CompTIA A+ Core 2 Practice Exam Question Review

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following file extensions indicate a Windows system file? (Select two.) -.com -.dll -.msi -.vxd -.rtf

".dll" ".vxd" Windows system file extensions include .dll (dynamic link library), .drv (device driver), and .vxd (virtual device driver). Program file extensions include .exe and .com. Document file extensions include .rtf (rich text). Windows Installer files use the .msi extension.

You connect your computer to a wireless network available at the local library. You find that you cannot access several websites on the internet. Which of the following is the MOST likely cause of this problem? -A firewall is blocking ports 80 and 443. -The router has not been configured to perform port forwarding. -Port triggering is redirecting traffic to the wrong IP address. -A proxy server is filtering access to websites.

"A proxy server is filtering access to websites." A proxy server can block internet access based on website or URL. Many schools and public networks use proxy servers to prevent access to websites with objectionable content. Ports 80 and 443 are used by HTTP to retrieve all web content. If a firewall were blocking these ports, access would be denied to all websites. Port forwarding directs incoming connections to a host on the private network. Port triggering dynamically opens firewall ports based on applications that initiate contact from the private network.

Which of the following provides a set of rules that specify which types of network traffic are allowed through a firewall? answer -ACL -Circuit-layer gateway -Packet filtering -Application-level gateway

"ACL" ACLs (access control lists) are sets of rules used by firewalls. They specify which types of network traffic are allowed through the firewall. Any traffic that does not match the rules are blocked. Packet filtering, circuit-layer gateways, and application-level gateways are types of firewalls that use ACLs to filter network traffic.

Which of the following policies defines who has access to which company resources and explains any restrictions that have been set for their use? -Standard Operating Procedure (SOP) -Acceptable Use Policy (AUP) -Bring Your Own Device (BYOD) Policy -Physical Security Policy

"Acceptable Use Policy (AUP)" An Acceptable Use Policy (AUP) defines who has access to which company resources and explains any restrictions that have been set on their use. A Bring Your Own Device (BYOD) Policy sets rules for the use of personal devices. A Physical Security Policy indicates restricted areas and access rules. A Standard Operating Policy (SOP) provides step-by-step guidance for performing a complex or multi-faceted business activity.

As with other programming languages, improper structure, syntax, or systems testing can cause scripts to negatively impact a machine. Which of the following are common problems that can be introduced into a system or network with a script? (Select two.) -Black (or Blue) Screen of Death -Beeps upon startup -Accidentally changed system settings -Unintentional introduction of malware -Strange characters on a printed page

"Accidentally changed system settings" "Unintentional introduction of malware" As with other programming languages, improper structure, syntax, or systems testing can cause scripts to negatively impact a machine. These problems include: -Unintentional introduction of malware to a system. -System settings accidentally changed by the script. -Browser, application, or system crashes caused by poor resource management in a script. A Black (or Blue) Screen of Death is associated with Windows systems and indicates a fatal system error. However, it is not normally caused by running a script. Strange or jumbled characters on a printed page is normally a sign of an outdated or corrupted printer driver. If you hear a series of beeps when starting your computer, these sounds are normally produced by the BIOS/UEFI and are codes for specific issues or states.

You manage two folders in your computer as follows: C:\Confidential D:\PublicReports Both the C:\ and D:\ drives are formatted with the NTFS file system. In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: Reports.doc Costs.doc The D:\ drive grants the Full Control permission to the Users group. There are no other permissions assigned except for the default permissions. You then take the following actions. You: Move Reports.doc from C:\Confidential to D:\PublicReports. Copy Costs.doc from C:\Confidential to D:\PublicReports. Which of the following BEST describes the permission the members of the Users group will have for the two files in the D:\PublicReports folder? -Allow Full Control for Reports.doc and Deny Read for Costs.doc. -Allow Full Control for both. -Deny Read for Reports.doc and Allow Full Control for Costs.doc. -Deny R

"Allow Full Control for both." Users will have Allow Full Control for both files. Moving or copying files to a different NTFS partition removes any existing NTFS permissions so that only inherited permissions apply.

Match each incident detection method on the left (First Group) with the appropriate description on the right (Second Group). (Each method may be selected more than once.) -Poactive -Active -Passive -An organization looks for existing security flaws in their system. -A technician performing maintenance on a computer discovers prohibited content. -A device or practice helps determine how and why a security incident occurred. -A network intrusion detection system (IDS) detects malicious traffic.

