A2 part 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following characters indicates that a Windows network share is intended for administrative access? # $ ? &

$

Which netstat parameter allows to display all connections and listening ports? -a -p -e -r

-a

Which of the following netstat parameters displays addresses and port numbers in numerical form? -b -n -q -r

-n

Which of the following answers lists the filename extension of a Microsoft PowerShell script files? .py .vbs .sh .ps1

.ps1

Files with this filename extension are used in a scripting language based on the Microsoft's Visual Basic programming language. .vb .sh .vbs .js

.vbs

Which shutdown command switch enables aborting a system shutdown? /a /q /e /p

/a

Which ipconfig parameter allows to view the physical address of a Network Interface Card (NIC)? -S srcaddr /all -i address eth_addr

/all

Which of the answers listed below refers to an ipconfig command parameter used for displaying the full TCP/IP configuration information for all adapters? -a /? /all /a

/all

Which shutdown command switch in Microsoft Windows Command Prompt forces full system shutdown and restart of a Windows host? -s -r /r /s r -i

/r

Which sfc switch enables a type of file check that scans integrity of all protected system files and repairs corrupted files when possible? /scannow /verifyonly /scanfile /verifyfile

/scannow

Which copy command switch verifies that the new files are written correctly? /-y /v /y /a

/v

Which of the copy command switches suppresses the confirmation prompt displayed when Windows is about to overwrite the contents of an existing file? /v /y /a /-y

/y

The GPT partition style extends the MBR's primary partition limit to:

128 partitions

Which of the following is an example of a soft token? USB token Authenticator app Smart card Key fob

Authenticator app

Which of the following statements apply to the definition of a computer virus? (Select 3 answers) A self-replicating computer program containing malicious segment Requires its host application to be run to make the virus active A standalone malicious computer program that replicates itself over a computer network Can run by itself without any interaction Attaches itself to an application program or other executable component A self-contained malicious program or code that does need a host to propagate itself

A self-replicating computer program containing malicious segment Requires its host application to be run to make the virus active Attaches itself to an application program or other executable component

Which of the following statements describing share permissions in MS Windows are true? (Select 2 answers) Apply only to network users Can be set on a file level Apply to both network and local users Can be set on a folder level

Apply only to network users Can be set on a folder level

A rule-based access control mechanism implemented on routers, switches, and firewalls is known as: ACL CSR DLP AUP

ACL

Which of the following is a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object? DLP NAT ACL DEP

ACL

Which of the following cryptographic algorithms is the least vulnerable to attacks? AES DES RC4 3DES

AES

Asymmetric algorithms

AES, 3DES, RC4, Blowfish, and Twofish

Which of the following is a package management system most often used on Debian and Debian-based Linux distributions? KDE APT Yum RPM

APT

A type of document stipulating rules of behavior to be followed by users of computers, networks, and associated resources is called: SLA EULA AUP BPA

AUP

Which of the following answers refer(s) to the Windows Remote Assistance utility? (Select all that apply) Access based on one-time password Temporal remote access Access based on local password (local user account password) The host and invited user can both see the host's screen Windows tool used for connecting remotely to the user's own computer The host and invited user share control over host's mouse and keyboard Permanent remote access Windows tool used for assisted remote troubleshooting

Access based on one-time password Temporal remote access The host and invited user can both see the host's screen The host and invited user share control over host's mouse and keyboard Windows tool used for assisted remote troubleshooting

Which of the following answers apply to Windows BitLocker? (Select 3 answers) Works only on systems equipped with a TPM microcontroller Accessed via BitLocker Drive Encryption applet in Windows Control Panel Shipped with all versions of Windows 8/8.1/10 Accessed via Security and Maintenance applet in Windows Control Panel Does not require a TPM microcontroller to work Not included in basic versions of Windows 8/8.1/10 (Windows 8/8.1 Core and Windows 10 Home)

Accessed via BitLocker Drive Encryption applet in Windows Control Panel Does not require a TPM microcontroller to work Not included in basic versions of Windows 8/8.1/10 (Windows 8/8.1 Core and Windows 10 Home)

A drive letter in Windows can be changed by: Accessing Disk Management, right-clicking on a drive and selecting Change Drive Letter and Paths from the context menu Accessing File Explorer, clicking on a drive and selecting Change Drive Letter and Paths from the Drive Tools menu Accessing Disk Management, right-clicking on a drive and selecting new drive letter on the General tab in the Properties menu Accessing File Explorer, right-clicking on a drive and selecting Change Drive Letter and Paths from the context menu

Accessing Disk Management, right-clicking on a drive and selecting Change Drive Letter and Paths from the context menu

A type of hierarchical database structure used in Windows Server environments that enables centralized management of devices and resources on a network is known as: HomeGroup Active Directory Workgroup Windows domain

Active directory

In Windows Disk Management utility, a partition's size can be extended into: (Select 2 answers) Adjacent space on the same disk Disk space formatted with any file system Any available space on any of the installed disks Unallocated space on the same disk Any available space on the same disk

Adjacent space on the same disk Unallocated space on the same disk

A shortcut icon to the Windows Memory Diagnostic tool (mdsched.exe) can be found in: Hardware and Sound menu in Control Panel Administrative Tools folder in Control Panel Performance Information and Tools menu System menu

Administrative Tools folder in Control Panel

Active Directory Users and Computers (ADUC) is a Microsoft Management Console (MMC) snap-in included in most Windows Server OSs. The Active Directory Users and Computers snap-in allows system administrators to manage resources in the Active Directory (AD) environment (e.g. to create, delete, disable, unlock accounts, or to reset account passwords). On a Windows Server OS, the Active Directory Users and Computers snap-in resides in: Local Users and Groups in Computer Management Windows Control Panel User Accounts in Windows Control Panel Administrative Tools folder in Windows Control Panel

Administrative Tools folder in Windows Control Panel

Windows Task Scheduler (taskschd.msc) is a component of Microsoft Windows that provides the capability to schedule the launch of programs or scripts at pre-defined times or after specified time intervals. Which of the following locations contains the application icon shortcut used for launching the Task Scheduler MMC snap-in? Ease of Access Center Programs and Features menu in Windows Control Panel Windows Command Prompt Administrative Tools menu in Windows Control Panel

Administrative Tools menu in Windows Control Panel

Which of the following tabs of the Windows Internet Properties applet provides an option for rolling back all the Internet Explorer web browser configuration settings to the state they were in when Internet Explorer was first installed? General Security Privacy Advanced

Advanced

Which tab of the System Properties (sysdm.cpl) applet in MS Windows provides access to system performance settings menu? Hardware System Protection Environment Variables Advanced

Advanced

Which of the following locations/steps allows to view network shares in Windows? Windows Command Prompt -> net share -> Enter (all network shares) Windows Run dialog box -> \computer name -> Enter (user shares only) Shared Folders menu in the Computer Management utility (all network shares) Windows Command Prompt -> net view \\computer name -> Enter (user shares only) Windows Command Prompt -> net view \\computer name /all -> Enter (all network shares) All of the above

All

Restoring data from an incremental backup requires: (Select 2 answers) Copy of the last incremental backup All copies of differential backups made since the last full backup Copy of the last differential backup All copies of incremental backups made since the last full backup Copy of the last full backup

All copies of incremental backups made since the last full backup Copy of the last full backup

If a recently installed app, driver, or update for Windows has a degrading effect on system performance, Windows Restore can be used to undo system changes by reverting the computer to a restore point. Methods for accessing Windows Restore include: Windows Run dialog box -> type in rstrui.exe + press Enter Windows Run dialog box -> type in sysdm.cpl + press Enter -> System Protection tab -> System Restore... Windows Control Panel -> System applet -> Advanced system settings -> System Protection tab -> System Restore... Windows Control Panel -> Recovery applet Windows Settings menu (Windows 8/8.1/10) All of the above

All of the above

The User Accounts applet in Windows allows to: Change local account name Change local account type Change local account password Manage another local account Change local User Account Control (UAC) settings All of the above None of the above

All of the above

Which of the following actions would be of help in troubleshooting the "Missing operating system" error message displayed during system boot? Run Startup Repair utility Use bootrec.exe to fix Master Boot Record (MBR) errors Verify that the drive is detected in BIOS Use diskpart utility to label the system partition as active All of the above

All of the above

Which of the following can be used by system/network administrators to restrict a user's ability to install software? AUP Group Policy Principle of least privilege MDM solutions All of the above

All of the above

Which of the following methods can be used to launch Windows Recovery Environment (WinRE) in Windows 8/8.1/10? Boot from installation media In Power menu, hold down the Shift key and select Restart Boot from Recovery Drive Perform system restart from the Settings menu All of the above

All of the above

The Devices and Printers applet in Windows: (Select 3 answers) Allows to add/remove wired and wireless devices Does not offer troubleshooting options Provides a simplified view of all connected devices Allows to restore a device driver to the previously installed version Provides a detailed view of all connected devices Allows to troubleshoot a device that isn't working properly

Allows to add/remove wired and wireless devices Provides a simplified view of all connected devices Allows to troubleshoot a device that isn't working properly

Which of the following describe(s) the function of Windows Task Manager? (Select all that apply) Provides tools for managing network traffic Allows to close a non-responsive application in Windows Displays information on programs, processes, and services that are currently running on the computer Allows to schedule the launch of programs or scripts at pre-defined times or after specified time intervals Provides real-time reports on how a computer running Windows OS is using system resources (CPU/RAM/HDD/Network usage) Allows system administrators for managing the currently logged-in users

Allows to close a non-responsive application in Windows Displays information on programs, processes, and services that are currently running on the computer Provides real-time reports on how a computer running Windows OS is using system resources (CPU/RAM/HDD/Network usage) Allows system administrators for managing the currently logged-in users

Which of the following locations in macOS provides access to application updates menu? Explorer App Store iCloud Spotlight

App Store

Which of the following locations in macOS provide access to multi-touch interface settings (a.k.a. Gestures)? (Select 2 answers) Apple menu -> System Preferences... -> Mouse Apple menu -> App Store... -> Categories -> Devices -> Trackpad Apple menu -> System Preferences... -> Devices -> Mouse Apple menu -> System Preferences... -> Trackpad Apple menu -> App Store... -> Categories -> Devices -> Mouse Apple menu -> System Preferences... -> Devices -> Trackpad

Apple menu -> System Preferences... -> Mouse Apple menu -> System Preferences... -> Trackpad

What is the name of a policy that allows employees to use private mobile devices for accessing company's restricted data and applications? COPE BYOD JBOD CYOD

BYOD

Which of the following are disk storage types used with MS Windows? Extended Basic Logical Dynamic Primary

Basic Dynamic

In MS Windows, a newly added drive is by default partitioned as a:

Basic disc

Examples of devices/device components regulated under special disposal procedures due to environmental/safety hazards include: (Select all that apply) PSUs Batteries CRTs Toner cartridges LCDs

Batteries CRTs Toner cartridges

Which of the following data encryption tools can be used to secure a Windows workstation? (Select all that apply) FileVault (file-level encryption) BitLocker (drive-level encryption) EFS (file-level encryption) FileVault (drive-level encryption) BitLocker To Go (removable media encryption)

BitLocker (drive-level encryption) EFS (file-level encryption)

A Microsoft Windows feature specifically designed to enable encryption of removable drives is known as: BitLocker Encrypting File System (EFS) BitLocker To Go Trusted Platform Module (TPM)

BitLocker To Go

Which of the configuration features listed below can be managed through the MSConfig Boot tab? (Select all that apply) Boot logging Diagnostic startup Startup items loaded during system boot Default OS to load in a multiboot environment Services loaded during system startup Amount of hardware resources to be used by the chosen OS in a multiboot environment (e.g. the maximum amount of RAM) Safe boot options

Boot logging Default OS to load in a multiboot environment Amount of hardware resources to be used by the chosen OS in a multiboot environment (e.g. the maximum amount of RAM) Safe boot options

In forensic procedures, a chronological record outlining persons in possession of an evidence is referred to as: Proxy list Order of volatility Access log Chain of custody

Chain of custody

A type of trusted third party that issues digital certificates used for creating digital signatures and public-private key pairs is known as: IKE CA PKI CSP

CA

Which of the following is a file system designed for optical media? CDFS FAT32 NTFS exFAT

CDFS

Which of the following terms refers to a group of experts that handle computer security breaches? CIRT NIST CSRF IEEE

CIRT

In which of the mobile device deployment models employees can use corporate-owned devices both for work-related tasks and personal use? BYOD COPE VDI CYOD

COPE (corporate owned, personally enabled)

Which of the following devices may pose a risk to electrical safety due to accumulated high voltage? (Select all that apply) CRTs Power Supply Units (PSUs) Inverters CPUs Laser printers

CRTs Power Supply Units (PSUs) Inverters Laser printers

In Windows Disk Management utility, a disk status set to Failed indicates that the basic or dynamic volume: (Select 3 answers) Cannot be started automatically Is damaged Experiences (I/O) errors Requires assignment of a mount point folder path Contains corrupted file system

Cannot be started automatically Is damaged Contains corrupted file system

What is the function of the Linux chmod command? Changes file access permissions Changes file owner and group permissions Compares the contents of two files or sets of files Changes the Linux command prompt

Changes file access permissions

What is the function of the Linux chown command? Changes the Linux command prompt Compares the contents of two files or sets of files Changes file owner and group permissions Changes file access permissions

Changes file owner and group permissions

In wireless networks, a situation where multiple channels share the frequency band causing interference and performance degradation for devices operating on channels that are too close to each other is known as: Cross-talk Channel overlapping Collision Channel bonding

Channel overlapping

If an application written for an earlier version of MS Windows doesn't run correctly, the operating system can emulate its own older version to allow a given program to work with newer hardware or software. The compatibility mode settings in Windows can be changed manually by right-clicking the program icon and: Choosing "Restore previous versions" option from the pop-up menu Selecting "Run program using recommended compatibility settings" option from the pop-up menu Clicking on the Properties menu item, and then applying the required settings on the Compatibility tab Selecting "Run as administrator" option from the pop-up menu

