote site. She is connecting to the main office over a VPN connection and uses her Windows username and password during the VPN authentication process. Which of the following have been configured on the VPN concentrator to allow Windows-based credentials? A) WPA2 B) RADIUS C) IPsec D) AES E) SSL

RADIUS; -RADIUS (Remote Authentication Dial-in User Service) is commonly used to centralize authentication between devices.

A technician needs to view and control the desktop of a Windows computer in a different location. Which of the following would be the BEST choice for this requirement? A) SSH B) RDP C) Telnet D) SNMP E) VNC

RDP; -RDP (Remote Desktop Protocol) is the built-in screen sharing protocol in Windows. If a different operating system was in use, a similar utility would be VNC (VIrtual Network Computing) that uses the RFB (Remote Frame Buffer) protocol.

ROBOCOPY

ROBOCOPY stands for ROBUST COPY FOR WINDOWS. Robocopy will copy files and directories, as well as file attributes, timestamps and other small details. ROBOCOPY also has more switches than COPY OR XCOPY.

True

Rainbow tables are lookup tables used to speed up the process of password guessing.

shutdown -r

Reboot after shutdown

RSSI

Received Signal Strength Indicator - an index level calcuated from signal strength. If it the connection speed is below the RSSI minimum the wireless adapter will drop the signal

network topology

Refers to the geometric arrangement of the actual physical organization of the computers and other network devices) in a network

Which of the following tools do you used on a Windows 10 machine when the Microsoft guidance directs you to edit a registry key?

Regedit

REGEDIT

Registry Editor

A medical imaging company maintains a large database of customer information. Which of the following should be used to ensure that the company meets all applicable laws regarding the storage of this information? A) Acceptable Use Policy B) End User License Agreement C) Service Level Agreement D) Regulatory and compliance policy E) Risk Analysis

Regulatory and compliance policy; -It's important for companies to understand the legal requirements associated with data, and many organizations will have formal policies that determine how the organization should handle this information.

ipconfig /release AdapterName

Release the IP address obtained from a DHCP server so the network adapter will no longer have an IP address

An application on a Windows desktop is showing an error message each time it is launched. The application then closes without any additional messages. Which of these would be the BEST way to get more information about this error? A) System Information B) Reliability Monitor C) Registry Editor D) Task Manager E) DirectX Diagnostic Tool

Reliability Monitor; -The Windows Reliability Monitor will identify application errors and provide a summary of the problems over time. Reliability monitor also can view the technical details of the issue and perform a check to see if a solution is available.

RADIUS

Remote Authentication Dial-In User Service - a type of authentication suitable for server and domain based networks

RADIUS

Remote Authentication Dial-In User Service - under this protocol Authentication, Authorization, and Accounting are performed by a seperate server

mstsc.exe

Remote Desktop

macOS features enables access to optical drive of another computer over a network

Remote Disc

What should you do to secure the built-in admin and guest accounts on any Windows machine?

Rename them

You work for a company based in Phoenix, Arizona, which is a very hot and dry area. Several people in the research department have reported that even though their files are printing to their laser printer correctly, a much lighter copy of the same text also prints within 2 to 3 cm of the original text. Which of the following would MOST likely fix this type of ghosting image?

Replace the imaging drum, as it is probably at end of life.

A user has started their computer and received this message on their wired Ethernet connection: "The connection has limited or no connectivity." Which of the following would be the BEST next troubleshooting step? A) Reboot the computer B) Check the wireless configuration C) Reseat the network cable D) Update the network drivers E) Reboot the local router

Reseat the network cable; -If a device is not able to communicate across the network, then the first step is to confirm that the local device shows link lights and a proper network connection.

ping -a IPaddress

Resolves address to hostnames

Which tool can you use to display hardware utilization statistics that tell you about the operation of your computer?

Resource Monitor

shutdown -r now

Restart the system immediately

True

Restarting a PC regularly might help in resolving slower performance issues as it shuts down all background processes and clears out the system memory.

The System Protection tab of the System Properties (sysdm.cpl) utility in Windows provides:

Restore points

All copies of incremental backups made since the last full backup. Copy of the last full backup.

Restoring data from an incremental backup requires: (Select 2 answers)

True

Restoring the entire system from a known good backup copy is the most reliable method for effective malware removal.

What type of malware commonly infects core operating system files and can hide from traditional anti-malware software? A) Botnet B) Worm C) Rootkit D) Trojan E) Ransomware

Rootkit; -A rootkit often modifies core operating system files to effectively become invisible to the operating system and anti-malware utilities.

When you print from your laser printer, the paper contains faint images from previous printouts. Which of the following components is MOST likely the cause? (Select TWO).

Rubber scraper Fluorescent lamp

Win + R

Run Prompt

After performing an update to Windows 10, this message is seen when rebooting: "Missing operating system." There is no media in any drives and no USB drives are connected. Which of the following would be the BEST next troubleshooting step? A) Run Startup Repair B) Boot into Safe Mode C) Perform a driver update D) Disconnect from the network and reboot E) Check Reliability Monitor

Run Startup Repair; -The Windows 10 Startup Repair process can automatically identify and resolve many different startup issues.

regedit/regedt32

Run-line utilities for editing the Windows Registry.

A system administrator would like to restart a Windows 10 computer while connected to a command prompt. Which of the following would provide this functionality? A) REBOOT B) RESTART C) BOOT D) POWER E) SHUTDOWN

SHUTDOWN; -The Windows SHUTDOWN command can be used to shutdown a computer from the command line, or to shutdown and restart the system.

Which of the following would be the best way to block spam? A) VPN B) MAC filtering C) ACL D) Least privilege E) SMTP filtering

SMTP filtering; -Unsolicited email messages are best filtered at the SMTP email relays.

What is name of the utility that is (1 similar to Telnet and (2 used to establish a secure remote server management session?

SSH

A network administrator would like to prevent a wireless network name from appearing in the list of available networks. Which of the following would provide this feature? A) MAC filtering B) URL blacklisting C) Wi-Fi Protected Setup D) Update the default password E) SSID broadcast suppression

SSID broadcast suppression; -The SSID broadcast is used to populate the list of available wireless networks on a client device.

SOX

Sarbanes-Oxley Act. This law requires publicly traded companies and their independent auditors to demonstrate that their numbers are accurate and that they have processes in place to ensure accurate reporting. Several sections of the law have important implications for human resource activities.

You have determined that a block-level file corruption on the disk has damaged the driver files for a critical piece of hardware. Multiple reboots have failed to correct the problem. You open device manager, what is step 2 to fix this error?

Scan for hardware changes

sfc /scannow

Scans integrity of all protected system files and repairs files with problems when possible.

A desktop administrator has just scanned and removed some malware from a system. Which of the following would be the BEST next step in the removal process? A) Schedule scans and run updates B) Disable System Restore C) Educate the end user D) Quarantine the infected system

Schedule scans and run updates; -Now that the malware is gone, it's important to make sure the system remains clean by updating the operating system and scheduling periodic scans.

A desktop administrator has just scanned and removed some malware from a system. Which of the following would be the BEST next step in the removal process? A) Schedule scans and run updates B) Disable System Restore C) Educate the end user D) Quarantine the infected system E) Get some antibacterial wipes

Schedule scans and run updates; -Now that the malware is gone, it's important to make sure the system remains clean by updating the operating system and scheduling periodic scans.

Which of the following built-in macOS tools enables remote access to another Mac computer?

Screen Sharing

True

Screensaver password requirement falls into the category of password best practices. A password-protected screensaver allows to block access of unauthorized persons to a user's workstation in situations where the user is forced to leave their desk.

grep

Search file(s) for lines that match a given pattern

Which of the following features of Bitlocker is unavailable without a TPM 2.0 module?

Secure Boot (preboot security)

SSH

Secure Shell is a network protocol for secure transfer of data between computers on port 22

Which of the following are required to connect a Windows device to an 802.11 wireless network? A) Speed B) Alternate IP configuration C) Duplex D) Security type E) Smart card

Security type; -Wireless network configurations require the configuration of a security type (such as WPA2 or WPA2-Enterprise) and an encryption type (i.e., AES).

winsat formal

See how the video, CPU and HDD/SSD performs

SCM

Service Control Manager (SCM) is a special system process under the Windows NT family of operating systems, which starts, stops and interacts with Windows service processes. It is located in the %SystemRoot%\System32\services.exe executable.

Which of the following tools would you use to determine service dependencies?

Services

What would you use to restart a stopped instance of the SQL Service?

Services.msc

Print Management

Set properties and monitor local printers and manage print sharing on a network

Transmit Power

Sets radio power level, typically set to the highest level by default

mkswap command

Sets up a Linux swap area on a device or in a file. The device argument will usually be a disk partition (something like /dev/sdb7) but can also be a file.

Server Room Temperature

Should not dip below 50 degrees Fahrenheit, and should not exceed 82 degrees Fahrenheit. The optimal temperature range is between 68 and 71 degrees

netstat -b

Shows the process that has opened the port

Three most effective types of physical data destruction?

Shredding, Incineration, Degaussing

SPOF

Single Point of Failure

What would you call an authentication solution that enables a user to access multiple systems (such as your network and a cloud-based service) with your network login, despite the second service normally needing a separate username/password?

Single Sign-on (SSO)

True

Some of the Windows services require other background applications to run. If a service fails to start, one of the ways for troubleshooting such problem is to check whether all required components for a given service are also up and running. In MS Windows, the list of all connected services for a given service can be found by launching the Services (services.msc) utility, right-clicking on a service, selecting Properties, and checking the Dependencies tab.

macOS features allows to create switchable desktop environments

Spaces

What term best describes an attack that involves sending an email addressed to everyone in your company, that appears to come from an internal address and requires your network credentials in order to open an attachment, all in an attempt to steal the credentials?

Spear phishing

Fran is looking for a file on her macOS system that contains certain words and phrases. Which of the following would be the BEST way to locate these files on Fran's computer? A) Finder B) Spotlight C) iCloud D) Boot Camp E) Keychain

Spotlight; -The Spotlight features of macOS will search for files, apps, images, and other operating system objects.

After receiving several complaints from the employees in your company, you start to troubleshoot a laser printer. After a short while, you have concluded that the most probable cause is a dirty drum. Which of the following is the MOST logical reasons for this conclusion?

Spots at regular intervals on the page

A system administrator needs to install an application on approximately 100 workstations around the company offices. Which of these installation methods would be the best choice for this task? A) Install the application from USB drive on each user's workstation B) Send a DVD-ROM with the application to each user C) Stage the application on a central server D) Provide a download link to the developer's registration page

Stage the application on a central server; -Most organizations will stage applications on a central server to streamline the installation process.

Which formatting type in Windows 7/8/8.1/10 prevents data recovery by overwriting the contents of hard drive sectors?

Standard format

Step 3 of typically used applications in a windows 10 upgrade readiness plan:

Start the upgrade process

A system administrator needs to allocate virtual disks to a new virtual machine. Which of the following would be the BEST choice for this task? A) RAID array B) Storage space C) SSDs D) 7200 RPM hard drives E) Shared drive

Storage space; -Storage spaces are commonly used to allocate storage space to a virtual machine.

Which data type BEST describes this variable: name="Professor Messer"? A) Floating point B) Integer C) Boolean D) String E) Array

String;

copy /y

Suppresses overwrite prompts

Windows 7 Starter Upgrade Windows 7 Home Basic Upgrade Windows 7 Home Premium Upgrade Windows 7 Professional Install Windows 7 Enterprise Install Windows 7 Ultimate Install

Switching from Windows 7 to Windows 10 Home edition can be performed either via an upgrade or clean installation. Match each Windows 7 edition on the left with the correct upgrade option from the corresponding drop-down list.

A Windows Control Panel applet used for managing local (offline) versions of files and folders stored on the network is known as:

Sync Center

Virtual memory (Paging File) Configuration Options:

System applet in Control Panel -> Advanced system settings -> Performance -> Settings -> Advanced -> Virtual memory Windows Run dialog box -> type in sysdm.cpl + press Enter -> Advanced tab -> Performance -> Settings -> Advanced -> Virtual memory

Image backup

System backup that stores all information on the system including the operating system, programs, settings, and data. Most recent image backup programs also support restoration of individual files.

SMTP port

TCP 25

VNC Port

TCP 5900

As you troubleshoot a problem during a customer appointment, you discover the problem is directly related to the customer's actions. Which of the following is the BEST way to address the situation?

Tactfully explain the problem without accusing or judging the customer.

During an annual data center cleanup, a system administrator has found a closet with 10 CRT monitors. Which of the following would be the BEST way to dispose of these? A) Contact the CRT manufacturer for pick up B) Throw them out with the normal office trash C) Take them to a hazardous waste facility D) Swap out the tube for an LCD display

Take them to a hazardous waste facility; -CRT (Cathode Ray Tube) display glass often contains lead, so disposing of those monitors requires professionals at a hazardous waste facility.

A system administrator needs to view the real-time memory usage on a Windows 10 workstation. Which of these would be the best choice for this requirement? A) System Configuration B) Task Manager C) Event Viewer D) System Information E) Device Manager

Task Manager; -Task Manager can provide a real-time view of processes, services, resource utilization, and more.

A Windows 10 computer is taking twenty minutes to boot into the Windows desktop after the login process. Which of these would be the BEST choice for troubleshooting this issue? A) VGA Mode B) Memory Diagnostics C) BCDEDIT D) Windows Update E) Task Manager

Task Manager; -Task Manager includes Startup and Services tabs that can be used to manage the executables that load during the startup process.

A system administrator is troubleshooting a system with many processes running in active memory. Which of the following would be the BEST way to administratively stop these processes from executing? A) Event viewer B) System Configuration C) Safe Mode D) Registry Editor E) Task Manager

Task Manager; -Task Manager will display a list of all running processes, their resource utilization, and the administrator can right-click to end the task.

Which of the following would be the BEST way to view real-time network utilization, IPv4 address, and IPv6 address of a Windows 10 workstation? A) ipconfig B) Services C) Device Manager D) msinfo32 E) Task Manager

Task Manager; -Task Manager's Performance tab provides a real-time breakdown of CPU, memory, disk, and network information.

A system administrator is troubleshooting a Windows server that is performing slowly due to an application with excessive CPU utilization. Which of the following would be the BEST way to identify this application? A) Task Manager B) MSINFO32 C) PS D) Event Viewer E) Explorer

Task Manager; -The Task Manager utility can provide a summary of CPU, memory, I/O, and other metrics for each application and service running on a Windows computer.

taskschd.msc

Task Scheduler

Which of the following utilities would you use to kill an unresponsive application?

Task manager

Allows to add/remove wired and wireless devices. Provides a simplified view of all connected devices. Allows to troubleshoot a device that isn't working properly

The Devices and Printers applet in Windows: (Select 3 answers)

128 primary partitions

The GPT partition style extends the MBR's primary partition limit to:

Connections

The Internet Properties applet tab containing an option for configuring VPN settings is called:

ext3

The Linux file system that was the first to support journaling, which is a technique that tracks and stores changes to the hard drive and helps prevent file system corruption. Max. 32, 000 subdirectories

False

The Local Security Policy (secpol.msc) administrative tool in home editions of MS Windows can be used by system administrators to modify account and local policies, public key policies and IP security policies for a local host.

Uninstalling applications. Conducting repair installation of a malfunctioning program. Adding/removing Windows components. Managing installed updates.

The Programs and Features Windows Control Panel applet can be used for: (Select all that apply)

False

The Security and Maintenance applet in Windows Control Panel provides access to Windows Firewall (Windows 7) / Windows Defender Firewall (Windows 8/8.1/10) configuration settings.

True

The Security tab of the Internet Properties utility in Windows allows for imposing restrictions on web content allowed in Microsoft Internet Explorer web browser.

sc.exe

The Service Controller utility is a powerful command-line utility for managing Windows services.

Tools

The System Configuration tab in MS Windows providing access to MMC snap-ins is called:

1. Double-clicking on the System Configuration icon shortcut in the Administrative Tools folder. 2. Typing msconfig (or msconfig.exe) in the Command Prompt and pressing Enter. 3. Pressing simultaneously the Windows and R keys, typing msconfig (or msconfig.exe) in the Run window, and pressing Enter.

The System Configuration utility in MS Windows can be launched by: (Select 3 answers)

Services

The System Configuration utility tab containing a list of background applications that can be enabled/disabled during system startup is called:

Restore points

The System Protection tab of the System Properties (sysdm.cpl) utility in Windows provides options for managing:

Active Directory

The Windows directory service that enables administrators to create and manage users and groups, set network-wide user and computer policies, manage security, and organise network resources.

