A+ Core 2 To Study
Which file system type is used by default when installing macOS on a modern workstation?
APFS APFS = Apple file system. Default file system used for Mac computers using macOS 10.13 or later
You run the command ipconfig on your laptop and see that you have been assigned an IP address of 169.254.0.56. Which category of IPv4 address is this?
APIPA
A file currently has permissions of 755. Which of the following commands would change file permission to r-xr--r--?
chmod 544 filename
Which command-line tool and option on a Windows system is used to force a background refresh of all group policy settings on a system?
gpupdate /force
Your coworker is creating a script to run on a Windows server using PowerShell. Which of the following file formats should the script use?
.ps1
Which of the following file types are commonly used by scripts in a Linux command line environment?
.sh .sh = shell script file (read and executed by Linux and macOS) .vbs = VBScript (based on Microsoft's Visual Basic prog. language) .ps1 = Powershell .js = JavaScript
A coworker is creating a file containing a script. You look over their shoulder and see "#!/bin/bash" as the first line in the file. Based on this, what type of file extension should this script use?
.sh a shell script is a file that contains a list of commands to be read and executed by the shell in Linux and macOS. Always begins with #!/bin/bash, which instructs the operating system to execute the script.
Dion Training uses DHCP to assign private Class A IP addresses to its Windows 10 workstations. Which of the following IP addresses is a Class A address?
10.5.34.15 Class A range: 10.0.0.0 to 10.255.255.255.255 Class B range: 172.16.0.0 to 172.31.255.255 Class C range: 192.168.0.0 to 192.168.255.255 APIPA/link-local range: 169.254.0.0 to 169.254.255.255
Which of the following IP addresses is considered an APIPA address?
169.254.125.154
Which of the following backup rotation schemes requires backups to be stored to at least two different types of media?
3-2-1 Backup 3-2-1 Backup: states that an organization should create one primary backup and 2 copies of the data, save the backups to two different types of media, and keep one copy of the backup off-site.
Which of the following backup rotation schemes requires at least one monthly full backup to be stored safely off-site?
3-2-1 Backup The 3-2-1 backup rule states that an organization should create (3) one primary backup and two copies of the data, (2) save the backups to two different types of media, and (1) keep at least one backup copy off-site
You are partitioning a 1 TB hard drive on a new workstation. The hard disk has been partitioned into four different partitions with 100 GB, 150 GB, 250 GB, and 500 GB. How many different file system types could you support on this 1 TB hard drive?
4 Since there are 4 distinct partitions, it can support up to 4 different file systems.
What is the minimum amount of storage space required to install Windows 11 (x64) on a device?
64 GB Windows 11: 64GB Windows 10 32 Bit: 16GB Windows 10 64 Bit: 32GB
You have decided that you wanted to install a second operating system on your computer. After installing the OS and rebooting the computer, you see the "Operating System Not Found" error on your display. You verify that the boot.ini file is configured properly, but the error still appears. What is MOST likely causing this error?
An incompatible partition is marked as active
Which of the following should be used to uniquely identify every piece of hardware installed on the corporate network, including servers, desktops, laptops, printers, and monitors?
Asset ID The asset ID should be used to uniquely identify each piece of hardware tracked in an asset management database. Can be configured to store as much of as little data necessary.
What type of structure is "IF THEN ELSE" in scripting?
Branch A branch is used to control the flow within a computer program or script, usually based on some logic condition.
An attacker is using a word list that contains 1 million possible passwords as they attempt to crack your Windows password. What type of password attack is this?
Dictionary Dictionary attack uses a list of common passwords to crack a user's password.
Which of the following file system formatting types should be used with older recordable optical discs?
CDFS (CD File System) CD File System is a legacy file system used for CD optical disc media
Peter is attempting to print to his office printer, but nothing comes out. Yesterday, his printer was working just fine. Peter does not notice any errors on the taskbar's printer icon. Which of the following actions should Peter try FIRST to solve this issue?
Check the status of the print server queue The system properly sent the print job to the print queue, but the print queue has become stuck.
Your Android device's battery is advertised to last 12 hours, but it drains almost completely within 90 minutes. What should you do FIRST to try and solve this problem?
Check which apps are using the most battery life.
Which of the following should you use to remove any usernames and passwords that you no longer wish to store in Windows 10?