"An organization looks for existing security flaws in their system. Correct Answer: Proactive" "A technician performing maintenance on a computer discovers prohibited content. Correct Answer: Passive" "A device or practice helps determine how and why a security incident occurred. Correct Answer: Passive" "A network intrusion detection system (IDS) detects malicious traffic. Correct Answer: Active" The different incident detection methods are described below. Proactive: -An organization looks for existing security flaws in their system. Active: -A network intrusion detection system (IDS) detects malicious traffic. Passive: -A technician performing maintenance on a computer discovers prohibited content. -A device or practice helps determine how and why a security incident occurred.

Which Windows feature can you use to encrypt a hard drive volume? -EFS -NTFS -BitLocker -BitLocker to Go

"BitLocker" BitLocker was introduced in Windows Vista and is used to encrypt an entire volume (not just individual files and folders). BitLocker is designed to protect all data on a volume, even if the hard drive is moved to another computer. BitLocker to Go is used to encrypt USB drives (not a hard drive volume). Encrypting File System (EFS) is a component of the NTFS file system that allows file encryption. EFS is not a Windows feature that is used to encrypt a hard drive volume. NTFS is the file system that is used in modern Windows operating systems. It is not a Windows feature that is used to encrypt a hard drive volume.

Wendy had been searching the internet for a great deal on jewelry. While looking at one site, a pop-up was displayed that told her she had just been chosen as the winner of a nice prize. Being excited to win, Wendy clicked on the link provided to claim her prize. The next day, when Wendy tried to turn on her computer, her computer displayed the Blue Screen of Death (BSOD). After interviewing Wendy, you suspect that the pop-up she clicked on installed some malicious software that has caused her computer to lock up. Which of the following is the BEST place to begin repairing Wendy's computer? -Boot the computer from the Windows installation disc and run Startup Repair. -Boot the computer from the Windows installation disc and run Reset this PC. -Boot the computer from the Windows installation disc and run System Restore. -Boot the computer from the Windows installation disc and perform a clean installation of Windows.

"Boot the computer from the Windows installation disc and run Startup Repair." Although BSOD can be caused by many things, given the circumstances and your suspicion that malware may be the cause, you should first isolate Wendy's computer and then try to make her computer bootable by running Startup Repair. Startup Repair attempts to fix problems that keep Windows from loading. If this process fixes her computer, you would then take the proper steps to find and remove the malicious software that caused the issue in the first place. If the computer does not boot after completing the above, you can try to run a System Restore. This would recover your computer to a previous point, but all of the changes made after the restore point was created would be lost. If the restore process fails, you could then try to Reset the PC. Keep in mind that this step may get the computer running again, but it will remove all of the applications and settings. If this step does work, you must still check for malicious software that may be disguised as a personal file. If all else fails, a clean installation of Windows can be performed. And if a backup of Wendy's files are available, they can be restored.

Which documents are generally finished and approved before a project begins? (Select three.) -Budget -Customer acceptance checklist -Project plan -Analysis spreadsheet -Slide presentation -Risk Assessment -Change order form

"Budget" "Project Plan" "Risk Assessment" Most businesses require executive sign-off on a project's plan, budget, and risk assessment before it begins. A change order form is the document used to request changes to a project that is underway. A slide presentation or analysis spreadsheet are not required, although they might be useful. A customer acceptance checklist is important, but only after the project is completed.

Which file system path is the default location for system files in Windows 11? -C:\Windows\System32 -C:\Program Files (x86) -C:\Windows -C:\Windows\Program Files (x86) -C:\System32

"C:\Windows" In Windows 11, the default location of system files is C:\Windows. C:\Program Files (x86) stores 32-bit program files. There are no default C:\Windows\Program Files (x86), C:\System 32, or C:\Windows\System32 folders in Windows 11.

Which of the following is true about CRT monitors? -CRT monitor capacitors lose their charge after six months of not being used. -CRT monitors can be disposed of in the recycling bin. -CRT monitors can be disposed of in the regular trash. -CRT monitors should be discharged before disposal.

"CRT monitors should be discharged before disposal." CRT monitors contain a capacitor that holds up to 20,000 volts. CRT monitors should not be disposed of in the trash or recycling bin. You should follow local guidelines for disposal, which may not include placing them in recycling bins. The capacitor can maintain its charge even after six months of not being used.