Clicking on the Properties menu item, and then applying the required settings on the Compatibility tab

Which of the following statements describing features of Windows HomeGroups are true? (Select 3 answers) Communication between HomeGroup computers is encrypted with a pre-shared password User passwords for accessing HomeGroup are stored centrally on a Domain Controller HomeGroups are available in all versions of Windows Communication between HomeGroup computers is unencrypted An ad hoc home networking system for file and printer sharing HomeGroups are available only in Windows 7/8/8.1 and early versions of Windows 10

Communication between HomeGroup computers is encrypted with a pre-shared password An ad hoc home networking system for file and printer sharing HomeGroups are available only in Windows 7/8/8.1 and early versions of Windows 10

Which of the following is an MS Windows utility designed both for system administrators and for application developers? Component Services (dcomcnfg.exe) Microsoft Management Console (MMC) Windows PowerShell (powershell.exe) System Configuration (msconfig.exe)

Component Services (dcomcnfg.exe)

Which of the following can be used to launch the Disk Management utility in Windows? (Select 3 answers) Computer Management Disk Management shortcut icon in the Administrative Tools folder Windows Run dialog box Device Manager Storage Spaces menu item in Windows Control Panel Quick Access Menu (displayed after right-clicking on the Windows Start button)

Computer Management Windows Run dialog box Quick Access Menu (displayed after right-clicking on the Windows Start button)

Many of the utilities available in the Administrative Tools menu in Windows Control Panel are implemented as the so-called Microsoft Management Console (MMC) snap-ins. The most prominent MMC component in this menu (which contains a collection of other MMC snap-ins such as Device Manager, Disk Management, and Event Viewer) is called: Task Manager (taskmgr.exe) Performance Monitor (perfmon.exe) Computer Management (compmgmt.msc) System Configuration (msconfig.exe)

Computer Management (compmgmt.msc)

Which of the following locations provide direct access to the Device Manager applet in MS Windows? (Select 3 answers) Administrative Tools folder in Windows Control panel Computer Management utility in the Administrative Tools folder in Windows Control Panel Windows Run dialog box (after typing in devmgmt.msc and pressing Enter) Devices and Printers folder in Windows Control Panel Windows Control Panel

Computer Management utility in the Administrative Tools folder in Windows Control Panel Windows Run dialog box (after typing in devmgmt.msc and pressing Enter) Windows Control Panel

The Internet Properties applet tab containing an option for configuring VPN settings is called: General Programs Connections Privacy

Connections

Which of the Windows Internet Properties system utility tabs provides access to proxy settings? Security Privacy Advanced Connections

Connections

Which of the following provides access to the User Accounts applet in MS Windows? Computer Management Administrative Tools folder Control Panel Security and Maintenance

Control Panel

Which of the following steps provide access to Windows Reliability Monitor? (Select 2 answers) Control Panel (Icon view) -> Administrative Tools folder -> Reliability Monitor Control Panel (Category view) -> System and Security -> Security and Maintenance -> Maintenance -> View reliability history Control Panel (Icon view) -> Security and Maintenance -> Maintenance -> View reliability history Windows Settings menu -> Update & Security -> Troubleshooting -> Reliability Monitor Control Panel (Category view) -> System and Security -> System -> Advanced system settings -> Performance -> Settings... -> Advanced -> View reliability history

Control Panel (Category view) -> System and Security -> Security and Maintenance -> Maintenance -> View reliability history Control Panel (Icon view) -> Security and Maintenance -> Maintenance -> View reliability history

Which of the following locations in MS Windows provide access to an automated printer troubleshooting tool? (Select 3 answers) Control Panel (Icon view) -> Security and Maintenance -> Maintenance -> Troubleshooting -> Printer Control Panel (Category view) -> Administrative Tools -> Troubleshooting -> Printer Control Panel (Icon view) -> Troubleshooting -> Hardware and Sound -> Printer Control Panel (Category view) -> System and Security -> Troubleshoot common computer problems -> Printer Control Panel (Icon view) -> Devices and Printers -> right-click on a selected printer -> Troubleshoot

Control Panel (Category view) -> System and Security -> Troubleshoot common computer problems -> Printer Control Panel (Icon view) -> Devices and Printers -> right-click on a selected printer -> Troubleshoot

Which of the following steps in MS Windows allows to update/roll back the network adapter driver or disable/uninstall the device? (Select 2 answers) Control Panel (Icon view) -> Device Manager -> expand Network Adapters list -> right-click on the network adapter -> select Properties from the pop-up menu -> select the required action from the Driver tab Windows Run dialog box -> type in devmgmt.msc + press Enter -> expand Network Adapters list -> right-click on the network adapter -> select Properties from the pop-up menu -> select the required action from the Driver tab Control Panel (Icon view) -> Network and Sharing Center -> Change adapter settings -> right-click on the network adapter -> select Properties from the pop-up menu -> select the required action from the Driver tab Windows Settings menu -> Devices -> Network Adapters -> select the device -> select the required action from the Driver menu Control Panel (Category view) -> Network and Internet -> View network computers and devices -> right-click on the network adapter -> select Properties from the pop-up menu -> select the required action from the Driver tab

Control Panel (Icon view) -> Device Manager -> expand Network Adapters list -> right-click on the network adapter -> select Properties from the pop-up menu -> select the required action from the Driver tab Windows Run dialog box -> type in devmgmt.msc + press Enter -> expand Network Adapters list -> right-click on the network adapter -> select Properties from the pop-up menu -> select the required action from the Driver tab

Which of the following locations in MS Windows allows to print a test page? Control Panel (Icon view) -> Devices and Printers -> right-click on a selected printer -> Properties -> General tab -> Print Test Page Control Panel (Category view) -> Hardware and Sound -> Printers -> right-click on a selected printer -> Properties -> General tab -> Print Test Page Control Panel (Icon view) -> Devices and Printers -> right-click on a selected printer -> Printer Properties -> General tab -> Print Test Page Control Panel (Category view) -> System and Security -> Security and Maintenance -> Maintenance -> Hardware -> Printers -> right-click on a selected printer -> Properties -> General tab -> Print Test Page

Control Panel (Icon view) -> Devices and Printers -> right-click on a selected printer -> Printer Properties -> General tab -> Print Test Page

Which of the following answers describes the correct sequence of steps for accessing the magic packet settings of an Ethernet adapter in MS Windows? Control Panel (Icon view) -> Internet Options applet -> Connections tab -> click the "LAN settings" button -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Magic Packet settings Control Panel (Category view) -> Network and Internet -> View Network Computers and Devices -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Magic Packet settings Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Magic Packet settings Control Panel (Category view) -> View Devices and Printers -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Magic Packet settings

Control Panel (Icon view) -> Internet Options applet -> Connections tab -> click the "LAN settings" button -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Magic Packet settings

Which of the following answers describes the correct sequence of steps for accessing the Speed & Duplex settings of an Ethernet adapter in MS Windows? Control Panel (Category view) -> View Devices and Printers -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Speed & Duplex settings Control Panel (Icon view) -> Internet Options applet -> Connections tab -> click the "LAN settings" button -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Speed & Duplex settings Control Panel (Category view) -> Network and Internet -> View Network Computers and Devices -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Speed & Duplex settings Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Speed & Duplex settings

Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Speed & Duplex settings

Which Control Panel applet in Windows allows to manage usernames and passwords for websites, connected applications and networks? User Accounts Credential Manager Security and Maintenance Ease of Access Center

Credential Manager

The purpose of PCI DSS is to provide protection for: Credit cardholder data Licensed software User passwords Personal health information

Credit cardholder data

What is the correct sequence of steps for accessing the manual configuration interface for IPv4 connections in MS Windows? Control Panel (Category view) -> Network and Internet -> Internet Options -> Advanced tab -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields Control Panel (Category view) -> Network and Internet -> Network and Sharing Center applet -> Change adapter settings -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields Control Panel (Icon view) -> Internet Options applet -> Connections tab -> click the "LAN settings" button -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields

Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields

Which of the following answers describes the correct sequence of steps for accessing the manual configuration interface for IPv4 connections in MS Windows? Control Panel (Category view) -> Network and Internet -> Internet Options -> Advanced tab -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields Control Panel (Category view) -> Network and Internet -> Network and Sharing Center applet -> Change adapter settings -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields Control Panel (Icon view) -> Internet Options applet -> Connections tab -> click the "LAN settings" button -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields

Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields

Which of the following steps enable displaying protected system files in Windows 8/8.1/10? (Select 2 answers) Control Panel -> Folder Options -> General tab -> select Show hidden files, folders, and drives Control Panel -> File Explorer Options -> View tab -> Advanced settings -> select Show hidden files, folders, and drives Control Panel -> Folder Options -> General tab -> clear the checkbox next to Hide protected operating system files Control Panel -> File Explorer Options -> View tab -> Advanced settings -> clear the checkbox next to Hide protected operating system files Control Panel -> Folder Options -> View tab -> Advanced settings -> select Show hidden files, folders, and drives Control Panel -> File Explorer Options -> General tab -> select Show hidden files, folders, and drives

Control Panel -> File Explorer Options -> View tab -> Advanced settings -> select Show hidden files, folders, and drives Control Panel -> File Explorer Options -> View tab -> Advanced settings -> clear the checkbox next to Hide protected operating system files

Which of the following steps enable displaying protected system files in Windows 7? (Select 2 answers) Control Panel -> File Explorer Options -> General tab -> select Show hidden files, folders, and drives Control Panel -> Folder Options -> View tab -> Advanced settings -> clear the checkbox next to Hide protected operating system files Control Panel -> File Explorer Options -> View tab -> Advanced settings -> select Show hidden files, folders, and drives Control Panel -> Folder Options -> General tab -> select Show hidden files, folders, and drives Control Panel -> File Explorer Options -> General tab -> clear the checkbox next to Hide protected operating system files Control Panel -> Folder Options -> View tab -> Advanced settings -> select Show hidden files, folders, and drives

Control Panel -> Folder Options -> View tab -> Advanced settings -> clear the checkbox next to Hide protected operating system files Control Panel -> Folder Options -> View tab -> Advanced settings -> select Show hidden files, folders, and drives

Switching from Windows 8.1 to Windows 10 Home edition can be performed either via an upgrade or clean installation. Match each Windows 8.1 edition on the left with the correct upgrade option from the corresponding drop-down list. Windows 8.1 (Core) Windows 8.1 Professional Windows 8.1 Enterprise

Core: Upgrade Pro: Install Enterprise: Install

Which of the following are the upgrade options for switching from Windows 8.1 to Windows 10 Pro edition? (Match each Windows 8.1 edition on the left with the correct upgrade option from the corresponding drop-down list) Windows 8.1 (Core) Windows 8.1 Professional Windows 8.1 EnterpriseI

Core: Upgrade Pro: Upgrade Enterprise: Install

What are the upgrade options for switching from Windows 8.1 to Windows 10 Enterprise edition? Windows 8.1 (Core) Windows 8.1 Professional Windows 8.1 Enterprise

Core:Install Pro: Upgrade Enterprise: Upgrade

Windows Task Manager can be launched by: (Select all that apply) Ctrl+Shift+Esc key combination Double-clicking on the applet's icon shortcut in the Administrative Tools folder Pressing Ctrl+Alt+Delete and selecting the Task Manager option from the menu screen Selecting the Task Manager applet in Windows Control Panel Right-clicking on the Windows Taskbar and selecting Task Manager Typing taskmgr (or taskmgr.exe) in the Command Prompt and pressing Enter Pressing simultaneously the Windows and R keys, typing taskmgr (or taskmgr.exe) in the Run window, and pressing Enter

Ctrl+Shift+Esc key combination Pressing Ctrl+Alt+Delete and selecting the Task Manager option from the menu screen Right-clicking on the Windows Taskbar and selecting Task Manager Typing taskmgr (or taskmgr.exe) in the Command Prompt and pressing EnterPressing simultaneously the Windows and R keys, typing taskmgr (or taskmgr.exe) in the Run window, and pressing Enter

Which of the following are methods of storing and accessing data over computer network? ext3 DFS ext4 FAT32 NFS exFAT

DFS NFS

Which of the following acronyms refers to software or hardware-based security solutions designed to detect and prevent unauthorized use and transmission of confidential information outside of the corporate network? DRP DHE DLP DEP

DLP

Which of the following can be used by system administrators to selectively block access to known malware sites? DHCP settings DNS configuration Port security DLP software

DNS configuration

Which of the following answers describe(s) possible cause(s) of the "Missing operating system" error message displayed during system boot? (Select all that apply) Damaged hard drive BIOS does not detect the hard drive Windows starts in VGA mode System partition not set as active Corrupt Master Boot Record (MBR)

Damaged hard drive BIOS does not detect the hard drive System partition not set as active Corrupt Master Boot Record (MBR)

If a device in Windows fails after driver update, the driver can be restored to the previously installed version in: Device Manager Windows Update menu Programs and Features menu Task Manager

Device Manager

Which of the following Internet access types takes advantage of PSTN lines? Ethernet Mobile broadband Dial-up Optical fiber

Dial-up

Which of the following settings are used for establishing a dial-up connection in Windows? (Select 3 answers) Dial-up phone number Encryption type User name Security type Password Destination name

Dial-up phone number User name Password

According to the CompTIA's best practice procedures for malware removal, removing malicious software on a Windows-based system should be performed as the next step after: Disabling System Restore Isolating the infected system Scheduling scans and running updates Creating a restore point

Disabling System Restore

Which of the following is a macOS disk maintenance tool? defrag Disk Cleanup Disk Management chkdsk Disk Utility

Disk Utility

Which of the following macOS utilities allows to create/restore a disk image? App Store Disk Utility Time Machine System Restore

Disk Utility

Which of the following would be of help in preserving the integrity of a digital evidence? (Select 2 answers) Disk imaging Screenshots Network logs Hashing Video capturing

