Comptia A+ Core 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A type of contactless smart card that can be read at a close range from a reader device is commonly referred to as:

Proximity card

In computer networking, a computer system or an application that acts as an intermediary between another computer and the Internet is commonly referred to as:

Proxy

A Windows network profile that hides a computer from other devices on the network and makes it unavailable for file and printer sharing is known as:

Public

Which network profile in Windows by default disables the network discovery feature?

Public

Which of the Windows network profiles imposes the strongest security settings?

Public

Windows network profile that hides a computer from other devices on the network and makes it unavailable for file and printer sharing

Public

Which of the following solutions is used for controlling network resources and assigning priority to different types of traffic?

Quality of Service (QoS)

Which format type in MS Windows does not erase disk data?

Quick format

Which formatting type(s) would typically be performed by a user to reinstall an OS? (Select all that apply)

Quick format Standard format High-level format

Which formatting type(s) would typically be performed by a user to reinstall an OS?

Quick format Standard format High-level format

Which of the following wireless technologies enables identification and tracking of tags attached to objects?

RFID

A type of identification badge that can be held within a certain distance of a reader device to authenticate its holder is called:

RFID badge

Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is known as:

Ransomware

Which of the following terms refers to an example of crypto-malware?

Ransomware

The share permissions on a shared Windows folder grant the user Full Control access and the local NTFS permissions grant the user Read access. Which of the following are the effective user permission levels?

Read when accessing the share remotely Read when accessing the folder locally

The share permissions on a shared Windows folder grant the user Read access and the local NTFS permissions grant the user Modify access. Which of the following are the effective user permission levels?

Read when accessing the share remotely Modify when accessing the folder locally

Which of the following answers refers to a common solution for troubleshooting user login problems on a Windows domain?

Rebuilding Windows profiles

a common solution for troubleshooting user login problems on a Windows domain

Rebuilding Windows profiles

Which of the following enables troubleshooting a malware-infected system that doesn't boot up?

Recovery console

Which of the following replaced removable media used for reformatting hard drives and restoring an operating system to the original factory condition?

Recovery partition

RISC

Reduced Instruction Set Computer

Which of the built-in options added in Windows 8 enables OS reinstallation without affecting the existing user profiles and settings?

Refresh

GDPR (General Data Protection Regulation)

Regulates personal data privacy of the European Union (EU) citizens

Which of the macOS features enables access to optical drive of another computer over a network?

Remote Disc

Provides access to Remote Assistance and Remote Desktop configuration settings in Windows

Remote settings in the System applet in Windows Control Panel

Which of the following provides access to Remote Assistance and Remote Desktop configuration settings in Windows?

Remote settings in the System applet in Windows Control Panel

Which of the following allows to erase data on a lost or stolen mobile device?

Remote wipe

VPN types is used to connect computers to a network

Remote-access Client-to-site

According to the CompTIA's best practice procedures for malware removal, scheduling scans and running updates on a Windows-based system should be performed as the next step after:

Removing malware from the system

System Protection tab of the System Properties (sysdm.cpl) utility in Windows provides options for managing:

Restore points

The System Protection tab of the System Properties (sysdm.cpl) utility in Windows provides options for managing:

Restore points

Which of the following enables decreasing partition size in Windows Disk Management utility?

Right-click on a disk and select the Shrink Volume menu option

Which of the following actions in Windows allow to invoke the User Account Security (UAC) access control feature and run an application with administrator account permissions?

Right-click on an application icon -> select Run as administrator from the pop-up menu In Windows Start menu press and hold Control + Shift keys -> Left-click on an application icon Launch Windows Run dialog box (Windows logo key + R) -> type in the application's name -> press Control + Shift + Enter

Which of the following actions in Windows allow to invoke the User Account Security (UAC) access control feature and run an application with administrator account permissions?

Right-click on an application icon -> select Run as administrator from the pop-up menu In Windows Start menu press and hold Control + Shift keys -> Left-click on an application icon Launch Windows Run dialog box (Windows logo key + R) -> type in the application's name -> press Control + Shift + Enter

A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network is known as:

Rootkit

Which of the following actions would be of help in troubleshooting the "Missing operating system" error message displayed during system boot?

Run Startup Repair utility Use bootrec.exe to fix Master Boot Record (MBR) errors Verify that the drive is detected in BIOS Use diskpart utility to label the system partition as active

Which of the following is a complimentary instruction set that extends the capabilities of a CPU?

SSE2

Which of the following answers refers to a secure replacement for Telnet?

SSH

An authentication subsystem that enables a user to access multiple, connected system components (such as separate hosts on a network) after a single login on only one of the components is known as:

SSO

According to the CompTIA's best practice procedures for malware removal, enabling System Restore and creating a restore point in Windows should be performed as the next step after:

Scheduling scans and running updates

Which of the following built-in macOS tools enables remote access to another Mac computer?

Screen Sharing

A user interface element controlling access to a mobile device after the device is powered on is called:

Screen lock

SSID

Service Set Identifier

The System Configuration utility tab containing a list of background applications that can be enabled/disabled during system startup is called:

Services

An MS Windows Administrative Tools folder applet for managing background applications is called:

Services (services.msc)

Plrovides access to print spooler settings

Services (services.msc)

Provides an interface for managing background applications

Services (services.msc)

Which of the following Windows utilities provides access to print spooler settings?

Services (services.msc)

Which of the following locations in Windows provides an interface for managing background applications?

Services (services.msc)

Provide an interface for managing applications/services that might affect the system by slowing down the boot process

Services (services.msc) Task Manager (taskmgr.exe)

Which MS Windows utilities provide an interface for managing applications/services that might affect the system by slowing down the boot process?

Services (services.msc) Task Manager (taskmgr.exe)

Which of the following locations provides access to brightness configuration options on an iOS device?

Settings -> Display & Brightness

Which of the following locations allows to configure display brightness levels on an Android device?

Settings -> Display -> Brightness level

Windows power plans manage how the computer is using power. The Balanced (recommended) power plan (used by default in certain Windows versions) scales the CPU performance based on its current utilization, which might have a degrading effect on system performance. If the system is running slow, one of the troubleshooting methods is to enable the High performance power plan or customize the current plan settings. In Windows, the power configuration settings can be found in:

Settings menu (Windows 8/8.1/10) Power Options applet in Windows Control Panel

A type of user interface that enables the execution of operating system commands is commonly referred to as:

Shell

A situation in which an unauthorized person can view someone's display or keyboard to learn their password or other confidential information is referred to as:

Shoulder surfing

Examples of hard drive destruction and disposal tools/methods include:

Shredder Drill Hammer Degaussing Incineration

Which of the following destruction tools/methods allow for secure disposal of physical documents?

Shredder Incineration

Which of the following enables partition split in Windows Disk Management utility?

Shrink a volume, then create a new simple volume from the adjacent unallocated space

Allowing "Unknown Sources" in Android security settings enables:

Sideloading

The practice of installing mobile apps from untrusted sources (i.e. websites and app stores other than the official marketplaces) is called:

Sideloading

An antivirus database entry used for identifying malicious code is known as virus:

Signature

Which of the volume types available in Windows Disk Management utility do not offer fault tolerance?

Simple volume Spanned volume Striped volume

A power management mode in Windows that draws small amount of power, saves the system state in RAM, and allows for quick resuming of full-power operation with the use of a power button or on command is known as:

Sleep/suspend Standby

A power management mode in Windows that draws small amount of power, saves the system state in RAM, and allows for quick resuming of full-power operation with the use of a power button or on command

Sleep/suspend Standby

Which of the following answers refers to an example implementation of certificate-based authentication?

Smart card

An unauthorized practice of obtaining confidential information by manipulating people into disclosing sensitive data is referred to as:

Social engineering

Which of the following macOS features allows to create switchable desktop environments?

Spaces

Phishing scams targeting a specific group of people are referred to as:

Spear phishing

An email sent from unknown source disguised as a trusted source known to the message receiver is an example of:

Spoofing Social engineering

Which of the following is a macOS system search utility?

Spotlight

Malicious software collecting information about users without their knowledge/consent is known as:

Spyware

Which formatting type in Windows 7/8/8.1/10 prevents data recovery by overwriting the contents of hard drive sectors?

Standard format

The Task Manager utility in Windows 8/8.1/10 contains a tab previously included as part of the System Configuration (MSConfig) utility. The tab allows system administrators to control user applications that should be enabled/disabled during system boot. This tab is called:

Startup

Which of the following locations in Windows 7 allows to enable/disable startup applications?

Startup tab of the System Configuration (msconfig.exe) utility

Windows 8 introduces a virtualization technology that enables organization of multiple physical disks into logical volumes in a fashion similar to RAID levels. What is the name of the Control Panel applet providing access to this functionality?

Storage Spaces

Which of the following tools enable creation of disk arrays in Windows?

Storage Spaces Disk Management

A basic data type designed to contain text information is known as:

String

Which volume type in Windows Disk Management utility uses RAID 0 setup for performance gains?

Striped volume

Which volume type in Windows Disk Management utility uses RAID 5 setup for performance gains and fault tolerance?

Striped with parity volume

Which of the following allows to determine which network segment an IP address belongs to?

Subnet mask

What are the characteristic features of a WPA/WPA2 Enterprise mode?

Suitable for large corporate networks Requires RADIUS authentication server

A device designed to protect electronic devices from large voltage fluctuations

Surge suppressor

A device designed to protect electronic devices from large voltage fluctuations is called:

Surge suppressor

A hidden file (or files) on the hard disk that Windows uses to hold parts of programs and data files that cannot be stored in RAM due to the insufficient memory space is called:

Swap file Paging file Virtual memory

A hidden file (or files) on the hard disk that Windows uses to hold parts of programs and data files that cannot be stored in RAM due to the insufficient memory space

Swap, paging file and Virtual memory

A Windows Control Panel applet used for managing local (offline) versions of files and folders stored on the network is known as:

Sync Center

Which Control Panel applet in Windows can be used to check the OS version and basic hardware statistics such as the CPU type and amount of installed RAM?

System

Which Control Panel applet in Windows provides access to computer name, domain, and workgroup settings?

System

Which Microsoft Windows tool can be used by system administrators to find and isolate problems that might prevent the OS from starting correctly?

System Configuration (msconfig.exe)

An MS Windows system utility that allows to roll back system files and settings to an earlier point in time

System Restore

Which of the following is a Windows system utility that allows to roll back system files and settings to an earlier point in time?

System Restore

Which of the following provide access to virtual memory (a.k.a. paging file) configuration options in Windows?

System applet in Control Panel -> Advanced system settings -> Performance -> Settings -> Advanced -> Virtual memory Windows Run dialog box -> type in sysdm.cpl + press Enter -> Advanced tab -> Performance -> Settings -> Advanced -> Virtual memory

Provide access to virtual memory (a.k.a. paging file) configuration options in Windows

System applet in Control Panel -> Advanced system settings -> Performance -> Settings -> Advanced -> Virtual memory Windows Run dialog box -> type in sysdm.cpl + press Enter -> Advanced tab -> Performance -> Settings -> Advanced -> Virtual memory

What is the correct sequence of steps for enabling automatic virtual memory management in MS Windows?

System applet in Control Panel -> Advanced system settings -> Performance -> Settings -> Advanced -> Virtual memory -> Change... -> enable Automatically manage paging file size for each drive Windows Run dialog box -> type in sysdm.cpl + press Enter -> Advanced tab -> Performance -> Settings -> Advanced -> Virtual memory -> Change... -> enable Automatically manage paging file size for each drive

An exact copy of the entire state of a computer system is known as:

System image

Easiest step to troubleshoot the Blue Screen of Death (BSoD) in MS Windows

System restart

Which of the following would be the easiest step to troubleshoot the Blue Screen of Death (BSoD) in MS Windows?

System restart

AFP (Apple Filing Protocol)

TCP 548

A network technician wishes to use an RDP client on their Windows OS to remotely troubleshoot a problem on another Windows machine. Which of the following ports needs to be opened for the built-in Windows RDP server to allow this type of network connection?

TCP port 3389

A security protocol designed to strengthen WEP implementations is known as:

TKIP

In Windows 8 and newer releases of the Microsoft OS, contents of the MSConfig's Startup tab can be viewed and managed via:

Task Manager

Which of the following system utilities provides access to different command-line shells in macOS?

Terminal

PHI

The US Health Insurance Portability and Accountability Act (HIPAA) provides privacy protection for:

Which of the following enable a newly added disk to show up in Windows File Explorer?

The disk needs to be initialized The disk requires a drive letter The disk can be mounted as a folder

A Windows resource with conflicting NTFS and share permissions applied to it will assume:

The most restrictive permission

OEM (Original Equipment Manufacturer)

The original manufacturer of a hardware component or sub-component.

Partitioning

The practice of dividing hard disk space into isolated logical storage units that behave like separate disk drives

order of volatility

The sequence of volatile data that must be preserved in a computer forensic investigation.

Which of the following account management security solutions provide countermeasures against brute-force attacks?

Timeout period between login attempts Failed attempts lockout

Which of the following account management security solutions provide countermeasures against brute-force attacks? (Select 2 answers)

Timeout period between login attempts Failed attempts lockout

Used to locate a cable in a cabling bundle, or to trace individual wires in a cable

Toner and probe kit

The System Configuration tab in MS Windows providing access to MMC snap-ins is called:

Tools

A common example of channel overlapping in wireless networking would be the 2.4 GHz band used in 802.11, 802.11b, 802.11g, and 802.11n networks, where the 2.401 - 2.473 GHz frequency range is used for allocating 11 channels, each taking up a 22-MHz portion of the available spectrum. Setting up a wireless network to operate on a non-overlapping channel (1, 6, and 11 in this case) allows multiple networks to coexist in the same area without causing interference.