True

The category of account management security best practices includes the practice of restricting user administrative privileges to operating systems and applications based on user duties. Operating systems simplify this process by introducing the concept of user groups equipped with different types of permissions which allow system administrators to simultaneously manage permissions of multiple user accounts based on group membership.

Which of the following is NOT true regarding Windows Defender Firewall? A) Rules can be created for inbound or outbound traffic B) The firewall has no visibility of specific applications C) Advanced Security rules include protocol and port options D) Authentication can be required with Connection Security rules

The firewall has no visibility of specific applications; -Windows Firewall can provide control based on application, IP address, port number, and more.

shutdown

The following command can be used for turning off or restarting a Linux host.

shutdown

The following command can be used to shut down or restart a local or remote host running MS Windows.

copy

The following command-line command can be used to copy one or more files from one location to another.

True

The function of the ODBC Data Sources (odbcad32.exe) configuration utility in Windows is to facilitate communication between applications and varying types of databases. (True or False)

odbcad32.exe

The function of the ODBC Data Sources configuration utility in Windows is to facilitate communication between applications and varying types of databases.

boot partition

The hard drive partition where the Windows OS is stored. The system partition and the boot partition may be different partitions.

No reply (request timed out)

The host cannot route a reply back to your computer

True

The importance of changing default usernames and passwords can be illustrated on the example of certain network devices (e.g. routers) which are often shipped with default and well-known admin credentials that can be looked up on the web.

True

The intermediary systems used as a platform for a DDoS attack are often referred to as zombies, and collectively as a botnet.

True

The maximum amount of supported physical memory for all editions (Core/Professional/Enterprise) of the 32-bit (x86) Windows 8/8.1 is 4 GB.

False

The maximum amount of supported physical memory for all editions (Home/Pro/Education/Enterprise) of the 32-bit (x86) Windows 10 is 8 GB.

Partitioning

The practice of dividing hard disk space into isolated logical storage units that behave like separate disk drives is known as:

Sideloading

The practice of installing mobile apps from untrusted sources (i.e. websites and app stores other than the official marketplaces) is called:

kill -SIGKILL

The process is forced to stop immediately and is not allowed to save its progress or perform cleanup.

Wireless site survey

The process of planning and designing new WLANs for optimal performance, security and compliance typically involves:

True

The process of securing a workstation should involve keeping track of available system updates and patches. A single PC running Windows can be updated and patched via the Windows Update service. A similar type of service that enables centralized management and distribution of updates and patches to multiple Windows-based hosts in a corporate environment is known as Windows Server Update Services (WSUS).

A system administrator has created a Windows share with a dollar sign ($) at the end of the name. Which of the following would BEST describe this share? A) Files in the share are encrypted B) The share is hidden C) Files in the share will inherit permissions D) The share is temporary E) Administrator access is restricted

The share is hidden; -A Windows share ending in a dollar sign is an administrative share that does not appear in the standard list of available shares.

Read when accessing the share remotely. Read when accessing the folder locally.

The share permissions on a shared Windows folder grant the user Full Control access and the local NTFS permissions grant the user Read access. Which of the following are the effective user permission levels? (Select 2 answers)

Read when accessing the share remotely. Modify when accessing the folder locally.

The share permissions on a shared Windows folder grant the user Read access and the local NTFS permissions grant the user Modify access. Which of the following are the effective user permission levels? (Select 2 answers)

kernel

The software component that provides the core set of operating system functions

A user is trying to broadcast a presentation from their tablet to a television in the conference room. When the user selects the broadcast option, the television does not appear in the available list of devices. Which of the following would be the MOST likely reason for this issue? A) The wireless network is too slow to support the broadcast B) The mobile device requires an OS upgrade C) The television is on a different wireless network D) The resolution is different between the tablet and the television

The television is on a different wireless network; -Using Apple Airplay, Google Cast, or similar technologies require that both the mobile device and the destination device are on the same wireless network.

True

The term "BranchedCache" refers to a Wide Area Network (WAN) bandwidth optimization technology implemented in some versions of MS Windows. BranchCache accelerates the process of serving network content by saving previously requested WAN resources on local servers or client computers which allows the subsequent requests to be served locally rather than from a remote server.

True

The term "Mantrap" refers to a physical security access control system used to prevent unauthorized users from gaining access to restricted areas by following another person. An example mantrap could be a two-door entrance point connected to a guard station wherein a person entering mantrap from the outside remains locked inside until he/she provides authentication token required to unlock the inner door.

Password length. Password complexity.

The two factors that are considered important for creating strong passwords are: (Select 2 answers)

boot sector virus

These attack the boot sector, partition table, and file system

RECIMG

This command configures a recovery image from which Windows can refresh the computer

TASKLIST

This command creates a list of applications and services currently running on a system. This command will ALSO give the PID, or Process ID number of a process or service.

COPY

This command is a simple copy command from one directory to another.

TASKKILL

This command is usually used to end a process using the PID.

DIR

This command means DIRECTORY - it will LIST, or show, the contents of a specific directory

GPUUPDATE

This command updates local and Active Directory group policy settings (VERY similar to the GPEDIT command).

CD

This command will CHANGE to a specified directory. DON'T BE FOOLED! The test will try to make you choose this for "CREATE DIRECTORY". That is MD - MAKE DIRECTORY

TREE:

This command will GRAPHICALLY display a directory and subfolders... Of course, since CMD is text only, we mean a text based graphic - see the example below:

MD

This command will MAKE A DIRECTORY (Or to put it simply... create a new folder)

RD

This command will REMOVE A DIRECTORY (or delete a folder)

REGEDIT

This command will allow an admin to alter Windows Registries.

DISKPART

This command will be used to manage computer drives/partitions/volumes/Virtual HDDs

BOOTREC

This command will be used to troubleshoot the operating system IF startup repair doesn't work. One VERY COMMON command is BOOTREC /FIXBOOT, which is the typical command to fix an error such as "BOOTMGR is missing".

IPCONFIG /FLUSHDNS

This command will clear the DNS resolver cache on that specific machine. Remember that when you first connect to a FQDN, a DNS server is contacted to resolve that web address to an IP Address that the computer can understand.

macOS

Time Machine is a built-in backup utility for:

A user would like to automate data backups on their macOS computer. Which of the following utilities would be the BEST choice for this task? A) Backup and Restore B) Versions C) Imager D) Time Machine E) Snapshot

Time Machine; -The macOS utility Time Machine is used to automatically create hourly data backups.

A macOS user has inadvertently deleted the contents of a spreadsheet. Which of the following would allow them to recover the data in this file? A) Disk Utility B) Time Machine C) Data Browser D) Imager E) Backup and Restore

Time Machine; -macOS provides Time Machine as a file and operating system backup utility. Time Machine integrates with the macOS Finder, and files can be restored based on a specific date and time.

What is the purpose of an MSDS?

To document how to safely handle and dispose of hazardous materials.

Why should backup media be stored offsite?

To prevent the same disaster from affecting both the network and the backup media

A system administrator uses a key fob to unlock the door to the data center. What type of access controls are associated with this lock? A) Deadbolt B) Token-based C) Conventional D) Multi-factor E) Biometric

Token-based; -A token-based key lock would be associated with an RFID badge, magnetic swipe card, or key fob.

TCP/IP

Transmission Control Protocol/Internet Protocol. Protocol that connects computers to the Internet. Tells computers how to exchange information over the Internet.

True

Transmission carried out in one direction only is described as a simplex mode. Communication that takes place only in one direction at a time is referred to as half-duplex mode. Two devices communicating with each other in both directions simultaneously are said to be in full-duplex mode. Network devices supporting autonegotiation feature automatically configure best mode supported by both devices. Duplex mismatch is the term used for a situation where two devices communicate with each other using different duplex modes.

True

USB locks are mechanical devices used for blocking a computer's USB ports from unauthorized access. USB locks can also be used to prevent the removal of an external USB device attached to the computer

A user is upgrading a laptop from Windows 7, and they mention that their Windows edition is running BitLocker. Which of these Windows editions is on this laptop? A) Ultimate B) Professional C) Home Premium D) Starter

Ultimate; -BitLocker is available in the Enterprise and Ultimate editions of Windows 7.

UDF

Universal Disk Format - updated file system for optical media with support for multi-session writing

What app in settings will let you recover a failed installation?

Update and security

Which settings app configures the Active Hours settings to prevent forced reboots when users are logged on?

Update and security

You have determined that a block-level file corruption on the disk has damaged the driver files for a critical piece of hardware. Multiple reboots have failed to correct the problem. You open device manager, what is step 4 to fix this error?

Update the drivers

A caller to the help desk has requested a password reset. The caller recommended that the reset take place quickly or the company's payroll process would not occur on time. Which of the following social engineering principles is this caller using? A) Familiarity B) Authority C) Trust D) Urgency E) Consensus

Urgency; -Urgency encourages people to act quickly without thinking, making it a useful strategy for a social engineering attack.

A system administrator has created a Windows image that will be deployed to all new workstations. However, a developer has just released a patch for an application that is part of the image. Which of these would be the best way to update this image with the latest software? A) Deploy the image, update the software, and reimage the device B) Update the image with SFC C) Perform a GPUPDATE to the image file D) Use DISM to upgrade the application E) Apply the application patch after deployment with PowerShell

Use DISM to upgrade the application; -The DISM utility allows the system administrator to manage Windows image files. DISM can perform application updates, driver upgrades, and more.

A technician at the corporate headquarters needs to view the screen of a client located in another country. The client is running Windows 10 Home on a laptop computer. Which of the following would be the easiest way to accomplish this screen sharing session? A) Use Remote Desktop Connection B) Install a third-party screen-sharing utility C) Have the client email screenshots to the technician D) Use Remote Assistance E) Configure the client's firewall for UPnP

Use Remote Assistance; -Windows Remote Assistance is the one-time remote access feature available by default in Home editions of Windows 7, 8.1, and 10.

An administrator has received a report that shows an excessive amount of network traffic to one particular wireless tablet. Which of the following would be the BEST way to identify this traffic? Run the netstat utility Disable the wireless interface Change the tablet's MAC address Connect the tablet to a wired network Use a WiFi analyzer

Use a WiFi analyzer; -A WiFi analyzer will identify all wireless communication to a device.

A technician is replacing a broken adapter card in a server. Which of the following would be the BEST way to prevent ESD during this replacement process? A) Replace the adapter while the computer is outdoors B) Use an anti-static strap C) Decrease the humidity in the work area D) Place the broken adapter in an anti-static bag

Use an anti-static strap; -ESD (Electrostatic Discharge) can damage components, so using an anti-static pad and strap will minimize the potential for ESD while working on a system.

You're conducting scheduled maintenance on a laser printer. You notice that there is a build-up of excess toner inside the interior of the printer. Which of the following is the BEST way to remove the excess toner?

Use an anti-static vacuum.

A customer who uses a Windows computer recently purchased an inkjet printer from your store. She is now calling to complain that the colors in the photos she printed on her new printer don't match the colors in the original photos created by the photo shop. Which of the following actions will MOST likely resolve the issue? (Select TWO).

Use the color management tab of the printer driver to calibrate the driver's color settings download and install the latest printer drivers

Which of the following actions would let you recover from a system failure with the least administrative effort?

Use the factory recovery partition

System Configuration Utility(msconfig)

Used to modify settings and files that effect the affect the way the computer boots in windows

True

Used without any parameters, the help command in MS Windows displays a list of available system commands along with a brief description of each command.

UAC

User Account Control. Informs you when a program makes a change that requires administrator-level permission, also adjusts the permission level of your user accounts

What is the best countermeasure against social engineering?

User awareness training

A new Windows 10 application requires the installation of a service during the setup process. Which of the following would be the MOST important consideration during the installation on a Windows 10 computer? A) OS compatibility B) Available RAM C) User permissions D) Available drive space E) Media type

User permissions; -An application that installs system components would require elevated permissions during the installation process.

A new Windows 10 application requires the installation of a service during the setup process. Which of the following would be the MOST important consideration during the installation on a Windows 10 computer? A) OS compatibility B) Available RAM C) User permissions D) Available drive space E) Media type F) How many minutes until quitting time

User permissions; -An application that installs system components would require elevated permissions during the installation process.

power user

User who requires the capabilities of a workstation or other powerful computer, typically working with multimedia applications and using industry-specific software.

A user is using a WWAN when out of the office. Which of the following would BEST describe this connection? A) Encrypted tunnel B) Uses WPA2 security C) Requires multi-factor authentication D) Uses cellular radio frequencies E) Uses SSID broadcasts

Uses cellular radio frequencies; -WWAN (Wireless WAN) is a common name for network connectivity using a mobile provider's network. WWAN adapters can be built into a laptop or mobile device, or the network can be access using a tether or hotspot function on a mobile phone.

System Properties > System Protection > System Restore

Uses the Shadow Copy service as a back-end (allowing block-level changes in files located in any directory on the volume to be monitored and backed up regardless of their location) and allows System Restore to be used from the Windows Recovery Environment in case the Windows installation no longer boots at all.

bootrec.exe

Utility is a tool provided by Microsoft in Windows Recovery Environment, or the Windows RE. Bootrec.exe is used in connection with: Master Boot Record (MBR) Boot Sector. Boot Configuration Data (BCD)

.vbs

VBScript Manage Server Back-end Microsoft Office

A Linux system administrator needs to remotely manage the graphical desktop of the Linux workstations in the manufacturing department. Which of these tools would be the best choice for this task? A) Remote Desktop B) VNC C) Terminal D) dd E) ssh

VNC; -There are many options for Linux remote desktop functionality, and VNC or VNC-compatible remote desktop applications are some of the more common options.

A Windows user needs to control the graphical display of a Linux workstation. Which of the following would be the BEST choice? A) RDP B) Telnet C) VNC D) SSH

VNC; -VNC (Virtual Network Computing) is a common remote control system for non-Windows computers.

Your organization employs a group of traveling salespeople who need to access the corporate home network through the internet while they are on the road. You want to funnel remote access to the internal network through a single server. Which of the following solutions would be BEST to implement?

VPN concentrator

True

VPN connection types are divided into remote-access VPNs (used for connecting a computer to a network), and site-to-site VPNs (used for connecting networks).

copy /v

Verifies that new files are written correctly.

Which of the following paper types should not be used in inkjet printers?

Very glossy paper

VNC

Virtual Network Computing - freeware that works over TCP port 5900 with similary functionality to RDP. Screen Sharing is based on VNC

True

Virus definition database files contain detection patterns for known viruses. To be effective, an AV program needs up-to-date versions of these files which can be obtained through an AV software update feature.

WEP (Wired Equivalent Privacy)

WEP uses a data encryption scheme that is based on a combination of user- and system-generated key values. The original implementations of WEP supported encryption keys of 40 bits plus 24 additional bits of system-generated data, leading to keys of 64 bits in total length.

A user is connecting to a wireless network using CCMP. Which of the following would be the MOST likely use of this protocol? A) TACACS B) WPA2-Enterprise C) TKIP D) WEP E) RADIUS

WPA2-Enterprise; -CCMP is the Counter Mode with Cipher Block Chaining Message Authentication Code Protocol used to provide security services on WPA2 wireless networks.

WPA2

WPA2-PSK and WPA2-Enterprise both use AES 128 bit keys (TK1 & TK2) for the data encryption. However that key is derived from a Master key (MK) that must be at least 128 bits long (key strength), and it depends on what provides the MK what the actual strength is.

Users at a SOHO location use an eight-digit code when connecting new devices to the wireless network. Which of the following would BEST describe this connection process? A) WEP B) SSID C) WPA2 D) WPS E) DHCP

WPS; -WPS (Wi-Fi Protected Setup) uses an eight digit PIN (Personal Identification Number) to connect devices to the wireless network.

WoL

Wake on LAN - Allows you to start up the computer remotely

A system administrator needs to perform operating system upgrades overnight while the systems are not in use. Which of these settings would assist the administrator with this task? A) Wake on LAN B) VPN Connection C) Auto negotiation D) QoS E) BIOS User Password

Wake on LAN; -Wake on LAN (WoL) provides a way to conserve energy on a workstation until a special Wake on LAN frame is sent to the device.

A solution that allows to turn on a network host remotely by sending a broadcast frame is called:

Wake-on-LAN

bootcamp

What Mac tool allows you to boot Windows or Mac?

Finder

What allows a user to view folders, applications, devices, and documents on a Macintosh computer?

Multiboot environment. Separated disk space used for virtual memory. Separation of user files from the operating system and application files.