Credential manager
Which of the following types of backups only copies data modified since the last full backup?
Differential Differential backup only creates a copy of the selected data that has been modified since the last full backup (which takes the longest to backup and the least to restore)
Your home network is configured with a long, strong, and complex pre-shared key for its WPA3 encryption. You noticed that your wireless network has been running slow, so you checked the list of "connected clients" and see that "Bob's Laptop" is connected to it. Bob lives downstairs and is the maintenance man for your apartment building. You know that you never gave Bob your password, but somehow he has figured out how to connect to your wireless network. Which of the following actions should you take to prevent anyone from connecting to your wireless network without the proper WPA3 password?
Disable WPS WPS is vulnerable to a brute-force attack and is easily compromised, so it should be disabled on all wireless networks. Bob could've easily entered the apartment and clicked the WPS button to configure his laptop with the network.
Dion Training is building a new computer for its video editor to use. The new computer will use an octa-core Intel processor, 3 TB of DDR4 memory, and a RAID 0 with two 4 TB SSDs for optimal performance. Which of the following editions of Windows 10 would support all of this computer's memory properly?
Enterprise (or pro for workstations) These two versions are designed to run on devices with high-performance configurations
Dion Training has configured Windows Defender Firewall on all of its corporate Windows 10 laptops. When connected to a public network, the firewall has been configured to allow only inbound connections that match an existing rule and to only allow outbound connections that do match an existing rule to achieve the highest level of security. What type of security posture has Dion Training implemented?
Explicit allow for inbound, explicit allow for outbound Explicit allow refers to a security posture where the system will only allow an item to traverse the firewall if the traffic matches an existing rule. Implicit allow refers to a security posture where the system will only allow an item to traverse the firewall if the traffic matches an existing rule.
Madison is trying to open up her anti-malware solution to run a full system scan because she suspects her computer has become infected. When she attempts to run the tool, an error of "Access denied" is received. What security issue is MOST likely occurring?
File permission change
Elizabeth was replacing a client's security device that protects their screened subnet. The client has an application that allows external users to access the application remotely. After replacing the devices, the external users cannot connect remotely to the application anymore. Which of the following devices was MOST likely misconfigured and is now causing a problem?
Firewall Firewall ruleset was not configured to allow external users to access the application remotely
Which of the following types of software CANNOT be updated via the Windows Update program?
Firmware updates
Which of the following backup rotation schemes uses a three-tiered approach to ensure at least one monthly full backup is conducted?
Grandfather-father-son GFS backup rotation scheme is widely used to combine full and incremental backups to reduce backup time and enhance storage security. Grandfather: full backup that is stored off-site once per month Father: weekly full backup that is conducted Son: Incremental of differential backup conducted each day
Chris just downloaded a new third-party email client for his smartphone. When Chris attempts to log in to his email with his username and password, the email client generates an error messaging stating that "Invalid credentials" were entered. Chris assumes he must have forgotten his password, so he resets his email username and password and then reenters them into the email client. Again, Chris receives an "Invalid credentials" error. What is MOST likely causing the "Invalid credentials" error regarding Chris's email client?
His email account requires multi-factor authentication
Which version of Windows 10 does NOT support joining a domain or using Group Policy management?
Home Group Policy (GP) is a Windows management feature that allows you to control multiple users' and computers' configurations within an active directory environment.
You recently read a news article about a new crypto-malware worm that is causing issues for corporate networks. Today, you noticed that four of your company's workstations had their files encrypted. You are worried about the rest of the network's workstations. What should you do FIRST?
Immediately quarantine the affected workstations Based on the scenario, the four workstations have likely been infected. You should immediately isolate and quarantine the workstations to prevent the infection from spreading across the network.
A user is complaining about slow data speeds when they are at home in a large apartment building. The user uses Wi-Fi when they get home, and the device works fine on other wireless networks they connect to. Which of the following actions should the user take to increase their data speeds?
Increase the Wi-Fi signal being transmitted by their WAP
You are working at the Dion Training headquarters in Puerto Rico. The island just suffered a power outage due to a hurricane. The server room in the headquarters has power, but the rest of the office does not. You verify that the diesel generator is running at full electrical load capacity. Which of the following solutions should you recommend to Dion Training to allow them to continue working during a long-term power outage?