True

A double colon in an IPv6 address indicates that one part of the address, containing only zeros, has been compressed to make the address shorter.

True

A security rule that prevents users from accessing information and resources that lie beyond the scope of their responsibilities is known as principle of least privilege.

True

A type of critical file that a computer system depends on to operate properly is known as a system file. In Microsoft Windows, system files are hidden by default; they might also have Read-only attribute turned on to prevent accidental changes to the file contents. Windows system files can be permanently displayed in Windows Explorer (Windows 7), or File Explorer (Windows 8/8.1/10) after modifying file and folder settings in the Folder Options applet in Windows 7 Control Panel, or File Explorer Options applet in Windows 8/8.1/10 Control Panel.

True

A type of software that performs unwanted and harmful actions in disguise of a legitimate and useful program is known as a Trojan horse. This type of malware may act like a legitimate program and have all the expected functionalities, but apart from that it will also contain a portion of malicious code that the user is unaware of.

True

According to the CompTIA's best practice procedures for malware removal, user education should be the final step of the malware removal process.

True

An MS Windows feature enabling automatic execution of code contained on a mounted drive is called AutoRun. Since disabling AutoRun decreases potential security risk related to the propagation of malware, Windows 7/8/8.1/10 have AutoRun disabled by default.

True

An authenticator application is a software that generates additional authentication token (in the form of a random code) used in two-step verification process.

True

As opposed to the simple Denial of Service (DoS) attacks that usually are performed from a single system, a Distributed Denial of Service (DDoS) attack uses multiple compromised computer systems to perform the attack against its target.

True

Assigning static IP addresses on a SOHO network provides better administrative control over hosts and devices residing on the inside of the network.

True

Auto negotiation is an Ethernet procedure that allows two connected devices to exchange information about their capabilities (such as supported speed and duplex modes) and automatically configure connection parameters based on the highest performance settings supported by both devices.

True

BIOS/UEFI passwords improve the security of a workstation. These low-level passwords may, for example, prevent unauthorized users to proceed when the computer is powered on, or restrict the scope of changes a user can make in the BIOS/UEFI interface. A type of BIOS/UEFI password with the highest level of permissions is known as supervisor or administrator password; the other type of password is user password.

True

Because the Guest account in MS Windows allows a user to log on to a network, browse the Internet, and shut down the computer, it is recommended to keep it disabled when it isn't being used.

True

Because wireless routers are shipped with default credentials, the process of securing a SOHO network should include changing the default username and password on a Wireless Access Point (WAP).

True

By default, Android and iOS devices allow a limited number of failed login attempts after which the device becomes inaccessible and requires additional steps to unlock it.

True

Certificate of destruction is a document issued by companies that carry out secure device/document disposal. The certificate verifies proper asset destruction and can be used for auditing purposes. In case of device disposal, the document includes a list of all the items that have been destroyed along with their serial numbers. It may also describe the destruction method, specify location (on-site/off-site), or list the names of witnesses who oversaw the entire process.

True

Common methods of application installation and deployment include removable media (e.g. CD/USB) used locally in home networks and remote installation methods over a network popular in enterprise environments.

True

Event Viewer (eventvwr.msc) is a Windows utility for monitoring system health and troubleshooting problems with applications, operating system, and hardware. Event Viewer allows for browsing and managing event logs. The most common logs available in Event Viewer include Application, System, and Security logs. Depending on the severity of the event, Application and System logs display events that fall into three categories: Information, Warning, and Error. Information events denote normal operation of the system (such as starting and stopping of system services, or successful completion of some routine background tasks), warning events point to non-critical errors (for example when installation of a software component fails because the component is already on the system), error events point to serious issues, for example when programs stop responding and need to be closed by Windows. Security log contains events such as valid and invalid logon attempts, as well as events related to res

True

Factory recovery partition and recovery disc are two examples of storage media that can be used for rolling back an OS to its original state.

True

For a wireless client to be able to connect to a network, the security type (e.g. WEP, WPA or WPA2) and encryption type (e.g. TKIP or AES) settings on the connecting host must match the corresponding wireless security settings on a Wireless Access Point (WAP).

True

Hash functions allow for mapping large amounts of data content to a small string of characters. The result of hash function provides the exact "content in a nutshell" (in the form of a string of characters) derived from the original data content. In case there's any change to the data after the original hash was taken, the next time when hash function is applied, the resulting hash value calculated after content modification will be different from the original hash.

True

Implementing a computer screen lock is one of the account management security best practices. The screen lock can be used as a countermeasure against brute-force attacks as it can be set to block computer access after a specified number of failed login attempts.

True

Implementing full device encryption is one of the methods for securing sensitive data on a smartphone. When enabled, this type of encryption works in conjunction with the phone's screen lock, i.e. to decrypt the phone (which stays encrypted whenever the phone is locked), a user must first unlock the screen. On Android devices, the unlocking methods include entering a PIN, password, or swipe pattern. Apple devices use passcode and biometric fingerprint sensor (a.k.a. Touch ID).

True

In IT security, the term "Entry control roster" refers to a list of personnel allowed to access restricted areas.

True

In IT security, the term "User authentication" refers to the process of proving user identity to a system. Authentication process can be based on different categories of authentication factors, including unique physical traits of each individual, such as fingerprints ("something you are"), physical tokens such as smart cards ("something you have"), or usernames and passwords ("something you know"). Additional factors might include geolocation ("somewhere you are"), or user-specific activity patterns such as keyboard typing style ("something you do"). Multi-factor authentication systems require implementation of authentication factors from two or more different categories.

True

In MS Windows environments, Guest account is an account for users who do not have a permanent account on a Windows computer or domain. People using this type of account cannot install software or hardware, change settings, create passwords, or access protected files and folders. However, because the Guest account allows the user to log on to a network, browse the Internet, and shut down the computer, it is recommended to keep it disabled when it isn't being used.

True

In MS Windows, a set of troubleshooting utilities (including tools for solving network-related problems) can be found in the Troubleshooting applet located in Windows Control Panel.

True

In MS Windows, dynamic disks provide features that basic disks do not, such as the ability to create volumes that span multiple disks (spanned and striped volumes) and the ability to create fault-tolerant volumes (mirrored and RAID-5 volumes).

True

In MS Windows, the attrib command is used to display or change file attributes. Some of the available options for this command include read-only (R), archive (A), system (S), and hidden (H). With attrib, the "+" symbol sets an attribute for a file, the "-" sign removes the attribute.

True

In Microsoft Windows 7, the only two editions that include the BitLocker full drive encryption feature are Windows 7 Enterprise and Windows 7 Ultimate.

True

In NTFS, a folder or file copied or moved from one location to another on a different volume inherits permissions of its new parent folder.

True

In Windows 10, the Windows Firewall system component was renamed to Windows Defender Firewall. In similar fashion, the Windows Firewall with Advanced Security known from previous Windows versions changed its name to Windows Defender Firewall with Advanced Security.

True

In Windows 8 and newer releases of the Microsoft OS, the real-time information about resources used by user applications and system processes in Task Manager can be found grouped in one place under the Processes tab.

True

In Windows Disk Management utility, a volume status set to Failed Redundancy indicates that the data on a mirrored or RAID 5 volume is no longer fault tolerant because one of the underlying disks is not online.

True

In Windows Disk Management utility, assigning a mount point folder path to a drive enables a newly added drive to show up in File Explorer as a regular folder.

True

In Windows Disk Management utility, disk arrays can be created by right-clicking on a disk and selecting array type from the context menu.

True

In a network using subnets, the term "Default gateway" refers to a network device (e.g. router) that enables exchange of data between hosts residing in different subnets.

True

In computer security, a type of small-factor physical device used for authentication is commonly referred to as a hardware token.

True

In computer security, the term "Biometrics" refers to physical characteristics of the human body that can be used for identification and access control purposes.

True

In computer security, the term "Dumpster diving" is used to describe a practice of sifting through trash for discarded documents containing sensitive data. Found documents containing names and surnames of the employees along with the information about positions held in the company and other data can be used to facilitate social engineering attacks. Having the documents shredded or incinerated before disposal makes dumpster diving less effective and mitigates the risk of social engineering attacks.

True

In macOS, the term "local snapshot" refers to a backup copy of all personal and system files stored on the local machine instead of the preferred external drive.

True

In the context of MS Windows system management, the term "Administrative share" refers to a hidden network share on a local computer designed to be accessed remotely by network administrators.

True

Installing an app in Windows requires administrative-level access on a local machine. In cases where installation files are stored on a remote server, users may also need appropriate permissions to be able to access the installation folder/file.

True

Installing mobile apps from trusted sources (e.g. Apple's App Store for iOS devices, or Google Play for Android devices) decreases malware-related security risks.

True

Introduced in Windows Vista, Windows Firewall with Advanced Security MMC snap-in offers more detailed configuration options allowing system administrators to execute more granular control over inbound and outbound network traffic.

True

Network Access Control (NAC) defines a set of rules enforced in a network that the clients attempting to access the network must comply with. With NAC, policies can be enforced before or after end-stations gain access to the network. NAC can be implemented as pre-admission NAC where a host must, for example, be virus free or have patches applied before it can be allowed to connect to the network, and/or post-admission NAC, where a host is being granted/denied permissions based on its actions after it has been provided with the access to the network.

True

Network Address Translation (NAT) provides an IP proxy between a private LAN and a public network such as the Internet.

True

One of the measures for securing networking devices is the practice of disabling unnecessary services and unused ports.

True

One of the ways of confirming that a software application comes from a trusted source is the verification of its digital signature. A digitally signed software proves the identity of the developer and guarantees that the application code hasn't been tampered with since it was signed. The authenticity and integrity of the application's code can be verified by comparing results of a cryptographic hash function (original hash published by the application developer vs. hash obtained from a downloaded app).

True

One of the ways to prevent data recovery from a hard drive is to overwrite its contents. The data overwriting technique is used by drive wipe utilities which might employ different methods (including multiple overwriting rounds) to decrease the likelihood of data retrieval. As an example, a disk sanitization utility might overwrite the data on the drive with the value of one in the first pass, change that value to zero in the second pass, and finally perform five more passes, overwriting the contents with random characters (the Schneier method).

True

Permission propagation occurs when a folder or file created inside another folder takes on (inherits) permissions applied to that folder (permissions applied to the so-called parent folder propagate down to its child objects, i.e. folders and files created inside the parent folder).

True

Physical and logical network diagrams provide visual representation of network architecture. A physical network diagram contains information on hardware devices and physical links between them. A logical network diagram describes the actual traffic flow on a network and provides information related to IP addressing schemes, subnets, device roles, or protocols that are in use on the network.

True

Privacy filter (a.k.a. privacy screen) is a protective overlay placed on the computer screen that narrows the viewing angle, so the screen content is only visible directly in front of the monitor and cannot be seen by others nearby. Privacy filter is one of the countermeasures against shoulder surfing.

True

Program Compatibility Troubleshooter is a Windows system utility used for automatic resolution of problems with older applications failing to run on newer versions of MS Windows. Program Compatibility Troubleshooter can be accessed via the Troubleshooting applet in Windows 7/8/8.1/10 Control Panel. Selecting the "Run programs made for previous versions of Windows" option in the Troubleshooting applet launches a guided tool for fixing problems with older programs installed on the current version of Windows.

True

Rainbow tables are lookup tables used to speed up the process of password guessing.

True

Restarting a PC regularly might help in resolving slower performance issues as it shuts down all background processes and clears out the system memory.

True

Restoring the entire system from a known good backup copy is the most reliable method for effective malware removal.

True

Screensaver password requirement falls into the category of password best practices. A password-protected screensaver allows to block access of unauthorized persons to a user's workstation in situations where the user is forced to leave their desk.

True

Service Set Identifier (SSID) is another term for the name of a Wireless Local Area Network (WLAN). Wireless networks advertise their presence by regularly broadcasting the SSID in a special packet called beacon frame. In wireless networks with disabled security features, knowing the network SSID is enough to get access to the network. SSID also pinpoints the wireless router that acts as a Wireless Access Point (WAP). Wireless routers from the same manufacturer are frequently configured with default (well-known) SSID names. Since multiple devices with the same SSID displayed on the list of available networks create confusion and encourage accidental access by unauthorized users (applies to networks that lack security), changing the default SSID is a recommended practice.

True

Some of the Windows services require other background applications to run. If a service fails to start, one of the ways for troubleshooting such problem is to check whether all required components for a given service are also up and running. In MS Windows, the list of all connected services for a given service can be found by launching the Services (services.msc) utility, right-clicking on a service, selecting Properties, and checking the Dependencies tab.

True

Starting with the May 2019 OS release update, the minimum hard disk space requirement for both 32-bit (x86) and 64-bit (x64) editions of Windows 10 was increased to 32 GB.

True

The "Run as administrator" option in MS Windows allows users with lower-level permissions to perform tasks reserved for system administrators. This feature requires providing Administrator account credentials and temporarily elevates the current user's privileges to perform a given task. It also simplifies common system tasks, such as installation of new software, which would otherwise require logging out and switching to an admin account.

True

The "Run as administrator" option in MS Windows available after right-clicking on the Command Prompt application icon allows for execution of shell commands reserved for a system administrator.

True

The Security tab of the Internet Properties utility in Windows allows for imposing restrictions on web content allowed in Microsoft Internet Explorer web browser.