Disk imaging Hashing

Which of the locations listed below enable access to computer display configuration settings in Windows 7/8/8.1? (Select 3 answers) Programs and Features applet in Windows Control Panel Display settings pop-up menu launched after right-clicking on the Windows Desktop screen area Windows Start button -> Settings -> System -> Display -> System -> Display in Windows Start menu Appearance and Personalization menu of the Windows Control Panel (Category view) The Display applet icon in Windows Control Panel (Icons view)

Display settings pop-up menu launched after right-clicking on the Windows Desktop screen area Appearance and Personalization menu of the Windows Control Panel (Category view) The Display applet icon in Windows Control Panel (Icons view)

Premium versions of the Microsoft OS contain a built-in component that enables encryption of individual files. This feature is known as: Encrypting File System (EFS) Advanced Encryption Standard (AES) Trusted Platform Module (TPM) New Technology File System (NTFS)

Encrypting File System (EFS)

Netstat is a command-line utility used for: (Select 2 answers) Displaying active TCP/IP connections Testing the reachability of a remote host Displaying intermediary points on the packet route Viewing the TCP/IP configuration details Displaying network protocol statistics

Displaying active TCP/IP connections Displaying network protocol statistics

Windows repair installation: Modifies application configuration settings Does not affect user applications Removes user files Preserves application configuration settings Removes user applications Does not affect user files

Does not affect user applications Preserves application configuration settings Does not affect user files

What type of preventive physical access controls would provide a basic means for securing door access? (Select 3 answers) Motion detection Lighting Door lock CCTV Proximity card reader Smart card reader

Door lock proximity card reader smart card reader

The System Configuration utility in MS Windows can be launched by: (Select 3 answers) Typing msconfig.msc in the Command Prompt and pressing Enter Double-clicking on the System Configuration icon shortcut in the Administrative Tools folder Typing msconfig (or msconfig.exe) in the Command Prompt and pressing Enter Double-clicking on the System Configuration icon shortcut in Windows Control Panel folder Pressing simultaneously the Windows and R keys, typing msconfig (or msconfig.exe) in the Run window, and pressing Enter Double-clicking on the System Configuration icon shortcut in Windows Settings menu Typing sysconfig (or sysconfig.exe) in the Command Prompt and pressing Enter

Double-clicking on the System Configuration icon shortcut in the Administrative Tools folder Typing msconfig (or msconfig.exe) in the Command Prompt and pressing Enter Pressing simultaneously the Windows and R keys, typing msconfig (or msconfig.exe) in the Run window, and pressing Enter

Which of the following allows to create a backup copy of the entire contents of a disk drive (which may include a pre-configured OS installation) and replicate the drive to a new computer? Clean install In-place upgrade Repair installation Drive imaging

Drive imaging

Which of the following is an MS Windows diagnostic tool for detecting display, sound, and input related problems? DxDiag MSConfig SFC DirectX

DxDiag

Which of the following is an MS Windows component that enables encryption of individual files? EFS AES TPM SCP

EFS

Antistatic bags, antistatic wrist straps, and ground mats are all countermeasures used to protect computer and communications equipment components against: RFI ESD SVC EMI

ESD

In order to operate, an integrated component such as Network Interface Card (NIC) may need to be first: Updated with the latest driver Verified against the Hardware Compatibility List (HCL) Checked with a loopback plug Enabled in the advanced BIOS settings menu

Enabled in the advanced BIOS settings menu

What are the characteristics of TACACS+? (Select 3 answers) Encrypts only the password in the access-request packet Combines authentication and authorization Encrypts the entire payload of the access-request packet Primarily used for device administration Separates authentication and authorization Primarily used for network access

Encrypts the entire payload of the access-request packet Primarily used for device administration Separates authentication and authorization

Which of the following would be the best malware-prevention method/tool? An up-to-date antivirus application Software firewall An up-to-date anti-malware application End user education System restore from a known good backup

End user education

An antivirus software is kept up to date via: (Select 2 answers) Driver updates Application updates Engine updates OS updates Virus signature updates

Engine updates Virus signature updates

When a program installed in Windows stops responding or encounters an error, logs describing the error can be examined with the use of: Event Viewer Resource Monitor Task Manager System Information utility

Event Viewer

When a program installed in Windows stops responding or encounters an error, logs describing the error can be examined with the use of: Event Viewer System Information utility Resource Monitor System menu in Control Panel

Event Viewer

Reviewing System and Application logs on a Windows-based PC might provide useful information while troubleshooting security-related issues. System and Application logs in MS Windows can be found in: Task Manager (taskmgr.exe) Security and Maintenance (wscui.cpl) Event Viewer (eventvwr.msc) Performance Monitor (perfmon.exe)

Event Viewer (eventvwr.msc)

The practice of allowing a program through a firewall is described as creating a(n): Tunnel Static route Exception Event

Exception

What is the correct hierarchy of precedence for permissions settings in NTFS? Explicit Allow -> Inherited Allow -> Explicit Deny -> Inherited Deny Explicit Deny -> Explicit Allow -> Inherited Deny -> Inherited Allow Explicit Allow -> Explicit Deny -> Inherited Allow -> Inherited Deny Explicit Deny -> Inherited Deny -> Explicit Allow -> Inherited Allow

Explicit Deny -> Explicit Allow -> Inherited Deny -> Inherited Allow

The 4 GB maximum file size limit and 2 TB maximum volume size limit are the characteristic features of: NTFS FAT32 NFS exFAT

FAT32

If personal files, such as email, documents, or photos are lost or deleted, Windows System Restore can be used to recover such files. True False

False

In Microsoft Windows 7, the only two editions that include the BitLocker full drive encryption feature are Windows 7 Enterprise and Windows 7 Ultimate.

False

In NTFS, a folder or file copied from one location to another on the same volume retains its original permissions. True False

False

In NTFS, a folder or file moved from one location to another on the same volume inherits the permissions of its new parent folder. True False

False

In NTFS, permissions inherited from a parent object (e.g. a folder or user group) take precedence over permissions applied directly to an object (explicit permissions). True False

False

In Windows domain environment, the term "Home Folder" refers to a directory on a local PC where users can back up their data and files. True False

False

In a differential backup strategy, restoring data from backup requires only a working copy of the last full backup. True False

False

In the MBR partition style, each logical drive within the extended partition can be transformed into a bootable drive.

False

Local Users and Groups (lusrmgr.msc) is a Microsoft Management Console (MMC) snap-in included by default in all editions of MS Windows. It is used to create and manage users and groups that are stored locally on a computer. True False

False

Permission propagation occurs when a folder or file created inside another folder takes on (inherits) permissions applied to that folder (permissions applied to the so-called parent folder propagate down to its child objects, i.e. folders and files created inside the parent folder). True False

False

The "View by Category" option in Windows Control Panel allows for displaying entire contents of the Control Panel in a single window enabling quick access to each Control Panel applet. True False

False

The Local Security Policy (secpol.msc) administrative tool in home editions of MS Windows can be used by system administrators to modify account and local policies, public key policies and IP security policies for a local host. True False

False

The Security and Maintenance applet in Windows Control Panel provides access to Windows Firewall (Windows 7) / Windows Defender Firewall (Windows 8/8.1/10) configuration settings. True False

False

Windows Phone, iOS, and Android are all examples of closed-source operating systems. True False

False

Which of the following locations in Windows 8/8.1/10 allows to create a shortcut to a shared folder or computer on a network? Network and Sharing Center applet in Windows Control Panel File Explorer -> This PC -> Computer tab -> Map Network drive Windows Explorer -> Computer -> Map network drive Shared Folders menu in the Computer Management utility

File Explorer -> This PC -> Computer tab -> Map Network drive

Which of the following provides access to file/folder management settings in Windows 10? Folder Options applet in Windows Control Panel Administrative Tools in Windows Control Panel File Explorer Options applet in Windows Control Panel System Configuration applet in Windows Control Panel

File Explorer Options applet in Windows Control Panel

Which of the following adversely affect performance of a magnetic hard drive? (Select 3 answers) Disk striping File fragmentation Disk mirroring Excessive paging / disk thrashing Insufficient amount of RAM Disk duplexing

File fragmentation Excessive paging / disk thrashing Insufficient amount of RAM

Which of the following macOS utilities can be used for detecting and repairing disk-related problems? chkdsk Disk Utility Disk Management First Aid (in Disk Utility)

First Aid (in Disk Utility)

The /f switch of the chkdsk command-line utility in MS Windows: Locates bad sectors and recovers readable information Fixes errors on the disk Displays cleanup messages Displays the full path and name of every file on the disk

Fixes errors on the disk

Which of the following provides access to file/folder management settings in Windows 7? Folder Options applet in Windows Control Panel Administrative Tools in Windows Control Panel File Explorer Options applet in Windows Control Panel System Configuration applet in Windows Control Panel

Folder Options applet in Windows Control Panel

Which of the Windows Active Directory Group Policy settings allows network administrators to map a folder on a user's PC to a server-based location? Folder redirection Local Users and Groups User Account Control (UAC) Directory permissions

Folder redirection

In Windows Disk Management utility on a local computer, a dynamic disk that has been moved from another computer and found by the OS is labeled as: Offline Foreign Connected Online

Foreign

Which of the following tabs of the Windows Internet Properties applet provides an option for deleting temporary Internet files, cookies, web browsing history, Internet Explorer saved passwords, and saved data typed into web forms? General Privacy Advanced Security

General

Which of the tabs of the System Configuration utility in Windows contains the Diagnostic startup option? Tools General Services Startup Boot

General

Which tab of the MSConfig utility in Windows lists choices for startup configuration modes? Services Boot General Startup Tools

General

In Windows Active Directory environment, this feature enables centralized management and configuration of operating systems, applications, and user account settings. Local Users and Groups Resource Monitor Group Policy User Account Control (UAC)

Group policy

A type of proprietary file system used in Apple OSs is known as: DFS EFS HFS NFS

HFS

What kind of general term is used to describe the process of securing a computer system? Patching Baselining Hardening Auditing

Hardening

Which of the following firewall types would provide the best protection for an ingress/egress point of a corporate network? (Select 2 answers) Hardware firewall Network-based firewall Software firewall Host-based firewall

Hardware firewall Network-based firewall

Which of the following answers refers to the contents of a rainbow table entry? Hash/Password IP address/Domain name Username/Password Account name/Hash

Hash/Password

In MS Windows, the "$" sign appended to the end of the name of a network share indicates that the shared folder or drive is: Hidden Inaccessible Visible to any user Encrypted

Hidden

Which of the following is a common firewall type used for protecting a single computer? (Select 2 answers) Host-based firewall Software firewall Network-based firewall Hardware firewall

Host-based firewall Software firewall

A security technician was asked to configure a firewall so that the protected system would not send echo reply packets. What type of traffic should be blocked on the firewall to accomplish this task? SMTP ICMP HTTP SNMP

ICMP

What is the name of a network layer protocol that specifies the format of packets and addressing scheme in network communications? UDP IP TCP NetBIOS

IP

Which of the following answers list(s) data required for manual configuration of network adapter settings in MS Windows? (Select all that apply) IP address Subnet mask Default gateway MAC address DNS server address SSID (a.k.a. network name)

IP address Subnet mask Default gateway DNS server address

Examples of secure network protocols used for establishing VPN connections include: (Select 2 answers) IPP WEP IPsec HTTP TLS

IPSec TLS(Transport Layer Security)

According to the CompTIA's best practice procedures for malware removal, putting a malware-infected Windows-based system into a quarantine should be the next step after: Creating a restore point Identifying and researching malware symptoms Disabling System Restore Updating the anti-malware software

Identifying and researching malware symptoms

Which of the following terms is used a synonym for the bare-metal backup concept? Differential backup Image-level backup File-level backup Incremental backup

Image-level backup

Which social engineering attack relies on identity theft? Tailgating Dumpster diving Impersonation Watering hole attack

Impersonation

What is the function of archive bit? Search indexing Indicating whether a file has been modified since the last backup Setting file attribute to read-only Creating an additional copy of a file

Indicating whether a file has been modified since the last backup

In forensic analysis, taking hashes ensures that the collected digital evidence retains: Confidentiality Integrity Non-repudiation Availability

Integrity

Which of the following locations in Windows provide access to dial-up and VPN settings? (Select 3 answers) Phone and Modem System Configuration Internet Options (Connections tab) Network and Sharing Center Windows Mobility Center Settings menu

Internet Options (Connections tab) Network and Sharing Center Settings menu

Which of the following locations in MS Windows provide(s) access to the Internet Properties (inetcpl.cpl) system utility? (Select all that apply) Internet Options applet in Windows Control Panel Network and Sharing Center applet in Windows Control Panel Ease of Access applet in Windows Control Panel Internet Options menu item in Microsoft Edge Tools menu Windows Run dialog box (after typing in inetcpl.cpl and pressing Enter) Internet Options menu item in Internet Explorer's Tools menu

Internet Options applet in Windows Control Panel Network and Sharing Center applet in Windows Control Panel Windows Run dialog box (after typing in inetcpl.cpl and pressing Enter) Internet Options menu item in Internet Explorer's Tools menu

Which of the following utilities in Windows provides access to configuration options of a built-in pop-up blocker? Internet Explorer (iexplore.exe) System Configuration (msconfig.exe) Internet Properties (inetcpl.cpl) Security and Maintenance (wscui.cpl)

Internet Properties (inetcpl.cpl)

Assigning static IP addresses on a SOHO network provides better administrative control over hosts and devices residing on the inside of the network. True False

True

Which of the following settings are used for establishing a VPN connection in Windows? (Select 3 answers) Network name Internet address (domain name or IPv4/IPv6 address) Security type Destination name Encryption type Smart card (optional)

Internet address (domain name or IPv4/IPv6 address) Destination Name Smart card (optional)

According to the CompTIA's best practice procedures for malware removal, disabling System Restore on a malware-infected Windows-based system should be performed as the next step after: Isolating the infected system Removing malware from the infected system Identifying and researching malware symptoms Scheduling scans and running updates

