CPT-257-414 Operating Systems--Chapter 15, 16. 17 & 18
Live USB or Live CD
A bootable Linux USB flash drive or CD that can be used to repair system issues is known by what term, respectively?
grep
A Linux user needs to find all instances of the word admin in /var/log/auth.log.
Updates for macOS are downloaded and installed through the App Store.
A Mac user wants to update macOS and is searching Apple.com to locate update files. How are macOS updates typically obtained?
Windows Home editions do not support EFS.
A Windows 10 Home user is attempting to encrypt the contents of a folder on a volume formatted with NTFS. The user contacted you to ask why the option to encrypt the folder is disabled. What is the most likely reason the encryption option is disabled?
The file will lose all permissions.
A Windows 10 user is copying a file from the C:\data folder to the E:\data folder. The C: drive is formatted with NTFS, and the D: drive is formatted with FAT32. What happens to the permissions of the file on the D:\ drive when copied?
bootable
A Windows 10/8 recovery drive is a _____________ USB flash drive that can access Windows 10/8 repair tools. It is handy when you need to repair a computer that doesn't have an optical drive.
True
A Windows 7 system repair disc can be created using the Backup and Restore utility.
fixboot
A Windows 7/Vista command that repairs the boot sector of the system partition.
The user had previously encrypted her data files and folders using EFS.
A Windows user called the help desk to request that her local user account password be reset on her computer. The help desk technician connected to the computer using RDC and reset the password using the Network Places Wizard. After the password was reset, the user lost access to all the data files on the local HDD. Which of the following describes the most likely reason for the lost data files?
DMG
A ____________ file is a disk image file for a Mac and is similar to WIM or ISO files in Windows.
logon
A _____________ script is a list of commands stored in a script file that is performed each time a user signs in to Windows.
Set failed logon restrictions. Require strong passwords. Require user account passwords.
A company asked you help mitigate the brute force attacks carried out against its users' Windows account passwords. You successfully removed the malware responsible for the attacks You need to better secure the passwords assigned to the user accounts without limiting the system's usability. Which of the following should be included in securing the user accounts? (Select THREE.)
memory
A hard boot initializes the processor and clears ________.
$
A hidden share is a folder whose folder share name ends with a _____ symbol.
Linux
A system administrator is selecting an operating system for use by the company's research and development team. The team requires an OS that can be easily modified and changed to meet its particular requirements. Which of the following operating systems will be the best choice for the users?
Network printer
A technician is configuring the Windows computers on a network to print to a printer that is directly connected to the network via UTP cable. What term best describes this method of printer connectivity?
chown
A technician is logged in to a Linux computer as johnd and needs to reset group ownership for the file report.txt in the johnd home directory.
Click the Advanced button to open Advanced Security Settings for the file.
A technician is using the Security tab in the Properties dialog box in an attempt to remove the inherited status from a file's permissions but cannot locate where to make the change. Which of the following steps should the technician take to make this change?
The technician should be setting NTFS permissions instead of using Group Policy.
A technician wants to limit access to a group of folders and is using Group Policy to prevent the users in the sales department from accessing folders assigned to the accounting department. The technician is having difficulty achieving acceptable results. Which of the following is the most likely reason the technician is having difficulties?
Using the macOS Recovery tool
A technician wants to use a Time Machine backup to install a new copy of the macOS onto a Mac. Which of the following tools will the technician use to perform this task?
The Lock Screen timeout setting needs to be made in the AD OU GPO.
A technician, who was signed in to a Windows 10 computer as local administrator, accessed the Local Security Policy console and changed the Lock Screen timeout from 10 minutes to 60 minutes. After the technician completed the change, the user signed in to AD and discovered that the setting had reverted to 10 minutes. What can the technician do to keep the setting from reverting from 60 minutes to 10 minutes?
ps
A user is complaining about sluggish performance on her Linux system, and the technician suspects a running process is consuming excessive processor resources. Which of the following commands will the technician most likely use to locate the offending process?
soft, hard
A warm boot is also known as ____[a]_____ boot. A cold boot is also known as ____[b]_____ boot.
system
A(n) environmental variable (sometimes called a _________ variable) is information the OS makes available to a script. (one word answer)
redirection
AD is able to change a home folder location away from a user's local folder to a share on the network. This is called folder ________________.
lockout threshold
Account _____________________ sets the maximum number of failed logon attempts before the account is locked. (two word answer)
domains
Active Directory (AD) is a suite of services and databases provided by Windows Server that is used to manage Windows __________, including resource access and what users and computers can do.