Which of the following is a firewall type that scans network traffic based on TCP or UDP transmission? -Packet filtering -Application-level gateway -Access control list -Circuit-layer gateway

"Circuit-layer gateway" A circuit-layer gateway scans network traffic based on TCP or UDP transmission. If the transmission is detected as legitimate, the packet is granted access while the link remains established. Packet filtering is one of the most common types of firewalls. It scans all packets and reads the source and destination IP addresses along with port numbers. Then, based on the ACL, the firewall rejects any packet that does not belong to that network. An application-level gateway monitors packet contents. Each packet has information about what application can use that data. The ACL then dictates whether that data is denied or allowed on the network. An access control list (ACL) is not a type of firewall. It is a set of rules utilized by the firewall to filter network traffic.

Your computer has a single hard disk with a single volume that is used by the C:\ drive. You have previously upgraded the disk to a dynamic disk. The disk has run out of space, so you want to add more space to the C:\ volume. You add a new hard disk to the computer. Which of the following is the BEST step to complete while adding space to the C:\ drive? -Strip the C:\ volume to the second disk. -Extend the C:\ volume to the second disk. -Create a mount point using space on the second disk. -Span the C:\ volume to the second disk.

"Create a mount point using space on the second disk." A mount point is an empty folder on the existing volume that points to another partition. Data saved to the folder is physically saved on the referenced partition. Extending a volume adds space to the volume. Extending a volume using space on a different disk creates a spanned volume. You cannot extend the system volume using space on a second disk. A striped volume uses two equal portions on two disks. You can create a new striped volume, but you cannot stripe an existing volume.

You have a workstation running Windows 10 Home. However, you want to install Windows 11 Professional as a separate instance in order to boot into either operating system. Which of the following installation types will meet your needs? -Repair installation -Custom/clean installation -In-place installation -Upgrade installation

"Custom/clean installation" A custom (or clean) installation allows you to keep the existing operating system installed on your system and also deploy Windows as a separate instance on the same device, creating a multiple-boot configuration. All other installations (in-place, repair, and upgrade) do not provide a dual-boot installation option.

You manage a large number of workstations that belong to a Windows domain. You want to prevent someone from gaining access to login information by trying multiple passwords. Which default GPO contains a policy you can enable to guard all computers in the domain against this security breach? -Group Security Policy -Group Domain Policy -Default Domain Policy -Domain Security Policy

"Default Domain Policy" The Default Domain Policy GPO contains a policy you can enable for all computers in a domain that prevents multiple password login attempts. Group Domain Policy, Group Security Policy, and Domain Security Policy are not default GPOs in Active Directory.

You have been troubleshooting startup errors on your Windows 11 computer by undoing recent changes, such as rolling back device drivers for a local printer and new graphics card while in Safe Mode. However, the changes you are making are not resolving the startup errors. Which of the following steps will MOST likely help you to find the specific cause of the error without the need to re-install Windows? -Disable Driver Signature Enforcement. -Launch and use the utilities provided in the Recovery Environment. -Disable and then enable devices and services one by one. -Disable automatic restart on system failure.

"Disable and then enable devices and services one by one." If undoing recent changes does not fix the problem, you could disable all unnecessary devices and services. If you can boot normally, you can then identify the component that was causing the problem by enabling devices and services one by one until the system becomes unstable. While selecting the Disable Driver Signature Enforcement in Advanced Startup Options would cause Windows not to require a digital signature when loading a driver, this option would not help you find the specific driver or service that might be causing the startup error. While selecting the Disable automatic restart on system failure option in Advanced Startup Options would prevent Windows from restarting when a critical system error occurs, it would not help you find a specific driver or service that might be causing the startup error. The Recovery Environment provides tools such as System Restore, System Image Recovery, and Startup Repair, which could all potentially bring your Windows 11 system back to a usable state. However, the tools (by themselves) would not be very helpful in finding the specific cause of the startup error.

Which of the following stores user accounts, groups, and their assigned rights and permissions? -Active Directory -Domain controller -Local Users and Groups -Microsoft account

"Domain controller" A domain controller is a special server that stores user accounts, groups, and their rights and permissions. Domain accounts are stored in a central database called Active Directory. A Microsoft account enables feature such as syncing your settings across multiple computers. It is not designed to store the rights and permissions associated with a user account. Local Users and Groups is a feature in Windows that lets you create and manage users and groups locally on your computer.