True

The Task Manager's Users tab in MS Windows allows system administrators to disconnect a user (invoke a Windows lock screen) or to sign them off (force a user to log off).

True

The Troubleshooting Control Panel applet introduced in Microsoft Windows 7 provides access to several software tools that can automatically fix common problems related to application compatibility, hardware, sound, networking, operating system, and security.

True

The basic countermeasures against application-related security risks include avoiding applications from unknown sources and keeping the already installed apps up to date with current patches and bug fixes.

True

The category of account management security best practices includes the practice of restricting user administrative privileges to operating systems and applications based on user duties. Operating systems simplify this process by introducing the concept of user groups equipped with different types of permissions which allow system administrators to simultaneously manage permissions of multiple user accounts based on group membership.

True

The importance of changing default usernames and passwords can be illustrated on the example of certain network devices (e.g. routers) which are often shipped with default and well-known admin credentials that can be looked up on the web.

True

The intermediary systems used as a platform for a DDoS attack are often referred to as zombies, and collectively as a botnet.

True

The maximum amount of supported physical memory for all editions (Core/Professional/Enterprise) of the 32-bit (x86) Windows 8/8.1 is 4 GB.

True

The process of securing a workstation should involve keeping track of available system updates and patches. A single PC running Windows can be updated and patched via the Windows Update service. A similar type of service that enables centralized management and distribution of updates and patches to multiple Windows-based hosts in a corporate environment is known as Windows Server Update Services (WSUS).

True

The term "BranchedCache" refers to a Wide Area Network (WAN) bandwidth optimization technology implemented in some versions of MS Windows. BranchCache accelerates the process of serving network content by saving previously requested WAN resources on local servers or client computers which allows the subsequent requests to be served locally rather than from a remote server.

True

The term "Mantrap" refers to a physical security access control system used to prevent unauthorized users from gaining access to restricted areas by following another person. An example mantrap could be a two-door entrance point connected to a guard station wherein a person entering mantrap from the outside remains locked inside until he/she provides authentication token required to unlock the inner door.

True

The term "Power plan" refers to a collection of hardware and system settings that manage how a Windows-based computer uses power. Available configuration options for managing power in MS Windows 8/8.1/10 can be accessed via Power Options applet in Control Panel. Windows 10 provides additional way for managing basic power settings in the Settings menu.

True

The term "Unified Threat Management" (UTM) refers to a network security solution, commonly in the form of a dedicated device (called a UTM appliance or a web security gateway), which combines the functionality of a firewall with additional safeguards such as URL filtering, content inspection, spam filtering, gateway antivirus protection, IDS/IPS functionality, or malware inspection.

True

Transmission carried out in one direction only is described as a simplex mode. Communication that takes place only in one direction at a time is referred to as half-duplex mode. Two devices communicating with each other in both directions simultaneously are said to be in full-duplex mode. Network devices supporting autonegotiation feature automatically configure best mode supported by both devices. Duplex mismatch is the term used for a situation where two devices communicate with each other using different duplex modes.

True

USB locks are mechanical devices used for blocking a computer's USB ports from unauthorized access. USB locks can also be used to prevent the removal of an external USB device attached to the computer.

True

Used without any parameters, the help command in MS Windows displays a list of available system commands along with a brief description of each command.

True

VPN connection types are divided into remote-access VPNs (used for connecting a computer to a network), and site-to-site VPNs (used for connecting networks).

True

Virus definition database files contain detection patterns for known viruses. To be effective, an AV program needs up-to-date versions of these files which can be obtained through an AV software update feature.

True

Windows Active Directory service allows for grouping users and computers into containers known as Organizational Units (OUs). An OU is the smallest unit to which system administrators can assign Group Policy settings to manage the configuration and use of accounts and resources within a given OU.

True

Windows Memory Diagnostic Tool (mdsched.exe) cannot be run inside Windows. This utility requires a system restart and is launched during next boot before loading the operating system.

True

Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) are encryption standards designed for securing wireless networks. WEP is an older standard and due to its vulnerabilities is not recommended. WPA was designed as an interim replacement for WEP, and WPA2 was introduced as the official standard offering the strongest security of the three.

True

Which of the following ensures the privacy of a VPN connection?

Tunneling

Which of the following actions would help in resolving Windows network connectivity issues?

Turning off airplane mode if enabled Adjusting wireless signal range Checking physical cable connections Rebooting router/modem Using Windows built-in troubleshooting utilities Checking network resources permissions Temporarily turning off firewalls Temporarily turning off antivirus and anti-malware Reinstalling the network adapter driver Restarting Windows Manually updating network settings

A device designed to provide emergency power during an unexpected main power source outage is called:

UPS

A type of automated OS installation process that uses an answer file and does not require user interaction or presence

Unattended installation

The Programs and Features Windows Control Panel applet can be used for:

Uninstalling applications Conducting repair installation of a malfunctioning program Adding/removing Windows components Managing installed updates

The Programs and Features Windows Control Panel applet can be used for: (Select all that apply)

Uninstalling applications Conducting repair installation of a malfunctioning program Adding/removing Windows components Managing installed updates

ups

Uninterruptible Power Supply. A device designed to provide emergency power during an unexpected main power source outage

Which of the following actions would be of help while troubleshooting printing issues in Windows OS?

Unplug and restart the printer Check cables or wireless connection Uninstall and reinstall the printer Install the latest printer driver Clear and reset the print spooler Change printer's status to "online" Print a test page

Which of the following disk status options in Windows Disk Management utility indicates that a basic or dynamic disk is not accessible and might have experienced hardware failure, corruption, or I/O errors?

Unreadable

Which of the following actions would help in optimizing Windows for faster performance?

Updating Windows and installing the latest device drivers Closing unnecessary applications and web browser tabs Making sure the system has enough virtual memory available Checking for low disk space and freeing up space (deleting unused programs / using Disk Cleanup utility) Defragmenting installed magnetic hard drives Adjusting system visual effects, such as animations and shadow effects Disabling unnecessary startup programs Checking for and removing viruses and malware Adjusting power configuration settings Restoring the PC from a system restore point Restarting the system regularly to clear out the memory Adding more RAM

Windows Vista and newer releases of the Microsoft OS offer a security feature which limits privileges of software applications and access to administrative tasks. When a program makes a change that requires administrator-level permission or a user attempts to modify system settings that require administrative access, it triggers an on-screen prompt requiring an administrator password to proceed. This functionality is known as:

User Account Control (UAC)

Which of the following answers refers to a non-proprietary remote-access tool that enables control over another computer on the network with the use of a graphical user interface?

VNC

Which of the following is a non-proprietary RDP alternative that enables control over another computer on the network with the use of a graphical user interface?

VNC

Which of the following is a dedicated device designed to manage encrypted connections established over an untrusted network such as the Internet?

VPN concentrator

Tab of the Folder Options applet (Windows 7) / File Explorer Options applet (Windows 8/8.1/10) in MS Windows contains the Advanced settings menu for files, folders, and Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) navigation pane

View

Which tab of the Folder Options applet (Windows 7) / File Explorer Options applet (Windows 8/8.1/10) in MS Windows contains the Advanced settings menu for files, folders, and Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) navigation pane?

View

A system that uses public network (such as the Internet) as a means for creating private encrypted connections between remote locations is known as:

Virtual Private Network (VPN)

Can be used as an extension of RAM

Virtual memory Paging file Swap partition

Not part of the General tab of the Folder Options applet (Windows 7) / File Explorer Options applet (Windows 8/8.1/10) in MS Windows

Visibility of hidden files, folders, or drives

Which of the following options is not part of the General tab of the Folder Options applet (Windows 7) / File Explorer Options applet (Windows 8/8.1/10) in MS Windows?

Visibility of hidden files, folders, or drives

Which of the following would be of help in troubleshooting wireless signal loss and low wireless network signal coverage?

WAP power level controls

Which of the following wireless security protocols has been discouraged in favor of newer standards due to known vulnerabilities resulting from implementation flaws?

WEP

wireless security protocols has been discouraged in favor of newer standards due to known vulnerabilities resulting from implementation flaws

WEP

Wireless network type has a design that uses mesh topology

WMN Wireless mesh network

AES-based encryption mode is a characteristic feature of:

WPA2

Which of the following is the best method to secure a small network lacking an authentication server?

WPA2-PSK

A solution that simplifies configuration of new wireless networks by enabling non-technical users to easily set up new networks, configure network security settings, and add new devices to an existing network is known as:

WPS

Which of the following wireless technologies are deprecated and should not be used due to their known vulnerabilities?

WPS WEP

Which of the following takes advantage of cell towers that provide wireless signal coverage for mobile devices?

WWAN

A solution that allows to turn on a network host remotely by sending a broadcast frame is called:

Wake-on-LAN

An optimal Wireless Access Point (WAP) antenna placement provides a countermeasure against:

War driving

Phishing scams targeting people holding high positions in an organization or business are known as:

Whaling

Which of the following is a set of firewall entries containing information on traffic considered safe enough to pass through?

Whitelist

Which of the following tools would be of help in determining the optimal WAP placement?

Wi-Fi analyzer

Long-distance line-of-sight Internet service

WiMAX

What is the maximum amount of RAM supported by different editions of 64-bit (x64) Microsoft Windows 10?

Windows 10 Home 128 GB Windows 10 Pro 2 TB Windows 10 Education 2 TB Windows 10 Enterprise6 TB

Which of the Microsoft Windows 7 editions include the BranchCache feature?Which of the Microsoft Windows 7 editions include the BranchCache feature?

Windows 7 Enterprise Windows 7 Ultimate

Which of the following Windows 7 editions do(es) not include EFS?

Windows 7 Starter Windows 7 Home Basic Windows 7 Home Premium

Which edition(s) of Microsoft Windows 7 cannot participate in a Windows domain?

Windows 7 Starter Windows 7 Home Basic Windows 7 Home Premium

Limits on physical memory for 32-bit (x86) Microsoft Windows 7

Windows 7 Starter 2GB Windows 7 Home Basic 4 GB Windows 7 Home Premium 4 GB Windows 7 Professional 4 GB Windows 7 Enterprise 4 GB Windows 7 Ultimate 4 GB

Maximum amount of RAM supported by different editions of 64-bit (x64) Microsoft Windows 7

Windows 7 Starter NA Windows 7 Home Basic 8 GB Windows 7 Home Premium 16 GB Windows 7 Professional 192 GB Windows 7 Enterprise 192 GB Windows 7 Ultimate 192 GB

What are the limits on physical memory for 64-bit (x64) Microsoft Windows 8/8.1?

Windows 8 (Core) 128 GB Windows 8 Professional 512 GB Windows 8 Enterprise 512 GB

Which of the following locations/steps allows to view network shares in Windows?

Windows Command Prompt -> net share -> Enter (all network shares) Windows Run dialog box -> \computer name -> Enter (user shares only) Shared Folders menu in the Computer Management utility (all network shares) Windows Command Prompt -> net view \\computer name -> Enter (user shares only) Windows Command Prompt -> net view \\computer name /all -> Enter (all network shares)

In Windows 8/8.1/10, Windows Defender Firewall can be enabled/disabled in:

Windows Defender Firewall Control Panel applet Firewall & network protection menu in Windows Settings (accessed via Start menu) Windows Defender Firewall Control Panel applet -> Advanced settings -> right-click on Windows Defender Firewall with Advanced Security -> Properties

Which of the following locations provides access to Windows Defender Firewall settings in Windows 8/8.1/10?

Windows Defender Firewall applet in Control Panel Windows Start button -> Settings -> Update & Security -> Windows Security -> Firewall & network protection

Which of the following locations in Windows 8/8.1/10 provides access to configuration options that would allow to block incoming echo requests?

Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound Rules -> New Rule... -> Custom -> All programs (or a single app)

Which of the following locations in Windows 8/8.1/10 provides access to configuration options that would allow to create an exception for a TCP or UDP port?

Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound/Outbound Rules -> New Rule... -> Port

Which of the following locations in Windows 8/8.1/10 provide access to configuration options for managing apps or features allowed through Windows Defender Firewall?

Windows Defender Firewall applet in Control Panel -> Turn Windows Defender Firewall on or off menu item Windows Start button -> Settings -> Update & Security -> Windows Security -> Firewall & network protection -> Allow an app through firewall Windows Defender Firewall applet in Control Panel -> Allow an app or feature through Windows Defender Firewall

Which of the following steps provide access to the Disk Cleanup utility in MS Windows?

Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) -> right-click on a drive -> Properties -> General tab -> Disk Cleanup Windows Control Panel -> Administrative Tools folder -> Disk Cleanup shortcut icon Windows Run dialog box -> type in diskmgmt.msc + press Enter -> right-click on a drive -> Properties -> General tab -> Disk Cleanup

Which of the following steps provide access to the disk defragmenter utility in MS Windows? (Select 3 answers)

Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) -> right-click on a drive -> Properties -> Tools tab -> Optimize and defragment drive -> Optimize Windows Control Panel -> Administrative Tools folder -> Defragment and Optimize Drives shortcut icon

Which of the following steps provide access to the disk defragmenter utility in MS Windows?

Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) -> right-click on a drive -> Properties -> Tools tab -> Optimize and defragment drive -> Optimize Windows Control Panel -> Administrative Tools folder -> Defragment and Optimize Drives shortcut icon Windows Run dialog box -> type in diskmgmt.msc + press Enter -> right-click on a drive -> Properties -> Tools tab -> Optimize and defragment drive -> Optimize

Which of the following locations in Windows 7 allows to create a shortcut to a shared folder or computer on a network?