What are the advantages of organizing hard drive space into multiple partitions? (Select 3 answers)

Primarily used for network access. Combines authentication and authorization. Encrypts only the password in the access-request packet.

What are the characteristic features of RADIUS? (Select 3 answers)

Suitable for large corporate networks. Requires RADIUS authentication server.

What are the characteristic features of a WPA/WPA2 Enterprise mode? (Select 2 answers)

Encrypts the entire payload of the access-request packet. Primarily used for device administration. Separates authentication and authorization.

What are the characteristics of TACACS+? (Select 3 answers)

1 GB of system RAM. DirectX 9 graphics device with WDDM 1.0 or higher driver. 16 GB of free hard disk space. 1 GHz CPU.

What are the minimum system requirements for 32-bit (x86) version of Microsoft Windows 7? (Select 4 answers)

1 GHz CPU with support for PAE, NX, and SSE2. 1 GB of system RAM. Microsoft DirectX 9 graphics device with WDDM 1.0 or higher driver. 16 GB of free hard disk space.

What are the minimum system requirements for 32-bit (x86) version of Microsoft Windows 8/8.1? (Select 4 answers)

Gaining unauthorized access to restricted areas by following another person.

What is tailgating?

On the Applications tab, right-click the program that isn't responding, click End Task button.

What is the correct sequence of steps required to close a non-responsive user application in Task Manager in Windows 7?

Access control

What is the function of a laptop's smart card reader?

Indicating whether a file has been modified since the last backup

What is the function of archive bit?

Changes file access permissions

What is the function of the Linux chmod command?

Changes file owner and group permissions.

What is the function of the Linux chown command?

iCloud

Which of the following Apple services enables remote mobile device backups?

Offline

Which of the following disk status options in Windows Disk Management utility indicates that a dynamic disk might be corrupted or intermittently unavailable?

regedit

Which of the following system utilities in MS Windows provides access to a database containing system configuration information?

WEP

Which of the following wireless security protocols has been discouraged in favor of newer standards due to known vulnerabilities resulting from implementation flaws?

WPS

Which of the following wireless technologies are deprecated and should not be used due to their known vulnerabilities? (Select 2 answers)

WAP power level controls

Which of the following would be of help in troubleshooting wireless signal loss and low wireless network signal coverage?

At least 8 characters

Which of the following would be the best recommendation for a minimum password length?

System restart

Which of the following would be the easiest step to troubleshoot the Blue Screen of Death (BSoD) in MS Windows?

tasklist /svc

Windows - shows a list of services within each process

LPL

Windows Logo'd Product List- catalog of tested devices and drivers

Ctrl+Shift+Esc key combination. Pressing Ctrl+Alt+Delete and selecting the Task Manager option from the menu screen. Right-clicking on the Windows Taskbar and selecting Task Manager. Typing taskmgr (or taskmgr.exe) in the Command Prompt and pressing Enter. Pressing simultaneously the Windows and R keys, typing taskmgr (or taskmgr.exe) in the Run window, and pressing Enter.

Windows Task Manager can be launched by: (Select all that apply)

Administrative Tools menu in Windows Control Panel

Windows Task Scheduler (taskschd.msc) is a component of Microsoft Windows that provides the capability to schedule the launch of programs or scripts at pre-defined times or after specified time intervals. Which of the following locations contains the application icon shortcut used for launching the Task Scheduler MMC snap-in?

A system administrator needs to verify that a Windows computer has received an important operating system patch. Which of the following utilities would be the BEST way to determine this? A) System Information B) Windows Update C) Patch Manager D) System Configuration E) Event Viewer

Windows Update; -Windows Update is used to keep the operating system up to date, automatically install updates, and view a history of installed patches.

shutdown -a

Windows aborts command prompt shutdown

.bat

Windows batch file

.bat

Windows batch file @ECHO OFF cd c:\source

Each Windows device on a network is configured to maintain its own set of user information. Which of the following would BEST describe this architecture? A) Domain B) Kerberos C) HomeGroup D) Workgroup E) Cluster

Workgroup; -A Windows Workgroup maintains an independent authentication database on each device, and the devices do not share this information. To globally change a user's password in a Windows Workgroup, you would need to change the credentials on each device.

Windows Workgroups

Workgroups typically consist of no more than twenty computers Logging on to any computer in the workgroup requires an account on that computer Each computer in the workgroup has its own security policy

A company has found that all of their servers have been infected by a virus that was able to replicate between systems without any user intervention. Which of the following would best describe this type of virus? A) Ransomware B) Worm C) Botnet D) Rootkit E) Spyware

Worm; -A worm is able to propagate between systems without a user manually downloading or executing a program.

Which of the following command line tools would you run to script the copy of all files (including hidden and system) from one directory to another?

Xcopy

yum

YUM (Yellowdog Updater Modified) is an open source command-line as well as graphical based package management tool for RPM (RedHat Package Manager) based Linux systems. It allows users and system administrator to easily install, update, remove or search software packages on a systems.

Your organization has 20 employees who need an accounting software update installed. Due to a miscommunication, the purchaser only paid to update 10 licenses. The software company issued a paper license and a single key for updating 10 users. Since this is an enterprise paper license, there is no mechanism that enforces a limit to the number of times the key can be used, so you decide to go ahead and update all 20 users. What are the possible consequences of this decision? (Select TWO.)

You expose your company to litigation by violating the software license agreement. You risk losing your job.

While using a Windows 10 system, you accidentally downloaded and installed a malware package from a phishing email exploit. You were able to reboot the system into Safe Mode and use System Restore to revert the system to a point in time before the malware infection occurred. Given this information, which of the following are true? (Select TWO).

You must reinstall any applications that were installed after the restore point was taken. Your user files were not affected when the system was reverted to the restore point.

In which of the following situations should you install a firewall?

You want to restrict internet users from accessing private data on your network.

What type of application attack takes advantage of a previously unknown vulnerability? A) Man-in-the-middle B) Spoofing C) Social engineering D) Brute force E) Zero day

Zero day; -A zero day attack is an exploit against a vulnerability that has not previously been identified.

A system administrator has discovered malware on a computer. The computer has all of the latest security patches and is up to date with the latest anti-malware signatures. Which of the following is the MOST likely reason for this malware infection? A) Brute force attack B) Denial of service C) Zero-day attack D) Spoofing E) Man-in-the-middle attack

Zero-day attack; -A computer that already has all of the latest patches and updates could have been infected by unknown zero-day malware that has not previously been seen in the wild.

A way to find out if a device has been rooted is to download and run the Root Checker Basic app. What type of condition and device does Root Checker Basic report on? a) Jailbroken iOS device b) Rooted Android device c) Rooted iOS device d) Rooted Windows Phone device e) Jailbroken Android device

b) Rooted Android device Root Checker Basic is a free app. that produces a report showing whether an Android device has been rooted or not. In regards to terminology Android and Windows Phone devices are said to "rooted" while iOS devices are referred to as "jailbroken".

You work as the IT administrator for a small startup company. Lily's computer has two internal hard drives and runs Windows 10. She is concerned that she may accidently delete a file or that her primary hard disk may fail at some future time. She has come to you for suggestions about how to protect her files. Due to the size and revenue of this startup company, resources are somewhat limited. Which of the following would BEST protect Lily's files?

back up her files using file history

Wendy had been searching the internet for a great deal on jewelry. While looking at one site, a pop-up was displayed that told her she had just been chosen as the winner of a nice prize. Being excited to win, Wendy clicked on the link provided to claim her prize. The next day, when Wendy tried to turn on her computer, her computer displayed the Blue Screen of Death (BSOD). After interviewing Wendy, you suspect that the pop-up she clicked on installed some malicious software that has caused her computer to lock up. Which of the following is the BEST place to begin repairing Wendy's computer?

boot the computer from the windows installation disc and run startup repair

You have just received a call from one of your customers. He informs you that after turning his computer on, he received the following error: Error loading operating system BOOTMGR is missing Press Ctrl+Alt+Del to restart Every time he restarts his computer, the same error is shown. Which of the following tools is BEST for fixing this issue?

bootrec

A user complains that they can't launch Hyper-V from home. The user cannot even find the program settings. However, the user can access the Internet. In order to help this user, which question would you ask first? a) Can you access the company website? b) Can you ping the server? c) Which Edition of Windows is installed? d) What error message is being displayed?

c) Which Edition of Windows is installed? Since the user can access the Internet, there is no need to ask the user if he or she can access the company website access or ping the server. Since there is no error message, this would indicate that the user is using a Windows Edition that does not support Hyper-V. Windows 10 Pro, Enterprise, and Education Editions support Hyper-V. Windows 10 Home Edition does not. Answer: Which Edition of Windows is installed?

Who needs to approve a change before it is initiated? (Select TWO.)

change board client or end user

chown

change ownership in linux

chmod

change permission modifiers in linux

format D: /v: E

changes the name of drive D to drive E

Which of the following disk maintenance utilities optimizes the performance of your hard drive by verifying the file system integrity of a hard disk and fixing the errors it detects?

check disk

Which of the following utilities checks the disk for bad clusters?

chkdsk

A Linux administrator has been asked to change the group ownership of a documents folder on the accounting server. Which of these commands would be the best choice for this task? A) chmod B) group C) mv D) dd E) chown

chown; -The Linux chown command can change the owner and group information of an operating system object.

Identifies a set of rules or standards that define personal behaviors.

code of ethics

CDFS

compact disc file system - legacy file system used for optical disc media

You have just installed a new video card in Mark's computer. When you power on the computer, Windows automatically detects the new device and tries to locate an applicable device driver. Unfortunately, Windows cannot locate the required driver. Which of the following would be the BEST administrative tool to fix Mark's computer?

computer mangement

Data Sources

control connection to databases set up on the local computer, ODBC

Remote Settings location

control panel -> system properties -> remote settings

restore point

file that contains info about your systems configuration at a particular time, helps backup the computer.

Host Firewall

firewall implemented as software on the individual host computer

gpupdate

force a group policy update

format D: /fs:NTFS /x

forces the volume to dismount

format D: /fs:EXFAT

formats D drive to an exfat file system

A mobile device user is comparing methods for securing the device. Which of the following methods for securing a mobile device can affect the device's performance?

full device encryption

Which of the following would you use after rejoining a client machine that had lost its trust relationship to the domain?

gpupdate /force

taskkill /t /pid processid

halts any child processes

GREP

is a command that will SEARCH FOR A string of text

CHMOD

is a command that will allow a superuser to change permissions for a file.

APT-GET

is a command that will allow a superuser to change permissions for a file. Stands for "Aptitude Package Checker"

CHOWN

is a command that will change the group, change the owner, or BOTH for a directory.

RM

is a command used to delete directories (same as Remove Directory in Windows)

script file

is a text document containing commands for the operating system. The commands are run in the order they are listed

Vi

is a text editing command

MAC (Media Access Control) address

lA node's unique physical address, which is assigned to its network interface card (NIC) by the card's manufacturer.

grep

linux command used to search and filter contents of files displaying the lines that match the search string

netstat /?

lists all switches for the netstat command

LS

lists directory contents of files and folders

Component Services

located in Administrative Tools, enables you to register new server applications or reconfigure security permissions for existing services

A series of used clusters on the hard disk drive that are not associated with a specific file.

lost clusters

You have a workstation running Windows 10, 64-bit edition. A local printer connected to a USB port is shared so that other users can print to that printer. Users running 32-bit versions of Windows report that they can't install the driver for the shared printer. Users running a 64-bit version of Windows do not have any problems. Which of the following actions will MOST likely fix this problem? (Select TWO).

manually install the correct driver on each computer that is having a problem on your computer, add the x86 drivers

You have been asked to implement a network infrastructure that will accommodate failed connections. Which of the following network topologies provides redundancy for a failed link?

mesh

Which utility allows you to choose Selective Startup in Windows?

msconfig

A system administrator needs to connect to a remote Windows desktop at a remote site. Which of the following would provide this functionality? A) regedit B) services.msc C) mstsc D) defrag E) Explorer

mstsc; -The mstsc (Microsoft Terminal Services Client) is the executable name of the remote desktop connection client software.

What command lets you see a list of valid command parameters for the net use command?

net use /?

Which of the following commands will map the network drive x: to share "DATA" on the fileserver "SRV01" each time someone logs into the machine, but using the currently logged on user credentials?

net use x:\\SV01\data/persistent:yes /savecred

Displays active sessions, ports, sockets, and the local routing table.

netstat

mstsc

opens a Remote Desktop connection from command line

control + C

quits a running program in command prompt

4

r--

apt-get update

refresh the local database with information about the packages available from the repository

secure boot

restricts OS installation to trusted software

A system administrator is copying a large file over an unreliable satellite link. Which of the following would resume the copy process if the link were to fail and recover? A) copy B) dism C) net copy D) cp E) robocopy

robocopy; -The robocopy (Robust Copy) command includes a resume feature that will continue the copy process if a network connection bounces.

6

rw-

7

rwx

Standby/Sleep Mode

saves current session to memory and put the computer into a minimal power state

hibernate mode

saves the current session from RAM to HDD before powering off the computer

chkdsk C: /r

scans and attempts to recover bad sectors on drive C

An administrator configures the Time Machine application on Mac OS computers and develops scripts that use the tar command on Linux computers. Which of the following best practices is the administrator following?

scheduled backups

spotlight

search tool to find documents

You have a computer that runs Windows 10. Where would you go to verify that the system has recognized the anti- malware software installed on the system?

security and maintenence

Activation Lock/Device Protection

services that work in the device firmware that prevents restores or the disabling of location services

Which of the following commands would you run to check and fix protected operating system files?

sfc

Resource Monitor

shows an enhanced version of the sort of snapshot monitoring provided by task manager

PWD

shows the name of the current directory. ***PWD stands form "Print Working Directory", not Password***

net user dmartin

shows the properties of the dmartin account

shutdown -t 30

shuts the computer down in 30 seconds

Which of the following is not a form of biometrics?

smart card

format D: /a:512

specifies the size of allocation units

While changing the toner cartridge in your laser printer, you accidently spill toner in and around the printer. Which of the following is the BEST method for cleaning up the spilled toner?

use an anti-static micro-filtering vacuum

Aubrey, an employee in the marketing department, has told you that when she prints to her laser printer, faint ghost-like images are being printed on her new page. As an IT administrator, you check with other employees who use the same printer and find that they are not experiencing the same problem. Which of the following would be the BEST fix for this issue?

use preprinted paper that has been printed with laser-compatible printer toner

asymmetric encryption

used in public key encryption, it is scheme in which the key to encrypt data is different from the key to decrypt.(uses an RSA cipher)

chown command

used on Unix-like systems to change the owner of file system files, directories

PASSWD

used to change a user's password

CP

used to copy a file

Gpfixup

used to fix domain names dependence in group policy

defrag

used to recover fragmented disk space

SHUTDOWN (Lynux)

used to shutdown a linux system.

Logical controls

user authentication login, firewalls, anti-virus software

2

-w-

3

-wx

HOSTS file location in Linux

/etc/hosts

Which option, used with the copy command, makes sure that all copied files are written correctly after they have been copied?

/v

Minimum system requirements for 32-bit (x86) version of Microsoft Windows 7

1 GHz CPU 1 GB of system RAM DirectX 9 graphics device with WDDM 1.0 or higher driver 16 GB of free hard disk space

How many primary partitions are support on GPT disks?

128

What is the IPv4 address of the workstation?

169.254.201.11

What is the subnet mask?

255.255.255.0

32bit vs. 64bit

32-bit Processor: 4GB RAM or less (Windows) Maximum of 4 GB (2^32 bytes) of memory 64-bit Processor: Theoretical maximum of 18 EB (2^64 bytes). Practical limit is 8 TB of addressable RAM Limitations + Software Compatibility

Which port must be opened in the firewall of a Windows system so that a Remote Desktop connection can be established?

3389

What is the effective upper limit for RAM in 32-bit processing?

4GB

sector

512 bytes on a disk

exFAT

64 bit Extended File Allocation Table used for large capacity removable hard drives and flash media.

You want to build a new system that supports 6 GB of memory. Which of the following will be the MOST important consideration when building the computer?

64-bit processor

To connect to the corporate wireless network, a user must authenticate with their Windows Domain credentials. Which of these would describe this process? A) 802.1X B) MAC filtering C) SSID broadcasting D) WPS E) Wireless encryption

802.1X; -802.1X is a common way to limit access to a network port on a wired or wireless network. 802.1X is a type of network access control (NAC), and it commonly integrates with a centralized authentication database.

exFAT (Extended File Allocation Table)

A 64-bit version of the file allocation table file system designed for use on large USB flash drives. No realistic file-size or partition-size limits.

