102.1

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following environment variables is used to access the absolute file path of the Windows system folder

%SystemRoot%

You have created a script file that runs in the Windows Command Prompt environment (CMD.EXE) or in its DOS-based predecessors. What is the extension of this script file

.bat (batch file)

Which of the following gpupdate tool options reapplies all policies, even those which haven't been changed?

/force

is an interface to manage built-in utilities to secure and protect the computer

Action Center

In which of the following attacks does an attacker intercept and relay communications between two points and impersonate each party in the eyes of the other

Man-in-the-middle

Startup tab

Manage which programs start with a Windows login Has moved to the Task Manager in Windows 8/8.1 is used to enable or disable startup programs, which can help to troubleshoot a computer that's slow to start

Which of the following NTFS permissions gives the read and write permissions to a user and allows the user to delete the folder?

Modify

When you log into your account, you press a button on your keychain and then type in the new set of numbers it displays. What digital authentication element are you using

OTP (one time password)

common system requirements to install and run an application on a computer

Operating system Drive space CPU RAM Network Graphics Other hardware Services

Which user group exists on Windows but has no special privileges and can be customized to make a general set of "privileged user" permissions?

Power Users

Which of the following installation types is used to install an operating system from an image on a network server using PXE or NetBoot

Remote network

is used to display information about all the Windows services that are installed on the computer. Windows services control all aspects of the operating system's interaction with the computer and the network

Services administrative tool

Which of the following can hold digital certificates, store temporary data, or even perform cryptographic processing functions to keep its data secure

Smart card

Remote Authentication Dial-In User Service (RADIUS)

a protocol that enables a server to provide standardized, centralized authentication for remote users

Active Directory Certificate Services (AD CS)

allows the Active Directory network to maintain a public key infrastructure. It creates, validates, and revokes digital certificates wherever they might be needed on the network to identify users or computers, encrypt files or email, or establish secure VPN connections

KVM over IP

allows users to access servers located at remote locations through the Internet using IP addresses of servers

The Backup Operators

can back up and restore files from anywhere on the computer, regardless of individual file and folder permissions. While the Backup Operator privilege overrides any normal file system permissions, members of this group have no special power to change security settings

botnet

can be used to perform distributed denial-of-service attack, steal data, send spam, and allows the attacker to access the device and its connection

The Users

can perform common tasks and run most applications. They can't share folders, install printers, or generally change any system-wide settings that can affect other users or put system security at risk

Event Viewer

checked to troubleshoot spontaneous shutdown and restart

Make Directory (md)

command creates a folder with the specified name

Remove Director (rd)

command deletes the specified folder and its contents

Change Directory (cd)

command moves the command prompt to the specified folder

IPCONFIG

displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings

Which of the following Linux commands helps the users to find files with specific words or phrases

grep

Guest User

have much more limited permissions and can't customize settings, install software, or even change their own passwords. Guest accounts aren't protected by passwords and use a temporary profile that's deleted at logoff. Windows versions that include a Guest account generally disable it by default

Spoofing

human-based or software-based attack where the goal is to pretend to be someone else for the purpose of identity concealment

Preboot Execution Environment (PXE)

is a booting or installation technique in which a computer loads the operating system from a connected network rather than from a boot device

System Restore

is a feature that automatically saves configuration settings periodically or before system changes

Windows Resource Protection

is a feature that runs in the background to protect critical system files, folders, and registry keys from unplanned alterations

Digital certificate

is a file created and signed using special cryptographic algorithms

Service Level Agreement (SLA)

is a legally binding service contract between a service provider and the end-user

Adware

is a malware that delivers advertisements to the infected system, either as pop-ups or within browser or other application windows

Extensible Authentication Protocol (EAP)

is a protocol that enables systems to use hardware-based identifiers, such as fingerprint scanners or smart card readers, for authentication

Active Directory Federation Services (ADFS)

is a single sign-on system that uses the common Internet standard SAML instead of LDAP. It is intended for use over the Internet, and for integrating services with other organizations