Which of the following Show Options tabs allows you to configure performance settings for your Remote Desktop connection? -General -Advanced -Local Resources -Experience

"Experience" You use the Experience tab to configure your performance settings. This is especially important if you are on a slow connection. The Advanced tab lets you set up server authentication and configure Remote Desktop Gateway connection settings. The Local Resources tab lets you configure settings such as remote audio and Windows key combinations. The General tab lets you enter the remote computer's name and the username of the account you are connecting through.

A user has complained about not being able to remove a program that is no longer needed on a computer. The Programs option is not available in Control Panel. You suspect that a policy is enabled that hides this option from the user. But after opening the Local Group Policy Editor, you see that the policy to hide Programs is not configured. You know that other users in this domain can access the Programs option. Where should you look next to determine whether the policy is enabled? -The Default Domain Policy GPO. -The Local Group Policy. -GPOs linked to the domain that contains this user's object. -GPOs linked to organizational units that contain this user's object.

"GPOs linked to organizational units that contain this user's object." You should look at GPOs linked to organizational units that contain this user's object to see where the Hide Programs and Features Page policy might be enabled. If the policy were enabled in a GPO linked to the domain, it would be applied to all users in the domain. The next level that GPOs are applied from is any GPO linked to organizational units that contain the user's object.

As a systems engineer for a large retail corporation, you have filled out a change order form to replace the laptop computers that sales reps use on the road with business tablets that are much more durable, provide both touch and keyboard options, and are more portable and easier to use when working with clients. The request has been forwarded to the change board, which is reviewing the change order form with you. One of the board members asks if this change will impact plans to move more of the business online to reach customers directly. Which of the following questions does the board member really want answered? -What is the scope of the requested change? -What are the desired deliverables? -How does this change fit with company's current strategic focus? -What are the desired outcomes?

"How does this change fit with company's current strategic focus?" What the board member really wants to know is how the requested change will fit with the company's strategic focus to move business online. The scope, deliverables, and desired outcomes are also questions that the board will want to know more about, but they do not relate to the strategic focus change of moving online.

To protect user data on a Windows 11 system, you've configured System Restore to automatically create restore points for the C: volume. Given that your user profile data is stored in the default directory (C:\Users), will this strategy adequately protect your users' data? (Select two.) -No. You need to create a backup of your user data as well. -Yes. Your workstation data is protected. -No. You need to implement a RAID 0 array to protect your data. -No. You need to enable File History. -Yes. All user profile data will be restored.

"No. You need to create a backup of your user data as well." "No. You need to enable File History." Using restore points alone is an incomplete strategy for protecting user data. You should also use Backup and Restore (Windows 7) in Control Panel to back up user data or enable File History. This is because System Restore on Windows 11 maintains restore points for applications, device drivers, or patches installed since the restore point was taken. However, user data is not affected (include the user profile) by restore points. It remains the same. A RAID 0 array does not provide data redundancy.

You have just opened a text file in the vi editor, and you are in Command Mode by default. There is more than one way to get from Command Mode to Replace Mode. Which of the following key-press sequences will get you into Replace Mode? (Select three.) -Press Esc and then press : + R. -Press Esc and then press the R key. -Press Insert and then press Insert again. -Press Insert and then press the R key. -Press Insert and then press : + R. -Press the I key and then press Insert. -Press the S key and then press Insert.

"Press Insert and then press Insert again." "Press the I key and then press Insert." "Press the S key and then press Insert." In Command Mode, you need to press either the I key, the S key, or the Insert key to enter Insert Mode. Then (just as with GUI word processors) if you press the Insert key again, the cursor will change to Replace Mode. Pressing Esc and typing a colon (:) while in Command Mode will switch the vi editor to Command Line Mode.

You are an IT technician for your company. Fred calls you to complain that every time he opens his internet browser, the default home page has been changed to a site he is not familiar with. You suspect this change is being caused by a malware infection on his system. However, after you run antimalware and antivirus software on Fred's system, it is still having the same issue. Which of the following would be the next BEST way to remove the malware? -Perform an image deployment from a backup image to restore Fred's computer to a known good point. -Purchase a new disk and deploy a backup image of Windows. -Restore Fred's computer back to a previous restore point. -Format Fred's disks and perform a clean installation of the operating system.