Domain Services
Active Directory _______________________ (AD DS) authenticates accounts and authorizes what these accounts can do. (two word answer)
True
Administrative shares are hidden by default.
option
After Windows is installed on a Mac Computer, press and hold the _________ key when starting the computer to reach the Startup Manager.
Enable Safe Mode with Command Prompt
Allows Windows to load without the graphical interface.
Backward compatibility for legacy operating systems and applications.
An administrator is assigning Windows user accounts to user groups based on the user's role and notices the built-in Power Users group. What is the purpose of the Power Users group in Windows 7 and later?
Advanced Boot Options screen appears
As Windows 10 is loading, assuming it is enabled, what will happen when F8 is pressed?
Anonymous
As an __________________ user, you might be allowed to use File Explorer or Windows Explorer to view shared folders and files on the remote computer, but you cannot access them
source
Basic versions of LINUX OS are open source, and all the underlying programming instructions (called __________ code) are freely distributed.
dual
Boot Camp can split a partition and install Windows in the new partition for a _______ boot.
Windows
Boot Camp is a utility in macOS that allows you to install and run _________ on a Mac Computer.
Drive mapping is managed by a Windows component called the Network File System (NFS)
Drive mapping is managed by a Windows component called the ____________________________ or NFS.
%TEMP%
Executes the same commands until a condition is met
Homegroup
For Windows 8/7, when all users on a network require the same access to all resources, what simple type of network model should you use?
GRUB is the current Linux boot loader, which can handle dual boots with another OS installed on the system.
GRUB is the current Linux boot loader, which can handle dual boots with another OS installed on the system.
A rouge antivirus program
Hector is trying to use Windows Defender to run an antivirus scan. Windows Defender refuses to run. When he opens the Action Center, Hector realizes that Windows Defender has been disabled and another antivirus software is running. Hector does not recognize the other antivirus software. What type attack has infected Hector's computer?
True
If a Windows computer belongs to a domain, all security is managed by the network administrator for the entire network.
factory
If an OEM recovery partition is present, a system can be reset to its _________ state.
|
If you need to redirect the output from a command, what symbol should you use?
sfc /scannow
If you suspect corrupted system files are causing issues, what command can be run to search for and replace the corrupted files?
NetBoot
If you want to boot to a deployment server on the network to reinstall macOS from a disk image, you will use the Apple technology called _____________.
redirect virus
If your Internet home page has changed and a strange-looking search engine appears when you try to search the Internet, what type of attack are you experiencing?
True
If your problem is caused by a bad hardware or software installation and you get an error message the first time you restart the system after the installation, using the Last Known Good Configuration can, in effect, undo your installation and solve your problem.
vi editor
In Linux and macOS, this text editor works in command mode (to enter commands) or in insert mode (to edit text).
Snapshots
In macOS, ____________________ is the search app that can be configured to search the local computer.
Snapshots
In macOS, the ___________________ window functions something like File Explorer in Windows; use it to find and access files, applications, and utility programs.
Ctrl+C
In order to break out of a Linux command or process on a terminal, what keys should you press?
/Library/StartupItems and /System/Library/StartupItems
In order to ensure that a Mac has no startup items, what two directories should you check for items?
#Start
Integer
The last step in the process is to educate the user on what she can do to prevent this type of attack or issue from happening again.
Jackson has completed remediation of a virus-infected system. He eliminated all the startup program issues and uninstalled several browser add-ons. Jackson has scheduled scans to be performed daily and has run updates on Windows and the anti-malware program. He has enabled System Restore and created a new restore point. What should Jackson do to complete the malware removal process (as described in our reading)?
.sh
JavaScript file
Based on these indicators, what should Joann do with her computer? (Select all that apply.)