Programs and Features

A Control Panel applet that enables the user to uninstall or repair applications.

Folder Options

A Control Panel applet used to control views in Windows Explorer. + View hidden files - Hide extensions - General options - View options

A technician is investigating the cause of a Windows 7 PC running very slow. While reviewing Task Manager, the technician finds one process is using more than 90% of the CPU. Outbound network traffic on port 25 Is very high, while Inbound network traffic Is low. Which of the following tasks should be done FIRST? A Disconnect the network cable. B. Update the antivirus software. C. Run an antivirus scan. D. Shut down the PC

A Disconnect the network cable.

pwd

A Linux command displaying an absolute path to (i.e. full filename of) the current working directory is called:

grep

A Linux command-line command that enables searching files for lines containing a match to a given text pattern is called:

ifconfig

A Linux command-line utility used for displaying and modifying network interface configuration settings is called:

Cron

A Linux utility which schedules a command or script on your server to run automatically at a specified time and date. A cron job is the scheduled task itself. Cron jobs can be very useful to automate repetitive tasks.

Surge suppressor

A device designed to protect electronic devices from large voltage fluctuations is called:

UPS

A device designed to provide emergency power during an unexpected main power source outage is called:

Archive Bit

A file attribute that can be checked (or set to "on") or unchecked (or set to "off") to indicate whether the file needs to be archived. An operating system checks a file's archive bit when it is created or changed.

WHAT'S A DIRECTORY?

A folder

Windows Administrative Tools

A folder in Control Panel that contains tools for system administrators and advanced users.

Phishing. Social engineering.

A fraudulent email requesting its recipient to reveal sensitive information (e.g. username and password) used later by an attacker for the purpose of identity theft is an example of: (Select 2 answers)

Which of the following is the most common result when a Windows computer does not receive an IP address from a DHCP server? A) The IP address of 0.0.0.0 is assigned B) The network adapter is disabled C) A link-local address is automatically assigned D) The user is prompted to assign a manual IP address E) A static IP address is automatically assigned

A link-local address is automatically assigned; -If a Windows computer is not able to receive a DHCP-assigned IP address, it will automatically assign a link-local address using APIPA (Automatic Private IP Addressing).

dd

A low-level utility that can be used for creating/restoring filesystem backup copies in Linux is called:

Finder

A macOS file manager application is known as:

Mission Control

A macOS system feature providing single-screen thumbnail preview of all open windows and applications is known as:

Bot

A malware-infected networked host under remote control of a hacker is commonly referred to as a:

Local Users and Groups

A managment console that provides an interface for managing user and group accounts.(not available in Starter or Home editions)

Physical Address Extension (PAE)

A memory management feature that allows 32-bit CPUs to use more than 4 GB of physical memory on capable versions of Microsoft Windows operating systems

GPS

A mobile device's built-in functionality enabling the usage of locator applications is known as:

WinSAT.exe (Windows System Assessment Tool)

A module of Windows operating system and is found in the control panel. Its purpose is to evaluate the performance of your computer and the hardware capabilities which it is running. It reports the results as Windows Experience Index (WEI) score.

tracert

A network command-line utility in MS Windows that tracks and displays the route taken by IPv4 packets on their way to another host is called:

DHCP

A network protocol providing an alternative solution to the manual allocation of IP addresses is known as:

DHCP (Dynamic Host Configuration Protocol)

A network service that provides automatic assignment of IP addresses and other TCP /IP configuration information.

BranchCache

A new feature of Windows 7 that enables users to rapidly access data from remotely located file and web servers. This enables users at a small branch to cache copies of frequently accessed files from head office servers on a local computer.

hash

A number generated by an algorithm from a text string.

Advanced Package Tool (Linux)

A package management system most often used on Debian and Debian-based Linux distributions e.g. apt-get

ACL

A rule-based access control mechanism implemented on routers, switches, and firewalls is known as:

Spotlight Search

A search tool in the macOS

recovery partition

A section of a hard disk that contains the files necessary to restore a computer's hard disk contents to factory condition

TKIP (Temporal Key Integrity Protocol)

A security protocol created by the IEEE 802.11i task group to replace WEP.

TKIP

A security protocol designed to strengthen WEP implementations is known as:

True

A security rule that prevents users from accessing information and resources that lie beyond the scope of their responsibilities is known as principle of least privilege.

iCloud

A service that enables storage of data on Apple cloud servers is called:

Administrative Tools folder in Control Panel

A shortcut icon to the Windows Memory Diagnostic tool (mdsched.exe) can be found in:

Notepad

A simple Windows text-editing utility that can be launched from any place in the Command Prompt without the need for specifying path to the application's executable file location is called:

Shoulder surfing

A situation in which an unauthorized person can view someone's display or keyboard to learn their password or other confidential information is referred to as:

Phishing

A social engineering technique whereby attackers under disguise of a legitimate request attempt to gain access to confidential information they shouldn't have access to is commonly referred to as:

Wake-on-LAN

A solution that allows to turn on a network host remotely by sending a broadcast frame is called:

WPS

A solution that simplifies configuration of new wireless networks by enabling non-technical users to easily set up new networks, configure network security settings, and add new devices to an existing network is known as:

A combination of characters from at least 3 character groups

A strong password that meets the password complexity requirement should contain: (Select the best answer)

Virtual Private Network (VPN)

A system that uses public network (such as the Internet) as a means for creating private encrypted connections between remote locations is known as:

MBSA (Microsoft Baseline Security Analyzer)

A tool available as a free download that can check one or more systems for potential security issues.

Clean install

A type of Windows installation that erases the contents of target partition is called:

Active Directory

A type of hierarchical database structure used in Windows Server environments that enables centralized management of devices and resources on a network is known as:

RFID badge

A type of identification badge that can be held within a certain distance of a reader device to authenticate its holder is called:

IP address

A type of logical numeric identifier assigned to every single computer host or other device on a TCP/IP-based network is known as:

HFS

A type of proprietary file system used in Apple OSs is known as:

True

A type of software that performs unwanted and harmful actions in disguise of a legitimate and useful program is known as a Trojan horse. This type of malware may act like a legitimate program and have all the expected functionalities, but apart from that it will also contain a portion of malicious code that the user is unaware of.

Full duplex

A type of transmission that takes place in two directions simultaneously is known as:

Shell

A type of user interface that enables the execution of operating system commands is commonly referred to as:

Screen lock

A user interface element controlling access to a mobile device after the device is powered on is called:

Boot Camp

A utility on macOS that allows a full windows installation to be made on a Mac. Applications ->Utilities folder

A system administrator has started the Disk Management utility and finds that one of the drives in the server is labeled as "Healthy (At Risk)." Which of the following would best describe this message? A) A RAID 1 volume is synching data between the drives B) A volume has experienced a number of input/output errors C) The volume is working normally D) A RAID 5 volume is recreating data based on the parity information E) The volume is initializing

A volume has experienced a number of input/output errors; -A Healthy (At Risk) label shows that the drive is still operational, but a number of errors have occurred with reading or writing information. A best practice would be to backup the volume data and run some diagnostics on the drive.

Which type of security token is the least vulnerable to malware? a) Hardware token b) Software token c) Badge reader d) None of these

A) Hardware Token Hardware security tokens are standalone devices that provide a higher level of security than software tokens. Hardware tokens are often used with smart devices.

When formatting a large capacity drive what situation would cause it to format at a lower capacity when you set it up in an operating system? a) Operating system overhead. b) The new drive is not IDE compatible. c) The ram does not support the larger capacity hard drives. d) The disk is full.

A) Operating System Overhead The operating system uses a portion of the drive for file allocation, boot records and other overhead. The formatted capacity never matches the actual drive size.

You are responsible for managing remote users. Their connections must adhere to the AAA management model. Which service would you choose? a) RADIUS b) PPP c) Dialup-Call back d) TACACS+

A) RADIUS RADIUS (Remote Access Dial-in User Service) provides the required Authentication, Authorization, and Accounting services needed for the AAA management model. Another viable option would be TACACS+ (Terminal Access Controller Access Control Service Plus) which is secure but lacks Authentication and Authorization functions.

The ALT+TAB keystroke produces which result in Windows 10? a) Switches between open programs. b) Closes the open program. c) Opens the closed program. d) Opens the Start Menu.

A) Switches between open programs.

Which of the following will: (1) help prevent malware from installing itself; and (2) protect the Windows configuration and other settings? a) The UAC box b) Shared permissions c) Workgroup security with user accounts and passwords d) Advanced encryption technologies

A) the UAC box

In which of the following file extension types would a user expect to see the command. "net use T:\\server\files'? A. .bat B. .vbs C. .js D. .py

A. .bat

Which of the following is the MOST secure wireless security protocol? A. AES B. WPA C. WPA2 D. WEP

A. AES

Which of the following security methods BEST describes when a user enters a username and password once for multiple applications? A. SSO B. Permission propagation C. Inheritance D. MFA

A. SSO

A MAC user's operating system became corrupted, and files were deleted after malware was downloaded. The user needs to access the data that was previously stored on the MAC. Which of the following built-in utilities should be used? A. Time Machine B. Snapshot C. System Restore D. Boot Camp

A. Time Machine

A SOHO technician needs to upgrade two computers quickly and is not concerned about retaining user settings. The users currently have Windows 8 and want to upgrade to Windows 10. Which of the following installation methods would the technician MOST likely use to accomplish this quickly? A. Unattended installation B. Remote network installation C. In-place upgrade D. Clean installation

A. Unattended installation

After a virus has been spread unknowingly via USB removable hard drives, a technician is tasked with limiting removable hard drive access to certain network users. USB ports are used for many devices, including scanners, printers, and signature pads, so a policy is created to deny access to removable hard drives only. When testing the policy, a removable drive is plugged in but can still be accessed. Which of the following command-line tools should the technician use to apply the new policy? A. grupdate B. diskpart C. gpresult D. net use

A. grupdate

A junior Linux system administrator needs to update system software. Which of the following shell commands would allow the administrator to gain the necessary permissions to update the software? A. sudo B. chmod C. grep D. pwd

A. sudo

Which of the following can provide some protection for your network from outside invaders? (Choose all that apply) a) Firewalls b) Class 3 modems c) Class 2 modems d) Packet-Filtering Routers e) Hidden Files f) Proxy Servers

A/D/F Firewalls/Packet-Filtering Routers/Proxy Servers

A Windows 7 Professional computer is having boot problems. You investigate and decide that the problem may be related to a process being initiated by Internet Explorer. Which one of the following Advanced Options would you choose to correct the problem? a) Safe Mode with Networking b) Safe Mode with Command Prompt c) Safe Mode d) Enable Boot Logging

A: Safe Mode with Networking Remember, Safe Mode prevents startup files and most of the drivers from loading. This simplification of the system can give you the chance to troubleshoot and detect needed fixes. Safe Mode with networking will permit internet access. Answer: Safe Mode with Networking.

Which of the following would commonly be used by an organization to define the rules and expected behavior when accessing technology resources? A) EULA B) FOSS C) AUP D) GLBA E) HIPAA

AUP; -The AUP (Acceptable Use Policies) are used to document the expected use and rules associated with Internet use, phones, computers, mobile devices, and other technology resources.

Windows Remote Assistance Utility

Access based on one-time password Temporal remote access The host and invited user can both see the host's screen The host and invited user share control over host's mouse and keyboard Windows tool used for assisted remote troubleshooting sysdm.cpl > Remote > Allow Remote Assistance connections to this computer.

ACL

Access control list. Rules applied by packet filter firewalls that filter data by IP address, Protocol ID, and Port Numbers

Remote Disc

Access files on a remote Mac CD

Isolating the infected system

According to the CompTIA's best practice procedures for malware removal, disabling System Restore on a malware-infected Windows-based system should be performed as the next step after:

Scheduling scans and running updates

According to the CompTIA's best practice procedures for malware removal, enabling System Restore and creating a restore point in Windows should be performed as the next step after:

Disabling System Restore

According to the CompTIA's best practice procedures for malware removal, removing malicious software on a Windows-based system should be performed as the next step after:

Removing malware from the system

According to the CompTIA's best practice procedures for malware removal, scheduling scans and running updates on a Windows-based system should be performed as the next step after:

Win + A

Action Center

Which of the following is used to centrally manage accounts on a Windows network? A) System Configuration B) Server Message Block C) Active Directory D) Component Services E) ODBC Data Sources

Active Directory; -Microsoft Active Directory provides a centralized database for managing thousands of users on a Microsoft Windows network.

Consider the virtual memory configuration for the Windows 10 system shown in the exhibit. Given that this Windows 10 system has 16 GB of system RAM and three hard disks installed, which configuration change could you make to the paging file to increase system performance?

Add paging files to the E: and F: volumes.

Win + X

Administrative Tools

robocopy

Advanced utility to copy files and directory trees

Differential backup

All data modified since last full backup(moderate backup time, moderate restore time uses no more than two tape sets)

False

All modern applications are designed as cross-platform software which allows them to be run on different operating systems (e.g. Windows, Linux, or macOS) without any modifications in the application source code.

full backup

All selected data regardless of when it was previously backed up (high backup, time low restore time uses one tape set)

kill -SIGTERM

Allow the process to release its resources and save its progress before exiting.

Sideloading

Allowing "Unknown Sources" in Android security settings enables:

BranchCache

Allows computers at a local branch office to cache data from a file or web server on a WAN (wide area network). The data can be cached either on the client computers, in distributed cache mode, or on a local server, in hosted cache mode. By caching data locally, there is a reduction in WAN traffic and applications often respond faster due to using local files instead of retrieving them over the WAN.

Local Security Policy

Allows you to view and edit currenty security policy

Credential Manager

Allows you to view cached passwords for websites and Windows/network accounts

iOS

An Apple-proprietary OS designed for tablets, smartphones and mobile devices is called:

Services (services.msc)

An MS Windows Administrative Tools folder applet for managing background applications is called:

True

An MS Windows feature enabling automatic execution of code contained on a mounted drive is called AutoRun. Since disabling AutoRun decreases potential security risk related to the propagation of malware, Windows 7/8/8.1/10 have AutoRun disabled by default.

BitLocker

An MS Windows feature that enables full drive encryption is known as:

LocalSystem account

An account in which if a process is executed it is unrestricted in terms of making changes to the system configuration and file system (better than administrator account)

DoS attack

An attempt to flood the bandwidth or resources of a targeted system so that it becomes overwhelmed with false requests and in result doesn't have time or resources to handle legitimate requests is called:

SSO

An authentication subsystem that enables a user to access multiple, connected system components (such as separate hosts on a network) after a single login on only one of the components is known as:

True

An authenticator application is a software that generates additional authentication token (in the form of a random code) used in two-step verification process.

Spoofing. Social engineering.

An email sent from unknown source disguised as a trusted source known to the message receiver is an example of: (Select 2 answers)

%appdata%

An environment variable is a dynamic "object" on a computer, containing an editable value, which may be used by one or more software programs in Windows. Environment variables help programs know what directory to install files in, where to store temporary files, and where to find user profile settings.

True

An operating system cross-platform compatibility feature allows certain types of data files created on one type of OS to be seamlessly read and modified on a different OS type.

OWASP (Open Web Application Security Project)

An organization that maintains a list of the top 10 errors found in web applications. Identity and Authentication Controls: 1. Multi-factor Authentication 2. Session Handling 3. Secure Password Storage

A desktop technician will be shipping a set of adapter cards to another facility. Which of the following would be the BEST choice to protect against ESD during shipping? A) Styrofoam peanuts B) Antistatic bag C) Bubble wrap D) Packing foam

Antistatic bag; -An antistatic bag will minimize the chance of ESD (Electrostatic Discharge) when packing or unpacking the components.

Disk Utility

App in macOS used to verify or repair a disk or file system

A user would like to validate the safety of a mobile app before it is installed onto their phone. Which of the following would provide this information? A) Digital signature of the app B) App scanner results C) App developer web site D) Mobile device logs

App scanner results; -App scanners can provide a historical view of application usage and provide information regarding the safety of a mobile app.

Power Users

Appears in legacy applications but is deprecated because the rights allocated to this account type can be abused to allow the user Administrative or System privileges

Which of the following Windows Firewall exceptions provides the most control over a traffic flow? A) Port number B) Source IP address C) Destination IP address D) Application name E) Time of day

Application name; -Using an application name in a Windows Firewall rule allows the operating system to allow or deny traffic based on any application traffic flow, regardless of IP address or port number.