Increase the capacity of their backup generator to support a larger load
While investigating a data breach, you discover that the account credentials used belonged to an employee who was fired several months ago for misusing company IT systems. The IT department never deactivated the employee's account upon their termination. Which of the following categories would this breach be classified as?
Insider Threat Current or former employee, contractor, or business partner who has or had authorized access to an organization's network and intentionally misused that access Zero day is as vulnerability in a software unpatched by the developer or a attack that exploits such a vulnerability.
A corporate workstation was recently infected with malware. The malware was able to access the workstation's credential store and steal all the usernames and passwords from the machine. Then, the malware began to infect other workstations on the network using the usernames and passwords it stole from the first workstation. The IT Director has directed its IT staff to develop a plan to prevent this issue from occurring again. Which of the following would BEST prevent this from reoccurring?
Install an anti-virus or anti-malware solution that uses heuristic analysis Heuristic analysis is a method employed by many computer anti-virus programs designed to detect previously unknown computer viruses and new variants of viruses already in the wild. The other options may be able to monitor and detect the issue but not prevent it from spreading.
Another technician tells you that they are PXE booting a computer. What is the technician MOST likely doing with the computer?
Installing an image to the computer over the network The Prebook eXecution Environment (PXE) specification described a standardized client-server environment that boots a software assembly, retrieved from a network, on PXE-enables clients. It allows a workstation to boot from a server on a network before booting the local hard drive's operating system.
Which of the following data types would be used to store the number 21?
Integers
A home user brought their Windows 10 laptop to the electronics store where you work because they suspect it has a malware infection. Which of the following actions should you perform FIRST?
Investigate malware symptoms
Tim has created a new iOS application that he wants to install on an iPad without having to install it through the official App Store. To save some money, he has not purchased a developer certificate from Apple since he isn't planning to sell this app to others. Which of the following would allow Tim to install this unofficial app on his own iPad for testing?
Jailbroken device
Your company recently downloaded and installed the latest audio card driver for all of its workstations. Now, several users have had their usernames and passwords for several websites compromised. You believe the two issues are related. If they are, which of the following was MOST likely contained in the audio card driver file that was installed?
Keylogger
Which of the following tools in Windows 10 allows a technician to add different utilities, such as disk management, computer management, performance monitor, print management, and others to create a modular and customized tool kit for the technician to utilize?
MMC The Microsoft management console (MMC) is a utility that uses snap-ins for various Windows tools to perform operations a local or networked computer.
What kind of attack is an example of IP spoofing?
On-path attack An on-path attack intercepts communications between two systems.
An employee's inbox is now filled with unwanted emails after their email password had been compromised last week. You helped them reset their password and regain access to their account. Many of the emails are coming from different email addresses such as @yahoo.com, @gmail.com, and @hotmail.com. Which of the following actions should the user take to help reduce the amount of spam they receive?
Mark each email as spam or junk
A network technician is tasked with designing a firewall to improve security for an existing FTP server on the company network. The FTP server must be accessible from the Internet. The security team is concerned that the FTP server could be compromised and used to attack the domain controller hosted within the company's internal network. What is the BEST way to mitigate this risk?
Migrate the FTP server from the internal network to a screened subnet A screened subet (or DMZ) is a perimeter network that protects an organization's internal local area network (LAN) from untrusted traffic.
Windows file servers commonly hold sensitive files, databases, passwords, and more. What common vulnerability is usually used against a Windows file server to expose sensitive files, databases, and passwords?
Missing patches Missing patches are the most common vulnerability found on both Windows and Linux systems
Which of the following tools should a technician use to modify the HOSTS file on a Windows 10 system to solve a website address resolution issue?
Notepad
A customer runs frantically into your computer repair store. He says that his smartphone fell into a puddle, and now it won't turn on. He excitedly tells you that he needs the smartphone working again "right now" and cannot wait. What should you do?
Offer the customer the option to replace his phone
You have decided to have DNA genetic testing and analysis performed to determine your exact ancestry composition and possibly find some lost relatives through their database. Which of the following types of data should this be classified?