Isolating the infected system

Which of the following enables installation of software that is not available through the official Apple App Store? Carrier unlocking Sideloading Rooting Jailbreaking

Jailbreaking

Which of the following terms refers to removing software restrictions imposed by Apple on its iOS operating system? Sideloading Carrier unlocking Rooting Jailbreaking

Jailbreaking

Which of the following is an example of spyware? Keylogger Vulnerability scanner Computer worm Packet sniffer

Keylogger

ext3 and ext4 are examples of default file systems used by: OS X macOS Windows Server Linux distributions

Linux distributions

Which of the following Microsoft Windows components allow system administrators to enable/disable user accounts? (Select 2 answers) User Accounts in the Administrative Tools folder Local Users and Groups in Control Panel User Account Control (UAC) Local Users and Groups in Computer Management User Accounts in Control Panel

Local Users and Groups in Computer Management User Accounts in Control Panel

The /r switch of the chkdsk command-line utility in Windows: (Select 2 answers) Displays cleanup messages Locates bad sectors and recovers readable information Uses more system resource to perform a scan as fast as possible Displays the full path and name of every file on the disk Fixes errors on the disk

Locates bad sectors and recovers readable information Fixes errors on the disk

Which of the following statements apply to Windows domains? (Select 3 answers) Logging on to any computer on a Windows domain requires a single set of credentials Security policies and permissions on a Windows domain are administered centrally Windows domains are based on Peer-to-Peer (P2P) networking architecture Each computer on a Windows domain has its own security policy Windows domains are based on client-server networking architecture All members of a Windows domain must be on the same local network or subnet

Logging on to any computer on a Windows domain requires a single set of credentials Security policies and permissions on a Windows domain are administered centrally Windows domains are based on client-server networking architecture

Which of the following solutions will allow a server with a private IP address to handle requests from an outside (public) network? Port bonding Port labeling Port forwarding Port mirroring

Port forwarding

Which of the following statements apply to Windows domains? (Select 3 answers) Logging on to any computer on the Windows domain requires a single set of credentials Security policies and permissions on the Windows domain are administered centrally Windows domains are based on the Peer-to-Peer networking architecture Each computer on the Windows domain has its own security policy Windows domains are based on the Client-Server networking architecture All members of the Windows domain must be on the same local network or subnet

Logging on to any computer on the Windows domain requires a single set of credentials Security policies and permissions on the Windows domain are administered centrally Windows domains are based on the Client-Server networking architecture

Which of the following are examples of partition types? Extended Basic Logical Dynamic Primary

Logical Primary Extended

On a Windows domain, this tool can be used by system administrators to configure initial desktop environment (which may include mapping a network drive or setting up access to a shared printer) for a specific user. MDM policy Login script Group Policy Directory permissions

Login script

What is the name of a logical security access control method in which a 48-bit physical address assigned to each Network Interface Card (NIC) is used to determine access to the network? MAC address filtering Network Address Translation (NAT) Static IP addressing Network Access Control (NAC)

MAC address filtering

What is the name of a network security access control method in which a 48-bit physical address assigned to each network card is used to determine access to the network? MAC filtering Network Address Translation (NAT) Static IP addressing Network Access Control (NAC)

MAC filtering

Which of the following are examples of partition styles? ext3 MBR ext4 GPT NTFS

MBR GPT

Symetric algorithms

MD5, SHA-1, and SHA-2

Which of the following facilitates the enforcement of mobile device policies and procedures? MFA MMC MDM MFD

MDM

Which type of software enables a centralized administration of mobile devices? MFA MMC MDM MFD

MDM (mobile device management)

A type of customizable framework providing access to a collection of system tools designed to manage networks, computers, services, and other system components in Windows is known as: Control Panel PowerShell MMC Administrative Tools

MMC

Which of the following answers refers to the MS Windows client application for Remote Desktop Services (RDS)? GoToMyPC RDP TeamViewer MSTSC

MSTSC

Disabling SSID broadcast: Is one of the measures used in the process of securing wireless networks Makes a WLAN harder to discover Blocks access to a WAP Prevents wireless clients from accessing the network

Makes a WLAN harder to discover

Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as: Adware Malware Ransomware Spyware

Malware

Which of the following password policy settings prevents attackers using cracked passwords from gaining permanent access to a Windows workstation? Login time restrictions Password complexity setting Account lockout threshold setting Maximum password age setting

Maximum password age setting

Which of the answers listed below refers to an example order of volatility for a typical computer system? Memory dump, disk files, temporary files, archival media Archival media, disk files, temporary files, memory dump Memory dump, temporary files, disk files, archival media Temporary files, memory dump, archival media, disk files

Memory dump, temporary files, disk files, archival media

A macOS system feature providing single-screen thumbnail preview of all open windows and applications is known as: Spotlight Mission Control Screen Sharing Desktop Window Manager

Mission Control

What are the advantages of organizing hard drive space into multiple partitions? Multiboot environment Separated disk space used for virtual memory Preventative measure against hard drive failures Separation of user files from the operating system and application files Increased overall disk storage space available for user data

Multiboot environment Separated disk space used for virtual memory Multiboot environment Separated disk space used for virtual memory

Which of the following statements are true? (Select 2 answers) NTFS permissions apply only to local users NTFS permissions can be applied only on a folder level NTFS permissions apply to both network and local users NTFS permissions can be applied to a folder or individual file

NTFS permissions apply to both network and local users NTFS permissions can be applied to a folder or individual file

Which of the following enable installation of an OS via network interface? GPT diskpart Netboot PXE gpupdate

Netboot PXE

Which of the Control Panel applets in Windows 8/8.1/10 can be used for checking basic information about the network connection status and setting up network connections? Networking Phone and Modem Internet Options Network and Sharing Center

Network and Sharing Center

What type of configuration info is used for setting up a wireless connection in Windows? (Select all that apply) Network name Smart card (optional) Encryption type Destination name Security type Internet address (domain name or IPv4/IPv6 address) Security key

Network name Encryption type Security type Security key

Which of the following would be the most important considerations when installing computer applications? (Select 3 answers) OS compatibility Minimum amount of drive space CPU speed Graphics adapter Minimum amount of RAM

OS compatibility Minimum amount of drive space Minimum amount of RAM

Which of the following disk status options in Windows Disk Management utility indicates that a dynamic disk might be corrupted or intermittently unavailable? Foreign Unallocated Offline Disconnected

Offline

Which of the following answers refer to a very basic UPS type commonly used for protecting a single PC? (Select 2 answers) Offline Standby Line-interactive Online Double-conversion

Offline Standby

What is the correct sequence of steps required to close a non-responsive user application in Task Manager in Windows 7? On the Processes tab, right-click the program that isn't responding, click End Task button On the Applications tab, right-click the program that isn't responding, click End Task button On the Performance tab, right-click the program that isn't responding, click End Task button On the App history tab, right-click the program that isn't responding, click End Task button

On the Applications tab, right-click the program that isn't responding, click End Task button

Which of the following answers describes the correct sequence of steps required to close a non-responsive user application or process in Task Manager in Windows 8/8.1/10? On the App history tab, right-click the program/process that isn't responding, click End Task button On the Performance tab, right-click the program/process that isn't responding, click End Task button On the Processes tab, right-click the program/process that isn't responding, click End Task button On the Applications tab, right-click the program/process that isn't responding, click End Task button

On the Processes tab, right-click the program/process that isn't responding, click End Task button

In Windows Disk Management utility, a normal disk status indicating that the disk is ready for read/write operations is labeled as: Accessible Online Ready Initialized

Online

Which type of UPS provides the best power outage protection? (Select 2 answers) Online Double-conversion Standby Line-interactive Offline

Online Double-conversion

Which of the following disk status options in Windows Disk Management utility indicates Input/Output (I/O) errors on a dynamic disk/volume? (Select 2 answers) Failed Unreadable Online (Errors) Unknown Healthy (At Risk)

Online (errors) Healthy (at risk)

If a network adapter's "Speed & Duplex" property is set to Half Duplex, communication on the network will be taking place: Only in one direction at a time In both directions at half the speed In one direction at half the speed In both directions simultaneously

Only in one direction at a time

What is the name of a router configuration feature that allows to open an inbound port based on the outbound requests made by hosts placed inside a private network? Port triggering Port bonding Port forwarding Port mirroring

Port Triggering

Which of the following allows to hide extensions for known file types in Windows 8/8.1/10? Open the File Explorer Options applet in Windows Control Panel, then select Hide extensions for known file types on the General tab Open the Folder Options applet in Windows Control Panel, then select Hide extensions for known file types in the Advanced settings on the View tab Open the File Explorer Options applet in Windows Control Panel, then select Hide extensions for known file types in the Advanced settings on the View tab Open the Folder Options applet in Windows Control Panel, then select Hide extensions for known file types on the General tab

Open the File Explorer Options applet in Windows Control Panel, then select Hide extensions for known file types in the Advanced settings on the View tab

Which of the following allows to view hidden files, folders, and drives in Windows 8/8.1/10? Open the Folder Options applet in Windows Control Panel, then select Show hidden files, folders, and drives on the General tab Open the File Explorer Options applet in Windows Control Panel, then select Show hidden files, folders, and drives in the Advanced settings on the View tab Open the Folder Options applet in Windows Control Panel, then select Show hidden files, folders, and drives in the Advanced settings on the View tab Open the File Explorer Options applet in Windows Control Panel, then select Show hidden files, folders, and drives on the General tab

Open the File Explorer Options applet in Windows Control Panel, then select Show hidden files, folders, and drives in the Advanced settings on the View tab

Which of the following allows to hide extensions for known file types in Windows 7? Open the File Explorer Options applet in Windows Control Panel, then select Hide extensions for known file types on the General tab Open the Folder Options applet in Windows Control Panel, then select Hide extensions for known file types in the Advanced settings on the View tab Open the File Explorer Options applet in Windows Control Panel, then select Hide extensions for known file types in the Advanced settings on the View tab Open the Folder Options applet in Windows Control Panel, then select Hide extensions for known file types on the General tab

Open the Folder Options applet in Windows Control Panel, then select Hide extensions for known file types in the Advanced settings on the View tab

Which of the following allows to view hidden files, folders, and drives in Windows 7? Open the File Explorer Options applet in Windows Control Panel, then select Show hidden files, folders, and drives on the General tab Open the Folder Options applet in Windows Control Panel, then select Show hidden files, folders, and drives in the Advanced settings on the View tab Open the File Explorer Options applet in Windows Control Panel, then select Show hidden files, folders, and drives in the Advanced settings on the View tab Open the Folder Options applet in Windows Control Panel, then select Show hidden files, folders, and drives on the General tab

Open the Folder Options applet in Windows Control Panel, then select Show hidden files, folders, and drives in the Advanced settings on the View tab

In forensic procedures, a sequence of steps in which different types of evidence should be collected is known as: Order of volatility Layered security Chain of custody Transitive access

Order of volatility

Which of the following answers describe the available options of the Master Boot Record (MBR) partition style? Overall number of partitions limited to four Up to three primary partitions and one extended partition Multiple logical drives within each primary partition One primary partition and multiple extended partitions (up to three) Only one logical drive within extended partition Up to four primary partitions

Overall number of partitions limited to four Up to three primary partitions and one extended partition Up to four primary partitions

Which of the following answers refers to a hierarchical system for the creation, management, storage, distribution, and revocation of digital certificates? Web of trust PKI IaaS CA

PKI

Which of the Windows Task Manager tabs in Windows 8/8.1/10 includes the information about the network resources usage listed under Networking tab in previous releases of the Microsoft OS? Applications Processes Performance Services

Performance

Which of the following tools in MS Windows is used to examine (both in real time and by collecting log data for later analysis) how programs that are run affect a computer's performance? Task Manager (taskmgr.exe) Performance Monitor (perfmon.exe) System Properties (sysdm.cpl) Computer Management (compmgmt.msc) Event Viewer (eventvwr.msc)

Performance Monitor (perfmon.exe)

Which of the following tools in Windows provide access to real-time performance data on CPU, RAM, hard drive, and network interface utilization? (Select 3 answers) Performance Monitor (perfmon.exe) Device Manager (devmgmt.msc) Resource Monitor (resmon.exe) System Properties (sysdm.cpl) Task Manager (taskmgr.exe)

Performance Monitor (perfmon.exe) Resource Monitor (resmon.exe) Task Manager (taskmgr.exe)

Which of the following answers describe the features of Windows Remote Desktop tool? (Select 3 answers) Permanent remote access The host and invited user share control over host's mouse and keyboard Access based on local password (local user account password) Windows tool used for connecting remotely to the user's own computer The host and invited user can both see the host's screen Windows tool used for assisted remote troubleshooting Access based on one-time password Temporal remote access

Permanent remote access Access based on local password (local user account password) Windows tool used for connecting remotely to the user's own computer

Which user group in Windows (applies to Windows 7 and earlier versions) had rights and permissions that allowed its members to perform specific administrator-level tasks? Domain Guests Power Users Domain Users Protected Users

Power Users

Which WAP configuration setting allows for adjusting the boundary range of a wireless signal? AP WPS configuration Power level controls Maximum Transmission Unit (MTU) Quality of Service (QoS)

Power level controls

In Windows Disk Management utility, a dynamic disk status set to Offline/Missing indicates that the missing disk may be: (Select 3 answers) Powered down Unallocated Corrupted Not initialized Disconnected

Powered down Corrupted Disconnected

In Windows Disk Management utility, initializing a disk: (Select 2 answers) Keeps data stored on disk intact Converts a basic disk to dynamic disk Prepares a newly added disk for use by Windows Changes a dynamic disk back to a basic disk Erases data on disk

Prepares a newly added disk for use by Windows Erases data on disk

What are the characteristic features of RADIUS? (Select 3 answers) Primarily used for network access Encrypts the entire payload of the access-request packet Combines authentication and authorization Encrypts only the password in the access-request packet Primarily used for device administration Separates authentication and authorization