"Restore Fred's computer back to a previous restore point." Although all of the options could remove the malware and virus, the best first step is to try to restore the computer back to a restore point prior to the infection. If the infection has been included in all of the restore points, the next best thing would be to restore the drive using a good image that contains the operating system and the programs and files required by your company.

Micka, a tech-savvy employee, tried to upgrade her computer from Windows 10 to Windows 11 from the internet. Something went wrong during the upgrade, and Micka's computer will no longer boot to Windows. She has brought her computer to the IT department for you to repair. You have tried to repair the computer, but you are unable to get it to boot to Windows. Which of the following methods would be the QUICKEST way to get Micka's computer back to its original Windows 10 operating system? -Connect her computer to your external flash drive and install Windows 10 from the data it contains. -Restore her system using the recovery partition. -Using the Windows 10 DVD, perform an upgrade. -Download and reinstall Windows 10 from the internet.

"Restore her system using the recovery partition." The recovery partition contains a Windows 10 factory image as it came fresh from the factory, including all of the correct drivers for its devices. Her system can be recovered using this partition, but all of her data will be lost. Since the original installation of Windows 10 was corrupted during the upgrade process, trying to do an upgrade from the source DVD will not detect the old operating system, and it will fail. It would take more time to download and manually install than restoring the image from the recovery partition. Reinstalling Windows using the DVD or an external flash drive would be time-consuming and may require additional steps to download and install the drivers required.

You have been hired to investigate a recent cybersecurity attack. You have discovered that the attacker was able to send commands to the server using the login fields and steal user credentials from the database. Which of the following attacks was your client MOST likely the victim of? -SQL injection -On-path -Brute force -Cross-site scripting

"SQL injection" Your client is most likely the victim of an SQL injection attack. SQL is the most common database language and is used by most websites. All sorts of sensitive data, such as user credentials, are stored in these databases. If the SQL database is not properly configured, an attacker can input SQL commands into text fields on a website to gain access to the data. The attacker can steal, edit, or even destroy the data contained in the database. A cross-site scripting (XSS) attack takes advantage of improperly configured input fields on the website. The attacker can hide malicious code inside of a legitimate input field and send it to the server. If the server processes the request, the malicious code will also be processed and carry out the attack. An XSS attack is not used to gain access to the database. In an on-path attack, the hacker places themselves between two devices and intercepts all communications. It is not used to gain access to the database. In a brute force attack, the attacker attempts to guess the password by using a cracking tool that submits every possible letter, number, and symbol combination in a short amount of time. This attack is not used to gain access to the database.

Which Active Directory service simplifies how users log in to all the systems and applications that they need? -SSO -PIN -Workgroup -Domain

"SSO" Active Directory uses the single sign-on (SSO) process to simplify how users sign in to all the systems and applications that they need. When a user logs in, their credentials are authenticated with the authentication server. When the user visits a trusted resource, the authentication server vouches for the user, and the resource allows them access. Windows Hello uses a PIN as a backup for biometric authentication. A domain is an administratively defined collection of network resources that share a common directory database and security policies. A workgroup is Microsoft's implementation of peer-to-peer networking.

Which of the following is a tool that lets you revert a system's files and data from a previously saved point in time without changing documents, pictures, or email? -Startup Repair -Uninstall Update -System Image Recovery -System Restore

"System Restore" System Restore is a utility that allows you to revert the system back to a previously created restore point that does not change files like documents, photos, or email. System Image Recovery is a utility that installs a complete image of the Windows system, including the settings, personal files, hardware drivers, and software from an external drive. Startup Repair is a utility that fixes damaged or missing system files, which can stop the boot process. Uninstall Update is not the name of a Windows utility. However, uninstalling an update will roll back Windows to the time before the current Windows update was in place.

Which of the following are features that a device location service on your smartphone can provide? (Select two.) -Reset the mobile device settings to factory defaults. -Take and send pictures using the front and back cameras. -Perform a remote wipe. -Send a notification of unauthorized login attempts. -Identify the approximate location of the device on a map.

"Take and send pictures using the front and back cameras." "Identify the approximate location of the device on a map." If the location service has been set up on your device, you can use a website or software application to identify the approximate location of the device on a map. The service can also tell the device to take a picture with both the front and back cameras and then send the pictures to you. A device location service is not designed to reset the mobile device to factory defaults, perform a remote wipe, or send a notification that one or more unauthorized attempts have been made to log in to the device.