PHI Protected health information (PHI) refers to medical and insurance records, plus associated hospital and laboratory test results. Personally identifiable information (PII) is data that can be used to identify, contact, or locate an individual. (SSN, name, DOB) Intellectual property (IP) is information created and owned by the company, typically about products of services they make or perform. Controlled Unclassified Information (CUI) is a federal non-classified information that must be safeguarded by implementing a uniform set of requirements and information security controls to secure sensitive govt. info
Which of the following is considered a form of regulated data?
PII (Personally Identifiable Information) PII is data used to identify, contact, or locate an individual (SSN, Name, DOB, etc.)
A company has had several virus infections over the past few months. The root cause was determined to be known vulnerabilities in the software applications in use by the company. What should an administrator implement to prevent future outbreaks?
Patch Management Since the viruses exploited known vulnerabilities, there should be patches available from the manufacturer / vendor.
You have submitted an RFC to install a security patch on all of your company's Windows 2019 servers during the weekly maintenance window. Which of the following change request documents would describe how the installation of the change will be performed during this maintenance window?
Plan The plan of the change defines how the change or installation will occur.
Your company has just installed a brand new email server, but you determined that the server cannot send emails to another server during your initial testing. You decide to check the firewall's ACL to see if the server's outgoing email is being blocked. Which of the following ports should you ensure is open and not blocked by the firewall?
Port 25 (SMTP)
When using an MBR, which of the following types of partitions can only have up to four partitions?
Primary Primary partitions are limited to only four primary partitions on a system using MBR. To overcome this limitation, extended partitions are used.
You have submitted an RFC to install a security patch on all of your company's Windows 2019 servers during the weekly maintenance window. Which of the following change request documents would describe why the change will be installed during this maintenance window?
Purpose The purpose of the change defines why the change or installation will occur.
You are working as a mobile device technician for a large corporation's enterprise service desk. A user complains that every time they attempt to launch the company's mobile email application, it crashes and displays an error message of Code123. Which of the following should you do FIRST to attempt to solve this problem?
Reinstall the email app
A home user brought their Windows 10 laptop to the electronics store where you work because they suspect it has a malware infection. You are in the process of remediating the infected system. Which of the following actions should you be performing?
Remove, quarantine, or erase the infected files
Susan is installing several updates on a Windows computer. Nine of the updates were installed without any issues, but one update produced an error and failed to install. Susan restarts the computer as part of the troubleshooting process, and the computer automatically attempts to install the failed update again. Again, the update fails to install. What should Susan do NEXT?
Research the error number for the failed update and determine if there is a known issue with the update.
A macOS user is browsing the internet in Google Chrome when they see a notification that says, "Windows Enterprise Defender: Your computer is infected with a virus, please click here to remove it!" What type of threat is this user experiencing?
Rogue anti-virus Rouge anti-virus is a form of malicious software and internet fraud that misleads users into believing there is a virus on their computer and to pay money for a fake malware removal tool
You are a member of a project team contracted to install twenty new wireless access points (WAPs) for a college campus. Your team has already determined the locations for the new WAPs and notated them in the physical and logical network diagrams. Your team is still finalizing the change request documents for the installation. The project cannot move forward with the installation until the change request is finalized and approved. Which of the following is the MOST important thing to add to the scope of work and change request before its approval?
Rollback Plan
Dion Training wants to implement a new wireless network using WPA3 in their offices. Which of the following features of WPA3 is used to provide a password-based authentication using the dragonfly handshake instead of the older WPA 4-way handshake?
SAE SAE is a password based authentication and password-authenticated key agreement method used in WPA3 that replaced the 4-way handshake used in WPA based networks
Which of the following would a technician use when trying to find the exact steps required to install a custom software package within their organization?
SOP Standard operation procedure (SOP) is an inflexible, step-by-step listing of the actions that must be completed for any given task. Material Safety Data Sheet (MSDS) is a document that contains information on the potential hazards and how to work safely with the chemical product. Statement of work (SOW) or a scope of work, is a document that outlines all the work that is to be performed, as well as the agreed-upon deliverables and timelines.
What is the FIFTH step of the seven-step malware removal process?
Schedule scans and run updates 1. Investigate and verify malware symptoms 2. Quarantine the infected systems 3. Disable System Restore in Windows 4. Remediate the infected systems, update anti-malware software, scan the system, and use removal techniques 5. Schedule scans and run updates 6. Enable System Restore and create a restore point 7. Educate the end user
You have submitted an RFC to install a security patch on some of your company's Windows 2019 servers during the weekly maintenance window. Which of the following change request documents would describe which servers will receive the patch during this maintenance window?