Windows Explorer -> Computer -> Map network drive

Which of the following is a Windows built-in software component that monitors network traffic and depending on the configuration settings applied to each data packet either blocks it or allows it to pass through?

Windows Firewall

Which of the following Control Panel applets provides access to the Windows Firewall with Advanced Security tool?

Windows Firewall (Advanced settings)

In Windows 7, Windows Firewall can be enabled/disabled in:

Windows Firewall Control Panel applet Windows Firewall Control Panel applet -> Advanced settings -> right-click on Windows Firewall with Advanced Security -> Properties

Which of the following locations provides access to Windows Firewall settings in Windows 7?

Windows Firewall applet in Control Panel

If a recently installed app, driver, or update for Windows has a degrading effect on system performance, Windows Restore can be used to undo system changes by reverting the computer to a restore point. Methods for accessing Windows Restore include:

Windows Run dialog box -> type in rstrui.exe + press Enter Windows Run dialog box -> type in sysdm.cpl + press Enter -> System Protection tab -> System Restore... Windows Control Panel -> System applet -> Advanced system settings -> System Protection tab -> System Restore... Windows Control Panel -> Recovery applet Windows Settings menu (Windows 8/8.1/10)

Which of the following steps provide access to configuration settings for Windows system visual effects, such as animations and shadow effects?

Windows Run dialog box -> type in sysdm.cpl + press Enter -> Advanced tab -> Performance -> Settings... -> Visual Effects Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) -> right-click on the Computer icon (Windows 7) / This PC icon (Windows 8/8.1/10) -> Properties -> Advanced system settings -> Advanced tab -> Performance -> Settings... -> Visual Effects Control Panel -> System applet -> Advanced system settings -> Advanced tab -> Performance -> Settings... -> Visual Effects

locations in MS Windows provide access to an interface containing options for configuring restore settings, managing disk space, and deleting restore points

Windows Run dialog box -> type in sysdm.cpl + press Enter -> System Protection -> Configure... Control Panel (Icon view) -> Recovery -> Configure System Restore -> Configure...

Which of the following locations in MS Windows provide access to an interface containing options for configuring restore settings, managing disk space, and deleting restore points?

Windows Run dialog box -> type in sysdm.cpl + press Enter -> System Protection -> Configure... Control Panel (Icon view) -> Recovery -> Configure System Restore -> Configure...

Which of the following locations in Windows 8/8.1/10 provide access to an interface for managing startup applications?

Windows Settings (Settings -> Apps -> Startup) Startup tab of the Task Manager utility

Which of the following locations provide access to proxy settings in Windows?

Windows Settings menu -> Network & Internet -> Proxy Windows Control Panel -> Internet Options -> Connections tab -> LAN settings -> Proxy server

Which of the following locations in Windows 10 provide access to configuration options for connecting a network printer to a PC (network printer mapping)?

Windows Start button -> Settings -> Devices -> Printers & scanners -> Add printers & scanners -> Add a printer or scanner -> select a printer -> Add Device Control Panel -> Devices and Printers applet -> Add a printer

Which of the following locations in Windows 10 provide access to configuration options that allow to share a local printer with other PCs on a network?

Windows Start button -> Settings -> Devices -> Printers & scanners -> select a printer -> Manage -> Printer Properties -> Sharing tab Control Panel -> Devices and Printers applet -> right-click on a selected printer -> Printer Properties -> Sharing tab

Which of the following locations provide access to display settings in Windows 10?

Windows Start button -> Settings -> System -> Display Display settings pop-up menu launched after right-clicking on the Windows Desktop screen area

Which of the following locations enable adjustments to the volume of sound in Windows 8/8.1/10?

Windows Taskbar notification area Sound applet in Control Panel

Which of the following locations enable adjustments to the volume of sound in Windows 8/8.1/10

Windows Taskbar notification area Sound applet in Control Panel

A Microsoft online service used for patching up system vulnerabilities, improving system performance, and fixing coding errors found in Windows software is known as:

Windows Update

Which of the following terms describes a large network of Windows-based PCs under single administration?

Windows domain

Which of the following key combinations can be used to launch Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) in MS Windows?

Windows logo key + E

used to launch Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) in MS Windows

Windows logo key + E

Which of the following statements describing different methods for organizing Windows-based computers in networks are true?

Windows-based computers on a network must be part of a workgroup or a domain Windows-based computers on workplace networks are usually part of a domain Windows-based computers on home networks are usually part of a workgroup

The process of planning and designing new WLANs for optimal performance, security and compliance typically involves:

Wireless site survey

Uses cell towers that provide wireless signal coverage for mobile devices

Wireless wide area network (WWAN)

Which of the statements listed below apply to Windows workgroups?

Workgroups typically consist of no more than twenty computers Logging on to any computer in the workgroup requires an account on that computer Each computer in the workgroup has its own security policy

What is the name of a standalone malicious computer program that typically propagates itself over a computer network to adversely affect system resources and network bandwidth?

Worm

A type of attack aimed at exploiting vulnerability that is present in already released software but unknown to the software developer is called:

Zero-day attack

Chain of custody

a chronological record outlining persons in possession of an evidence.

Physical Address Extension (PAE)

a memory management feature that allows 32-bit CPUs to use more than 4 GB of physical memory on capable versions of Microsoft Windows operating systems

VNC (Virtual Network Computing)

a non-proprietary remote-access tool that enables control over another computer on the network with the use of a graphical user interface

Public Key Infrastructure (PKI)

a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption. Hierarchical system for the creation, management, storage, distribution, and revocation of digital certificates?

CSP (Content Security Policy)

an added layer of security that helps to detect and mitigate certain types of attacks, including Cross-Site Scripting (XSS) and data injection attacks. These attacks are used for everything from data theft to site defacement to distribute malware.

What is the name of a software tool used for finding and installing software packages on Debian and Debian-based Linux distributions?

apt-get

Which of the following answers lists the correct syntax for applying the read-only attribute to a file?

attrib +R [drive:] [path] [filename]

Which type of script file would be used to store a series of commands designed to automate tasks in DOS, OS/2 and Microsoft Windows?

bat

While trying to start their Windows machine, a user receives "Windows Boot Configuration Data file is missing required information" error message. Which of the following bootrec options should be used by a technician for manual CLI troubleshooting of this error?

bootrec /rebuildbcd

CL: Used for directory traversal

cd

Which of the following Linux command-line commands enables directory traversal?

cd

CL: Moves the command-line prompt one folder up in the directory tree (sets the prompt at the parent folder of the current folder)

cd ..

CL: Changes the current directory to the root directory

cd \

CL: used for checking the file system and status of the system's hard drives

chkdsk

Which of the following commands launches a command interpreter utility in Windows?

cmd

CL: used to copy one or more files from one location to another.

copy

Which Linux command enables copying files and directories?

cp

A low-level utility that can be used for creating/restoring filesystem backup copies in Linux is called:

dd

An MS Windows system utility designed to improve file access speed by rearranging data stored on a disk or drive is called:

defrag

Which of the following launches the Device Manager tool in Microsoft Windows?

devmgmt.msc

CL: Used to list all directory's files and subdirectories contained in the current directory

dir dir *.*

Which of the following launches a GUI system utility for managing HDDs in Windows?

diskmgmt.msc

CL: launches a text-based command-line partitioning utility

diskpart

CL: Used for preparing and modifying contents of Windows images

dism

EIDE

enhanced integrated drive electronics

CL: allows to configure it with a file system so that Windows can store information on the disk.

format

CL: displays Group Policy information for a machine or user

gpresult

CL: allows for updating multiple Group Policy settings in MS Windows

gpupdate

A Linux command-line command that enables searching files for lines containing a match to a given text pattern is called:

grep

CL: used to display help information related to a specific command-line utility

help [command name] [command name] /?

A service that enables storage of data on Apple cloud servers is called:

iCloud

Which of the following Apple services enables remote mobile device backups?

iCloud

A Linux command-line utility used for displaying and modifying network interface configuration settings is called:

ifconfig

CL: Used to display TCP/IP configuration settings

ipconfig

Which of the following Windows command-line utilities can be used to renew an IP address?

ipconfig

CL: Used for resetting the DHCP configuration settings for all adapters

ipconfig /release ipconfig /renew

Which of the following is a Linux command-line command used for configuring network interface parameters specific to the wireless communication?

iwconfig

Which of the Linux command-line commands allows to terminate a running process?

kill

Which of the following addresses can be pinged to test the functionality of a Network Interface Card (NIC)?

localhost ::1 127.0.0.1

Which of the following addresses can be pinged to test the functionality of a Network Interface Card (NIC)

localhost ::1 127.0.0.1

Which of the following Linux commands is used to display information about files and directories contained within the current working directory?

ls

Time Machine is a built-in backup utility for:

macOS

A Microsoft Windows application utility that displays details about computer's hardware configuration, computer components, software, and device drivers is known as:

msinfo32.exe

What is the name of the Linux command used for renaming files and directories?

mv

Which of the following is a Linux command for transferring files/directories to a different directory?

mv

CL: used for listing a computer's connections to shared resources

net use

Command prompt command used for listing a computer's connections to shared resources

net use

CL: lists the user accounts for the computer

net user

Command-line commands lists the user accounts for the computer

net user

Which of the following CLI tools can be used for troubleshooting DNS-related problems?

nslookup

A Linux command-line command allowing a user to change his/her own password is known as:

passwd

CL: Used for checking the reachability of a remote network host

ping

Which of the following are examples of administrative share names in Windows?

print$ IPC$

PCI DSS

provide protection for Credit cardholder data

What is the name of a Linux command-line utility used for displaying statistics of running processes?

ps

Which of the following answers lists the filename extension of a Microsoft PowerShell script files?

ps1

A Linux command displaying an absolute path to (i.e. full filename of) the current working directory is called:

pwd

Which of the following system utilities in MS Windows provides access to a database containing system configuration information?

regedit

Which other command-line command besides regedit can be used to launch registry editor in Windows?

regedt32

A command-line command in Linux used for deleting files and directories is known as:

rm

Which of the following system utilities in Windows enables managing background applications?

services.msc

CL: Scans the integrity of all protected system files and replaces incorrect versions with correct Microsoft versions

sfc

Which of the following answers refers to a script file type designed to be run in Unix command line?

sh

CL: Can be used to shut down or restart a local or remote host running MS Windows.

shutdown

The following command can be used for turning off or restarting a Linux host.

shutdown

CL: enables a full system shutdown and restart of an MS Windows host after a time-out period of two minutes

shutdown /r /t 120

CL: command for setting the time-out period of 60 seconds before powering off a Windows host

shutdown /s /t 60

Which of the following is a Linux command that allows to assume the identity of a different system user and execute commands with security privileges of that user account?

su

A Linux command that temporarily modifies security privileges to allow an execution of a single command that requires root access permissions is called:

sudo

Correct syntax for a Windows Command Prompt taskkill command that would allow to close notepad.exe by providing its imagename

taskkill /im notepad.exe

Provided that the process ID of notepad.exe obtained with the tasklist command is 1230, which of the following answers lists the correct syntax for a Windows Command Prompt taskkill command that would allow to close this application?

taskkill /pid 1230

CL: displays a list of currently running processes on a local or remote host

tasklist

CL: Tracks and displays the route taken by IPv4 packets on their way to another host

tracert

Which of the following commands is used for invoking a text editor in Unix-like operating systems?

vi

CL: allow for copying multiple files or entire directory trees from one directory to another and for copying files across a network

xcopy robocopy

Which of the following characters indicates that a Windows network share is intended for administrative access?

$

Netstat Parameters

-a Displays all connections and listening ports -e Displays Ethernet statistics -n Displays addresses and port numbers in numerical form instead of using friendly names -s Displays statistics categorized by protocol -p protocol Shows connections for the specified protocol, either TCP or UDP -r Displays the contents of the routing table interval Displays selected statistics, pausing interval seconds between each display; press [Ctrl]C to stop displaying statistics

Which type of script filename extension would be used to create a script file that extends the scope of interaction between a user and a web page?

.js

Which of the following answers refers to an example of filename extension used in a cross-platform, general-purpose programming language?

.py

Files with this filename extension are used in a scripting language based on the Microsoft's Visual Basic programming language.

.vbs

CL: enables aborting a system shutdown

/a

CL: Allows to view the physical address of a Network Interface Card (NIC)

/all

CL: Refers to an ipconfig command parameter used for displaying the full TCP/IP configuration information for all adapters

/all

CL: forces full system shutdown and restart of a Windows host

/r

CL: sfc switch enables a type of file check that scans integrity of all protected system files and repairs corrupted files when possible

/scannow

CL: copy command switch verifies that the new files are written correctly

/v

CL: suppresses the confirmation prompt displayed when Windows is about to overwrite the contents of an existing file

/y

What are the minimum system requirements for 64-bit (x64) version of Microsoft Windows 7?

1 GHz CPU 2 GB of system RAM DirectX 9 graphics device with WDDM 1.0 or higher driver 20 GB of free hard disk space

What are the minimum system requirements for 32-bit (x86) version of Microsoft Windows 10?

1 GHz CPU with support for PAE, NX, and SSE2 1 GB of system RAM Microsoft DirectX 9 graphics device with WDDM 1.0 or higher driver 16 GB of free hard disk space

What are the minimum system requirements for 32-bit (x86) version of Microsoft Windows 8/8.1?