Share permissions in MS Windows

Apply only to network users Can be set on a folder level

Which of the following types of scripts would be seen on the user end of a web page? A. .bat B. .js C. .sh D. .vbs

B. .js

Which of the following is the amount of memory a user is limited to with a 32-bit version of Windows? A. 2GB B. 4GB C. 8GB D. 16GB

B. 4GB

A technician is disposing of computer hardware that contains PHI. The drive must be reusable. Which of the following methods should be used? A. Degauss B. Drive wipe C. Standard format D. Low-level format

B. Drive wipe

A user reports that a cell phone application is loading slowly and not functioning properly. Which of the following should a technician do FIRST to remedy this issue? A. Remove and reinstall the application. B. Hard reset the cell phone. C. Reconnect the wireless network connection D. Close all running applications

B. Hard reset the cell phone.

A network administrator needs to be able to securely connect to a local router from within the office. Which of the following protocols should the administrator ensure is enabled on the router? A. RDP B. SSH C. TFTP D. HTTP

B. SSH

You have a computer with a removable disk drive formatted with NTFS. You want the drive to use FAT32 so it is compatible with more operating systems. The drive is currently configured using drive letter D:. Which of the following MUST you complete to accomplish this task?

Back up the data on the D: drive. Reformat the D: drive using FAT32. Restore the data.

You are filling out a change order form. Toward its end, you explain how you will return affected hardware and software to its original state if the change fails. What is this plan called?

Backout Plan

A portion of the hard disk that cannot be used.

Bad sector

Disk storage types used with MS Windows

Basic & Dynamic: Dynamic disks provide features that basic disks do not, such as the ability to create volumes that span multiple disks (spanned and striped volumes) and the ability to create fault-tolerant volumes (mirrored and RAID-5 volumes). A newly added drive is by default partitioned as a basic disk.

True

Because the Guest account in MS Windows allows a user to log on to a network, browse the Internet, and shut down the computer, it is recommended to keep it disabled when it isn't being used.

True

Because wireless routers are shipped with default credentials, the process of securing a SOHO network should include changing the default username and password on a Wireless Access Point (WAP).

What do biometrics use to authenticate identity?

Biological attributes

A data center door lock will only open with a valid fingerprint. Which of the following would BEST describe this lock type? A) Token-based B) Somewhere you are C) Biometric D) Least privilege E) Proxy

Biometric; -A biometric lock uses a person's physical characteristics to determine access permissions.

Which of the following would be commonly used as a screen lock on a mobile device? A) Personal firewall B) Full device encryption C) Authenticator app D) Biometrics E) Geolocation

Biometrics; -There are many ways to provide authentication through a mobile device lock screen, and using a fingerprint or face recognition is a common method.

What is the name of a Microsoft Windows feature that allows for full volume encryption?

Bitlocker

Block-level backup

Block-level backup is a feature that allows to upload only the changed parts of files instead of whole files. In order to do that, it uses snapshot technology. Block-level backup software reads data in the same sized blocks as the file system, or the parameter is chosen by software developers

BCD

Boot Configuration Data

Which of the following do you make available first so that your network-based automated deployment can proceed with exclusive access to the installation volume?

Boot.wim

A network administrator has found that certain infected systems in their network are participating in a DDoS attack. Which of the following would best describe these systems? A) Bots B) Trojans C) Spyware D) Rootkit E) Worms

Bots; -Systems that are infected with botnet malware are under the control of a third-party and can be used to store data, participate in a DDoS (Distributed Denial of Service), or any other task required by the botnet owner.

Which of these technologies can be used to decrease file download times at remote locations? A) HTT B) Domain Services C) EFS D) BranchCache

BranchCache; -BrachCache is the Windows technology used to cache files at branch (remote) offices. This conserves bandwidth and decreases file download times for cached files.

True

By default, Android and iOS devices allow a limited number of failed login attempts after which the device becomes inaccessible and requires additional steps to unlock it

How can disk management be accessed in Windows 10? a) Main Panel b) Device Manager c) Administrative Tools d) My Computer

C) Administrative Tools Most partition, boot sector, and drive configuration faults can be corrected or recovered from by using the Disk Management tool from the Computer Management utility of Administrative Tools.

Which file is needed to start up Windows 8? a) NTLDR b) BOOT.INI c) BOOTMGR d) NTBOOTDD.SYS

C) BOOTMGR When booting a Windows 8 OS, the BOOTMGR in the MBR consults the BCD text file for operating system and boot partition information. This is similar to the relationship between NTLDR and BOOT.INI in legacy NT based systems.

You have a customer that has installed an updated device driver for their sound card and now it is not functioning properly. How can you roll back the driver? a) Go to Device manager and click Roll Back Driver. b) Go to Device Manager, click on the Device and Roll Back Driver. c) Go to Device Manager. Right-click on the Device. Click Properties. Click on the Driver tab and Click Roll Back Driver. d) Restart the computer in Last known good configuration Mode.

C) Go to Device Manager. Right-click on the Device. Click Properties. Click on the Driver tab and Click Roll Back Driver.

Which devices are loaded during safe mode? a) Mouse, CD-ROM, keyboard b) Mouse, SVGA, keyboard c) Mouse, VGA, keyboard d) Mouse, keyboard, speakers

C) Mouse, VGA, keyboard

Which of the following would you choose to track inventory that are on pallets in your company's warehouse? a) QR codes b) Barcodes c) RFID tags d) All of these

C) RFID tags RFID tags offer the most accurate tracking method of the choices provided. The other choices would require the codes to be scanned individually for each piece of inventory.

Which of the following is the memory limitation of a 32-bit OS? A. 16MB B. 2048MB C. 4GB D. 1024GB E. 2TB F. 8TB

C. 4GB

Which of the following would a technician use to store memory chips from a laptop safely after an upgrade? A. Mylar bags B. Cardboard boxes C. Antistatic containers D. Paper envelopes

C. Antistatic containers

A client wants a technician to create a PC naming convention that will make the client's PCs easier to track and identify while in use. Which of the following naming convention formats should the technician follow? A. Domain name, location, IP address B. Domain name, location, asset ID C. Asset ID, MAC address D. Location, RFID

C. Asset ID, MAC address

A technician needs to edit a protected .dll file but cannot find the file in the System32 directory. Which of the following Control Panel utilities should the technician use? A. System B. Display C. Folder Options D. Indexing Options

C. Folder Options

A technician is installing Windows 7 64-bit OS on a VM but keeps getting errors. The specifications for the malware are: Two 1GHz CPUs 2GB of memory 15GB hard drive 800x600 screen resolution Which of the following should the technician do to resolve the problem? A. Increase the number of CPUs B. Increase the amount of memory C. Increase the amount of hard drive space D. Increase the screen resolution

C. Increase the amount of hard drive space

A technician logs on to a Linux computer and runs the following command: cs -aux I grep vi Which of the following MOST accurately describes the effect of the command? A. It kills any running programs starting with the letters vi. B. It opens a list of directories that start with the letters vi. C. It creates a new file named grep in the current working directory. D. It finds a list of processes running a text editor.

C. It creates a new file named grep in the current working directory.

Which of the following is a community supported, open source OS used for both services and workstations? A. IOS B. Windows 10 C. Linux D. OS X

C. Linux

A technician is recycling PCs to be reused by a middle school. Which of the following methods is MOST appropriate for ensuring data has been removed from the PCs? A. Standard formatting B. HD drilling C. Low-level formatting D. HD partitioning

C. Low-level formatting

Ann, a user, is attempting to log in to her email service form a third-party email client on her phone. When Ann enters her usual username and password, she receives an error message saying the credentials are invalid. Ann then decides to reset her email password, but after the reset, the new credentials still do not work in the third-party email client. Which of the following settings or features is responsible for the problems Ann is experiencing? A. Full device encryption B. Account lock C. Multifactor authentication D. Strong password requirements

C. Multifactor authentication

Which of the following should be enacted to reduce a company's liability and exposure to a potential lawsuit? A. Acceptable use policy B. Incident documentation policy C. Password compliance policy D. Change control policy

C. Password compliance policy

A small business has an open wireless network so vendors can connect to the network without logging in. The business owners are concerned that a nearby company is connecting and using the wireless connection without permission. If the small business requires that the network remain open, which of the following configuration settings should be changed to address these concerns? A. Default SSID B. MAC filtering C. Power levels D. Content filtering E. Firewall

C. Power levels

A technician is cleaning up a warehouse and several old CRT monitors and UPS units. The technician removes the batteries from the UPSs and wants to comply with proper disposal techniques. Which of the following should the technician do NEXT to proceed with disposal of the batteries? A. Place security In trash receptacles B. Refer to the manufacture's specific usage C. Review the material safety data sheet D. Conduct an Internal search of disposal techniques

C. Review the material safety data sheet

You have lost your iPhone. Fortunately, you have enabled the Find My iPhone feature. You log on to your account, access the map, but do not see the device. Fearing a breach of your privacy, which would best protect the data? a) Send message b) Remote lock c) Remote wipe d) Remote access

C: Remote Wipe The best choice to protect your data in this example is remote wipe. If the device is recovered, it can be restored from backup. Answer: Remote wipe.

Which commands can you run from the command line to navigate to the room from the C:\program Files (x86)\MicrosoftOffice\PackageManifests and list the directories and files on the root drive?

CD\.then run dir

A system administrator is concerned that the NTFS file system on a Windows 10 system may be corrupted. Which of these would be the best way to test the file system for inconsistencies? A) SFC B) DISKPART C) CHKDSK D) DISM E) GPUPDATE

CHKDSK; -The Check Disk utility, or CHKDSK, can be used to analyze and correct file system errors and locate bad hard drive sectors.

x86 Architecture

CPU architecture first used in the Intel 8086. Indicates 32-bits

Which of the following machines is best suited to have a BIOS/UEFI password for security?

Campus computer lab

CA

Certificate Authority - a third party that vouches for certificates

True

Certificate of destruction is a document issued by companies that carry out secure device/document disposal. The certificate verifies proper asset destruction and can be used for auditing purposes. In case of device disposal, the document includes a list of all the items that have been destroyed along with their serial numbers. It may also describe the destruction method, specify location (on-site/off-site), or list the names of witnesses who oversaw the entire process.

A technician is installing a new SOHO wireless router. Which of the following is the FIRST thing the technician should do to secure the router?

Change the router's default password

chkdsk

Check Disk - checks the integrity of disks and can repair any problems detected

A technician receives notification from a SOHO router manufacturer of a specific vulnerability that allows attackers to exploit SNMP traps to take over the router. The technician verifies the settings outlined in the notification. Which of the following actions should the technician take NEXT?

Check for and apply firmware updates.

You recently purchased a new sound card and installed it in a free PCI slot in your computer. You plug in your old speakers, but you don't get any sound. You have checked all cable connections, and they are secure. You have also ensured that the speaker volume is appropriately adjusted and isn't muted. Which of the following BEST describes the next step you should perform?

Check the vendor's website for an updated driver.

Task Manager > Details tab > Set Processor Affinity

Choose the CPU cores that are allowed for the execution of the selected process.

To get preparation tips for CompTIA 220-1002 Exam:

Click Here: https://www.vingle.net/posts/2828950

EXIT

Closes the command prompt.

A salesperson in your organization spends most of her time traveling between customer sites. After a customer visit, she must complete various managerial tasks, such as updating your organization's order database. Because she rarely comes back to your home office, she usually accesses the network from her notebook computer using Wi-Fi access provided by hotels, restaurants, and airports. Many of these locations provide unencrypted public Wi-Fi access, and you are concerned that sensitive data could be exposed. To remedy this situation, you decide to configure her notebook to use a VPN when accessing the home network over an open wireless connection. Which of the following key steps should you take when implementing this configuration? (Select TWO. Each option is part of the complete solution.)

Configure the VPN connection to use IPsec Configure the browser to send HTTPS requests through the VPN connection

You want to make sure that you always have the latest patches installed on your workstation for an order entry application created by DataComLink corporation. What should you do? (Select TWO.)

Configure the application to automatically download and install updates as they are released. Check the DataComLink Website regularly for patches and updates to the software.

To tightly control the anti-malware settings on your computer, you elect to update the signature file manually. Even though you vigilantly update the signature file, the machine becomes infected with a new type of malware. Which of the following actions would BEST prevent this scenario from occurring again?

Configure the software to automatically download the definition file updates as soon as they become available.

You have just installed anti-malware software on all computers on your company's network. Which of the following additional actions would be BEST to take to help protect systems from malicious software? (Select TWO).

Configure the software to automatically update its definition files train users to scan removable storage devices before copying files

What is the surest way to prevent the loss of important information on your mobile device if it is lost, stolen, destroyed, or there is a natural disaster?

Configure your device to back up important data to your personal computer.

Performance Monitor

Configures detailed reports on different system statistics and log performance over time(can be accessed through administrative tools, Computer Management or perfmon.exe command line)

A user that travels to remote locations has reported that their external speakers do not work from their mobile phone. Both the phone and speakers have been power cycled. Which of the following would be the NEXT troubleshooting step? A) Verify the device certificate B) Confirm that Bluetooth is enabled C) Replace or charge the battery D) Update the OS on the phone

Confirm that Bluetooth is enabled; -Connectivity to local devices can be affected by changes with airplane mode or battery conservation, so it's important to verify that the communication method is properly enabled and configured.

Ease of Access

Consumer's ability to easily and quickly find a retailer's Web site

A PC technician knows he will be late to an appointment with a customer. Which of the following actions should the technician take? (Select TWO).

Contact the customer and apologize. Give a realistic timeframe for your arrival.

Sequence of steps for accessing the magic packet settings of an Ethernet adapter in MS Windows

Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Magic Packet settings

Where are Windows features enabled and disabled in the Windows 10 GUI?

Control Panel -> Programs and Features

msinfo32.exe

Control Panel\All Control Panel Items\Administrative Tools\ System Information - System Summary + Hardware Resources + Components + Software Environment

cleanmgr.exe

Control Panel\All Control Panel Items\Administrative Tools\Disk Cleanup It allows users to remove files that are no longer needed or that can be safely deleted. Also allows you to empty the Recycle Bin, delete temporary files, and delete thumbnails.

A user has reported they accidentally sent multiple print jobs to the wrong printer. Where do you go to purge the queue?

Control panel ->Devices and Printers

A system administrator is using the rsync utility on a Linux server. Which of the following would BEST describe this function? A) Configure video output B) Install patch updates C) Manage partitions D) Copy files E) Identify viruses and malware

Copy files; -The rsync utility is commonly used to backup or synchronize files across Linux systems.

Which of the following actions would you take to minimize administrative overhead if you were responsible for managing just DHCP and DNS on a Windows server on your network?

Create a custom mmc with only the dhcp and dns snap-ins

You manage Windows desktops for your organization. You recently updated all of your workstations to Windows 10. Your organization relies on a particular application, which worked correctly on Windows 7, but now does not run in Windows 10. You have checked the application vendor's website, but they do not provide a Windows 10 update. What are your options for running the application? (Select TWO)

Create a virtual computer that runs Windows 7. Run the virtual computer each time the application runs. Run the application in Compatibility Mode.

A desktop technician is attempting to upgrade several machines to Windows 10. After releasing there is only one disc for the installation, the technician decides to upgrade over the network. Which of the following boot methods initiates such an upgrade? A. SSD B. Optical drive C. Flash drive D. PXE

D. PXE

Which of the following NTFS security settings overrides all other settings? A. Deny B. Modify C. Read D. Write

D. Write

cipher /w:D:\

Data Wipe

A system administrator is decommissioning an old server and would like to guarantee that data on the server's storage drive cannot be read and the drive cannot be used on another system. Which of the following would meet these requirements? A) Quick format the drive B) Degauss the drive C) Use a secure file delete utility D) Repartition the drive with a Linux file system

Degauss the drive; -The degaussing method removes the magnetic field maintaining the data and renders the media unusable.

DEL

Delete

DoS attack

Denial of Service Attack - causes a service at a given host to fail or become unavailable to legitimate users

Your computer has a single NTFS partition used for the C: drive with the following folders: • C:\Confidential • C:\PublicReports In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: • Reports.doc • Costs.doc The C:\PublicReports folder allows the Full Control permission to the Users group. There are no other permissions assigned except for the default permissions. You then take the following actions: • Move Reports.doc from C:\Confidential to C:\PublicReports. • Copy Costs.doc from C:\Confidential to C:\PublicReports. Which of the following BEST describes the permission the members of the Users group will have for the two files in the C:\PublicReports folder?