Primarily used for network access Combines authentication and authorization Encrypts only the password in the access-request packet

Which of the following allow for administering print devices in Microsoft Windows? (Select 3 answers) Printers applet in Control Panel in Windows OSs prior to Windows 7 Print Management utility shipped by default with all editions of MS Windows Devices and Printers applet in Control Panel in Windows 7 and newer Microsoft OSs Printers applet in Windows 7 and newer Microsoft OSs Devices and Printers applet in Control Panel in Windows OSs prior to Windows 7 Print Management utility in the Administrative Tools folder (not available in home editions of MS Windows)

Printers applet in Control Panel in Windows OSs prior to Windows 7 Devices and Printers applet in Control Panel in Windows 7 and newer Microsoft OSs Print Management utility in the Administrative Tools folder (not available in home editions of MS Windows)

A Windows Internet Properties applet tab containing an option for managing pop-up windows displayed by websites is called: Security Programs Privacy General

Privacy

What is the name of a Windows Internet Properties applet tab providing access to advanced cookie management options? Programs Privacy Connections Security

Privacy

Which Microsoft Windows 10 editions include the BranchCache feature? Home Pro Pro Education Education Enterprise

Pro Education

A Windows Internet Properties system utility tab containing an option for managing Internet Explorer web browser add-ons is called: Privacy General Security Programs

Programs

Which of the following Control Panel applets in Windows provides options to uninstall, change, or repair applications? Programs and Features System Configuration Troubleshooting Security and Maintenance

Programs and Features

Telnet: (Select 3 answers) Encrypts network connection Provides username & password authentication Transmits data in an unencrypted form Does not provide authentication Enables remote login and command execution

Provides username & password authentication Transmits data in an unencrypted form Enables remote login and command execution

In computer networking, a computer system or an application that acts as an intermediary between another computer and the Internet is commonly referred to as: Bridge Active hub Server Proxy

Proxy

A Windows network profile that hides a computer from other devices on the network and makes it unavailable for file and printer sharing is known as: Home Private Work Public

Public

Which network profile in Windows by default disables the network discovery feature? Home Private Work Public

Public

Which of the Windows network profiles imposes the strongest security settings? Home Private Work Public

Public

Which of the following solutions is used for controlling network resources and assigning priority to different types of traffic? Measured service Acceptable Use Policy (AUP) Fair access policy Quality of Service (QoS)

Quality of Service (QoS)

Which format type in MS Windows does not erase disk data? Standard format Low-level-format High-level format Quick format

Quick format

Which formatting type(s) would typically be performed by a user to reinstall an OS? (Select all that apply) Quick format Low-level-format Standard format High-level formatQuick format

Quick format Standard format High-level formatQuick format

Hashing algorithms

RSA, DSA, ECC, and Diffie-Hellman

Which of the following terms refers to an example of crypto-malware? Backdoor Ransomware Keylogger Rootkit

Ransomware

The share permissions on a shared Windows folder grant the user Read access and the local NTFS permissions grant the user Modify access. Which of the following are the effective user permission levels? (Select 2 answers) Read when accessing the share remotely Modify when accessing the folder locally Read when accessing the folder locally Modify when accessing the share remotely

Read when accessing the share remotely Modify when accessing the folder locally

The share permissions on a shared Windows folder grant the user Full Control access and the local NTFS permissions grant the user Read access. Which of the following are the effective user permission levels? (Select 2 answers) Read when accessing the share remotely Full control when accessing the folder locally Read when accessing the folder locally Full Control when accessing the share remotely

Read when accessing the share remotely Read when accessing the folder locally

Which of the following answers refers to a common solution for troubleshooting user login problems on a Windows domain? Applying system updates Rebuilding Windows profiles Safe mode troubleshooting Disabling startup applications Updating network settings

Rebuilding Windows profiles

Which of the following enables troubleshooting a malware-infected system that doesn't boot up? Anti-malware application Recovery console AV software Backup/restore options

Recovery console

Which of the macOS features enables access to optical drive of another computer over a network? Remote Disk Dock Boot Camp Remote Disc

Remote Disc

Which of the following provides access to Remote Assistance and Remote Desktop configuration settings in Windows? Security and Maintenance applet in Windows Control Panel Advanced tab of the System Properties (sysdm.cpl) utility Remote settings in the System applet in Windows Control Panel Network and Sharing applet in Windows Control Panel

Remote settings in the System applet in Windows Control Panel

According to the CompTIA's best practice procedures for malware removal, scheduling scans and running updates on a Windows-based system should be performed as the next step after: Enabling System Restore Isolating the infected system Removing malware from the system Creating a restore point

Removing malware from the system

The System Protection tab of the System Properties (sysdm.cpl) utility in Windows provides options for managing: Memory usage Restore points User accounts Network security

Restore Points

Which of the following enables decreasing partition size in Windows Disk Management utility? Right-click on a disk and select the Shrink Volume menu option Right-click on a disk and set the disk space limits on the Quota tab in the Properties menu Select a disk, then choose Shrink Volume from the Disk Management Action menu Right-click on a disk and select Shrink Volume on the Tools tab in the Properties menu

Right-click on a disk and select the Shrink Volume menu option

Which of the following actions in Windows allow to invoke the User Account Security (UAC) access control feature and run an application with administrator account permissions? (Select 3 answers) Right-click on an application icon -> select Run as administrator from the pop-up menu Launch Windows Run dialog box (Windows logo key + R) -> type in the application's name -> press Enter In Windows Start menu press and hold Control + Shift keys -> Left-click on an application icon Launch Windows Run dialog box (Windows logo key + R) -> type in the application's name -> press Control + Shift + Enter In Windows Start menu press and hold Alt + Shift keys -> Left-click on an application icon

Right-click on an application icon -> select Run as administrator from the pop-up menu In Windows Start menu press and hold Control + Shift keys -> Left-click on an application icon Launch Windows Run dialog box (Windows logo key + R) -> type in the application's name -> press Control + Shift + Enter

A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network is known as: Rootkit Spyware Backdoor Trojan

Rootkit

The sfc command-line utility in MS Windows: Encrypts files and folders Scans the integrity of all protected system files and replaces incorrect versions with correct Microsoft versions Displays information about system hardware and software configuration Checks a disk and displays a status report

Scans the integrity of all protected system files and replaces incorrect versions with correct Microsoft versions

According to the CompTIA's best practice procedures for malware removal, enabling System Restore and creating a restore point in Windows should be performed as the next step after: Removing malware from the system Scheduling scans and running updates Identifying and researching malware symptoms Isolating the infected system

Scheduling scans and running updates

Which of the following built-in macOS tools enables remote access to another Mac computer? Screen Sharing Remote Desktop Protocol (RDP) GoToMyPC Remote Assistance

Screen Sharing

The System Configuration utility tab containing a list of background applications that can be enabled/disabled during system startup is called: Boot Applications Services General Tools

Services

An MS Windows Administrative Tools folder applet for managing background applications is called: Services (services.msc) Resource Monitor (resmon.exe) System Configuration (msconfig.exe) Component Services (dcomcnfg.exe)

Services (services.msc)

Which of the following Windows utilities provides access to print spooler settings? Services (services.msc) Device Manager (devmgmt.msc) Computer Management (compmgmt.msc) Programs and Features (appwiz.cpl)

Services (services.msc)

Which of the following locations in Windows provides an interface for managing background applications? Programs and Features (appwiz.cpl) Services (services.msc) Computer Management (compmgmt.msc) Device Manager (devmgmt.msc)

Services (services.msc)

Which MS Windows utilities provide an interface for managing applications/services that might affect the system by slowing down the boot process? (Select 2 answers) Services (services.msc) Task Manager (taskmgr.exe) System Properties (sysdm.cpl) Performance Monitor (perfmon.exe) System Information (msinfo32.exe)

Services (services.msc) Task Manager (taskmgr.exe)

Which of the following locations provides access to brightness configuration options on an iOS device? Settings -> Display -> Brightness level Settings -> Battery -> Display -> Brightness level Settings -> Display & Brightness Settings -> Battery & performance -> Display -> Brightness level

Settings -> Display & Brightness

Which of the following locations allows to configure display brightness levels on an Android device? Settings -> Display & Brightness Settings -> Battery & performance -> Display -> Brightness level Settings -> Display -> Brightness level Settings -> Battery -> Display -> Brightness level

Settings -> Display -> Brightness level

Windows power plans manage how the computer is using power. The Balanced (recommended) power plan (used by default in certain Windows versions) scales the CPU performance based on its current utilization, which might have a degrading effect on system performance. If the system is running slow, one of the troubleshooting methods is to enable the High performance power plan or customize the current plan settings. In Windows, the power configuration settings can be found in: (Select 2 answers) Settings menu (Windows 8/8.1/10) Power Options applet in Windows Control Panel System Configuration (msconfig.exe) utility Administrative Tools folder Security and Maintenance applet in Windows Control Panel

Settings menu (Windows 8/8.1/10) Power Options applet in Windows Control Panel

A type of user interface that enables the execution of operating system commands is commonly referred to as: GUI Shell CLI Terminal

Shell

Which of the following enables partition split in Windows Disk Management utility? Right-click on a disk and set the disk space limits on the Quota tab in the Properties menu Shrink a volume, then create a new simple volume from the adjacent unallocated space Right-click on a disk and select the Split Volume menu option Select a disk, then choose Split Volume from the Disk Management Action menu

Shrink a volume, then create a new simple volume from the adjacent unallocated space

Allowing "Unknown Sources" in Android security settings enables: Rooting Malware propagation Sideloading Jailbreaking

Sideloading

The practice of installing mobile apps from untrusted sources (i.e. websites and app stores other than the official marketplaces) is called: Jailbreaking Rooting Sideloading Carrier unlocking

Sideloading

An antivirus database entry used for identifying malicious code is known as virus: ID Record Signature Repository

Signature

Which of the volume types available in Windows Disk Management utility do not offer fault tolerance? (Select 3 answers) Simple volume Spanned volume Striped volume Mirrored volume Striped with parity volume

Simple volume Spanned volume Striped volume

A power management mode in Windows that draws small amount of power, saves the system state in RAM, and allows for quick resuming of full-power operation with the use of a power button or on command is known as: (Select 2 answers) Power saver Sleep/suspend High performance Standby Hibernation

Sleep/suspend Standby

Which of the following answers refers to an example implementation of certificate-based authentication? Smart card ID badge PIN code Biometric lock

Smart card

Which of the following macOS features allows to create switchable desktop environments? Spaces Personalization Display Aero

Spaces

Phishing scams targeting a specific group of people are referred to as: Vishing Spear phishing Spoofing Whaling

Spear phishing

Which of the following is a macOS system search utility? Explorer File explorer Spotlight Finder

Spotlight

Malicious software collecting information about users without their knowledge/consent is known as: Crypto-malware Adware Ransomware Spyware

Spyware

Which formatting type in Windows 7/8/8.1/10 prevents data recovery by overwriting the contents of hard drive sectors? Low-level format Standard format High-level format Quick format

Standard format

What are the upgrade options for switching from Windows 7 to Windows 10 Enterprise edition? Windows 7 Starter Windows 7 Home Basic Windows 7 Home Premium Windows 7 Professional Windows 7 Enterprise Windows 7 Ultimate

Starter: Install Home Basic: Install Home Premium: Install Pro: Upgrade Enterprise: Install Ultimate: Upgrade

Switching from Windows 7 to Windows 10 Home edition can be performed either via an upgrade or clean installation. Match each Windows 7 edition on the left with the correct upgrade option from the corresponding drop-down list. Windows 7 Starter Windows 7 Home Basic Windows 7 Home Premium Windows 7 Professional Windows 7 Enterprise Windows 7 Ultimate

Starter: Upgrade Home Basic: Upgrade Home Premium: Upgrade Pro: Install Enterprise: Install Ultimate: Install

Which of the following are the upgrade options for switching from Windows 7 to Windows 10 Pro edition? (Match each Windows 7 edition on the left with the correct upgrade option from the corresponding drop-down list) Windows 7 Starter Windows 7 Home Basic Windows 7 Home Premium Windows 7 Professional Windows 7 Enterprise Windows 7 Ultimate

Starter: Upgrade Home Basic: Upgrade Home Premium: Upgrade Pro: Upgrade Enterprise: Upgrade Ultimate: Install

The Task Manager utility in Windows 8/8.1/10 contains a tab previously included as part of the System Configuration (MSConfig) utility. The tab allows system administrators to control user applications that should be enabled/disabled during system boot. This tab is called: Boot Startup App history Details

Startup

Which of the following locations in Windows 7 allows to enable/disable startup applications? Startup tab of the Task Manager (taskmgr.msc) utility Windows Settings (Settings -> Apps -> Startup) Startup tab of the System Configuration (msconfig.exe) utility Programs and Features (appwiz.cpl) applet in Windows Control Panel Startup tab of the System Properties (sysdm.cpl) utility

Startup tab of the System Configuration (msconfig.exe) utility

Windows 8 introduces a virtualization technology that enables organization of multiple physical disks into logical volumes in a fashion similar to RAID levels. What is the name of the Control Panel applet providing access to this functionality? Disk Management Storage Spaces Administrative Tools Sync Center

Storage Spaces

Which of the following tools enable creation of disk arrays in Windows? (Select 2 answers) Device Manager Programs and Features Storage Spaces Disk Management Backup and Restore

Storage Spaces Disk Management

Which volume type in Windows Disk Management utility uses RAID 0 setup for performance gains? Simple volume Spanned volume Striped volume Mirrored volume Striped with parity volume

Striped Volume

Which volume type in Windows Disk Management utility uses RAID 5 setup for performance gains and fault tolerance? Simple volume Spanned volume Striped volume Mirrored volume Striped with parity volume

Striped with parity volume

Which of the following allows to determine which network segment an IP address belongs to? Physical address Dynamic Host Configuration Protocol (DHCP) Address Resolution Protocol (ARP) Subnet mask