1 GHz CPU with support for PAE, NX, and SSE2 1 GB of system RAM Microsoft DirectX 9 graphics device with WDDM 1.0 or higher driver 16 GB of free hard disk space

An IPv6 address consists of:

128 bits

An IPv4 address consists of:

32 bits

Net use

A Windows TCP/IP command that connects or disconnects a computer from a shared resource or can display information about connections.

A strong password that meets the password complexity requirement should contain:

A combination of characters from at least 3 character groups

A strong password that meets the password complexity requirement should contain: (Select the best answer)

A combination of characters from at least 3 character groups

archive bit

A flag that is set on a file after it has been created or altered. Some backup methods reset the flag to indicate that it has been backed up.

MBR (Master Boot Record)

A program that reads the partition table to find the primary partition used to boot the system.

Internet Key Exchange (IKE)

A protocol that provides the authentication material used to create the keys exchanged by ISAKMP during peer authentication in IPsec. Also sometimes referred to as IPsec Key Exchange.

FTP (File Transfer Protocol)

A protocol used to move files and folders over a network or the Internet. TCP 20 enables FTP's Data Connection to send file data TCP 21 FTP's Control Connection for administering a session

Which of the following statements apply to the definition of a computer virus? (Select 3 answers)

A self-replicating computer program containing malicious segment Requires its host application to be run to make the virus active Attaches itself to an application program or other executable componen

Which of the following statements apply to the definition of a computer virus?

A self-replicating computer program containing malicious segment Requires its host application to be run to make the virus active Attaches itself to an application program or other executable component

Main Distribution Frame (MDF)

A signal distribution frame for connecting equipment to cables and subscriber carrier equipment.

Patch panel

A simple device consisting of multiple connector blocks and ports used for cable management

Data Loss Prevention (DLP)

A system that can identify critical data, monitor how it is being accessed, and protect it from unauthorized users.

Digital Rights Management (DRM)

A type of control access technology providing protection against copyright infringements

AUP (Acceptable Use Policy)

A type of document stipulating rules of behavior to be followed by users of computers, networks, and associated resources

What is the application of No-eXecute bit (NX bit)?

A type of feature used by CPUs for isolating areas of memory to prevent the execution of code from non-executable memory location. AKA Malware protection

Certificate Authority (CA)

A type of trusted third party that issues digital certificates used for creating digital signatures and public-private key pairs

A rule-based access control mechanism implemented on routers, switches, and firewalls is known as:

ACL

Which of the following is a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object?

ACL

Most common type of DSL Internet access

ADSL

Which of the following cryptographic algorithms is the least vulnerable to attacks?

AES

Which of the following is a package management system most often used on Debian and Debian-based Linux distributions?

APT

A type of document stipulating rules of behavior to be followed by users of computers, networks, and associated resources is called:

AUP

Which of the following can be used by system/network administrators to restrict a user's ability to install software?

AUP Group Policy Principle of least privilege MDM solutionsAUP Group Policy Principle of least privilege MDM solutions

Which of the following answers refer(s) to the Windows Remote Assistance utility?

Access based on one-time password ( Missed) Temporal remote access The host and invited user can both see the host's screen The host and invited user share control over host's mouse and keyboard Windows tool used for assisted remote troubleshooting

What is the function of a laptop's smart card reader?

Access control

Which of the following answers apply to Windows BitLocker?

Accessed via BitLocker Drive Encryption applet in Windows Control Panel Does not require a TPM microcontroller to work Not included in basic versions of Windows 8/8.1/10 (Windows 8/8.1 Core and Windows 10 Home)

A drive letter in Windows can be changed by:

Accessing Disk Management, right-clicking on a drive and selecting Change Drive Letter and Paths from the context menu

A type of hierarchical database structure used in Windows Server environments that enables centralized management of devices and resources on a network is known as:

Active Directory

Which of the following would resolve problems related to excessive paging and disk thrashing?

Adding more RAM

In Windows Disk Management utility, a partition's size can be extended into:

Adjacent space on the same disk Unallocated space on the same disk

A shortcut icon to the Windows Memory Diagnostic tool (mdsched.exe) can be found in:

Administrative Tools folder in Control Panel

Active Directory Users and Computers (ADUC) is a Microsoft Management Console (MMC) snap-in included in most Windows Server OSs. The Active Directory Users and Computers snap-in allows system administrators to manage resources in the Active Directory (AD) environment (e.g. to create, delete, disable, unlock accounts, or to reset account passwords). On a Windows Server OS, the Active Directory Users and Computers snap-in resides in:

Administrative Tools folder in Windows Control Panel

Location that contains the application icon shortcut used for launching the Task Scheduler MMC snap-in

Administrative Tools menu in Windows Control Panel

Windows Task Scheduler (taskschd.msc) is a component of Microsoft Windows that provides the capability to schedule the launch of programs or scripts at pre-defined times or after specified time intervals. Which of the following locations contains the application icon shortcut used for launching the Task Scheduler MMC snap-in?

Administrative Tools menu in Windows Control Panel

Which of the following answers refers to a built-in MS Windows account with complete and unrestricted system access?

Administrator

Which of the following tabs of the Windows Internet Properties applet provides an option for rolling back all the Internet Explorer web browser configuration settings to the state they were in when Internet Explorer was first installed?

Advanced

Which tab of the System Properties (sysdm.cpl) applet in MS Windows provides access to system performance settings menu?

Advanced

Restoring data from an incremental backup requires:

All copies of incremental backups made since the last full backup Copy of the last full backup

Restoring data from an incremental backup requires:

All copies of incremental backups made since the last full backup. Copy of the last full backup

Which of the following actions may help when troubleshooting a non-responsive touchscreen on a mobile device?

All of the above

The Devices and Printers applet in Windows:

Allows to add/remove wired and wireless devices Provides a simplified view of all connected devices Allows to troubleshoot a device that isn't working properly

Which of the following describe(s) the function of Windows Task Manager?

Allows to close a non-responsive application in Windows Displays information on programs, processes, and services that are currently running on the computer Provides real-time reports on how a computer running Windows OS is using system resources (CPU/RAM/HDD/Network usage) Allows system administrators for managing the currently logged-in users

EULA (End User License Agreement)

An agreement granting the right to use software application in a manner determined by the software vendor

Transitive access

An attack involving using a third party to gain access rights.

System image

An exact copy of the entire state of a computer system

Which of the following locations in macOS provides access to application updates menu?

App Store

Which of the following locations in macOS provide access to multi-touch interface settings (a.k.a. Gestures)?

Apple menu -> System Preferences... -> Mouse Apple menu -> System Preferences... -> Trackpad

Which of the following statements describing share permissions in MS Windows are true?

Apply only to network users Can be set on a folder level

Which of the following statements describing NTFS permissions in MS Windows are true?

Apply to both network and local users Can be applied to a folder or individual file

Which of the following statements describing NTFS permissions in MS Windows are true? (Select 2 answers)

Apply to both network and local users Can be applied to a folder or individual file

Which of the following answers refers to an example of appropriate handling of customer's confidential data in a situation where troubleshooting requires user's password?

Ask user to type in the password themselves

Which of the following would be the best recommendation for a minimum password length?

At least 8 characters

Which of the following answers describe the characteristics of a non-persistent VDI?

At the end of a session, user desktop reverts to its original state Virtual desktop is shared among multiple users

Which of the following is one of the functions provided by RADIUS and TACACS servers?

Authentication

Which of the following is an example of a soft token?

Authenticator app

Unattended installation

Automated OS installation process that uses an answer file and does not require user interaction or presence

What is the name of a policy that allows employees to use private mobile devices for accessing company's restricted data and applications?

BYOD

Differential backup strategy

Backs up files and folders that have changed since the last full backup, on a daily basis. They are much quicker than full backups since less data is being backed up.

In MS Windows, a newly added drive is by default partitioned as a:

Basic disk

Examples of devices/device components regulated under special disposal procedures due to environmental/safety hazards include:

Batteries CRTs Toner cartridges

What is the name of a Microsoft Windows feature that allows for encrypting entire drives?

BitLocker

Which of the following data encryption tools can be used to secure a Windows workstation?

BitLocker (drive-level encryption) EFS (file-level encryption)

Which of the following data encryption tools can be used to secure a Windows workstation? (Select all that apply)

BitLocker (drive-level encryption) EFS (file-level encryption)

A Microsoft Windows feature specifically designed to enable encryption of removable drives is known as:

BitLocker To Go

Tethering methods used in mobile Internet connection sharing

Bluetooth Wi-fi USB cable

Which of the Apple software utilities enables installation of an alternative OS in a multiboot environment?

Boot Camp

Which of the following methods can be used to launch Windows Recovery Environment (WinRE) in Windows 8/8.1/10?

Boot from installation media In Power menu, hold down the Shift key and select Restart Boot from Recovery Drive Perform system restart from the Settings menu

Which of the configuration features listed below can be managed through the MSConfig Boot tab?

Boot logging Default OS to load in a multiboot environment Amount of hardware resources to be used by the chosen OS in a multiboot environment (e.g. the maximum amount of RAM) Safe boot options

A malware-infected networked host under remote control of a hacker is commonly referred to as a:

Bot

Which of the following terms is used to describe a collection of intermediary compromised systems that are used as a platform for a DDoS attack?

Botnet

An attack against encrypted data that relies heavily on computing power to check all possible password combinations until the correct one is found is known as:

Brute-force attack

A type of trusted third party that issues digital certificates used for creating digital signatures and public-private key pairs is known as:

CA

Which of the following terms refers to a group of experts that handle computer security breaches?

CIRT

In which of the mobile device deployment models employees can use corporate-owned devices both for work-related tasks and personal use?

COPE

Which of the following devices may pose a risk to electrical safety due to accumulated high voltage?

CRTs ( Missed) Power Supply Units (PSUs) Inverters Laser printers

Which of the following provides physical security measure against laptop theft?

Cable lock

In Windows Disk Management utility, a disk status set to Failed indicates that the basic or dynamic volume:

Cannot be started automatically Is damaged Contains corrupted file system

In forensic procedures, a chronological record outlining persons in possession of an evidence is referred to as:

Chain of custody

The User Accounts applet in Windows allows to:

Change local account name Change local account type Change local account password Manage another local account Change local User Account Control (UAC) settings

What is the function of the Linux chmod command?

Changes file access permissions

What is the function of the Linux chown command?

Changes file owner and group permissions

Which of the following actions allow(s) to improve the security of a SOHO router?

Changing default admin credentials Implementing MAC address filtering Blocking unwanted traffic via firewall settings Disabling unused physical ports Implementing content filtering Performing firmware updates Implementing physical security controls (e.g. a door lock)

A situation where multiple channels share the frequency band causing interference and performance degradation for devices operating on channels that are too close to each other

Channel overlapping

In wireless networks, a situation where multiple channels share the frequency band causing interference and performance degradation for devices operating on channels that are too close to each other is known as:

Channel overlapping

Examples of proper communication and professional skills while dealing with difficult customer include:

Clarifying customer statements by asking open ended questions to narrow the scope of the problem Restating the issue to verify understanding

A type of Windows installation that erases the contents of target partition

Clean install

If an application written for an earlier version of MS Windows doesn't run correctly, the operating system can emulate its own older version to allow a given program to work with newer hardware or software. The compatibility mode settings in Windows can be changed manually by right-clicking the program icon and:

Clicking on the Properties menu item, and then applying the required settings on the Compatibility tab

Which of the following statements describing features of Windows HomeGroups are true?

Communication between HomeGroup computers is encrypted with a pre-shared password An ad hoc home networking system for file and printer sharing HomeGroups are available only in Windows 7/8/8.1 and early versions of Windows 10

Which of the following statements describing features of Windows HomeGroups are true

Communication between HomeGroup computers is encrypted with a pre-shared password An ad hoc home networking system for file and printer sharing HomeGroups are available only in Windows 7/8/8.1 and early versions of Windows 10

MS Windows utility designed both for system administrators and for application developer

Component Services (dcomcnfg.exe)

Which of the following is an MS Windows utility designed both for system administrators and for application developers?

Component Services (dcomcnfg.exe)

CIRT

Computer Incident Response Team. A group of experts that respond to security incidents. Also known as CERT, SIRT, or IRT.

The most prominent MMC component in Administrative Tools

Computer Management

Which of the following can be used to launch the Disk Management utility in Windows?

Computer Management Windows Run dialog box Quick Access Menu (displayed after right-clicking on the Windows Start button)

Many of the utilities available in the Administrative Tools folder in Windows Control Panel are implemented as the so-called Microsoft Management Console (MMC) snap-ins. The most prominent MMC component in this folder (which contains a collection of other MMC snap-ins such as Device Manager, Disk Management, and Event Viewer) is called:

Computer Management (compmgmt.msc)

Which of the following locations provide direct access to the Device Manager applet in MS Windows?

Computer Management utility in the Administrative Tools folder in Windows Control Panel Windows Run dialog box (after typing in devmgmt.msc and pressing Enter) Windows Control Panel

The Internet Properties applet tab containing an option for configuring VPN settings is called:

Connections

Which of the Windows Internet Properties system utility tabs provides access to proxy settings?

Connections

Which of the following is an application software that selectively blocks access to websites?

Content filter

Which of the following provides access to the User Accounts applet in MS Windows?

Control Panel

Which of the following steps provide access to Windows Reliability Monitor?

Control Panel (Category view) -> System and Security -> Security and Maintenance -> Maintenance -> View reliability history Control Panel (Icon view) -> Security and Maintenance -> Maintenance -> View reliability history

Provide access to Windows Reliability Monitor

Control Panel (Category view) -> System and Security -> Security and Maintenance -> Maintenance -> View reliability history Control Panel (Icon view) -> Security and Maintenance -> Maintenance -> View reliability history

Which of the following steps in MS Windows allows to update/roll back the network adapter driver or disable/uninstall the device?