Scope The change's scope defines the area, number, size, or scale of a particular change.
A user contacts the service desk, stating their account is locked out, and they are unable to login to their local workstation. Which of the following log files should you review to determine the source of the lockout on the local workstation?
Security log The event viewer shows a log of application and system messages, including errors, information messages, and warnings.
Jason's company issued him an old 2018 laptop with an internal hardware security key that he uses to connect to his office network over a VPN while traveling. Without this laptop, Jason cannot access his company's internal servers, email, or share drive files. The Windows 10 laptop is extremely slow, and the screen recently cracked and needs to be replaced. When Jason returns to the company's headquarters, the company will provide him with a new laptop due to the broken screen. Until then, he is working out of his hotel room during a 45-day business trip and needs to continue using this laptop. Jason brings the laptop to the computer store you work at and asks for your assistance. Which of the following do you recommend?
Sell him an external 15" tablet/monitor to connect to the laptop as a workaround. Since the laptop has an internal hardware key, if he replaces it then he will not be able to connect to the corporate network over the VPN.
You are renting space in another company's data center. To protect your server from being physically accessed when you are not in the building, what device should you use?
Server lock A server lock is a physical locking mechanism installed on a server cabinet to prevent unauthorized users from accessing the servers.
Which of the following types of attacks are usually used as part of an on-path attack?
Spoofing Spoofing is often used to inject the attacker into the conversation path between the two parties. Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source.
Which of the following contains virtual memory that can supplement the physical system memory in a Linux system?
Swap partition The swap partition on a Linux system is a portion of the hard disk formatted with a minimal kind of file system and used in situations when the operating system runs out of physical memory and needs more of it.
Which of the following types of backups generates the recovered files from a complete copy of a file created at some point in time and one or more partial backups created at later times to merge them into the recovered data?
Synthetic Synthetic backup is the process of generating a file from a complete copy of a file created at some past time and one or more incremental copies created at later times. Synthetic == merged together, not a direct copy of a current or previously created file
Which of the following authentication protocols was developed by Cisco to provide authentication, authorization, and accounting services?
TACACS+ TACACS+ is an extension to TACACS (Terminal Access Controller Access Control System) and was developed as a proprietary protocol by Cisco.
You are troubleshooting a network printer when a document is printed with sensitive employee data on it. Which of the following actions should you take?
Take the document to the office manager
You are troubleshooting a user's workstation that is operating extremely slowly. You open the Task Manager and see that only Microsoft Word is currently running, but the CPU and network utilization is consistently running between 95-100%. Which of the following is MOST likely causing this issue?
The computer has become a zombie A zombie is any workstation running unauthorized software that directs the device to participate in a DDoS attack as part of a larger botnet. Botnet: network of computers that have been compromised by a Trojan, rootkit, or worm malware.
You are configuring a Windows 10 Professional workstation to connect to the Dion Training domain. To provide additional security to its users, Dion Training requires that all uses route their internet traffic through a server located at 10.0.0.15 for inspection before it is sent to the internet. Once inspected, the server will route the traffic to the WAN router whose IP is 10.0.0.1. Which of the following settings should be configured on the workstation to achieve this?
Under Internet Options, configure the proxy server address as 10.0.0.15 A proxy server is a web server that acts as a gateway between a client application.
Which of the following must be enabled to allow a video game console or VoIP handset to configure your firewall automatically by opening the IP addresses and ports needed for the device to function?
UPnP Protocol framework allowing network devices to auto-configure services, such as allowing a games console to request appropriate settings from a firewall
A laptop is running Windows 10 with Windows Defender on it. A user believes their laptop may have become infected with malware, so they install a second antivirus program that supposedly includes real-time protection. Now, the laptop is sluggish and sometimes non-responsive. Which of the following should you do FIRST to resolve this problem?
Uninstall the real-time protection antivirus
You are working as a mobile device technician for a large corporation's enterprise service desk. A user complains that every time they attempt to launch the company's mobile email application, it crashes and displays an error message of Code123. This is the third user with this error on an Android (model DTA) smartphone. The same app is working on your smartphone, but it is a model DTX. Which of the following should you do FIRST to attempt to solve this problem?