Deny read to reports.doc; Allow full control to costs.doc.

A system administrator has been tasked with upgrading a set of application servers. Which of the following would be the FIRST step in the change management process? A) Obtain end-user acceptance B) Calculate the risk C) Determine the scope of the change D) Document the changes E) Obtain approval from the change board

Determine the scope of the change; -The first step of the change management process is to determine which devices, networks, users, and other resources will be affected by this change.

devmgmt.msc

Device Manager

A user in the marketing department has purchased a graphics tablet to use for digital artwork. To use the tablet, a hardware driver must be added to Windows 10. Which of these would be the best choice for adding this driver? A) Computer Management B) Services C) Programs and Drivers D) Component Services E) Device Manager

Device Manager; -The Windows Device Manager is the central point for installing hardware drivers and configuring driver options.

A system administrator has connected a new smart card scanner to a check-in kiosk running Windows, but the scanner is not recognized by the application. Which of the following would be the BEST way to view the status of this scanner? A) Event Viewer B) Performance Manager C) Component Services D) Device Manager

Device Manager; -The Windows Device Manager provides information and status updates of all connected hardware.

DRM

Digital Rights Management

Which of the following is a best practice in combating hackers?

Disable autorun

Employees in a small business have a habit of transferring files between computers using a USB flash drive and often bring in files from outside the company. Recently, a computer was infected with malware from a USB flash drive even though the employee did not access any files. Which of the following options would prevent this issue in the future?

Disable autorun.

One of the Windows workstations you manage has four user accounts defined on it. Two of the users are limited users while the third (your account) is an administrative user. The fourth account is the Guest user account, which has been enabled to allow management employees convenient workstation access. Each limited and administrative user has been assigned a strong password. File and folder permissions have been assigned to prevent users from accessing each other's files. Autorun has been disabled on the system. Which of the following actions is MOST likely to increase the security of this system?

Disable the Guest account.

net user dmartin /active:no

Disables dmartin account

chkdsk C: /x

Dismounts volume C:

netstat -a

Display all connections and listening ports

Win + D

Display and hide the desktop

netstat -b

Display the name of an application involved in creating each connection or listening port

ipconfig /all

Displays DHCP, DNS server, MAC address, and NetBIOS status

ipconfig /displaydns

Displays DNS resolver cache

gpresult

Displays Group Policy information for machine or user.

FSUTIL

Displays or configures the file system properties.

netstat -n

Displays ports and addresses in numerical format. Skipping name resolution speeds up each query

gpresult

Displays the RSoP for a computer and user account

A security administrator has identified a server on the corporate network that has been infected with a bot. The server has been sending an excessive number of requests to a single external IP address. Which of the following would BEST describe this activity? A) Zero-day attack B) Buffer overflow C) DoS D) Brute force attack E) Spoofing F) A normal day at work

DoS; -A bot that is sending excessive data requests to another device is most likely participating in a distributed DoS (Denial of Service).

Which of the following is commonly the last phase of the change management process? A) End-user acceptance B) Document changes C) Create a backout plan D) Obtain approval from the change committee

Document changes; -Once the change has been successfully implemented, it's important to document the changes and update all associated manuals and guides.

You have just connected a new USB device to your Windows system. You used the installation disc that came with the device to install the drivers needed to support the device. Since the installation, the system frequently crashes when you try to access the new device. Which of the following steps would MOST likely resolve this issue?

Download and install the latest driver from the manufacturer's website.

To improve the safety of your location and to comply with regulations regarding work environments with hazardous materials, you have been assigned to assemble Material Safety Data Sheets (MSDS) for all chemicals used in your shop. How should you obtain these documents?

Download them from the chemical manufacturer's websites.

What do all the upgrade advisors check and report on?

Drivers, Hardware and software

While working on an older computer system, the power supply made a popping noise and a flame can now be seen inside the computer. Which of the following should be used to extinguish this electrical fire? A) Water B) Compressed air C) Dry chemical D) Aqueous Foam E) Dry ice

Dry chemical; -Electrical fires should be extinguished by carbon dioxide, FM-200, or other dry chemicals. Do not use water or foam on an electrical fire.

A company has just experienced a data breach that affected all mobile devices. Which of the following would BEST secure access to users' mobile devices? (Select TWO). A. Full device encryption B. Remote backup application C. SSO authentication D. Device profiles update E. OS security updates F. Biometric authentication

E. OS security updates and F. Biometric authentication

A user believes there is a virus on a laptop. The user installs additional real-time protection antivirus software but is now experiencing extremely slow performance on the laptop. Which of the following should a technician do to resolve the issue and avoid recurrence? A. Activate real-time protection on both antivirus software programs B. Uninstall one antivirus software program and install a different one C. Run OS updates D. Enable the quarantine feature on both antivirus software programs E. Remove the user-installed antivirus software

E. Remove the user-installed antivirus software

A user in the marketing department would like to encrypt a single file on their Windows Desktop. Which of the following would be the BEST choice for this task? A) BranchCache B) AppLocker C) EFS D) Domain Services E) BitLocker

EFS; -EFS (Encrypting File System) is a feature of NTFS that allows for the encryption of individual objects in the file system.

A large corporation is evaluating a new application suite, and they would like to understand the licensing details before the purchase. Which of the following would provide this information? A) FOSS B) PHI C) EULA D) GDPR E) DRM

EULA; -The EULA (End User Licensing Agreement) is the legal document that determines how software can be licensed and used.

Which of the following actions would you take to make drivers available to an automated installation of Windows 10?

Edit the unattend.xml file

A system administrator has just scheduled signature updates and enabled System Restore after performing a malware removal. Which of the following would be the BEST next step? Update the anti-virus engine Disable System Restore Remove the computer from the network Educate the end-user Identify any malware symptoms

Educate the end-user; -After malware has been removed, it's useful to educate the end-user to help prevent any future infections.

man/ --help

Either parameter will generate a detailed explanation of the command in Linux

What must you do first as a prerequisite to establishing a Sync Partnership?

Enable offline folders

You use productivity apps on your iPad tablet device while traveling between client sites. You're concerned that you may lose your iPad while on the road and want to protect the data stored on it from being compromised. Currently, your iPad uses a 4-digit PIN number for a passcode. You want to use a more complex alpha-numeric passcode. You also want all data on the device to be erased if the wrong passcode is entered more than 10 consecutive times. What should you do? (Select TWO. Each option is part of the complete solution.)

Enable the Erase Data option. Disable the Simple Passcode option.

In order to operate, an integrated component such as Network Interface Card (NIC) may need to be first:

Enabled in the advanced BIOS settings menu

format D: /fs:NTFS /x

Enables file compression using NTFS

EFS

Encrypting File System

EFS

Encrypting File System - a windows feature that can encrpyt a folder or a file

EFS

Encrypting File System. A feature within NTFS on Windows systems that supports encrypting individual files or folders for confidentiality.

Characteristics of TACACS+

Encrypts the entire payload of the access-request packet Primarily used for device administration Separates authentication and authorisation

EOL

End of life

EIDE

Enhanced Integrated Drive Electronics; interface that uses parallel signals to transfer data, instructions, and information.

Drive wiping

Ensures old data on a hard drive is destroyed by writing zereos or a random patter to each location on the drive. Makes disk suitable for re-use

Which of these Windows 10 editions provide support for AppLocker? A) Pro B) Home C) Starter D) Enterprise

Enterprise; -AppLocker allows system administrators to manage application use in Windows. This feature is available in Windows 10 Enterprise and Education editions.

You provide desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems installing a new device. You try to tell the user how to update the driver for the device over the phone, but he is having a hard time understanding your directions and is becoming frustrated. What should you do?

Establish a Remote Desktop connection and update the driver.

True

Event Viewer (eventvwr.msc) is a Windows utility for monitoring system health and troubleshooting problems with applications, operating system, and hardware. Event Viewer allows for browsing and managing event logs. The most common logs available in Event Viewer include Application, System, and Security logs. Depending on the severity of the event, Application and System logs display events that fall into three categories: Information, Warning, and Error. Information events denote normal operation of the system (such as starting and stopping of system services, or successful completion of some routine background tasks), warning events point to non-critical errors (for example when installation of a software component fails because the component is already on the system), error events point to serious issues, for example when programs stop responding and need to be closed by Windows. Security log contains events such as valid and invalid logon attempts, as well as events related to res

A security administrator is researching a possible malware infection on a local Windows computer. Which of the following options would provide the most information about any unusual activity? Reliability Monitor System Information Event Viewer Browser certificate Safe Mode

Event Viewer; -The Windows Event Viewer provides detailed information on operating system and application activities.

After installing a new application, the machine performs slowly and frequently blue screens. The product documentation does not address this issue. What tool would you use to check for setup errors and messages?

Event viewer

A user is complaining that their mobile device is performing slower than usual across the wireless network. Other users on the wireless network are not seeing any slowdowns. Which of the following would be the BEST next troubleshooting step? A) Disable Bluetooth B) Restart the mobile device C) Examine running apps for unusual activity D) Lock and then unlock the mobile device E) Turn on airplane mode

Examine running apps for unusual activity; -If a single phone or tablet is having network problems, it would be useful to know if any large file transfers or constant network activity is occurring behind the scenes.

Shredder Drill Hammer Degaussing Incineration

Examples of hard drive destruction and disposal tools/methods include:

IPsec. TLS.

Examples of secure network protocols used for establishing VPN connections include: (Select 2 answers)

Microsoft Windows. Apple Macintosh OS. Linux.

Examples of workstation operating systems include: (Select 3 answers)

NTFS hierarchy of precedence for permissions

Explicit Deny -> Explicit Allow -> Inherited Deny -> Inherited Allow

HFS Plus

Extended Hierarchical File System - the file system older macOS uses

Ann, a user, has purchased a new Android phone and is attempting to access a public hot-spot. When she gets a message indicating the page cannot be displayed. She notices there is a "?" in the radio icon in the toolbar. She has verified Bluetooth is active, airplane mode is off, and tethering is turned on. She uses the cell phone to call a technician for assistance. Which of the following is the MOST likely issue Ann is experiencing? A. There is unauthenticated wireless connectivity B. She has exceeded the data allowance C. The phone is only 3G capable D. It is an unrooted phone E. The SIM card was not activated F. A data plan was not purchased

F. A data plan was not purchased

An organization is evaluating a software package where the source code is freely available and the end user can compile their own executable. Which of the following would BEST describe this software? A) Closed source B) FOSS C) PCI D) GDPR E) DRM

FOSS; -FOSS (Free and Open Source Software) is software that is freely available and includes the source code for review or modification. The end user can compile the source code and create their own executable for the software package.

True

Factory recovery partition and recovery disc are two examples of storage media that can be used for rolling back an OS to its original state.

Win + E

File Explorer

A system administrator needs to search for system files on a Windows 10 computer, but does not want to use the existing search index. Which of these options would be the best choice for this configuration? A) File Explorer Options B) Performance Settings C) System Properties D) Troubleshooting E) Credential Manager

File Explorer Options; -The option to enable and disable the search index for system files is located in the Control Panel under File Explorer Options and the Search tab.

FAT32

File allocation table that uses 32 bits to address and index clusters. Commonly used with USB flash-media drives and versions of Windows prior to XP. 4 GB maximum file size, 8 TB maximum partition size.

What happens when you move a file structure from the fileservers D:drive to E:?

File attributes (including security) are inherited from the new parent directory

/etc/fstab (filesystem table)

File used to mount devices at boot time and it is also consulted when users do not specify enough arguments with the mount command. Enable a swap partition.

.vbs

Files with this filename extension are used in a scripting language based on the Microsoft's Visual Basic programming language.

Fragmentation

Files written in non contiguous clusters reducing read performance

Which of the following security measures is a form of biometrics?

Fingerprint scanner

chkdsk /f

Fixes errors on the disk

chkdsk C: /f

Fixes file system errors on the disk drive C

A technician is replacing the batteries in an older UPS. Which of the following would be the best way to dispose of the old batteries? A) Contact the local building facilities department B) Follow the instructions in the MSDS C) Use the building trash services D) Contact a third-party document shredding service E) Transport the batteries to the local landfill

Follow the instructions in the MSDS; -The MSDS (Material Safety Data Sheets) provides details for the proper handling, storage, and disposal of components.

format

For a newly added hard drive, this command allows to configure it with a file system so that Windows can store information on the disk.

True

For a wireless client to be able to connect to a network, the security type (e.g. WEP, WPA or WPA2) and encryption type (e.g. TKIP or AES) settings on the connecting host must match the corresponding wireless security settings on a Wireless Access Point (WAP).

ipconfig /renew AdapterName

Forced DHCP client to renew lease it has for an IP address(if AdapterName is omitted it releases or renews ALL adapters on the network)

A system administrator would like to reuse a hard drive from another computer. Which of the following would be the best way to ensure that none of the original hard drive data would be available on the new Windows system? A) Format the drive with a regular format B) Degauss the drive C) Format the drive with a quick format D) Perform a low-level format

Format the drive with a regular format; -In Windows, a regular format will overwrite every sector with zeros, and this process prevents the recovery of any prior data. A quick format does not delete data in each sector, and a degauss would effectively render the drive unusable. Low-level formats are provided at the factory and are not available to administrators or end-users.

What OS would you choose if you wanted full access to the kernel and source code, were not concerned about security, and had no budget?

FreeBSD

FDE

Full Disk Encryption

Which of these mobile device features ensures that all data on a device is protected? A) Biometric authentication B) Anti-malware C) Full device encryption D) Authenticator app E) Firewall

Full device encryption; -Full device encryption protects all of the data stored on a mobile device.

GPO

Group Policy Object - a means of applying security settings and other administrative settings across a range of computers and users

Which of the following are MOST important when restoring from a bare metal backup? A) Location of application executables B) BIOS version C) Hardware configuration of the device D) Type of restore media E) File system type

Hardware configuration of the device; -A bare metal backup or image backup will restore a system to its original configuration. A best practice is to restore to a computer that is as similar as possible to the original hardware configuration.

HFS

Hierarchical File System. The file system used on a Mac computer for describing how files and folders are to be structured.

A workstation administrator is purchasing surge suppressors for group of devices. Which of the following would be the MOST important specification to consider? A) High joule rating B) Support for AC and DC C) International power receptacles D) Battery capacity E) Modular interfaces

High joule rating; -A surge suppressor with a higher joule rating can absorb more energy before it fails.

Windows Media Center (WMC)

Home entertainment desktop personal computer that includes a mid-to high-end processor, large-capacity hard disk, CD and DVD drives, a remote control and advanced graphics and audio capabilities.

Whats new in HomeGroup in Windows 10?

HomeGroups are deprecated in Windows 10

Step 2 of typically used applications in a windows 10 upgrade readiness plan:

Identify and resolve problems with applications

Step 1 of typically used applications in a windows 10 upgrade readiness plan:

Identify important apps and assign importance levels to prioritize your applications

You have determined that a block-level file corruption on the disk has damaged the driver files for a critical piece of hardware. Multiple reboots have failed to correct the problem. You open device manager, what is step 3 to fix this error?

Identify the correct drivers

Multiboot

If a computer's hard disk has an adequate free disk space, it is possible to install more than one operating system and then choose which OS to use during each startup. This type of configuration setup is known as:

Device Manager

If a device in Windows fails after driver update, the driver can be restored to the previously installed version in:

Only in one direction at a time.

If a network adapter's "Speed & Duplex" property is set to Half Duplex, communication on the network will be taking place:

Windows Run dialog box -> type in rstrui.exe + press Enter. Windows Run dialog box -> type in sysdm.cpl + press Enter -> System Protection tab -> System Restore. Windows Control Panel -> System applet -> Advanced system. settings -> System Protection tab -> System Restore. Windows Control Panel -> Recovery applet. Windows Settings menu (Windows 8/8.1/10).

If a recently installed app, driver, or update for Windows has a degrading effect on system performance, Windows Restore can be used to undo system changes by reverting the computer to a restore point. Methods for accessing Windows Restore include:

False

If personal files, such as email, documents, or photos are lost or deleted, Windows System Restore can be used to recover such files.

You want to be able to monitor and filter VM-to-VM traffic within a virtual network. What should you do?

Implement a virtual firewall within the hypervisor.

True

Implementing a computer screen lock is one of the account management security best practices. The screen lock can be used as a countermeasure against brute-force attacks as it can be set to block computer access after a specified number of failed login attempts.