As a Help Desk Level 2 operator, you are attempting to use Remote Desktop to connect to an employee's Windows desktop to resolve a printing issue that has been given to you from another Level 2 operator. You know that both your Windows computer and the employee's Windows computer are configured correctly for this Remote Desktop connection. You also have the correct connection information. However, you are having problems accessing the employee's desktop. Which of the following is the MOST likely reason that you cannot connect to the desktop? -Your firewall is not set up to allow the connection through port 3389. -You have the wrong IP address for the employee's computer. -The remote session from the original Level 2 operator has not been disconnected. -The employee's computer is turned off.

"The remote session from the original Level 2 operator has not been disconnected." In order for you to connect to the employee's desktop using Remote Desktop, all other remote connections must be inactive. Because this is an issue given to you from another Level 2 operator, it is highly likely that the Remote Desktop connection between the original Level 2 operator and the employee's desktop has not been disconnected. If you have the correct connection information, the IP address that you need to enter should be correct. By default, when you enable Remote Desktop, the local Windows firewall is automatically updated with rules that allow Remote Desktop connections to be made to the computer. This includes opening TCP port 3389 to allow RDP traffic. Although you cannot connect to a computer that is turned off, it is highly unlikely that the employee's computer is turned off, as the Level 1 operator has just established an RDP connection with the desktop.

Your system volume is running out of disk space. You need to extend the system volume to give it more space. Which of the following conditions MUST be met to extend the system volume? (Select two.) -The system volume must be on a dynamic disk. -The system volume must formatted with NTFS. -The system volume must be on a basic disk. -The disk must have contiguous free space on the same disk. -The volume must be spanned to use disk space on a different disk.

"The system volume must formatted with NTFS." "The disk must have contiguous free space on the same disk." The system volume can only be extended using contiguous free space on the same disk. This is the same for both basic and dynamic disks. Any volume can only be extended if it is unformatted or formatted with NTFS. The system volume can be on either a basic or dynamic disk. The system volume cannot be extended or spanned to non-contiguous space or to space on another disk.

Which of the following is true of Remote Assistance? -The remote user initiates the session. -Only one user is logged in at a time. -It is designed to improve user productivity. -The user initiates the session.

"The user initiates the session." With Remote Assistance, the user initiates the session. Remote Assistance allows both the user and the remote user to be logged in at the same time. Remote Desktop only allows one user (such as the remote user) to be logged in at a time. Remote Assistance is designed to provide or receive remote help. Remote Desktop is designed for user productivity.

Your supervisor recently purchased 100 desktop computer systems and 100 new Windows 11 licenses for your organization's accounting department. She received a single Windows 11 installation disc with the licenses. Which of the following would be the BEST installation methods to use? (Select two.) -Copy the installation media to 10 flash drives and install 10 systems at a time. -Burn 50 copies of the installation disc and install 50 systems at a time. -Use the installation disk to install Window on each system individually. -Install one system and image it to the other systems. -Use a network installation.

"Use a network installation." "Install one system and image it to the other systems." The best installation options in this scenario is to either perform a network installation or use imaging. In a network installation, you would copy the installation media to a Windows Deployment Services (WDS) server, configure each new workstation to use PXE boot, boot them from the WDS server over the network, and then run the install. Alternatively, you could install Windows on one of the systems and then use imaging software to take an image of that system and copy it to the remaining 99 systems over a network connection. Installing one system at a time from the installation disc would take a considerable amount of time. Burning multiple copies of the installation disc or creating multiple flash drives and then installing 100 systems from them would be much more time-consuming as well.

Which of the following wireless security methods uses a common shared key that is configured on the wireless access point and all wireless clients? -WPA Enterprise and WPA2 Enterprise -WEP -WEP, WPA Personal, and WPA2 Personal -WEP, WPA Personal, WPA Enterprise, WPA2 Personal, and WPA2 Enterprise -WPA Personal and WPA2 Personal

"WEP, WPA Personal, and WPA2 Personal" Shared key authentication is used with WEP, WPA, and WPA2. Shared key authentication with WPA and WPA2 is often called WPA Personal or WPA2 Personal. WPA Enterprise and WPA2 Enterprise use 802.1x for authentication. 802.1x authentication uses usernames and passwords, certificates, or devices such as smart cards to authenticate wireless clients.