Control Panel (Icon view) -> Device Manager -> expand Network Adapters list -> right-click on the network adapter -> select Properties from the pop-up menu -> select the required action from the Driver tab ( Windows Run dialog box -> type in devmgmt.msc + press Enter -> expand Network Adapters list -> right-click on the network adapter -> select Properties from the pop-up menu -> select the required action from the Driver tab

Which of the following locations in MS Windows allows to print a test page?

Control Panel (Icon view) -> Devices and Printers -> right-click on a selected printer -> Printer Properties -> General tab -> Print Test Page

Which of the following answers describes the correct sequence of steps for accessing the magic packet settings of an Ethernet adapter in MS Windows?

Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Magic Packet settings

Which of the following answers describes the correct sequence of steps for accessing the Speed & Duplex settings of an Ethernet adapter in MS Windows?

Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Speed & Duplex settings

What is the correct sequence of steps for accessing the manual configuration interface for IPv4 connections in MS Windows?

Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields

Which of the following answers describes the correct sequence of steps for accessing the manual configuration interface for IPv4 connections in MS Windows?

Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields

Which of the following locations in MS Windows provide access to an automated printer troubleshooting tool?

Control Panel (Icon view) -> Troubleshooting -> Hardware and Sound -> Printer Control Panel (Category view) -> System and Security -> Troubleshoot common computer problems -> Printer Control Panel (Icon view) -> Devices and Printers -> right-click on a selected printer -> Troubleshoot

Locations in MS Windows provide access to an automated printer troubleshooting tool

Control Panel (Icon view) -> Troubleshooting -> Hardware and Sound -> Printer Control Panel (Category view) -> System and Security -> Troubleshoot common computer problems -> Printer Control Panel (Icon view) -> Devices and Printers -> right-click on a selected printer -> Troubleshoot

Which of the following steps enable displaying protected system files in Windows 8/8.1/10?

Control Panel -> File Explorer Options -> View tab -> Advanced settings -> select Show hidden files, folders, and drives Control Panel -> File Explorer Options -> View tab -> Advanced settings -> clear the checkbox next to Hide protected operating system files

Which of the following steps enable displaying protected system files in Windows 8/8.1/10? (Select 2 answers)

Control Panel -> File Explorer Options -> View tab -> Advanced settings -> select Show hidden files, folders, and drives Control Panel -> File Explorer Options -> View tab -> Advanced settings -> clear the checkbox next to Hide protected operating system files

Which of the following steps enable displaying protected system files in Windows 7?

Control Panel -> Folder Options -> View tab -> Advanced settings -> clear the checkbox next to Hide protected operating system files Control Panel -> Folder Options -> View tab -> Advanced settings -> select Show hidden files, folders, and drives

Which of the following steps enable displaying protected system files in Windows 7

Control Panel -> Folder Options -> View tab -> Advanced settings -> clear the checkbox next to Hide protected operating system files Control Panel -> Folder Options -> View tab -> Advanced settings -> select Show hidden files, folders, and drives

Control Panel applet in Windows can be used to check the OS version and basic hardware statistics such as the CPU type and amount of installed RAMControl Panel applet in Windows can be used to check the OS version and basic hardware statistics such as the CPU type and amount of installed RAM

Control Panel applet in Windows can be used to check the OS version and basic hardware statistics such as the CPU type and amount of installed RAM

Which of the following can be the source of RFI and cause disruptions in wireless network connectivity?

Cordless phones Car alarms Baby monitors Microwave ovens Bluetooth devices

Which edition of Microsoft Windows 8/8.1 cannot participate in a Windows domain?

Core

Which of the Microsoft Windows 8/8.1 editions does not include the BranchCache feature?

Core

Which of the following Windows 8/8.1 editions does not include the Bitlocker full drive encryption and Encrypting File System (EFS) features?

Core

Layered security

Creating multiple layers of security defenses through which an attacker must penetrate; also called defense-in-depth.

Control Panel applet in Windows allows to manage usernames and passwords for websites, connected applications and networks

Credential Manager

Which Control Panel applet in Windows allows to manage usernames and passwords for websites, connected applications and networks?

Credential Manager

The purpose of PCI DSS is to provide protection for:

Credit cardholder data

CSRF

Cross-Site Request Forgery--Third-party redirect of static content within the security context of a trusted site.

Windows Task Manager can be launched by:

Ctrl+Shift+Esc key combination Pressing Ctrl+Alt+Delete and selecting the Task Manager option from the list menu Right-clicking on the Windows Taskbar and selecting Task Manager Typing taskmgr (or taskmgr.exe) in the Command Prompt and pressing Enter Pressing simultaneously the Windows and R keys, typing taskmgr (or taskmgr.exe) in the Run window, and pressing Enter

A network protocol providing an alternative solution to the manual allocation of IP addresses is known as:

DHCP

Automatic Private IP Addressing (APIPA) addresses are valid only for communications within a network segment that a given host is connected to. A host with APIPA-assigned address (i.e. an IP address in the range between 169.254.0.1 and 169.254.255.254) cannot connect to the Internet. The assignment of APIPA address typically indicates a problem related to:

DHCP

Which of the following acronyms refers to software or hardware-based security solutions designed to detect and prevent unauthorized use and transmission of confidential information outside of the corporate network?

DLP

An Internet browser redirecting a user to a website other than intended indicates a security issue related to:

DNS

Which of the following answers refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses?

DNS

Which of the following can be used by system administrators to selectively block access to known malware sites?

DNS configuration

In order to connect to a website and display its contents, a URL entered in the web browser address bar needs to be translated into an IP address. Which of the servers listed below is used to handle this type of request?

DNS server

A type of control access technology providing protection against copyright infringements is called:

DRM

Which of the following answers describe(s) possible cause(s) of the "Missing operating system" error message displayed during system boot?

Damaged hard drive BIOS does not detect the hard drive System partition not set as active Corrupt Master Boot Record (MBR)

Characteristics of DSL modems

Dedicated bandwidth Twisted-pair copper cabling Telephone lines

Injector

Dedicated device designed to supply power to PoE equipment

Which of the following methods provides the most effective way for permanent removal of data stored on a magnetic drive?

Degaussing

Error-Correcting Code (ECC)

Detects and corrects error in a single bit Application: ECC makes 64-bit DIMM a 72-bit module

Time Domain Reflectometer (TDR)

Detects the location of a fault in a copper cable by sending an electric signal down the copper cable and measuring the time required for the signal to bounce back from the cable fault. A TDM can then mathematically calculate the location of the fault.

If a device in Windows fails after driver update, the driver can be restored to the previously installed version in:

Device Manager

Uses traditional analog telephone lines

Dial-up

Which of the following Internet access types takes advantage of PSTN lines

Dial-up

Which of the following Internet access types takes advantage of PSTN lines?

Dial-up

Which of the following settings are used for establishing a dial-up connection in Windows?

Dial-up phone number User name Password

Which password attack takes advantage of a predefined list of words?

Dictionary attack

According to the CompTIA's best practice procedures for malware removal, removing malicious software on a Windows-based system should be performed as the next step after:

Disabling System Restore

Which of the following could be of help in troubleshooting a system that attempts to boot to incorrect device?

Disconnecting any removable drives Updating boot order in BIOS

Help in preserving the integrity of a digital evidence

Disk Imaging and Hashing

Which of the following is a macOS disk maintenance tool?

Disk Utility

Which of the following macOS utilities allows to create/restore a disk image?

Disk Utility

Which of the following would be of help in preserving the integrity of a digital evidence?

Disk imaging Hashing

Advantages of the New Technology File System (NTFS) over FAT32 file system

Disk quotas Compression Object permissions Encryption

Which of the locations listed below enable access to computer display configuration settings in Windows 7/8/8.1?

Display settings pop-up menu launched after right-clicking on the Windows Desktop screen area Appearance and Personalization menu of the Windows Control Panel (Category view) The Display applet icon in Windows Control Panel (Icons view)

Netstat is a command-line utility used for:

Displaying active TCP/IP connections Displaying network protocol statistics

Net Session

Displays information about all sessions with the local computer.

An attempt to flood the bandwidth or resources of a targeted system so that it becomes overwhelmed with false requests and in result doesn't have time or resources to handle legitimate requests is called:

DoS attack

What is the name of a macOS equivalent of Windows Taskbar?

Dock

Windows repair installation:

Does not affect user applications Preserves application configuration settings Does not affect user files

Windows repair installation

Does not affect user applications Preserves application configuration settings Does not affect user files

What type of preventive physical access controls would provide a basic means for securing door access?

Door lock Proximity card reader Smart card reader

Which type of UPS provides the best power outage protection?

Double-conversion Online

Which of the following allows to create a backup copy of the entire contents of a disk drive (which may include a pre-configured OS installation) and replicate the drive to a new computer?

Drive imaging

The term "Brownout" refers to what kind of situation?

Drop in voltage

Which of the following is an MS Windows diagnostic tool for detecting display, sound, and input related problems?

DxDiag

Antistatic bags, antistatic wrist straps, and ground mats are all countermeasures used to protect computer and communications equipment components against:

ESD

An agreement granting the right to use software application in a manner determined by the software vendor is known as:

EULA

In a persistent VDI:

Each user runs their own copy of virtual desktop At the end of a session, user data and personal settings are saved

Which Microsoft Windows 10 editions include the BranchCache feature?Which Microsoft Windows 10 editions include the BranchCache feature?Which Microsoft Windows 10 editions include the BranchCache feature?

Education Enterprise

Which of the following logical security controls provides a countermeasure against unsolicited electronic messages (a.k.a. spam)?

Email filtering

Which of the following logical security controls provides a countermeasure against unsolicited electronic messages (a.k.a. spam)?Which of the following logical security controls provides a countermeasure against unsolicited electronic messages (a.k.a. spam)?

Email filtering

In order to operate, an integrated component such as Network Interface Card (NIC) may need to be first:

Enabled in the advanced BIOS settings menu

Premium versions of the Microsoft OS contain a built-in component that enables encryption of individual files. This feature is known as:

Encrypting File System (EFS)

What are the characteristics of TACACS+?

Encrypts the entire payload of the access-request packet Primarily used for device administration Separates authentication and authorization

Which of the following would be the best malware-prevention method/tool?

End user education

An antivirus software is kept up to date via:

Engine updates Virus signature updates

Which of the following terms describes the most common type of wired connections used in modern networks?

Ethernet

When a program installed in Windows stops responding or encounters an error, logs describing the error can be examined with the use of

Event Viewer

When a program installed in Windows stops responding or encounters an error, logs describing the error can be examined with the use of:

Event Viewer

Reviewing System and Application logs on a Windows-based PC might provide useful information while troubleshooting security-related issues. System and Application logs in MS Windows can be found in:

Event Viewer (eventvwr.msc)

System and Application logs in MS Windows can be found in

Event Viewer (eventvwr.msc)

What is the correct hierarchy of precedence for permissions settings in NTFS?

Explicit Deny -> Explicit Allow -> Inherited Deny -> Inherited Allow

4 GB maximum file size limit and 2 TB maximum volume size limit

FAT32

IPv6 link-local address

FE80::/10

Which of the following enable(s) biometric authentication on a mobile device?

Face, Fingerprint lock

An SSL VPN connection typically requires a dedicated VPN client application.

False

If personal files, such as email, documents, or photos are lost or deleted, Windows System Restore can be used to recover such files.

False

In NTFS, a folder or file copied from one location to another on the same volume retains its original permissions.

False

In NTFS, a folder or file moved from one location to another on the same volume inherits the permissions of its new parent folder.

False

In NTFS, permissions inherited from a parent object (e.g. a folder or user group) take precedence over permissions applied directly to an object (explicit permissions).

False

In Windows domain environment, the term "Home Folder" refers to a directory on a local PC where users can back up their data and files.

False

In a differential backup strategy, restoring data from backup requires only a working copy of the last full backup.

False

In the MBR partition style, each logical drive within the extended partition can be transformed into a bootable drive.

False

Local Users and Groups (lusrmgr.msc) is a Microsoft Management Console (MMC) snap-in included by default in all editions of MS Windows. It is used to create and manage users and groups that are stored locally on a computer.

False

On a 64-bit MS Windows OS, both 32-bit and 64-bit applications are stored in the Program Files folder.

False

Solid-State Drives (SSDs) require periodic defragmentation to improve system performance.

False

The "View by Category" option in Windows Control Panel allows for displaying entire contents of the Control Panel in a single window enabling quick access to each Control Panel applet.

False

The Local Security Policy (secpol.msc) administrative tool in home editions of MS Windows can be used by system administrators to modify account and local policies, public key policies and IP security policies for a local host.

False

The Security and Maintenance applet in Windows Control Panel provides access to Windows Firewall (Windows 7) / Windows Defender Firewall (Windows 8/8.1/10) configuration settings.

False

The maximum amount of supported physical memory for all editions (Home/Pro/Education/Enterprise) of the 32-bit (x86) Windows 10 is 8 GB.

False

Windows Phone, iOS, and Android are all examples of closed-source operating systems.

False

What is the name of a GUI-based file and folder manager application in Windows 10?

File Explorer

Which of the following locations in Windows 8/8.1/10 allows to create a shortcut to a shared folder or computer on a network?

File Explorer -> This PC -> Computer tab -> Map Network drive

Provides access to file/folder management settings in Windows 10

File Explorer Options applet in Windows Control Panel

Which of the following provides access to file/folder management settings in Windows 10?