True

Implementing full device encryption is one of the methods for securing sensitive data on a smartphone. When enabled, this type of encryption works in conjunction with the phone's screen lock, i.e. to decrypt the phone (which stays encrypted whenever the phone is locked), a user must first unlock the screen. On Android devices, the unlocking methods include entering a PIN, password, or swipe pattern. Apple devices use passcode and biometric fingerprint sensor (a.k.a. Touch ID).

True

In IT security, the term "Entry control roster" refers to a list of personnel allowed to access restricted areas

True

In IT security, the term "User authentication" refers to the process of proving user identity to a system. Authentication process can be based on different categories of authentication factors, including unique physical traits of each individual, such as fingerprints ("something you are"), physical tokens such as smart cards ("something you have"), or usernames and passwords ("something you know"). Additional factors might include geolocation ("somewhere you are"), or user-specific activity patterns such as keyboard typing style ("something you do"). Multi-factor authentication systems require implementation of authentication factors from two or more different categories.

True

In MS Windows environments, Guest account is an account for users who do not have a permanent account on a Windows computer or domain. People using this type of account cannot install software or hardware, change settings, create passwords, or access protected files and folders. However, because the Guest account allows the user to log on to a network, browse the Internet, and shut down the computer, it is recommended to keep it disabled when it isn't being used.

Basic Disk

In MS Windows, a newly added drive is by default partitioned as a:

True

In NTFS, a folder or file copied or moved from one location to another on a different volume inherits permissions of its new parent folder.

False

In NTFS, a folder or file moved from one location to another on the same volume inherits the permissions of its new parent folder.

False

In NTFS, permissions inherited from a parent object (e.g. a folder or user group) take precedence over permissions applied directly to an object (explicit permissions).

Screen Sharing

In OS X, a utility to remotely view and control a Mac and is similar to Remote Assistance in Windows.

Task Manager

In Windows 8 and newer releases of the Microsoft OS, contents of the MSConfig's Startup tab can be viewed and managed via:

Each user runs their own copy of virtual desktop. At the end of a session, user data and personal settings are saved.

In a persistent VDI: (Select 2 answers)

Local Security Policy(secpol.msc)

In administrative tools. You would use this to configure password and account policies with out going into the registry

Proxy

In computer networking, a computer system or an application that acts as an intermediary between another computer and the Internet is commonly referred to as:

True

In computer security, a type of small-factor physical device used for authentication is commonly referred to as a hardware token.

True

In computer security, the term "Biometrics" refers to physical characteristics of the human body that can be used for identification and access control purposes.

True

In macOS, the term "local snapshot" refers to a backup copy of all personal and system files stored on the local machine instead of the preferred external drive.

False

In the MBR partition style, each logical drive within the extended partition can be transformed into a bootable drive.

True

In the context of MS Windows system management, the term "Administrative share" refers to a hidden network share on a local computer designed to be accessed remotely by network administrators.

COPE

In which of the mobile device deployment models employees can use corporate-owned devices both for work-related tasks and personal use?

You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0 subnet using the default subnet mask. This workstation can communicate with some hosts on the private network, but not with other hosts. You run ipconfig /all and see the following: Ethernet adapter Local Area Connection: Connection-specific DNS Suffix . : mydomain.local Description . . . . . . . : Broadcom network adapter Physical Address. . . . . . : 00-AA-BB-CC-74-EF DHCP Enabled . . . . . . . : No Autoconfiguration Enabled. . . : Yes IPv4 Address . . . . . . . : 192.168.1.102(Preferred) Subnet Mask . . . . . . . : 255.255.255.0 Default Gateway. . . . . . . . . : 192.168.2.1 DNS Servers. . . . . . . . . . . : 192.168.2.20 Which of the following is the MOST likely cause of the problem?

Incorrect default gateway

Which of the following would be an advantage of using a GPT partition style over an MBR partition style? A) Built-in file-level encryption B) Increased number of bootable partitions on a single physical drive C) Password-protected boot process D) Support for removable storage devices E) Supports scheduled tasks

Increased number of bootable partitions on a single physical drive; -A GPT (GUID Partition Table) can support up to 128 bootable partitions in Windows. An MBR partition style drive can only support a maximum of 4 bootable partitions.

x64

Indicates a 64-bit processor supporting a 64-bit operating system. 64-bit versions of Windows can run on x64-based systems.

ICM

Information Content Management - the process of managing information over its life cycle

What type of Windows object permission is propagated from the parent object to the child object? A) Explicit B) NTFS C) Share D) Inherited E) Administrative

Inherited; -When you set the permissions on a parent object, by default those same permissions will apply to the child objects.

Which of the following would be the best way to upgrade a computer from Windows 8.1 Professional x64 to Windows 10 Pro x64? A) Backup all personal files, perform a fresh install of Windows 10, and restore all personal files B) Use the Windows 10 Upgrade Checker C) Perform a Custom (Advanced) installation of Windows 10 D) Use the Windows Upgrade Assistant E) Insert the Windows 10 installation media and run the setup from the Windows 8.1 desktop

Insert the Windows 10 installation media and run the setup from the Windows 8.1 desktop; -Windows 8.1 Professional x64 can be upgraded to Windows 10 Pro x64 using the Windows 10 upgrade process. A clean install is not required for this upgrade path.

You have installed a new computer with a quad-core 64-bit processor, 6 GB of memory, and a PCIe video card with 512 MB of memory. After installing the operating system, you see less than 4 GB of memory showing as available in Windows. Which of the following actions would MOST likely rectify this issue?

Install a 64-bit version of the operating system.

A user has created a complex spreadsheet on her workstation containing many graphs and charts. She sent the document to an older network laser printer that is shared by everyone in her department. When she picked up the output, only the top half of each page was printed, and the bottom half was blank. Which of the following will MOST likely rectify this issue?

Install additional memory in the printer.

You have an existing computer running Windows 10 Enterprise. You want to configure a RAID 5 array in the computer. You install three new SATA drives and then use the RAID controller integrated into the motherboard to define a RAID 5 array using them. When you boot the computer, Windows does not show the logical RAID drive you just created. What should you do?

Install the drivers for the motherboard RAID controller.

Which of the following actions directly improves system security on a Windows workstation?

Install the latest updates.

True

Installing mobile apps from trusted sources (e.g. Apple's App Store for iOS devices, or Google Play for Android devices) decreases malware-related security risks.

A user is trying to install a new Windows application that isn't part of the standard company desktop. Windows displays an error when the setup program starts. Which of the following would be the MOST likely reason for this error? A) Not enough RAM B) Invalid installation media C) Out of disk space D) Incorrect Windows version E) Insufficient rights

Insufficient rights; -The user of a computer must have the correct permissions to install applications and write files to the program directories. Most corporate users do not have the required permissions to install new applications.

IDE

Integrated Development Environment - programming environment that includes features to help you write and edit code as well as debugging tools

A help desk technician is troubleshooting an older application that runs in Internet Explorer. Which of these Control Panel utilities would reset IE to the default settings? A) Internet Options B) Device Manager C) Default Programs D) Programs and Features E) Administrative Tools

Internet Options; -The Internet Options applet is used for configuring Internet Explorer options, including options for resetting the configurations.

A system administrator needs to configure proxy addresses on a Windows 10 workstation. Where is this configuration option found? A) Shared Folders B) Internet Options C) Computer Management D) System Properties E) Device Manager

Internet Options; -The Windows proxy settings are in the Control Panel under the Internet Properties applet and the Connections tab.

Daniel, a system administrator, needs to access Safe Mode on a Windows 10 computer that uses Fast Startup. The Windows desktop will not load when starting the computer. Which of the following would start Safe Mode on this system? A) Select Safe Mode in msconfig B) Configure Safe Mode in the UEFI BIOS C) Disable Fast Startup D) Hold down the power button when starting the system E) Interrupt the boot process three times

Interrupt the boot process three times; -Windows 10 will automatically display the boot option screen if the normal boot process is interrupted three times in a row.

True

Introduced in Windows Vista, Windows Firewall with Advanced Security MMC snap-in offers more detailed configuration options allowing system administrators to execute more granular control over inbound and outbound network traffic. (True or False)

SHUTDOWN

It shuts down a computer (requires an attribute).

.js

JavaScript

.js

JavaScript Filetype

What type of scripting language would be the BEST choice to add interactivity to a web page? A) JavaScript B) Python C) PowerShell D) VBScript E) Shell script

JavaScript; -JavaScript is commonly used to extend the functionality web pages.

Which of the following are the BEST steps you can take to avoid having your mobile device exploited by a hacker or infected by a virus? (Select TWO).

Keep the operating system up to date. Lock the screen with some form of authentication.

Authentication protocol that can be used to enable SSO in Windows-based network environments

Kerberos

Janet has used the built-in password management features of macOS to securely store credentials, notes, and certificates. What would Janet use if she wanted to edit or remove one of these items? A) Spotlight B) Password Vault C) Keychain D) Encryption Machine E) Key Finder

Keychain; -The macOS Keychain is an integrated password manager that secures information using login credentials as the encryption key.

compmgmt.msc

Launches Computer Management Console

A new laptop was delivered to your home and left on the porch while you were at work. It is very cold outside, and you don't know how long it has been there. You unpack the computer. You would like to know if it is working properly. Which of the following is the BEST action to take?

Let the computer warm up to room temperature before turning it on.

.sh

Linex shell script

fsck

Linux File system consistency check and repair

ps

Linux command-line utility used for displaying statistics of running processes

dir *.*

List all directory's files and subdirectories contained in the current directory

Normal Startup

Load all device drivers and services

Diagnostic start up

Load basic devices and services only

secpol.msc

Local Security Policy snap in

A system administrator would like to require all passwords to be a minimum length. Which of the following would be the BEST way to accomplish this? A) Device Manager B) Component Services C) Boot Configuration Data D) Local Security Policy E) BIOS User Password

Local Security Policy; -The Local Security Policy utility provides for the configuration of password length, password age, and other important security parameters.

What tool would you use to set a password policy for the clients machines local user accounts?

Local Security policy

Which of the following tools would you use to reset a local account password?

Local Users and Groups

False

Local Users and Groups (lusrmgr.msc) is a Microsoft Management Console (MMC) snap-in included by default in all editions of MS Windows. It is used to create and manage users and groups that are stored locally on a computer.

Administrative Tools

Located in Control Panel, is a collection of predefined Microsoft Management Consoles

chkdsk /r

Locates bad sectors and recovers readable information Fixes errors on the disk

Windows Domains

Logging on to any computer on a Windows domain requires a single set of credentials Security policies and permissions on a Windows domain are administered centrally Logging on to any computer on a Windows domain requires a single set of credentials

Of the following choices, which action could be most physically harmful to you?

Looking into the end of a fiber optic cable.

Which of the following terms is used to describe initial hard drive formatting typically performed at the factory by the drive manufacturer?

Low-level format

You are an IT technician for your company. Your boss has asked you to set up and configure a wireless network to service all of the conference rooms. Which of the following features lets you allow or reject client connections by hardware address?

MAC address filtering

1. Local Users and Groups in Computer Management 2. User Accounts in Control Panel

MS Windows utility designed both for system administrators and for application developers

Which of the following utilities would you use to quickly determine the non-Windows applications configured to launch automatically at start-up?

MSConfig

time machine

Mac OS X full backup tool that enables you to recover some or all files in the event of a crash; it also enables you to restore deleted files and recover previous versions of files.

What must you plan for when running Windows Memory Diagnostics that is not a concern with most other administrative tools?

Machine downtime

Spyware

Malicious software collecting information about users without their knowledge/consent is known as:

Ransomware

Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is known as:

Computer Management

Management console (MMC) with multiple snap-ins to configure local users and groups, disks, services, and devices

Which of the following would a common method to limit access to an area to a single person at a time? A) Fingerprint scanner B) Smart card C) Mantrap D) Voiceprint E) USB lock

Mantrap; -A mantrap is a physical security device that can limit access through an area to a single person or a small controlled group.

While reviewing video files from your organization's security cameras, you notice a suspicious person using piggy- backing to gain access to your building. The individual in question did not have a security badge. Which of the following would you MOST likely implement to keep this from happening in the future?

Mantraps

Where should you download 3rd arty drivers from?

Manufacturers website

Computer Management (compmgmt.msc)

Many of the utilities available in the Administrative Tools folder in Windows Control Panel are implemented as the so-called Microsoft Management Console (MMC) snap-ins. The most prominent MMC component in this folder (which contains a collection of other MMC snap-ins such as Device Manager, Disk Management, and Event Viewer) is called:

mdsched.exe

Memory Diagnostics tool Administrative Tools folder in Control Panel

Paging/Sec

Memory pages per second: the rate at which the system is paging memory to and/or from disk.

You have a network that uses a logical ring topology. How do messages travel through the network?

Messages travel from one device to the next until they reach the destination device.

domain

Microsoft client/server network model that groups computers together for security and to centralize administration

workgroup

Microsoft peer to peer network model in which computers are grouped together with access to shared resources

Sysprep

Microsoft's System Perperation Tool - a utility to be run before imaging a disk to solve possible configuration problems

A user's corporate email messages are not decrypting on their new mobile phone. Which of the following would be the MOST likely reason for this issue? Missing private key Low signal strength Incorrect OS version Incorrect wireless passphrase Battery has overheated

Missing private key; -The private key on a mobile device allows protected data to be decrypted by the phone.

MDM

Mobile Device Management - a class of enterprise software designed to apply security policies to the use of smartphones and tablets in a business network

A laptop will not recognize a new bootable USB drive during the startup process. Which of the following would be the BEST way to resolve this issue? Start in Safe Mode Remove any boot passwords Modify the BIOS configuration Perform a recovery reset on the primary OS

Modify the BIOS configuration; -The BIOS determines the priority of drives during the boot process. To boot from the USB drive, the BIOS should allow removable drives to boot before the internal storage drive.

You have a folder on your Windows computer that you would like to share with members of your development team. Users should be able to view and edit any file in the shared folder. You share the folder and give Everyone Full Control permission to the shared folder. Users connect to the shared folder and report that they can open the files, but they cannot modify any of the files. Which of the following would be the BEST action to take next?

Modify the NTFS permissions on the folder.

Which of the following networking devices or services is LEAST likely to be compatible with VPN connections?

NAT

A user in the accounting department needs to edit a file that's shared on the \MARKETING server. Which of these would be the best way for the accounting team to identify the share name on \MARKETING? A) NETSTAT B) NSLOOKUP C) NET USE D) SHARE E) NET VIEW

NET VIEW; -The NET VIEW command can be used to list the available resources on a remote server.

A user in the shipping department would like to associate a local drive letter to a file share on a corporate Windows server. Which of the following utilities would provide this functionality? A) SHARE B) FILE C) NET D) MAP E) DRIVE

NET; -The NET USE command will map a local drive letter to a remote file share.

A user in the IT department has an IP address listed in a report and needs to convert the address to a FQDN. Which of the following would provide this functionality? A) NET VIEW B) NSLOOKUP C) NETSTAT D) IPCONFIG E) TRACERT

NSLOOKUP; -The NSLOOKUP command can query a domain name server to provide the FQDN (Fully Qualified Domain Name) of an IP address, or vice versa.

Which command do you run to create a local user account?

Net user

Displaying active TCP/IP connections and Displaying network protocol statistics

Netstat is a command-line utility used for: (Select 2 answers)

True

Network Access Control (NAC) defines a set of rules enforced in a network that the clients attempting to access the network must comply with. With NAC, policies can be enforced before or after end-stations gain access to the network. NAC can be implemented as pre-admission NAC where a host must, for example, be virus free or have patches applied before it can be allowed to connect to the network, and/or post-admission NAC, where a host is being granted/denied permissions based on its actions after it has been provided with the access to the network.

NAC

Network Access Control - allows administrators to devise policies or profiles defining the minimum security configuration required of devices for network access

NFS

Network File System - used to mount storage devices into a local file system in linux

NLA

Network Level Authentication - Authenticates user before committing any resources to RDP session preventing denial of service attacks

NOS

Network Operating System - an OS designed to run on servers in business networks

Which of the Control Panel applets in Windows 8/8.1/10 can be used for checking basic information about the network connection status and setting up network connections?

Network and Sharing Center

NTFS

New Technology File System The file system that the Windows NT operating system uses for storing and retrieving files on a hard disk

What is the name of a Microsoft Windows feature that allows for user-based file level encryption?

New Technology File System (NTFS)

Incremental backup

New files and files modified since last backup(low backup time, high restore time uses multiple tape sets)

Which of the following is the correct PowerShell cmdlet to create a user object in AD?

New-ADUser

What type of internet access would this computer have?