Subnet Mask

What are the characteristic features of a WPA/WPA2 Enterprise mode? (Select 2 answers) Suitable for large corporate networks Does not require an authentication server Suitable for all types of wireless LANs Requires RADIUS authentication server

Suitable for large corporate networks Requires RADIUS authentication server

A hidden file (or files) on the hard disk that Windows uses to hold parts of programs and data files that cannot be stored in RAM due to the insufficient memory space is called: (Select 3 answers) Swap file Paging file Signature file Virtual memory Archive file

Swap file Paging file Virtual memory

A Windows Control Panel applet used for managing local (offline) versions of files and folders stored on the network is known as: Ease of Access Center Sync Center Indexing Options File Explorer Options

Sync Center

Which Control Panel applet in Windows can be used to check the OS version and basic hardware statistics such as the CPU type and amount of installed RAM? Resource Monitor System Computer Management System Configuration

System

Which Control Panel applet in Windows provides access to computer name, domain, and workgroup settings? Credential Manager System User Accounts Administrative Tools

System

Which Microsoft Windows tool can be used by system administrators to find and isolate problems that might prevent the OS from starting correctly? Task Manager (taskmgr.exe) System Information (msinfo32.exe) Computer Management (compmgmt.msc) System Configuration (msconfig.exe)

System Configuration (msconfig.exe)

Which of the following is a Windows system utility that allows to roll back system files and settings to an earlier point in time? Sync Center Windows Backup System Restore Ease of Access Center

System Restore

Which of the following provide access to virtual memory (a.k.a. paging file) configuration options in Windows? (Select 2 answers) System applet in Control Panel -> System Protection tab -> Virtual memory Administrative Tools folder in Windows Control Panel -> Windows Memory Diagnostics Windows Run dialog box -> type in sysdm.cpl + press Enter -> System Protection tab -> Virtual memory System applet in Control Panel -> Advanced system settings -> Performance -> Settings -> Advanced -> Virtual memory Windows Run dialog box -> type in sysdm.cpl + press Enter -> Advanced tab -> Performance -> Settings -> Advanced -> Virtual memory

System applet in Control Panel -> Advanced system settings -> Performance -> Settings -> Advanced -> Virtual memory Windows Run dialog box -> type in sysdm.cpl + press Enter -> Advanced tab -> Performance -> Settings -> Advanced -> Virtual memory

What is the correct sequence of steps for enabling automatic virtual memory management in MS Windows? (Select 2 answers) System applet in Control Panel -> System Protection tab -> Virtual memory -> Change... -> enable Automatically manage paging file size for each drive Administrative Tools folder in Windows Control Panel -> Windows Memory Diagnostics -> Change... -> enable Automatically manage paging file size for each drive Windows Run dialog box -> type in sysdm.cpl + press Enter -> System Protection tab -> Virtual memory -> Change... -> enable Automatically manage paging file size for each drive System applet in Control Panel -> Advanced system settings -> Performance -> Settings -> Advanced -> Virtual memory -> Change... -> enable Automatically manage paging file size for each drive Windows Run dialog box -> type in sysdm.cpl + press Enter -> Advanced tab -> Performance -> Settings -> Advanced -> Virtual memory -> Change... -> enable Automatically manage paging file size for each drive

System applet in Control Panel -> Advanced system settings -> Performance -> Settings -> Advanced -> Virtual memory -> Change... -> enable Automatically manage paging file size for each drive Windows Run dialog box -> type in sysdm.cpl + press Enter -> Advanced tab -> Performance -> Settings -> Advanced -> Virtual memory -> Change... -> enable Automatically manage paging file size for each drive

Which of the following would be the easiest step to troubleshoot the Blue Screen of Death (BSoD) in MS Windows? System restart Recovery Console Safe Mode troubleshooting Driver rollback

System restart

A network technician wishes to use an RDP client on their Windows OS to remotely troubleshoot a problem on another Windows machine. Which of the following ports needs to be opened for the built-in Windows RDP server to allow this type of network connection? TCP port 1720 TCP port 636 TCP port 3389 TCP port 445

TCP port 3389

A security protocol designed to strengthen WEP implementations is known as: PEAP TKIP CCMP WPA2

TKIP

In Windows 8 and newer releases of the Microsoft OS, contents of the MSConfig's Startup tab can be viewed and managed via: Task Manager Performance Monitor Programs and Features applet Device Manager

Task Manager

Which of the following system utilities provides access to different command-line shells in macOS? cmd.exe PowerShell command.com Terminal

Terminal

Which of the following enable a newly added disk to show up in Windows File Explorer? (Select 3 answers) The disk needs to be initialized The disk needs to be converted to a dynamic volume The disk requires a drive letter The disk needs to be converted to a dynamic disk The disk can be mounted as a folder

The disk needs to be initialized The disk requires a drive letter The disk can be mounted as a folder

Auto negotiation is an Ethernet procedure that allows two connected devices to exchange information about their capabilities (such as supported speed and duplex modes) and automatically configure connection parameters based on the highest performance settings supported by both devices. True False

True

A Windows resource with conflicting NTFS and share permissions applied to it will assume: The least restrictive permission NTFS permissions The most restrictive permission Share permissions

The most restrictive permission

The System Configuration tab in MS Windows providing access to MMC snap-ins is called: Services Tools Applications Programs

Tools

A type of critical file that a computer system depends on to operate properly is known as a system file. In Microsoft Windows, system files are hidden by default; they might also have Read-only attribute turned on to prevent accidental changes to the file contents. Windows system files can be permanently displayed in Windows Explorer (Windows 7), or File Explorer (Windows 8/8.1/10) after modifying file and folder settings in the Folder Options applet in Windows 7 Control Panel, or File Explorer Options applet in Windows 8/8.1/10 Control Panel. True False

True

According to the CompTIA's best practice procedures for malware removal, user education should be the final step of the malware removal process. True False

True

Common methods of application installation and deployment include removable media (e.g. CD/USB) used locally in home networks and remote installation methods over a network popular in enterprise environments. True False

True

Event Viewer (eventvwr.msc) is a Windows utility for monitoring system health and troubleshooting problems with applications, operating system, and hardware. Event Viewer allows for browsing and managing event logs. The most common logs available in Event Viewer include Application, System, and Security logs. Depending on the severity of the event, Application and System logs display events that fall into three categories: Information, Warning, and Error. Information events denote normal operation of the system (such as starting and stopping of system services, or successful completion of some routine background tasks), warning events point to non-critical errors (for example when installation of a software component fails because the component is already on the system), error events point to serious issues, for example when programs stop responding and need to be closed by Windows. Security log contains events such as valid and invalid logon attempts, as well as events related to res True False

True

Implementing a computer screen lock is one of the account management security best practices. The screen lock can be used as a countermeasure against brute-force attacks as it can be set to block computer access after a specified number of failed login attempts. True False

True

In IT security, the term "Entry control roster" refers to a list of personnel allowed to access restricted areas. True False

True

In MS Windows, a set of troubleshooting utilities (including tools for solving network-related problems) can be found in the Troubleshooting applet located in Windows Control Panel. True False

True

In MS Windows, the attrib command is used to display or change file attributes. Some of the available options for this command include read-only (R), archive (A), system (S), and hidden (H). With attrib, the "+" symbol sets an attribute for a file, the "-" sign removes the attribute. True False

True

In NTFS, a folder or file copied or moved from one location to another on a different volume inherits permissions of its new parent folder. True False

True

In Windows 10, the Windows Firewall system component was renamed to Windows Defender Firewall. In similar fashion, the Windows Firewall with Advanced Security known from previous Windows versions changed its name to Windows Defender Firewall with Advanced Security. True

True

In Windows 8 and newer releases of the Microsoft OS, the real-time information about resources used by user applications and system processes in Task Manager can be found grouped in one place under the Processes tab. True False

True

In Windows Disk Management utility, a volume status set to Failed Redundancy indicates that the data on a mirrored or RAID 5 volume is no longer fault tolerant because one of the underlying disks is not online. True False

True

In Windows Disk Management utility, assigning a mount point folder path to a drive enables a newly added drive to show up in File Explorer as a regular folder. True False

True

In Windows Disk Management utility, disk arrays can be created by right-clicking on a disk and selecting array type from the context menu. True False

True

In computer security, a type of small-factor physical device used for authentication is commonly referred to as a hardware token. True False

True

In macOS, the term "local snapshot" refers to a backup copy of all personal and system files stored on the local machine instead of the preferred external drive. True False

True

In the context of MS Windows system management, the term "Administrative share" refers to a hidden network share on a local computer designed to be accessed remotely by network administrators. True False

True

Installing an app in Windows requires administrative-level access on a local machine. In cases where installation files are stored on a remote server, users may also need appropriate permissions to be able to access the installation folder/file. True False

True

Introduced in Windows Vista, Windows Firewall with Advanced Security MMC snap-in offers more detailed configuration options allowing system administrators to execute more granular control over inbound and outbound network traffic. True False

True

Network Access Control (NAC) defines a set of rules enforced in a network that the clients attempting to access the network must comply with. With NAC, policies can be enforced before or after end-stations gain access to the network. NAC can be implemented as pre-admission NAC where a host must, for example, be virus free or have patches applied before it can be allowed to connect to the network, and/or post-admission NAC, where a host is being granted/denied permissions based on its actions after it has been provided with the access to the network. True False

True

One of the ways of confirming that a software application comes from a trusted source is the verification of its digital signature. A digitally signed software proves the identity of the developer and guarantees that the application code hasn't been tampered with since it was signed. The authenticity and integrity of the application's code can be verified by comparing results of a cryptographic hash function (original hash published by the application developer vs. hash obtained from a downloaded app). True False

True

An optimal Wireless Access Point (WAP) antenna placement provides a countermeasure against: War chalking Spoofing War driving Insider threat

War driving

Prior to Windows 8, the MSConfig Startup tab contained a list of user applications that could be enabled/disabled during system boot. The contents of this tab are not available in the MSConfig utility shipped with Windows 8/8.1/10. True False

True

Program Compatibility Troubleshooter is a Windows system utility used for automatic resolution of problems with older applications failing to run on newer versions of MS Windows. Program Compatibility Troubleshooter can be accessed via the Troubleshooting applet in Windows 7/8/8.1/10 Control Panel. Selecting the "Run programs made for previous versions of Windows" option in the Troubleshooting applet launches a guided tool for fixing problems with older programs installed on the current version of Windows. True False

True

Rainbow tables are lookup tables used to speed up the process of password guessing. True False

True

Some of the Windows services require other background applications to run. If a service fails to start, one of the ways for troubleshooting such problem is to check whether all required components for a given service are also up and running. In MS Windows, the list of all connected services for a given service can be found by launching the Services (services.msc) utility, right-clicking on a service, selecting Properties, and checking the Dependencies tab. True False

True

The -b netstat parameter in Microsoft Windows allows to display the name of an application involved in creating each connection or listening port. True False

True

The Task Manager's Users tab in MS Windows allows system administrators to disconnect a user (invoke a Windows lock screen) or to sign them off (force a user to log off). True False

True

The Troubleshooting Control Panel applet introduced in Microsoft Windows 7 provides access to several software tools that can automatically fix common problems related to application compatibility, hardware, sound, networking, operating system, and security. True False

True

The basic countermeasures against application-related security risks include avoiding applications from unknown sources and keeping the already installed apps up to date with current patches and bug fixes. True False

True

The function of the ODBC Data Sources (odbcad32.exe) configuration utility in Windows is to facilitate communication between applications and varying types of databases. True False

True

The process of securing a workstation should involve keeping track of available system updates and patches. A single PC running Windows can be updated and patched via the Windows Update service. A similar type of service that enables centralized management and distribution of updates and patches to multiple Windows-based hosts in a corporate environment is known as Windows Server Update Services (WSUS). True False

True

The term "Power plan" refers to a collection of hardware and system settings that manage how a Windows-based computer uses power. Available configuration options for managing power in MS Windows 8/8.1/10 can be accessed via Power Options applet in Control Panel. Windows 10 provides additional way for managing basic power settings in the Settings menu. True False

True

Transmission carried out in one direction only is described as a simplex mode. Communication that takes place only in one direction at a time is referred to as half-duplex mode. Two devices communicating with each other in both directions simultaneously are said to be in full-duplex mode. Network devices supporting autonegotiation feature automatically configure best mode supported by both devices. Duplex mismatch is the term used for a situation where two devices communicate with each other using different duplex modes. True False

True

USB locks are mechanical devices used for blocking a computer's USB ports from unauthorized access. USB locks can also be used to prevent the removal of an external USB device attached to the computer. True False

True

VPN connection types are divided into remote-access VPNs (used for connecting a computer to a network), and site-to-site VPNs (used for connecting networks). True False

True

Windows Active Directory service allows for grouping users and computers into containers known as Organizational Units (OUs). An OU is the smallest unit to which system administrators can assign Group Policy settings to manage the configuration and use of accounts and resources within a given OU. True False

True

Windows Memory Diagnostic Tool (mdsched.exe) cannot be run inside Windows. This utility requires a system restart and is launched during next boot before loading the operating system. True False

True

The Programs and Features Windows Control Panel applet can be used for: (Select all that apply) Uninstalling applications Conducting repair installation of a malfunctioning program Adding/removing Windows components Creating/deleting system restore points Managing installed updates

Uninstalling applications Conducting repair installation of a malfunctioning program Adding/removing Windows components Managing installed updates

Phishing scams targeting people holding high positions in an organization or business are known as: Vishing Bluesnarfing Whaling Bluejacking Pharming

Whaling

Which of the following disk status options in Windows Disk Management utility indicates that a basic or dynamic disk is not accessible and might have experienced hardware failure, corruption, or I/O errors? Foreign Unreadable Offline Initializing