File Explorer Options applet in Windows Control Panel

Which of the following adversely affect performance of a magnetic hard drive?

File fragmentation Excessive paging / disk thrashing Insufficient amount of RAM

A macOS file manager application is known as:

Finder

Which of the following answers refers to (a) screen lock type(s) used for securing access to a mobile device?

Fingerprint lock Face lock Swipe lock Passcode lock

Which of the following examples meets the requirement of multi-factor authentication on a mobile device?

Fingerprint scan and password ( Missed)

Which of the following macOS utilities can be used for detecting and repairing disk-related problems?

First Aid (in Disk Utility)

The /f switch of the chkdsk command-line utility in MS Windows:

Fixes errors on the disk

Which of the following provides access to file/folder management settings in Windows 7?

Folder Options applet in Windows Control Panel

Which of the Windows Active Directory Group Policy settings allows network administrators to map a folder on a user's PC to a server-based location?

Folder redirection

An unresponsive application/process in macOS can be terminated with the use of:

Force Quit

In Windows Disk Management utility on a local computer, a dynamic disk that has been moved from another computer and found by the OS is labeled as:

Foreign

This command allows to configure it with a file system so that Windows can store information on the disk.

Format

A type of transmission that takes place in two directions simultaneously is known as:

Full duplex

Which of the following regulates personal data privacy of the European Union (EU) citizens?

GDPR

A mobile device's built-in functionality enabling the usage of locator applications is known as:

GPS

What is tailgating?

Gaining unauthorized access to restricted areas by following another person

Tab of the MSConfig utility in Windows lists choices for startup configuration modes

General

Tab of the System Configuration utility in Windows contains the Diagnostic startup option

General

Which of the following tabs of the Windows Internet Properties applet provides an option for deleting temporary Internet files, cookies, web browsing history, Internet Explorer saved passwords, and saved data typed into web forms?

General

Which of the tabs of the System Configuration utility in Windows contains the Diagnostic startup option?

General

Which tab of the MSConfig utility in Windows lists choices for startup configuration modes?

General

In Windows Active Directory environment, this feature enables centralized management and configuration of operating systems, applications, and user account settings.

Group Policy

Which of the following default local groups in Microsoft Windows has the least amount of system access privileges?

Guests

A type of proprietary file system used in Apple OSs is known as:

HFS

Which of the following terms refers to an environmental control system?

HVAC

What kind of general term is used to describe the process of securing a computer system?

Hardening

Which of the following firewall types would provide the best protection for an ingress/egress point of a corporate network?

Hardware firewall Network-based firewall

Which of the following answers refers to the contents of a rainbow table entry?

Hash/Password

IPv6 addresses are expressed by using:

Hexadecimal numbers

Which of the power-saving states in MS Windows uses the least amount of power

Hibernation

Which of the power-saving states in MS Windows uses the least amount of power?

Hibernation

In MS Windows, the "$" sign appended to the end of the name of a network share indicates that the shared folder or drive is:

Hidden

Which edition of Microsoft Windows 10 cannot participate in a Windows domain?

Home

Which of the following Windows 10 editions does not include the Bitlocker full drive encryption and Encrypting File System (EFS) features?

Home

Which of the following is a common firewall type used for protecting a single computer?

Host-based firewall Software firewall

Which of the following is a common firewall type used for protecting a single computer? (Select 2 answers)

Host-based firewall Software firewall

What is the name of a network layer protocol that specifies the format of packets and addressing scheme in network communications?

IP

A type of logical numeric identifier assigned to every single computer host or other device on a TCP/IP-based network is known as:

IP address

Which of the following answers list(s) data required for manual configuration of network adapter settings in MS Windows?

IP address Subnet mask Default gateway DNS server address

Examples of secure network protocols used for establishing VPN connections include:

IPsec TLS

CompTIA's best practice procedures for malware removal

Identify and research malware symptoms. ... Quarantine the infected systems. ... Disable System Restore (in Windows). ... Remediate the infected systems. ... Schedule scans and run updates. ... Enable System Restore and create a restore point (in Windows). ... Educate the end user.

According to the CompTIA's best practice procedures for malware removal, putting a malware-infected Windows-based system into a quarantine should be the next step after:

Identifying and researching malware symptoms

Provides a simpler and less costly alternative to manual OS installation in an environment consisting of multiple hosts requiring the same configuration settings

Image deployment

Which of the following terms is used a synonym for the bare-metal backup concept?

Image-level backup

synonym for the bare-metal backup concept

Image-level backup

Characteristics of fiber-optic network cabling

Immunity to electromagnetic interference More suitable for carrying digital information than copper cabling Used for network backbone cabling

Which social engineering attack relies on identity theft?

Impersonation

operating system installation type that preserves system settings, personal files, and applications from the older OS version

In-place upgrade

Which of the following destruction tools/methods allow for secure disposal of physical documents

Incineration Shredder

Which of the following actions would be of help while troubleshooting a mobile device's intermittent wireless connectivity problems?

Increase the signal strength (adjust power level controls on a WAP, or move closer to a WAP) Switch to a different WAP Check for interference from wireless devices operating in the 2.4 GHz frequency band (e.g. cordless phones, Bluetooth devices, or microwave ovens) Reduce the number of wireless devices using up available bandwidth on the network Configure a WAP to operate on a different wireless channel Switch to the 5 GHz frequency band

What is the function of archive bit?

Indicating whether a file has been modified since the last backup

Multiboot

Install more than one operating system and then choose which OS to use during each startup.

IEEE

Institute of Electrical and Electronic Engineers. International organization with a focus on electrical, electronics, and information technology topics. IEEE standards are well respected and followed by vendors around the world.

Which of the following is a basic variable type designed to store whole numbers?

Integer

Enables simultaneous digital transmission of voice, video, data, and other network services over a PSTN

Integrated Services Digital Network (ISDN)

In forensic analysis, taking hashes ensures that the collected digital evidence retains:

Integrity

Which of the following locations in Windows provide access to dial-up and VPN settings?

Internet Options (Connections tab) Network and Sharing Center Settings menu

Which of the following locations in MS Windows provide(s) access to the Internet Properties (inetcpl.cpl) system utility?

Internet Options applet in Windows Control Panel Network and Sharing Center applet in Windows Control Panel Windows Run dialog box (after typing in inetcpl.cpl and pressing Enter) Internet Options menu item in Internet Explorer's Tools menu

Which of the following utilities in Windows provides access to configuration options of a built-in pop-up blocker?

Internet Properties (inetcpl.cpl)

utilities in Windows provides access to configuration options of a built-in pop-up blocker

Internet Properties (inetcpl.cpl)

SNMP

Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behavior. An SNMP Agent receives requests on UDP port: 161 An SNMP management station receives SNMP notifications on 162

Which of the following settings are used for establishing a VPN connection in Windows?

Internet address (domain name or IPv4/IPv6 address) Destination name Smart card (optional)

Which of the following settings are used for establishing a VPN connection in Windows? (Select 3 answers)

Internet address (domain name or IPv4/IPv6 address) Destination name Smart card (optional)

According to the CompTIA's best practice procedures for malware removal, disabling System Restore on a malware-infected Windows-based system should be performed as the next step after:

Isolating the infected system

Which of the following authentication protocols can be used to enable SSO in Windows-based network environments?

Kerberos

Which of the following are examples of hardware tokens?

Key fob RFID badge Smart card

A password management system in macOS is known as:

Keychain

Which of the following is an example of spyware?

Keylogger

ext3 and ext4 are examples of default file systems used by:

Linux distributions

Which of the following is an example of good communication skills when dealing with a customer?

Listening to the customer and avoiding interruptions until he or she has finished describing the problem

Which of the following Microsoft Windows components allow system administrators to enable/disable user accounts?

Local Users and Groups in Computer Management User Accounts in Control Panel

The /r switch of the chkdsk command-line utility in Windows:

Locates bad sectors and recovers readable information Fixes errors on the disk

Which of the following statements apply to Windows domains?

Logging on to any computer on a Windows domain requires a single set of credentials Security policies and permissions on a Windows domain are administered centrally Windows domains are based on client-server networking architecture

On a Windows domain, this tool can be used by system administrators to configure initial desktop environment (which may include mapping a network drive or setting up access to a shared printer) for a specific user.

Login script

Which of the following account management security measures narrows down a user's computer access to specified hours?

Login time restrictions

Which of the following answers refers to a basic programming construct that repeats a sequence of instructions until a specified condition is reached?

Loop

Which of the following terms is used to describe initial hard drive formatting typically performed at the factory by the drive manufacturer?

Low-level format

What is the name of a logical security access control method in which a 48-bit physical address assigned to each Network Interface Card (NIC) is used to determine access to the network?

MAC address filtering

What is the name of a network security access control method in which a 48-bit physical address assigned to each network card is used to determine access to the network?

MAC filtering

Which of the following facilitates the enforcement of mobile device policies and procedures?

MDM

Which type of software enables a centralized administration of mobile devices?

MDM

Relies on intercepting and altering data sent between two networked hosts?

MITM attack

Which of the following attacks relies on intercepting and altering data sent between two networked hosts?

MITM attack

A type of customizable framework providing access to a collection of system tools designed to manage networks, computers, services, and other system components in Windows is known as:

MMC

System Restore

MS Windows system utility that allows to roll back system files and settings to an earlier point in time

A document describing procedures for safe handling, use, storage and disposal of potentially hazardous materials is called:

MSDS

Which of the following answers refers to the MS Windows client application for Remote Desktop Services (RDS)?

MSTSC

Disabling SSID broadcast:

Makes a WLAN harder to discover

Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as:

Malware

Partition Styles:

Master Boot Record (MBR) GUID Partition Table (GPT)

Which of the following password policy settings prevents attackers using cracked passwords from gaining permanent access to a Windows workstation?

Maximum password age setting

Which of the following is a Microsoft Windows home theater software included in MS Windows versions prior to Windows 10?

Media Center

Order of volatility for a typical computer system

Memory dump, temporary files, disk files, archival media

Which of the answers listed below refers to an example order of volatility for a typical computer system?

Memory dump, temporary files, disk files, archival media

Network topology provides the most redundancy

Mesh

Which password policy setting prevents users from repeatedly changing their passwords to bypass the password history policy setting and get back to their original/preferred password?

Minimum password age setting

A macOS system feature providing single-screen thumbnail preview of all open windows and applications is known as:

Mission Control

Common causes for a black/blank PC screen include:

Monitor connectivity issues Video adapter driver updates Recent updates or installations

If a computer's hard disk has an adequate free disk space, it is possible to install more than one operating system and then choose which OS to use during each startup.

Multiboot

Advantages of organizing hard drive space into multiple partitions

Multiboot environment Separated disk space used for virtual memory Separation of user files from the operating system and application files

Methods of storing and accessing data over computer network

NFS(Network File System) and DFS(Distributed File System)

Which of the following statements are true?

NTFS permissions apply to both network and local users NTFS permissions can be applied to a folder or individual file

NIST

National Institute of Standards and Technology. NIST is a part of the U.S. Department of Commerce, and it includes an Information Technology Laboratory (ITL). The ITL publishes special publications related to security that are freely available for download here: http:// csrc.nist.gov/ publications/ PubsSPs.html.

Which of the following enable installation of an OS via network interface?

Netboot PXE

Installation of an OS via network interface

Netboot and PXE

Which of the Control Panel applets in Windows 8/8.1/10 can be used for checking basic information about the network connection status and setting up network connections?

Network and Sharing Center

What type of configuration info is used for setting up a wireless connection in Windows?

Network name Encryption type Security type Security key

IPv4 link-local addresses

Non-routable IP address APIPA address 169.254.0.0/16

What is the theoretical limit of addressable RAM for a 64-bit CPU?

None of the above

A simple Windows text-editing utility that can be launched from any place in the Command Prompt without the need for specifying path to the application's executable file location is called:

Notepad

Which of the following would be the most important considerations when installing computer applications?

OS compatibility Minimum amount of drive space Minimum amount of RAM

Which of the following disk status options in Windows Disk Management utility indicates that a dynamic disk might be corrupted or intermittently unavailable?

Offline

Which of the following answers refer to a very basic UPS type commonly used for protecting a single PC?

Offline Standby

Which of the following answers refer to a very basic UPS type commonly used for protecting a single PC?

Offline Standby

Very basic UPS type commonly used for protecting a single PC

Offline Standby

What is the correct sequence of steps required to close a non-responsive user application in Task Manager in Windows 7?

On the Applications tab, right-click the program that isn't responding, click End Task button

Which of the following answers describes the correct sequence of steps required to close a non-responsive user application or process in Task Manager in Windows 8/8.1/10?

On the Processes tab, right-click the program/process that isn't responding, click End Task button

GUID Partition Table (GPT)

One of two methods used to organize partitions on a hard drive. A GPT partitioning system installed on a hard drive can support 128 partitions and is recommended for drives larger than 2 TB. Compare with Master Boot Record (MBR).

In Windows Disk Management utility, a normal disk status indicating that the disk is ready for read/write operations is labeled as:

Online

Which type of UPS provides the best power outage protection?

Online Double-conversion

Which of the following disk status options in Windows Disk Management utility indicates Input/Output (I/O) errors on a dynamic disk/volume?

Online (Errors) Healthy (At Risk)

If a network adapter's "Speed & Duplex" property is set to Half Duplex, communication on the network will be taking place:

Only in one direction at a time

What type of software licensing model grants free access to the application code as well as permission to modify and redistribute the application?