Update the smartphone's OS Since the issue is occurring on multiple devices with the same model, it would be a better first step to update the smartphone's OS.
Which of the following open-source remote access tools allows users to connect to their desktop remotely, see what is on their screen, and control it with their mouse and keyboard?
VNC VNC (virtual network computing) is a remote access tool and protocol used for screen sharing on Linux and macOS. RDP is not open source (developed by microsoft)
Which of the following types of encryption uses a 128-bit encryption key but is considered weak due to its use of a 24-bit initialization vector?
WEP
Which of the following types of wireless encryption uses a 40-bit encryption key with an RC4 encryption cipher?
WEP WEP: Based on the RC4 encryption cipher. Uses a 40-bit encryption key and a 24-bit initialization vector by default, creating a 64-bit key. WPA: Uses RC4 cipher and a temporal key integrity protocol (TKIP) WPA2: Uses AES cipher with counter mode with cipher-block chaining message authentication protocol (CCMP) for encryption
Which of the following should be implemented to allow wireless network access for clients in the lobby using a shared password as the key?
WPA2
A small doctor's office has asked you to configure their network to use the highest levels of wireless security and desktop authentication. The office only uses cloud-based SaaS applications to store their patient's sensitive data. Which TWO of the following protocols or authentication methods should you implement for the BEST security?
WPA2 and Multifactor
Dion Training wants to implement a new wireless network in their offices. Which of the following types would support encryption for traffic being sent and received over the network while still allowing users to connect to the open network without a password, passphrase, or digital certificate?
WPA3 One of the features of WPA3 is enhanced open, which allows encryption for traffic being sent and received over a wireless network when still using open authenticaiton/
Which of the following types of attacks occurs when an attacker specifically targets the CEO, CFO, CIO, and other board members during their attack?
Whaling Whaling is an email-based or web-based form of phishing that targets senior executives or wealthy individuals.
A cybersecurity analyst from BigCorp contacts your company to notify them that several of your computers were seen attempting to create a denial of service condition against their servers. They believe your company has become infected with malware, and those machines were part of a larger botnet. Which of the following BEST describes your company's infected computers?
Zombie
You attempt to boot a Windows 10 laptop and receive an "Operating System Not Found" error on the screen. You can see the hard disk listed in the UEFI/BIOS of the system. Which of the following commands should you use to repair the boot sector of the hard disk?
bootrec /fixboot
Which Linux command is used to print the full contents of a file to the screen at once?
cat cat command allows the creation of singel or multiple files, view file contents, concatenate files, and redirect output in the terminal to a file.
Which command-line tool is used on a Windows system to move upward in a directory within the system's directory structure?
cd .. cd .. will move up one directory. cd . will remain the the current directory.
Which of the following commands is used on a Linux system to convert and copy files from one hard disk to another?
dd The dd command is used to convert and copy files
You are formatting a 4 TB external hard drive on your MacBook. The drive will be used to share files large video files between your MacBook and your friend's Windows 10 desktop. Which file format should you use?
exFAT The only file system format that would work for this situation is exFAT. macOS can format a hard drive as APFS, HFS+, HFS, exFAT, or FAT32, but the Windows system would only be able to read exFAT or FAT32. FAT32 only allows drive size up to 32GB and file sizes up to 4GB. exFAT supports up to 128 petabytes
Which command would a Linux user need to enter to change their password?
passwd
What umask should be set for a directory to have 700 as its octal permissions?
rwx------ RWX is 7 and --- is 0.
While troubleshooting the reason that the File Explorer is crashing on a Windows 10 machine, you determine that some of its files may have become corrupt. Which of the following utilities should you use to correct this?
sfc The system file checker (sfc) command is a utility in Windows that allows users to scan for and restore corrupted Windows files from the command line. dxdiag is used to troubleshoot problems with DirectX sound and video.
Your boss has asked you to write a script that will copy all of the files from one hard drive to another each evening. This script should mirror the directories from one drive to the other and ensure they are synchronized each evening. Which command-line tool should you use in your script?
the robocopy tool is used to mirror or sync directories and their contents. xcopy tool copies all the files from one directory to another.