No Access

To protect a Windows 10 system, you've configured System Restore to automatically protect your system using restore points. Will this adequately protect the user data on the system?

No, you need to enable File History.

IPCONFIG /ALL

Not only will IPCONFIG /ALL show you your basic network settings, it will also show you MAC ADDRESS, detailed IPv6 information, IP address leases and DHCP connection information!

You have booted your Windows workstation into Safe Mode and enabled Boot Logging. To which log file is the boot logging information now being written?

Ntbtlog.txt

What would you use to make a flat file database available to an application you are developing?

ODBC Data sources

Multiboot installation

OS installation in which multiple operating systems are installed on a single machine.

OSHA

Occupational Safety and Health Administration

performance monitor

Operating system program that assesses and reports information about various computer resources and devices. you can check memory.

Which of the following would be found natively in the System Configuration utility? A) Option to safe boot during startup B) Disk partitioning and formatting options C) Registry modification D) Defragmentation options E) MSTSC feature

Option to safe boot during startup; -The System Configuration utility provides many different options during the Windows startup process.

OU

Organizational Unit - Provide a way of dividing up a domain into different administrative realms

Provides a high-level overview of the organization's security program.

Organizational security policy

MBR (Master Boot Record)

Overall number of partitions limited to 4. Up to three primary partitions and one extended partition. Up to four primary partitions. Each logical drive within the extended partition CANNOT be transformed into a bootable drive.

A United States federal government employee uses their identification card as an authentication factor during login. Which of the following would best describe this card? A) MAC B) MDM C) PIV D) DLP E) ACL

PIV; -A PIV (Personal Identify Verification) card is a US federal government identification smart card that displays a picture, identification information, and contains a certificate.

You want to use a protocol that can encapsulate other LAN protocols and carry the data securely over an IP network. Which of the following protocols is suitable for this task?

PPTP

A branch office provides access to the wireless network with a passcode that is shared with everyone. Which of the following would describe this security mechanism? A) RADIUS B) 802.1X C) TKIP D) PSK E) TACACS

PSK; -An 802.11 passphrase used by everyone is a PSK (Pre-Shared Key).

Performance Monitor > Memory\Pages/sec counter

Pages Input/sec is the total number of pages read from the disk, and Pages Output/sec represents the total number of pages removed from memory and travelling toward the disk.

Which of the following are storage spaces configurations?

Parity, Simple and Mirror

A system administrator is concerned that the CPU utilization on a file server is exceeding 50% during the workday. Which of these tools would allow the administrator to monitor and alert on any excessive CPU utilization events during a 24-hour period? A) Event Viewer B) Task Manager C) Performance Monitor D) Component Services E) Computer Management

Performance Monitor; -The Windows Performance Monitor is designed to monitor system metrics over a long-term period and store the information for future use. Performance Monitor can also be configured to provide alerts if a metric exceeds a particular value.

Which of the following tools would you use to create a baseline of system performance?

Performance monitor

Features of Windows Remote Desktop tool

Permanent remote access Access based on local password (local user account password) Windows tool used for connecting remotely to the user's own computer

True

Permission propagation occurs when a folder or file created inside another folder takes on (inherits) permissions applied to that folder (permissions applied to the so-called parent folder propagate down to its child objects, i.e. folders and files created inside the parent folder).

PII

Personally Identifiable Information - data that is used to identify, contact, locate, or impersonate an individual

Spear phishing

Phishing scams targeting a specific group of people are referred to as:

Whaling

Phishing scams targeting people holding high positions in an organization or business are known as:

A finance manager has received an email with a link to update the corporate online banking address profile. What is the MOST common description of this attack type? A) Man-in-the-middle B) Phishing C) Brute force D) Denial of service

Phishing; -Phishing attacks attempt to entice a user to provide privileged information or account details.

True

Physical Address Extension (PAE) is a memory management feature that allows 32-bit CPUs to use more than 4 GB of physical memory.

False

Physical Address Extension (PAE), No-eXecute bit (NX bit), and Streaming SIMD Extensions 2 (SSE2) are mandatory CPU requirements for Microsoft Windows 7/8/8.1/10, therefore Windows 7/8/8.1/10 cannot be installed on computer systems that lack support for these features.

PING

Ping will send a specific amount of packets to a destination in order to test or VERIFY CONNECTIVITY!!

SMTP with SSL

Port 465

SMTP with TLS

Port 587

Which of the following can be used by Windows Firewall to control the traffic flow of an application? A) CPU utilization B) Port number C) Remote file share name D) Username and password E) Threat score

Port number; -Windows Firewall can use the application name, protocol, port numbers, and more to manage traffic flows.

Which WAP configuration setting allows for adjusting the boundary range of a wireless signal? Which of the following would be of help in troubleshooting wireless signal loss and low wireless network signal coverage?

Power level controls

.ps1

PowerShell

.ps1

Powershell Script Cmdlet

PSK

Pre-Shared Key - 256 bit cryptographic hash generated from a passphrase. This authentication method is suitable for SOHO networks

Encrypting File System (EFS)

Premium versions of the Microsoft OS contain a built-in component that enables encryption of individual files. This feature is known as:

A Windows 10 desktop has become unresponsive. Which of the following would be the BEST next troubleshooting step? A) Hold down the power button for three seconds B) Press Ctrl-Alt-Del and select Task Manager C) Power cycle the system and view the Event Viewer D) Connect to a share on the system from another computer

Press Ctrl-Alt-Del and select Task Manager; -Even if the desktop is unresponsive, using Ctrl-Alt-Del can often provide access to some useful troubleshooting tools.

You need to boot a Windows 10 system into Safe Mode. Which steps will accomplish this task? (Select TWO. Each choice is a complete solution.)

Press F8 at Startup. in Safe mode, select start > settings > Update&security > recovery > advanced startup > restart now

A desktop administrator is configuring a software firewall for each computer. Which of the following would be the MOST likely reason for this configuration? A) Identify spam emails B) Remove rootkit installations C) Block unauthorized software installation D) Prevent outbound botnet communication

Prevent outbound botnet communication; -Botnets must be able to communicate to their command-and-control servers to obtain operating instructions. A software firewall can block any unknown or unauthorized network communication.

Characteristic features of RADIUS

Primarily used for network access Combines authentication and authorisation Encrypts only the password in the access-request packet

What tool would you use to share a printer with least administrative effort?

Print managment

True

Prior to Windows 8, the MSConfig Startup tab contained a list of user applications that could be enabled/disabled during system boot. The contents of this tab are not available in the MSConfig utility shipped with Windows 8/8.1/10.

True

Privacy filter (a.k.a. privacy screen) is a protective overlay placed on the computer screen that narrows the viewing angle, so the screen content is only visible directly in front of the monitor and cannot be seen by others nearby. Privacy filter is one of the countermeasures against shoulder surfing

Which of the following is the minimum Windows 10 edition required to connect to a Windows Domain? A) Home B) Pro C) Education D) Enterprise

Pro; -Adding a device to a Windows Domain is available in Windows 10 Pro.

A user wants to perform an in-place upgrade from Windows 7 Professional to Windows 10. Which of these Windows 10 editions would provide this upgrade path? A) Pro B) Starter C) Home Premium D) Home Basic

Pro; -Both Windows 10 Pro and Windows 10 Enterprise can be used for an in-place upgrade from Windows 7 Professional.

True

Program Compatibility Troubleshooter is a Windows system utility used for automatic resolution of problems with older applications failing to run on newer versions of MS Windows. Program Compatibility Troubleshooter can be accessed via the Troubleshooting applet in Windows 7/8/8.1/10 Control Panel. Selecting the "Run programs made for previous versions of Windows" option in the Troubleshooting applet launches a guided tool for fixing problems with older programs installed on the current version of Windows

PHI

Protected Health Information - medical and insurance records, plus hospital lab results

Physical security control

Protection provided by security guards is an example of:

Windows Registry

Provides remotely accessible database for storing, operating system, device, and software application configuration information

Windows 7 Ultimate

Provides the same feature set as Windows 7 Enterprise x64 version supports 192GB RAM.

Reliability Monitor

Displays a log of "system reliability" events

netstat -n

Displays addresses and port numbers in numerical form

netstat -a

Displays all connections and listening ports.

HOSTS file location in Windows

%SYSTEMROOT%\System32\drivers\etc\hosts

0

---

Which of the following is a requirement for Windows 10 X 64?

2 GB RAM

Rootkit

A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network is known as:

A system administrator would like to prevent users from changing the boot order of their desktop computers. Which of the following would provide this functionality? A) Add a BIOS administrator password B) Use Windows Group assignments C) Limit password reuse D) Disable unnecessary accounts E) Increase password complexity

Add a BIOS administrator password; -A BIOS administrator password would allow a computer to boot normally, but it would restrict any changes to the BIOS configuration.

shell

An interface between the user and computer and software

War driving

An optimal Wireless Access Point (WAP) antenna placement provides a countermeasure against:

True

Assigning static IP addresses on a SOHO network provides better administrative control over hosts and devices residing on the inside of the network.

ipconfig /flushdns

Clears the DNS resolver cache

Clicking on the Properties menu item, and then applying the required settings on the Compatibility tab.

If an application written for an earlier version of MS Windows doesn't run correctly, the operating system can emulate its own older version to allow a given program to work with newer hardware or software. The compatibility mode settings in Windows can be changed manually by right-clicking the program icon and:

True

In a network using subnets, the term "Default gateway" refers to a network device (e.g. router) that enables exchange of data between hosts residing in different subnets.

You have installed anti-malware software that checks for viruses in e-mail attachments. You configure the software to quarantine any files with problems. You receive an email with an important attachment, but the attachment is not there. Instead, you see a message that the file has been quarantined by the anti-malware software. Which of the following BEST describes what happened to the file?

It has been moved to a folder on your computer.

Which of the following should contain the unpacked installation binaries to support an automated network-based roll out of your new OS?

Network share

NTFS

New Technology File System - proprietary file system used exclusively with Windows

SSE2 (Streaming SIMD Extensions 2)

One of the Intel SIMD (Single Instruction, Multiple Data) processor supplementary instruction sets first introduced by Intel with the initial version of the Pentium 4 in 2000. It extends the earlier SSE instruction set, and is intended to fully replace MMX.

Windows 7 Starter

Only 32-bit version Maximum 2GB RAM

Hide extensions for known file types in Windows 8/8.1/10

Open the File Explorer Options applet in Windows Control Panel, then select Hide extensions for known file types in the Advanced settings on the View tab

.py

Python

Active directory

The database that contains the users, groups, and computer accounts in a Windows Server Domain

dd

The dd command stands for "data duplicator" and used for copying and converting data.

/?

The same as /?, but it will be placed BEFORE a command. Example: help ipconfig

Scans the integrity of all protected system files and replaces incorrect versions with correct Microsoft versions

The sfc command-line utility in MS Windows:

Which settings app configures time, date, region and language settings?

Time and Language settings

Which of the following are you most likely to use for a one-off, manual installation of Windows 10 on a machine with no D/DVD access or network deployment solution?

USB

.sh

Unix/Linux Shell script #! Hash-bang #!/bin/bash

.vbs

VBScript

Shredder. Incineration.

Which of the following destruction tools/methods allow for secure disposal of physical documents? (Select 2 answers)

Disk Utility

Which of the following is a macOS disk maintenance tool?

Remote Disc

Which of the macOS features enables access to optical drive of another computer over a network?

A system administrator has configured a group of Windows devices with a set of usernames and passwords that are managed on each individual Windows device. Which of the following would describe this configuration? A) Workgroup B) Hybrid C) Domain D) Multi-factor E) HomeGroup

Workgroup; -A Windows Workgroup is designed for small departments that would like to manage authentication in a non-centralized method on each individual device.

cluster

a group of sectors

Defines an employee's rights to use company property.

acceptable use policy

Sets expectations for user privacy when using company resources.

acceptable use policy

NTBackup

allows users to create backups of data to a variety of devices, is not provided on newer windows anymore.

Network and Sharing Center

allows you to view and manage all your network connections

sfc /scannow

runs a scan immediately

Windows 7 Home Premium

• Full Aero interface • Multiple monitors • Support for up to 2 physical CPUs • 32-bit and 64-bit versions • 64-bit version supports up to 16 GB RAM • Support for tablet PCs and MultiTouch controls • Display personalization • Desktop enhancements • Windows Media Center capabilities • Creation and use of HomeGroups • Windows Mobility Center • Network printing • Internet Connection Sharing • Fast user switching • Games

Windows 7 Enterprise

• Multiple Language User Interface for companies spanning the globe • UNIX-based application support • BitLocker Drive Encryption • Enhancements to remote corporate data access

/all

Which ipconfig parameter allows to view the physical address of a Network Interface Card (NIC)?

-a

Which netstat parameter allows to display all connections and listening ports?

True

Starting with the May 2019 OS release update, the minimum hard disk space requirement for both 32-bit (x86) and 64-bit (x64) editions of Windows 10 was increased to 32 GB.

Windows 8.1 (Core) Upgrade Windows 8.1 Professional Install Windows 8.1 Enterprise Install

Switching from Windows 8.1 to Windows 10 Home edition can be performed either via an upgrade or clean installation. Match each Windows 8.1 edition on the left with the correct upgrade option from the corresponding drop-down list.

Windows 7 Enterprise. Windows 7 Ultimate.

Which of the Microsoft Windows 7 editions include the BranchCache feature? (Select 2 answers)

Core

Which of the Microsoft Windows 8/8.1 editions does not include the BranchCache feature?

/all

Which of the answers listed below refers to an ipconfig command parameter used for displaying the full TCP/IP configuration information for all adapters?

Refresh

Which of the built-in options added in Windows 8 enables OS re-installation without affecting the existing user profiles and settings?

cd

Which of the command-line commands listed below is used for directory traversal?

nslookup

Which of the following CLI tools can be used for troubleshooting DNS-related problems?

Windows 7 Starter. Windows 7 Home Basic. Windows 7 Home Premium.

Which of the following Windows 7 editions do(es) not include EFS? (Select all that apply)

Core

Which of the following Windows 8/8.1 editions does not include the Bitlocker full drive encryption and Encrypting File System (EFS) features?

No-eXecute bit (NX bit)

A type of feature used by CPUs for isolating areas of memory to prevent the execution of code from non-executable memory locations is known as:

True

In Microsoft Windows 7, the only two editions that include the BitLocker full drive encryption feature are Windows 7 Enterprise and Windows 7 Ultimate.

True

The -b netstat parameter in Microsoft Windows allows to display the name of an application involved in creating each connection or listening port.

Fat 32

The 4 GB maximum file size limit and 2 TB maximum volume size limit are the characteristic features of:

dir and dir *.*

Which of the following Windows Command Prompt commands can be used to list all directory's files and subdirectories contained in the current directory? (Select 2 answers)

1 GHz CPU with support for PAE, NX, and SSE2. 2 GB of system RAM. Microsoft DirectX 9 graphics device with WDDM 1.0 or higher driver. 20 GB of free hard disk space.

What are the minimum system requirements for 64-bit (x64) version of Microsoft Windows 10? (Select 4 answers)

Windows 10 Home 128 GB Windows 10 Pro 2 TB Windows 10 Education 2 TB Windows 10 Enterprise 6 TB

What is the maximum amount of RAM supported by different editions of 64-bit (x64) Microsoft Windows 10? (Match each OS edition on the left with the correct answer from the corresponding drop-down list)

Windows 7 Starter 2 GB Windows 7 Home Basic 8 GB Windows 7 Home Premium 16 GB Windows 7 Professional 192 GB Windows 7 Enterprise 192 GB Windows 7 Ultimate 192 GB

What is the maximum amount of RAM supported by different editions of 64-bit (x64) Microsoft Windows 7? (Match each OS edition on the left with the correct answer from the corresponding drop-down list)

Home

Which edition of Microsoft Windows 10 cannot participate in a Windows domain?

Core

Which edition of Microsoft Windows 8/8.1 cannot participate in a Windows domain?

Windows 7 Starter. Windows 7 Home Basic. Windows 7 Home Premium.

Which edition(s) of Microsoft Windows 7 cannot participate in a Windows domain? (Select all that apply)


Kaugnay na mga set ng pag-aaral

PrepU Chapter 23: Asepsis and Infection Control

View Set

What month is your birthday? 🎂 你的生日是幾月?

View Set

Fetal Thorax/ Neural Axis (ch59/60)

View Set

Generative Design for Industrial Applications

View Set

PRINCIPLES OF REAL ESTATE I SCENARIO #1

View Set