Which programs run during the startup process to allow user logon? (Select two.) -NToskrnl.exe -Winlogon -Winload.exe -Bootmgr.exe -Wininit

"Winlogon" "Wininit" The wininit and winlogon programs run to allow user logon. At this point, the Welcome or user logon screen is displayed. NToskrnl.exe, Bootmgr.exe, and Winload.exe occur before the logon and user configuration stage of startup.

Which of the following commands can you use to install updated packages (found in configured repositories) that are currently installed on a Debian Package Manager-based system? (Select two.) -apt dist-upgrade -apt update -yum upgrade -apt-get dist-upgrade -yum update

"apt dist-upgrade" "apt-get dist-upgrade" The correct answers are the apt dist-upgrade and apt-get dist-upgrade commands. Both perform a distribution upgrade of all packages available in the repositories. Both the yum update and yum upgrade commands apply to RPM-based systems. The apt update command refreshes repositories to look for new, updatable packages. However, the command itself does not upgrade them.

When you see the DNS server address, you realize that this information needs to be updated. Earlier in the day, you implemented a new DNS server with a new IP address. The workstation will update this information in 24 hours. Which command can you enter at the command line to update the DNS server information right away?

"ipconfig /flushdns" You can use ipconfig /flushdns to flush (or remove) all the entries in the workstation's current DNS cache. If a network server's IP address is changed, your local cache will contain the old IP address until the cache is updated (every 24 hours) or the flushdns option is used.

You need to view the contents of /var/log/auth.log to get information about the users that have been logging on to the system. The auth.log file is in plaintext, so you decide to use the cat command to review the file. However, the display fills with text for several pages, and you can't see the entire file. Which commands can you use to view the contents of the auth.log file page by page? (Select two.) -more /var/log/auth.log -page /var/log/auth.log -less /var/log/auth.log -vim /var/log/auth.log -ls /var/log/auth.log -grep /var/log/auth.log

"more /var/log/auth.log" "less /var/log/auth.log" Using the more command, a file's contents are output to the screen one page at a time to give you a chance to read the contents more easily. Press the space bar to go through the pages. Using the less command does the same thing as the more command, except that is allows you to use the Pg Up and Pg Dn keys to scroll up and down through the file.

You suspect a corrupt or missing system file. Which command would you use to scan the integrity of a specific file and repair it? -sfc /verifyfile -sfc /scannow -sfc /scanfile -sfc /verifyonly

"sfc /scanfile" Use sfc /scannow to scan the integrity of all protected system files and repair any file that has problems. Use sfc /verifyonly to scan the integrity of all protected system files (but not repair them). Use sfc /scanfile to scan the integrity of a specific file and repair it if it has problems. Use sfc /verifyfile to scan the integrity of a specific file (but not repair it).

During a routine audit of a web server running on an RPM-based Linux system, you notice a package that is not installed from the standard server template. This is an error. Before you do anything, however, you need to find the package's dependencies. The package's name is orleans. Which of the following commands lists dependencies? -apt search orleans -yum info orleans -apt info orleans -yum list orleans

"yum info orleans" The correct answer is the yum info orleans command. This is the only command listed that provides a list of dependencies for an RPM system. The apt commands are specific to Debian Package Management systems. The yum list orleans command only gives information on the orleans package. This command does not provide dependencies.

You have a laptop running Windows 11. User Account Control (UAC) has been disabled. How would you re-enable UAC on the laptop? (Select two. Each choice is a complete solution.) -In Control Panel, select System and Security > System. Then click Advanced system settings. -In Control Panel, select User Accounts > Credential Manager. -In Control Panel, select System and Security > Security and Maintenance. -In Control Panel, select System and Security > System. Then click System protection. -In Control Panel, select User Accounts > User Accounts.

To configure UAC in Windows 11: -In Control Panel, go to User Accounts. -Select User Accounts and then select Change User Account Control settings. Or: -In Control Panel, go to System and Security. -Select Security and Maintenance > Security. Then select Change settings under User Account Control. You can also use the Change User Account Control settings link in System and Security. Edit the Local Security Policy to configure UAC and control settings that are not available through Control Panel.


Ensembles d'études connexes

NURS 3311 RN Mental Health Theories & Therapy Assessment

View Set

Sales management test 2 multiple choice

View Set

chapter 19: introduction to the respiratory system Med surg(106)

View Set

Georgia Rules and Codes Pertinent to Life and Accident & Sickness Insurance Only

View Set