Open source

Hide extensions for known file types in Windows 8/8.1/10

Open the File Explorer Options applet in Windows Control Panel, then select Hide extensions for known file types in the Advanced settings on the View tab

Which of the following allows to hide extensions for known file types in Windows 8/8.1/10?

Open the File Explorer Options applet in Windows Control Panel, then select Hide extensions for known file types in the Advanced settings on the View tab

View hidden files, folders, and drives in Windows 8/8.1/10

Open the File Explorer Options applet in Windows Control Panel, then select Show hidden files, folders, and drives in the Advanced settings on the View tab

Which of the following allows to view hidden files, folders, and drives in Windows 8/8.1/10?

Open the File Explorer Options applet in Windows Control Panel, then select Show hidden files, folders, and drives in the Advanced settings on the View tab

Hide extensions for known file types in Windows 7

Open the Folder Options applet in Windows Control Panel, then select Hide extensions for known file types in the Advanced settings on the View tab

Which of the following allows to hide extensions for known file types in Windows 7?

Open the Folder Options applet in Windows Control Panel, then select Hide extensions for known file types in the Advanced settings on the View tab

View hidden files, folders, and drives in Windows 7

Open the Folder Options applet in Windows Control Panel, then select Show hidden files, folders, and drives in the Advanced settings on the View tab

Which of the following allows to view hidden files, folders, and drives in Windows 7?

Open the Folder Options applet in Windows Control Panel, then select Show hidden files, folders, and drives in the Advanced settings on the View tab

In-place upgrade

Operating system installation type that preserves system settings, personal files, and applications from the older OS version

In forensic procedures, a sequence of steps in which different types of evidence should be collected is known as:

Order of volatility

Available options of the Master Boot Record (MBR) partition style

Overall number of partitions limited to four Up to three primary partitions and one extended partition Up to four primary partitions

The US Health Insurance Portability and Accountability Act (HIPAA) provides privacy protection for:

PHI

Which of the following acronyms refers to any type of information pertaining to an individual that can be used to uniquely identify that person?

PII

Which of the following answers refers to a hierarchical system for the creation, management, storage, distribution, and revocation of digital certificates?

PKI

Which of the following are common applications of barcode scanners?

POS Inventory management

Which of the following answers refers to an example of content filtering configuration setting on a SOHO router?

Parental controls

Which of the following examples meets the requirement of multi-factor authentication?

Password and biometric scan

Which of the following password best practices would mitigate the security risk posed by temporary workers?

Password expiration

Which of the following password policy settings determines the number of unique new passwords that must be associated with a user account before an old password can be reused?

Password history setting

The two factors that are considered important for creating strong passwords are:

Password length Password complexity

Which of the Windows Task Manager tabs in Windows 8/8.1/10 includes the information about the network resources usage listed under Networking tab in previous releases of the Microsoft OS?

Performance

Tool in MS Windows is used to examine (both in real time and by collecting log data for later analysis) how programs that are run affect a computer's performance

Performance Monitor (perfmon.exe)

Used to examine (both in real time and by collecting log data for later analysis) how programs that are run affect a computer's performance

Performance Monitor (perfmon.exe)

Which of the following tools in Windows provide access to real-time performance data on CPU, RAM, hard drive, and network interface utilization?

Performance Monitor (perfmon.exe) Resource Monitor (resmon.exe) Task Manager (taskmgr.exe)

Which of the following answers describe the features of Windows Remote Desktop tool?

Permanent remote access Access based on local password (local user account password) Windows tool used for connecting remotely to the user's own computer

A social engineering technique whereby attackers under disguise of a legitimate request attempt to gain access to confidential information is known as:

Phishing

A fraudulent email requesting its recipient to reveal sensitive information (e.g. username and password) used later by an attacker for the purpose of identity theft is an example of: (Select 2 answers)

Phishing Social engineering

Protection provided by security guards is an example of:

Physical security control

Which of the following solutions will allow a server with a private IP address to handle requests from an outside (public) network?

Port forwarding

What is the name of a router configuration feature that allows to open an inbound port based on the outbound requests made by hosts placed inside a private network?

Port triggering

Which user group in Windows (applies to Windows 7 and earlier versions) had rights and permissions that allowed its members to perform specific administrator-level tasks?

Power Users

Which WAP configuration setting allows for adjusting the boundary range of a wireless signal?

Power level controls

What does the term "Blackout" refer to?

Power outage

PoE

Power over Ethernet. Using a single twisted-pair Ethernet cable to carry both data and electrical power

In Windows Disk Management utility, a dynamic disk status set to Offline/Missing indicates that the missing disk may be:

Powered down Corrupted Disconnected

In Windows Disk Management utility, initializing a disk:

Prepares a newly added disk for use by Windows Erases data on disk

Which of the following actions would be of help while troubleshooting a black/blank screen on a Windows-based PC?

Press Windows logo key + Ctrl + Shift + B to wake the screen Press Ctrl + Alt + Delete and try logging in Check the video output connection / Reconnect the monitor Remove third-party antivirus software (safe mode) Roll back the video adapter driver (safe mode) Check video adapter's compatibility (HCL)

What are the characteristic features of RADIUS

Primarily used for network access Combines authentication and authorization Encrypts only the password in the access-request packet

What are the characteristic features of RADIUS?

Primarily used for network access Combines authentication and authorization Encrypts only the password in the access-request packet

allow for administering print devices in Microsoft Windows

Printers applet in Control Panel in Windows OSs prior to Windows 7 Devices and Printers applet in Control Panel in Windows 7 and newer Microsoft OSs Print Management utility in the Administrative Tools folder (not available in home editions of MS Windows)

Allow for administering print devices in Microsoft Windows

Printers applet in Control Panel in Windows OSs prior to Windows 7 Devices and Printers applet in Control Panel in Windows 7 and newer Microsoft OSs Print Management utility in the Administrative Tools folder (not available in home editions of MS Windows)

A Windows Internet Properties applet tab containing an option for managing pop-up windows displayed by websites is called:

Privacy

What is the name of a Windows Internet Properties applet tab providing access to advanced cookie management options?

Privacy

PLC

Programmable logic controller-A type of technology that enables sending data over wiring used for transmission of electrical power

A Windows Internet Properties system utility tab containing an option for managing Internet Explorer web browser add-ons is called:

Programs

Which of the following Control Panel applets in Windows provides options to uninstall, change, or repair applications?

Programs and Features

Control Panel applets in Windows provides options to uninstall, change, or repair application.

Programs and features

Telnet

Provides username & password authentication Transmits data in an unencrypted form Enables remote login and command execution

If a device in Windows fails after driver update, the driver can be restored to the previously installed version in

Device Manager

net view

Displays a list of domains, computers, or resources that are being shared by the specified computer.

net share

Displays local shares, including administrative and hidden. Displays information about all of the resources that are shared on the local computer.

Physical Address Extension (PAE), No-eXecute bit (NX bit), and Streaming SIMD Extensions 2 (SSE2) are mandatory CPU requirements for Microsoft Windows 7/8/8.1/10, therefore Windows 7/8/8.1/10 cannot be installed on computer systems that lack support for these features.

False

The function of the NetBT protocol is to allow NetBIOS services to be used over TCP/IP networks.

True

The function of the ODBC Data Sources (odbcad32.exe) configuration utility in Windows is to facilitate communication between applications and varying types of databases.

True

Windows command-line commands allow for copying multiple files or entire directory trees from one directory to another and for copying files across a network

xcopy robocopy

A 32-bit system typically provides support for up to:

4 GB of RAM

SLP (Service Location Protocol)

427 allows computers and other devices to find services in a local area network without prior configuration.

CIFS (Common Internet File System)

445 A file access protocol. CIFS runs over TCP/IP and is the cross-platform version of SMB used between Windows, UNIX, and other operating systems.

SMB (Server Message Block)

445 A protocol that works on the Application layer and is used to share files, serial ports, printers, and communications devices, including mail slots and named pipes, between computers.

EPP/ECP

(Enhanced Parallel Port/Enhanced Capability Port) a standard signaling method for bi-directional parallel communication between a computer and peripheral devices that offers the potential for much higher rates of data transfer than the original parallel signaling methods. EPP is for non-printer peripherals. ECP is for printers and scanners.

What are the minimum system requirements for 32-bit (x86) version of Microsoft Windows 7?

1 GB of system RAM DirectX 9 graphics device with WDDM 1.0 or higher driver 16 GB of free hard disk space 1 GHz CPU

What are the minimum system requirements for 64-bit (x64) version of Microsoft Windows 10?

1 GHz CPU with support for PAE, NX, and SSE2 2 GB of system RAM Microsoft DirectX 9 graphics device with WDDM 1.0 or higher driver 20 GB of free hard disk space

Partition types

1. Primary 2. Logical 3. Extended Primary partition is a bootable partition and it contains the operating system/s of the computer, while logical partition is a partition that is not bootable. Multiple logical partitions allow storing data in an organized manner. An extended partition is a partition that can be divided into additional logical drives. Unlike a primary partition, you don't need to assign it a drive letter and install a file system. Instead, you can use the operating system to create an additional number of logical drives within the extended partition.

The GPT partition style extends the MBR's primary partition limit to

128 primary partitions

NetBIOS (Network Basic Input/Output System)

137-139 Protocol that operates at the Session layer of the OSI seven-layer model. This protocol creates and manages connections based on the names of the computers involved. Used when a WINS server tries to resolve a host name into an IP address on a Windows-based LAN

What are the minimum system requirements for 64-bit (x64) version of Microsoft Windows 8/8.1?

2 GB of system RAM Microsoft DirectX 9 graphics device with WDDM 1.0 or higher driver 20 GB of free hard disk space 1 GHz CPU with support for PAE, NX, and SSE2

Disk storage types used with MS Windows

Basic & Dynamic: Dynamic disks provide features that basic disks do not, such as the ability to create volumes that span multiple disks (spanned and striped volumes) and the ability to create fault-tolerant volumes (mirrored and RAID-5 volumes). A newly added drive is by default partitioned as a basic disk.

Configuration features listed below that can be managed through the MSConfig Boot tab

Boot logging Default OS to load in a multiboot environment Amount of hardware resources to be used by the chosen OS in a multiboot environment (e.g. the maximum amount of RAM) Safe boot options

Refresh

Built-in options added in Windows 8 enables OS reinstallation without affecting the existing user profiles and settings

A file system designed for optical media

CDFS (Compact Disc File system)

Network connections implemented with the use of a cable modem take advantage of:

Cabling that carries TV signals Coaxial cabling Shared bandwidth

The System Configuration utility in MS Windows can be launched by:

Double-clicking on the System Configuration icon shortcut in the Administrative Tools folder Typing msconfig (or msconfig.exe) in the Command Prompt and pressing Enter Pressing simultaneously the Windows and R keys, typing msconfig (or msconfig.exe) in the Run window, and pressing Enter

DHCP

Dynamic Host Configuration Protocol network management protocol used on Internet Protocol networks for automatically assigning IP addresses and other communication parameters to devices connected to the network using a client-server architecture. Runs on UDP Port 67, 68

Characteristic traits of a network switch

Forwarding decisions made in hardware (ASIC) Typically capable of connecting more network segments than bridge (more physical ports) Sometimes referred to as multiport bridge Newer and more effective type of network device in comparison to network bridge

Features of a network bridge

Forwarding decisions made in software Typically capable of connecting fewer network segments than switch (fewer physical ports) Older and less effective type of network device in comparison to network switch

Demarcation point

In telephony, the demarcation point is the point at which the public switched telephone network ends and connects with the customer's on-premises wiring.

LDAP

Lightweight Directory Access Protocol 389

Microsoft Windows components that allow system administrators to enable/disable user accounts

Local Users and Groups in Computer Management User Accounts in Control Panel

Recovery partition

Replaced removable media used for reformatting hard drives and restoring an operating system to the original factory condition

A permanent IP address assignment from a DHCP server

Reservation

A device designed to filter and transfer IP packets between dissimilar types of computer networks

Router

System Configuration utility tab containing a list of background applications that can be enabled/disabled during system startup

Services

MS Windows Administrative Tools folder applet for managing background applications

Services (services.msc)

image deployment

Simpler and less costly alternative to manual OS installation in an environment consisting of multiple hosts requiring the same configuration settings

type of VPN enables connectivity between two networks

Site-to-site

Improves network performance by dividing a given network segment into separate collision domains

Switch

Prior to Windows 8, the MSConfig Startup tab contained a list of user applications that could be enabled/disabled during system boot. The contents of this tab are not available in the MSConfig utility shipped with Windows 8/8.1/10.

True

Dynamic Host Configuration Protocol (DHCP) allows for static allocation of an IP address based on an IP-to-MAC address mapping.

True

Networked clients not residing on the same subnet as a DHCP server can still obtain an IP address from the server through a DHCP relay agent

True

Physical Address Extension (PAE) is a memory management feature that allows 32-bit CPUs to use more than 4 GB of physical memory.

True

Net accounts

Updates the user accounts database and modifies password and logon requirements for all accounts. Used to set the policy settings on local computer, such as Account policies and password policies.

Clean install

Windows installation that erases the contents of target partition

IPv4 addresses are expressed by using:

decimal numbers

Microsoft-proprietary file system optimized for flash drives

exFAT

Command used to display help information related to a specific command-line utility

help [command name] [command name] /?


Ensembles d'études connexes

Chapter 4 Patho Review Questions (from book)

View Set

Questions From Lectures + Concept Checks+ Quizzes

View Set