Mobile Device Management (MDM)

is a software designed to centrally administer devices in order to assign device permissions, verify security compliance, apply updates, and even monitor activity

Microsoft Management Console (MMC)

is a tool that is used to manage a Windows operating system and the computer on which it is running, as well as the network and other computers and services on the network

Magnetic stripe card

is a traditional machine-readable card, such as a bank or transit card, with a magnetic stripe to store user data

Distributed denial of service (DDoS)

is a type of DoS where a single target is flooded by traffic from many individual computers, often spread across the Internet

entry control roster

is a type of register which maintains the record of the persons who are allowed into high security areas

Local Policy Editor

is a utility which allows you to edit group policies for the entire computer

DNS hijacking

is an attack in which an attacker giving false replies to DNS requests sent by a host, in order to redirect traffic to a malicious or fraudulent site

Shoulder surfing

is an attack which is used to obtain information such as personal identification numbers, passwords, and other confidential data by looking over the victim's shoulder

Active Directory Rights Management Services (AD RMS)

is an information rights management service that can encrypt and limit access to specific types of information on the domain, such as emails, Word documents, webpages, and so on. It can be used to centrally secure access to sensitive information wherever it is stored on the domain

Action Center

is an interface to manage built-in utilities to secure and protect the computer

Network and Sharing Center

is an interface to manage the computer's network controllers and connections

Lightweight Directory Access Protocol (LDAP)

is an open, vendor-neutral, industry-standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network

%TEMP%

is the environment variable which is used to access a folder where programs can safely store temporary files

%CD%

is the environment variable which is used to access the current folder

%APPDATA%

is the environment variable which is used to access the current user's application data folder

MSCONFIG

is used to troubleshoot a system that boots into safe mode

spyware

malware specifically designed to gather information about user and computer activities to send to other parties, often through a backdoor

Rootkit

malware that compromises boot systems and core operating system functions in order to hide from most detection methods

Tailgating

physical security breach in which an unauthorized person follows an authorized individual to enter a secured premise

Active Directory Lightweight Directory Services (AD LDS)

provides directory services independent of the Windows domain model. You might find it used in networks which need authentication for distributed applications, or when it's useful to install a directory on a computer that isn't a domain controller

.ps1

script designed to run in the Windows PowerShell enviroment

Service Tab

settings is used to enable or disable Windows services on the computer to troubleshoot system problems

.sh

shell script that designed to run in a Unix style command shell such as bash or csh

short battery life

symptom of mobile system and app issues is caused by brightness settings set too high, or too many applications and services running at one time.

overheating

symptom of mobile system and app issues is caused by improper ventilation, excessive processor use, or too many applications and services running at one time

system lockout

symptom of mobile system and app issues is caused by security response to failed logon attempts

Digital Rights Management (DRM)

technologies that let copyright owners control the level of access or use allowed for a copyrighted work, such as limiting the number of times a song can be copied

Virtual Network Computing (VNC)

uses the Remote Frame Buffer (RFB) protocol, which allows the client and server to determine the best version of RFB they can support during a session

dir

using a Windows 8 computer and wants to display a list of files and folders within a directory. Which of the following commands will he use to complete the task

Voice over IP (VoIP)

voice over data implementation in which voice signals are transmitted over IP networks

Remote Desktop

wants to log into a user's computer to fix the user's corrupt local profile. Which of the following will allow him to connect to the user's computer

Use REGSVR32

working on a Windows computer and get to know that some necessary DLL files are missing. Which of the following will you do to troubleshoot the missing DLL files

net command

Which of the following commands can be used to manage network shares, network print jobs, and network users

Event Viewer

Which utility shows a log of application and system messages, including errors, information messages, and warnings

Windows 7 upgrade

Windows 10

Windows 8.1 upgrade?

Windows 10

Windows 7 upgrade?

Windows 8.1

Windows 8 upgrade?