Unreadable

Windows Vista and newer releases of the Microsoft OS offer a security feature which limits privileges of software applications and access to administrative tasks. When a program makes a change that requires administrator-level permission or a user attempts to modify system settings that require administrative access, it triggers an on-screen prompt requiring an administrator password to proceed. This functionality is known as: User Account Control (UAC) Windows Defender real-time protection Trusted Platform Module (TPM) Windows Defender Firewall with Advanced Security

User Account Control (UAC)

Which of the following answers refers to a non-proprietary remote-access tool that enables control over another computer on the network with the use of a graphical user interface? SSH RDP Telnet VNC

VNC

Which of the following is a non-proprietary RDP alternative that enables control over another computer on the network with the use of a graphical user interface? VTP VRF VTC VNC

VNC

Which of the following is a dedicated device designed to manage encrypted connections established over an untrusted network such as the Internet? VPN concentrator Proxy server Distributed switch UTM appliance

VPN concentrator

Which tab of the Folder Options applet (Windows 7) / File Explorer Options applet (Windows 8/8.1/10) in MS Windows contains the Advanced settings menu for files, folders, and Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) navigation pane? Settings View Search General

View

Which of the following can be used as an extension of RAM? (Select 3 answers) Virtual memory Paging file Extended partition Disk thrashing Swap partition

Virtual memory Paging file Swap partition

Which of the following options is not part of the General tab of the Folder Options applet (Windows 7) / File Explorer Options applet (Windows 8/8.1/10) in MS Windows? Windows Explorer / File Explorer default starting folder Visibility of hidden files, folders, or drives Opening items (single-click vs. double-click on an item) Windows Explorer / File Explorer browsing history options (Privacy)

Visibility of hidden files, folders, or drives

Which of the following would be of help in troubleshooting wireless signal loss and low wireless network signal coverage? Protocol analyzer WAP power level controls Logical network diagram Network mapper

WAP power level controls

AES-based encryption mode is a characteristic feature of: WEP WPA2 PAP WPA

WPA2

A solution that simplifies configuration of new wireless networks by enabling non-technical users to easily set up new networks, configure network security settings, and add new devices to an existing network is known as: WPA WPS WEP WAP

WPS

Which of the following wireless technologies are deprecated and should not be used due to their known vulnerabilities? (Select 2 answers) WPS WAP WPA2 WMN WEP

WPS WEP

Which of the following takes advantage of cell towers that provide wireless signal coverage for mobile devices? WPAN WWAN Satellite WLAN

WWAN

A solution that allows to turn on a network host remotely by sending a broadcast frame is called: Remote access Jumbo frame Backdoor access Wake-on-LAN

Wake-on-LAN

Which of the following tools would be of help in determining the optimal WAP placement? War driving Optical power meter Network mapper Wi-Fi analyzer

Wi-Fi analyzer

What is the maximum amount of RAM supported by different editions of 64-bit (x64) Microsoft Windows 10? Windows 10 Home Windows 10 Pro Windows 10 Education Windows 10 Enterprise

Windows 10 Home 128GB Windows 10 Pro 2TB Windows 10 Education 2TB Windows 10 Enterprise 6TB

Which of the Microsoft Windows 7 editions include the BranchCache feature? Windows 7 Starter Windows 7 Home Basic Windows 7 Home Premium Windows 7 Professional Windows 7 Enterprise Windows 7 Ultimate

Windows 7 Enterprise Windows 7 Ultimate

Which of the following Windows 7 editions do(es) not include EFS? Windows 7 Starter Windows 7 Home Basic Windows 7 Home Premium Windows 7 Professional Windows 7 Enterprise Windows 7 Ultimate

Windows 7 Starter Windows 7 Home Basic Windows 7 Home Premium

What are the limits on physical memory for 32-bit (x86) Microsoft Windows 7? Windows 7 Starter Windows 7 Home Basic Windows 7 Home Premium Windows 7 Professional Windows 7 Enterprise Windows 7 Ultimate

Windows 7 Starter 2GB Windows 7 Home Basic 4GB Windows 7 Home Premium 4GB Windows 7 Professional 4GB Windows 7 Enterprise 4GB Windows 7 Ultimate 4GB

What is the maximum amount of RAM supported by different editions of 64-bit (x64) Microsoft Windows 7? Windows 7 Starter Windows 7 Home Basic Windows 7 Home Premium Windows 7 Professional Windows 7 Enterprise Windows 7 Ultimate

Windows 7 Ultimate 192 GB Windows 7 Enterprise 192 GB Windows 7 Professional 192 GB Windows 7 Home Premium 16 GB Windows 7 Home Basic 8 GB Windows 7 Starter N/A

Which of the following are the limits on physical memory for 64-bit (x64) Microsoft Windows 8/8.1? Windows 8 (Core) Windows 8 Professional Windows 8 Enterprise

Windows 8 (Core) 128GB Windows 8 Professional 512GB Windows 8 Enterprise 512GB

In Windows 8/8.1/10, Windows Defender Firewall can be enabled/disabled in: (Select all that apply) Network and Sharing Center Control Panel applet Windows Defender Firewall Control Panel applet Security and Maintenance Control Panel applet Firewall & network protection menu in Windows Settings (accessed via Start menu) Windows Defender Firewall Control Panel applet -> Advanced settings -> right-click on Windows Defender Firewall with Advanced Security -> Properties Programs and Features Control Panel applet

Windows Defender Firewall Control Panel applet Firewall & network protection menu in Windows Settings (accessed via Start menu) Windows Defender Firewall Control Panel applet -> Advanced settings -> right-click on Windows Defender Firewall with Advanced Security -> Properties

A Microsoft online service used for patching up system vulnerabilities, improving system performance, and fixing coding errors found in Windows software is known as: Action Center Windows Update Security Center Windows Store

Windows Update

For a newly added hard drive, this command allows to configure it with a file system so that Windows can store information on the disk. mstsc defrag nbtstat format

format

Which of the following locations provides access to Windows Defender Firewall settings in Windows 8/8.1/10? (Select 2 answers) Windows Defender Firewall applet in Control Panel Internet Options (Security tab) Windows Start button -> Settings -> Update & Security -> Windows Security -> Firewall & network protection Internet Options (Advanced tab) Network and Sharing Center applet in Control Panel

Windows Defender Firewall applet in Control Panel Windows Start button -> Settings -> Update & Security -> Windows Security -> Firewall & network protection

Which of the following locations in Windows 8/8.1/10 provides access to configuration options that would allow to block incoming echo requests? Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Outbound Rules -> New Rule... -> Network protocols Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound Rules -> New Rule... -> Custom -> All programs (or a single app) Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Outbound Rules -> New Rule... -> Custom -> All programs (or a single app) Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound Rules -> New Rule... -> Network protocols

Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound Rules -> New Rule... -> Custom -> All programs (or a single app)

Which of the following locations in Windows 8/8.1/10 provides access to configuration options that would allow to create an exception for a TCP or UDP port? Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound/Outbound Rules -> New Rule... -> Port Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound/Outbound Rules -> New Rule... -> Custom Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound/Outbound Rules -> New Rule... -> Network protocols Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound/Outbound Rules -> New Rule... -> All programs (or a single app)

Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound/Outbound Rules -> New Rule... -> Port

Which of the following locations in Windows 8/8.1/10 provide access to configuration options for managing apps or features allowed through Windows Defender Firewall? (Select 3 answers) Network and Sharing Center applet in Control Panel -> Allow an app or feature through Windows Defender Firewall Windows Defender Firewall applet in Control Panel -> Turn Windows Defender Firewall on or off menu item Security and Maintenance applet in Control Panel -> Allow an app or feature through Windows Defender Firewall Windows Start button -> Settings -> Update & Security -> Windows Security -> Firewall & network protection -> Allow an app through firewall Windows Defender Firewall applet in Control Panel -> Allow an app or feature through Windows Defender Firewall

Windows Defender Firewall applet in Control Panel -> Turn Windows Defender Firewall on or off menu item Windows Start button -> Settings -> Update & Security -> Windows Security -> Firewall & network protection -> Allow an app through firewall Windows Defender Firewall applet in Control Panel -> Allow an app or feature through Windows Defender Firewall

Which of the following steps provide access to the Disk Cleanup utility in MS Windows? (Select 3 answers) Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) -> right-click on a drive -> Properties -> General tab -> Disk Cleanup Windows Run dialog box -> type in diskmgmt.msc + press Enter -> right-click on a drive -> Properties -> Tools tab -> Disk Cleanup Windows Control Panel -> Administrative Tools folder -> Disk Cleanup shortcut icon Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) -> right-click on a drive -> Properties -> Tools tab -> Disk Cleanup Windows Run dialog box -> type in diskmgmt.msc + press Enter -> right-click on a drive -> Properties -> General tab -> Disk Cleanup

Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) -> right-click on a drive -> Properties -> General tab -> Disk Cleanup Windows Run dialog box -> type in diskmgmt.msc + press Enter -> right-click on a drive -> Properties -> General tab -> Disk Cleanup

Which of the following steps provide access to the disk defragmenter utility in MS Windows? (Select 3 answers) Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) -> right-click on a drive -> Properties -> Tools tab -> Optimize and defragment drive -> Optimize Windows Control Panel -> Administrative Tools folder -> Defragment and Optimize Drives shortcut icon Windows Run dialog box -> type in diskmgmt.msc + press Enter -> right-click on a drive -> Properties -> Tools tab -> Optimize and defragment drive -> Optimize Windows Control Panel -> Administrative Tools folder -> Disk Management utility shortcut icon -> right-click on a drive -> Properties -> Tools tab -> Optimize and defragment drive -> Optimize Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) -> right-click on a drive -> Properties -> General tab -> Optimize and defragment drive -> Optimize

Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) -> right-click on a drive -> Properties -> Tools tab -> Optimize and defragment drive -> Optimize Windows Control Panel -> Administrative Tools folder -> Defragment and Optimize Drives shortcut icon Windows Run dialog box -> type in diskmgmt.msc + press Enter -> right-click on a drive -> Properties -> Tools tab -> Optimize and defragment drive -> Optimize

Which of the following locations in Windows 7 allows to create a shortcut to a shared folder or computer on a network? Windows Explorer -> Computer -> Map network drive Shared Folders menu in the Computer Management utility Network and Sharing Center applet in Windows Control Panel File Explorer -> This PC -> Computer tab -> Map Network drive

Windows Explorer -> Computer -> Map network drive

Which of the following is a Windows built-in software component that monitors network traffic and depending on the configuration settings applied to each data packet either blocks it or allows it to pass through? Security Center Windows Firewall Action Center Windows Defender

Windows Firewall

Which of the following Control Panel applets provides access to the Windows Firewall with Advanced Security tool? Internet Options (Security tab) Windows Firewall (Advanced settings) Network and Sharing Center Internet Options (Advanced tab)

Windows Firewall (Advanced settings)

In Windows 7, Windows Firewall can be enabled/disabled in: (Select all that apply) Programs and Features Control Panel applet Security and Maintenance Control Panel applet Firewall & network protection menu in Windows Settings (accessed via Start menu) Windows Firewall Control Panel applet Network and Sharing Center Control Panel applet Windows Firewall Control Panel applet -> Advanced settings -> right-click on Windows Firewall with Advanced Security -> Properties

Windows Firewall Control Panel applet Windows Firewall Control Panel applet -> Advanced settings -> right-click on Windows Firewall with Advanced Security -> Properties

Which of the following locations provides access to Windows Firewall settings in Windows 7? Network and Sharing Center applet in Control Panel Windows Firewall applet in Control Panel Windows Start button -> Settings -> Update & Security -> Windows Security -> Firewall & network protection Internet Options (Security tab)

Windows Firewall applet in Control Panel

Which of the following steps provide access to configuration settings for Windows system visual effects, such as animations and shadow effects? (Select 3 answers) Control Panel -> Programs and Features -> Optimize visual display -> Personalize appearance and sound effects -> Visual Effects Windows Run dialog box -> type in sysdm.cpl + press Enter -> Advanced tab -> Performance -> Settings... -> Visual Effects Control Panel -> Power Options -> select a power plan -> Change plan settings -> Change advanced power settings -> Desktop background settings -> Visual Effects Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) -> right-click on the Computer icon (Windows 7) / This PC icon (Windows 8/8.1/10) -> Properties -> Advanced system settings -> Advanced tab -> Performance -> Settings... -> Visual Effects Control Panel -> System applet -> Advanced system settings -> Advanced tab -> Performance -> Settings... -> Visual Effects

Windows Run dialog box -> type in sysdm.cpl + press Enter -> Advanced tab -> Performance -> Settings... -> Visual Effects Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) -> right-click on the Computer icon (Windows 7) / This PC icon (Windows 8/8.1/10) -> Properties -> Advanced system settings -> Advanced tab -> Performance -> Settings... -> Visual Effects Control Panel -> System applet -> Advanced system settings -> Advanced tab -> Performance -> Settings... -> Visual Effects

Which of the following locations in MS Windows provide access to an interface containing options for configuring restore settings, managing disk space, and deleting restore points? (Select 2 answers) Control Panel (Icon view) -> Security and Maintenance -> Change Security and Maintenance Settings -> System Protection -> Configure... Windows Run dialog box -> type in sysdm.cpl + press Enter -> System Protection -> Configure... Control Panel (Icon view) -> Recovery -> Configure System Restore -> Configure... Windows Run dialog box -> type in wscui.cpl + press Enter -> Change Security and Maintenance Settings -> System Protection -> Configure... Control Panel (Category view) -> System and Security -> Configure System Restore -> Configure...

Windows Run dialog box -> type in sysdm.cpl + press Enter -> System Protection -> Configure... Control Panel (Icon view) -> Recovery -> Configure System Restore -> Configure...