Windows 8.1

In which of the following Mac OS X versions was dark mode introduced to reduce eye strain

10.14 Mojave

Which is a system utility that is specifically used to troubleshoot issues that can arise during system startup

MSConfig

Boot tab

Control the boot location Advanced options - Number of processors, maximum memory, etc. Boot options - Safe boot, GUI, create a log file, base video is used to see all the copies of Windows installed, set a default operating system, and delete an operating system

Software token

Is a stored file used to describe temporary authentication and authorization data stored on and exchanged between computers in single sign-on environments

Which of the following types of malware silently tracks and records all user input to gather information about the user and send to other parties?

Keylogger

Frozen System

Which of the following symptoms of mobile system and app issues is caused by lack of sufficient storage, too many applications running at one time, or low battery?

To troubleshoot application crashes or compatibility errors in a Windows computer, you should take the following steps

Apply application updates. Perform a repair install of the application from Control Panel or Settings. Change the operating mode of the application on the Compatibility tab of the application's Properties dialog box

to install Windows on his Mac system by repartitioning the hard drive. Which of the following Mac OS features will you use in this situation

Boot Camp

Which of the following administrative tools is used to configure object sharing between applications

Component Services

is used to access a variety of management and troubleshooting tools in one place

Computer Management administrative tool

RDP (Remote Desktop Protocol)

Which provides remote display and input capabilities over network connections for Windows-based applications running on a server

the probable causes of the occurrence of the Blue Screen of Death (BSOD) error are

Device drivers Memory Malware infection

keeps a log of all recorded system and application events. This includes sign-on attempts, shutdown signals, system crashes, device driver errors, and many more scenarios that can help identify where problems exist

Event Viewer

Which format is used to check for bad sectors on the physical disk before installing the file system structure

Full

Which of the following can be used with disks of any size and allows an almost unlimited number of partitions

GPT (GUID Partition table)

hich of the following tabs of the system configuration settings is used to choose the type of startup for the next time the computer boots, to troubleshoot system startup problems

General

statements are true about the homegroup sharing model

Homegroups are created by one user and can be joined by anyone with a shared password. Computers already in workgroups can create or join homegroups. Computers in domains can join homegroups, but not create them. Home and business editions of Windows can join homegroups, but Windows Server editions might not be able to. Computers on a homegroup continue to use their local or domain accounts. Each user on the homegroup can choose whether to share any of a list of commonly shared items. Unlike workgroups and domains, homegroups don't have unique names

is an enhanced security feature of Windows that prevents unauthorized changes to the computer, either by prompting for permission or requiring the administrator password

User Account Control (UAC)

SMTP (Simple Mail Transfer Protocol)

Which is an application layer protocol that enables the transmission and delivery of email over the Internet

Which is an attack in which the attacker sends unsolicited emails or other electronic messages with undesired or malicious content?

Spam

Which of the following is a complete application installer which requires a network connection to download the applications but once downloaded, the user has all the files that are needed

Standalone

is used to schedule administrative tasks using an executable program

Task Scheduler administrative tool

main page of the System settings

The Windows edition you have installed, and any service packs that have been applied. Basic information about the processor, memory, and system type, either 32-bit or 64-bit. The computer name and its membership in a workgroup or domain. Windows' activation status

Which of the following Mac OS tools creates an incremental backup of files that can be restored at a later date

Time Machine

Why does the commercially distributed software and media make use of digital rights management (DRM)

To enforce copyright restrictions

The following are the troubleshooting steps which can be performed to correct problems with a slow Windows startup

Use MSCONFIG to disable unnecessary startup applications and services. Enable Fast Startup from the Power Options. Update drivers. Perform a refresh or factory reset of your computer, after backing up data


Ensembles d'études connexes

POSI 2310: Topic 3.2 Ch.7 Political Participation

View Set

ECON210 Chapter 3—Supply & Demand

View Set

Practicing Texas Politics Chapter 9

View Set