Which of the following locations in Windows 8/8.1/10 provide access to an interface for managing startup applications? (Select 2 answers) Startup tab of the System Properties (sysdm.cpl) utility Programs and Features applet in Windows Control Panel Startup tab of the System Configuration (msconfig.exe) utility Windows Settings (Settings -> Apps -> Startup) Startup tab of the Task Manager utility

Windows Settings (Settings -> Apps -> Startup) Startup tab of the Task Manager utility

Which of the following locations provide access to proxy settings in Windows? (Select 2 answers) Windows Settings menu -> System -> Network & Internet -> Proxy Windows Control Panel -> Internet Options -> Privacy tab -> Advanced -> Proxy server Windows Settings menu -> Network & Internet -> Proxy Windows Control Panel -> Internet Options -> Connections tab -> LAN settings -> Proxy server Windows Settings menu -> Update & Security -> Proxy Windows Control Panel -> Network and Sharing Center -> Change adapter settings -> Proxy server

Windows Settings menu -> Network & Internet -> Proxy Windows Control Panel -> Internet Options -> Connections tab -> LAN settings -> Proxy server

Which of the following locations in Windows 10 provide access to configuration options for connecting a network printer to a PC (network printer mapping)? (Select 2 answers) Control Panel -> Devices and Printers applet -> right-click on a selected printer -> Printer Properties -> Sharing tab Windows Start button -> Settings -> Devices -> Printers & scanners -> Add printers & scanners -> Add a printer or scanner -> select a printer -> Add Device Control Panel -> Devices and Printers applet -> Add a printer Windows Start button -> Settings -> Devices -> Printers & scanners -> select a printer -> Manage -> Printer Properties -> Sharing tab

Windows Start button -> Settings -> Devices -> Printers & scanners -> Add printers & scanners -> Add a printer or scanner -> select a printer -> Add Device Control Panel -> Devices and Printers applet -> Add a printer

Which of the following locations in Windows 10 provide access to configuration options that allow to share a local printer with other PCs on a network? (Select 2 answers) Control Panel -> Devices and Printers applet -> Add a printer Windows Start button -> Settings -> Devices -> Printers & scanners -> select a printer -> Manage -> Printer Properties -> Sharing tab Control Panel -> Devices and Printers applet -> right-click on a selected printer -> Printer Properties -> Sharing tab Windows Start button -> Settings -> Devices -> Printers & scanners -> Add printers & scanners -> Add a printer or scanner -> select a printer -> Add Device

Windows Start button -> Settings -> Devices -> Printers & scanners -> select a printer -> Manage -> Printer Properties -> Sharing tab Control Panel -> Devices and Printers applet -> right-click on a selected printer -> Printer Properties -> Sharing tab

Which of the following locations provide access to display settings in Windows 10? (Select 2 answers) Display applet in Windows Control Panel (Icons view) Appearance and Personalization menu of the Windows Control Panel (Category view) Windows Start button -> Settings -> System -> Display Programs and Features applet in Windows Control Panel Display settings pop-up menu launched after right-clicking on the Windows Desktop screen area

Windows Start button -> Settings -> System -> Display Display settings pop-up menu launched after right-clicking on the Windows Desktop screen area

Which of the following locations enable adjustments to the volume of sound in Windows 8/8.1/10? (Select 2 answers) System applet in Control Panel Windows Taskbar notification area Sounds and Audio Devices applet in Control Panel AutoPlay applet in Control Panel Sound applet in Control Panel

Windows Taskbar notification area Sound applet in Control Panel

Which of the following sources allow for obtaining, installing, and updating device drivers used by Microsoft Windows OSs? (Select 2 answers) Windows Update Computer Management Device manufacturer Task Manager System Configuration

Windows Update Device manufacturer

Which of the following key combinations can be used to launch Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) in MS Windows? Windows logo key + E Ctrl + Shift + Esc Windows logo key + F Ctrl + Alt + Delete

Windows logo key + E

Which of the following statements describing different methods for organizing Windows-based computers in networks are true? (Select 3 answers) Windows-based computers on home networks must be part of a HomeGroup Windows-based computers on a network must be part of a workgroup or a domain Windows-based computers on workplace networks are usually part of a domain Windows-based computers on workplace networks are usually part of a workgroup Windows-based computers on home networks are usually part of a workgroup Windows-based computers on home networks are usually part of a domain

Windows-based computers on a network must be part of a workgroup or a domain Windows-based computers on workplace networks are usually part of a domain Windows-based computers on home networks are usually part of a workgroup

Which of the following statements describing different methods for organizing Windows-based computers in networks are true? (Select 3 answers) Windows-based computers on home networks must be part of a HomeGroup Windows-based computers on a network must be part of a workgroup or a domain Windows-based computers on workplace networks are usually part of a domain Windows-based computers on workplace networks are usually part of a workgroup Windows-based computers on home networks are usually part of a workgroup Windows-based computers on home networks are usually part of a domain

Windows-based computers on a network must be part of a workgroup or a domain Windows-based computers on workplace networks are usually part of a domain Windows-based computers on home networks are usually part of a workgroup

The process of planning and designing new WLANs for optimal performance, security and compliance typically involves: Penetration testing Wireless site survey Network segmentation Vulnerability scanning

Wireless site survey

Which of the statements listed below apply to Windows workgroups? (Select 3 answers) Security policies and permissions in workgroups are administered centrally Logging on to any computer on the workgroup requires a single account Workgroups typically consist of no more than twenty computers There is no limit on the number of hosts that can become a part of a single workgroup Logging on to any computer in the workgroup requires an account on that computer Each computer in the workgroup has its own security policy

Workgroups typically consist of no more than twenty computers Logging on to any computer in the workgroup requires an account on that computer Each computer in the workgroup has its own security policy

Which of the statements listed below apply to Windows workgroups? (Select 3 answers) Security policies and permissions in workgroups are administered centrally Logging on to any computer on the workgroup requires a single account Workgroups typically consist of no more than twenty computers There is no limit on the number of hosts that can become a part of a single workgroup Logging on to any computer in the workgroup requires an account on that computer Each computer in the workgroup has its own security policy

Workgroups typically consist of no more than twenty computers Logging on to any computer in the workgroup requires an account on that computer Each computer in the workgroup has its own security policy

What is the name of a software tool used for finding and installing software packages on Debian and Debian-based Linux distributions? RPM apt-rpm Yum apt-get

apt-get

Which of the following answers lists the correct syntax for applying the read-only attribute to a file? attrib +R [drive:] [path] [filename] attrib [drive:] [path] [filename] /read-only attrib /R [drive:] [path] [filename] attrib [drive:] [path] [filename] +R

attrib +R [drive:] [path] [filename]

While trying to start their Windows machine, a user receives "Windows Boot Configuration Data file is missing required information" error message. Which of the following bootrec options should be used by a technician for manual CLI troubleshooting of this error? bootrec /scanos bootrec /rebuildbcd bootrec /fixmbr bootrec /fixboot

bootrec /rebuildbcd

A malware-infected networked host under remote control of a hacker is commonly referred to as a: Trojan Worm Bot Honeypot

bot

Which of the following terms is used to describe a collection of intermediary compromised systems that are used as a platform for a DDoS attack? Honeynet Botnet Quarantine network Malware

botnet

Which of the command-line commands listed below is used for directory traversal? cd dir ps dig

cd

Which of the following Linux command-line commands enables directory traversal? cd dir ps dig

cd

Which parameter of the cd command in Windows moves the command-line prompt one folder up in the directory tree (sets the prompt at the parent folder of the current folder)? cd \ cd /up cd + cd ..

cd ..

Which of the following commands in Windows Command Prompt changes the current directory to the root directory? cd \ dir /root cd .. chdir /r

cd \

Which of the following is a Windows, OS/2 and DOS command-line tool used for checking the file system and status of the system's hard drives? grep chkdsk sfc dism

chkdsk

The following command-line command can be used to copy one or more files from one location to another. sfc copy move pushd

copy

Which Linux command enables copying files and directories? cp copy xcopy robocopy

cp

A low-level utility that can be used for creating/restoring filesystem backup copies in Linux is called: fsutil diskpart dd format

dd

Which of the following launches the Device Manager tool in Microsoft Windows? msconfig.exe devmgmt.msc appwiz.cpl compmgmt.msc

devmgmt.msc

Which of the following Windows Command Prompt commands can be used to list all directory's files and subdirectories contained in the current directory? (Select 2 answers) dir dir /? dir *.* dir /all dir /list

dir dir *.*

Which of the following launches a GUI system utility for managing HDDs in Windows? diskpart.exe control.exe diskmgmt.msc compmgmt.msc devmgmt.msc

diskmgmt.msc

Which of the following commands in Windows Command Prompt launches a text-based command-line partitioning utility? format chkdsk defrag diskpart

diskpart

A Windows command-line tool used for preparing and modifying contents of Windows images is known as: format robocopy dism gpupdate

dism

A Microsoft-proprietary file system optimized for flash drives is known as:

exFAT

A command-line command in MS Windows that displays Group Policy information for a machine or user is known as: nbtstat gpresult verify gpupdate

gpresult

Which of the command-line commands listed below allows for updating multiple Group Policy settings in MS Windows? convert gpupdate bcdedit gpresult

gpupdate

A Linux command-line command that enables searching files for lines containing a match to a given text pattern is called: rm chmod find grep

grep

Which of the following commands in Windows can be used to display help information related to a specific command-line utility? (Select 2 answers) [command name] help man [command name] [command name] info help [command name] [command name] /?

help [command name] [command name] /?

A Linux command-line utility used for displaying and modifying network interface configuration settings is called: ifconfig net config ipconfig networksetup

ifconfig

Which of the following Windows command-line utilities can be used to renew an IP address? ifconfig net config iwconfig ipconfig

ipconfig

Which of the following command-line commands in MS Windows are used for resetting the DHCP configuration settings for all adapters? (Select 2 answers) ipconfig /down ipconfig /release ipconfig /up ipconfig /renew

ipconfig /release ipconfig /renew

Which of the following is a Linux command-line command used for configuring network interface parameters specific to the wireless communication? net config ifconfig networksetup iwconfig

iwconfig

Which of the Linux command-line commands allows to terminate a running process? taskkill exit shutdown kill

kill

Which of the following addresses can be pinged to test the functionality of a Network Interface Card (NIC)? (Select 3 answers) localhost ::1 FE80::/10 169.254/16 127.0.0.1

localhost ::1 127.0.0.1

Which of the following Linux commands is used to display information about files and directories contained within the current working directory? pwd ls grep ps

ls

A Microsoft Windows application utility that displays details about computer's hardware configuration, computer components, software, and device drivers is known as: msconfig.exe winver.exe msinfo32.exe control.exe

msinfo32.exe

What is the name of the Linux command used for renaming files and directories? rm ps mv ls

mv

Which of the following is a Linux command for transferring files/directories to a different directory? replace export move mv

mv

Which of the following Command Prompt commands in Windows is used for listing a computer's connections to shared resources? net share net use net session net config

net use

Which of the MS Windows command-line commands lists the user accounts for the computer? net view net session net user net accounts

net user

Which of the following CLI tools can be used for troubleshooting DNS-related problems? arp nslookup tracert pathping

nslookup

A Linux command-line command allowing a user to change his/her own password is known as: pwd pass passwd password

passwd

Which of the following are examples of administrative share names in Windows? (Select 2 answers) print$ Windows (C:) IPC$ C:/Windows/System32 $ADMIN

print$ IPC$

What is the name of a Linux command-line utility used for displaying statistics of running processes? ps tasklist nbtstat id

ps

A Linux command displaying an absolute path to (i.e. full filename of) the current working directory is called: mv pwd rm dir

pwd (print working directory)

Which of the following system utilities in MS Windows provides access to a database containing system configuration information? winver msconfig regedit msinfo32

regedit

Which other command-line command besides regedit can be used to launch registry editor in Windows? regdt regedit32 msconfig regedt32

regedt32

A command-line command in Linux used for deleting files and directories is known as: erase rm del edit

rm

Which of the following system utilities in Windows enables managing background applications? msconfig appwiz.cpl mstsc services.msc

services.msc

Which of the following answers refers to a script file type designed to be run in Unix command line? bat ps1 vbs sh

sh

The following command can be used for turning off or restarting a Linux host. reboot shutdown exit taskkill

shutdown

The following command can be used to shut down or restart a local or remote host running MS Windows. exit shutdown reboot taskkill

shutdown

Which of the following command-line commands enables a full system shutdown and restart of an MS Windows host after a time-out period of two minutes? shutdown /s /120 shutdown /r /t 120 shutdown /r /120 shutdown /s /t 120

shutdown /r /t 120

Which of the following is the correct command for setting the time-out period of 60 seconds before powering off a Windows host? shutdown /r /t 60 shutdown /s /60 shutdown /s /t 60 shutdown /r /60

shutdown /s /t 60

Which of the following is a Linux command that allows to assume the identity of a different system user and execute commands with security privileges of that user account? sync id usermod su

su

A Linux command that temporarily modifies security privileges to allow an execution of a single command that requires root access permissions is called: id sudo usermod su

sudo

Which of the answers listed below refers to the correct syntax for a Windows Command Prompt taskkill command that would allow to close notepad.exe by providing its imagename? taskkill /pid notepad taskkill /im notepad.exe taskkill /id notepad.exe taskkill /img notepad

taskkill /im notepad.exe

Provided that the process ID of notepad.exe obtained with the tasklist command is 1230, which of the following answers lists the correct syntax for a Windows Command Prompt taskkill command that would allow to close this application? taskkill /id 1230 taskkill --im 1230 taskkill /pid 1230 taskkill --id 1230

taskkill /pid 1230

Which of the following command-line commands in Windows displays a list of currently running processes on a local or remote host? iexplore tasklist services.msc netstat

tasklist

Which of the following commands is used for invoking a text editor in Unix-like operating systems? edit notepad vi bcdedit

vi

What is the name of a standalone malicious computer program that typically propagates itself over a computer network to adversely affect system resources and network bandwidth? Spyware Worm Trojan Spam

worm

Which of the Microsoft Windows command-line commands allow for copying multiple files or entire directory trees from one directory to another and for copying files across a network? (Select 2 answers) xcopy pushd shift robocopy

xcopy robocopy


Ensembles d'études connexes

Chapter 17 Fluid & Electrolyte Balance

View Set

History of Recorded Music Exam 1

View Set