Joann turned on her Windows 10 computer today, and while the computer was booting up, it shut down. She restarted the computer and it booted fine but ran slowly. She opened Task Manager and noticed that her CPU was running at 98% capacity and her network at 75% capacity. When she checked to see what process was using so much network connectivity, she received a message saying that access to the process was denied. Based on these indicators, what should Joann do with her computer? (Select all that apply.) start here
A botnet
Kevin recently discovered that unknown processes are running in the background on his company's web server. During a performance review, he also noticed that the CPU is working at 80% during downtimes. Kevin believes that software is running in the background and causing the CPU to run at such a high percentage. Kevin discovers that his server along with several other computers in the company have been used to perform a DDoS on another website. What type of attack occurred?
The scope of change defines all individual responsibilities in the change plan.
Larry has participated in a change proposal for his company. During the planning stage, Larry was told that his role in the change would be small but important. In the implementation stage, Larry completed his task according to the stipulations and timeframe of the plan. However, Larry was called in five times during the change to help others complete the change process. Where in the change management process did the problem occur?
*?
Linux utilizes what two different wildcard characters at the command line?
/sbin
On Linux, where are the commands required for system administration stored?
$X
PowerShell comment
Loop
PowerShell comment
False
Programs that automatically launch at startup are called login items.
.vbs
Python script file
C:\Windows\System32\Config\RegBack
Registry files, if deleted, can be restored from those saved in what folder?
It was created by GPT to store Windows boot and startup files.
Sara installed Windows 10 for the first time on her computer. During the installation process, she noticed that a new system partition called ESP partition was created. Sara cannot access this new partition to see what it contains. What can you tell Sara about the ESP partition?
Configure logon time restrictions.
Several computers in your organization are being used from within the building after hours when the company is closed. Your manager has asked you to configure the computers to limit access to business hours. Which of the following steps can be taken to limit access to the computers?
1424
String
HKEY_LOCAL_MACHINE\HARDWARE
The kernel reads from the registry and builds into memory the registry key ______________________________________________ using information that has been collected about the hardware.
FAT32
The __________ file system can be read and written by Linux, macOS, and Windows, and is therefore the file system of choice when you are concerned with compatibility.
sudo
The _____________ (substitute user) command is used to perform a command as superuser when logged in as a normal user.
System Preferences
The ________________________ window is used to change and customize macOS settings and is similar to the Settings app in Windows 10.
defense in depth
The best protection for computer resources is layered protection. When securing a workstation, use as many layers of protection as you reasonably can that are justified by the value of the resources you are protecting. These layers are collectively called __________________________. (three word answer)
Bash
The default shell for the terminal is the ________ shell, which stands for "Bourne Again Shell"
First Aid
The macOS disk utility tool called __________________________ scans a hard drive or other storage device for file system errors and repairs them. (two word answer)
Launchpad
The macOS utility __________________ is used to launch and uninstall applications.
least privilege
The principle of _________________________ is an approach to permissions in which a user is given only the permissions required to perform her job and no more.
Share the folder or volume on the file server that will store the shared data files.
The users in the sales department need a central location on the network to share data files. All the client computers in the organization are running Windows 10 and have network and Internet connectivity. The file server that hosts the network drive for the sales department is running Windows Server 2016. Which of the following is the first step in implementing this data share?
False
There is no option for networking access when using Safe Mode.
BitLocker
This encrypts data on a USB flash drive and restricts access by requiring a password:
Enable Safe Mode
This option allows you to launch programs to help solve Windows issues without third-party drivers and software loaded.
Enable Debugging
This tool moves system boot logs from the failing computer to another computer for evaluation.
Authenticated Users
To which group does Windows give access to folders that you create which are not part of your user profile?
Use Safe Mode to boot.
Today you turned on your computer after being on vacation for a week. You see spinning white dots on a black screen. You decide that an update might be installing, so you allow the computer to work for approximately 20 minutes. After 20 minutes, you turn off your computer and then restart it, and it fails two more times. What tool should you use first to help repair your computer?
To get rid of the malware, turn off System Protection so that anti-malware software can clean the System Volume Information folder. Realize that when you turn off System Protection, all your restore points are lost, so first consider whether you might need those restore points to troubleshoot the malware infection before you disable System Protection.
Turn off System Protection when attempting to get rid of malware.
.ps1
Unix or Linux shell script file
applications
Unless you're working with a custom refresh image, Windows 8 settings and desktop _____________ are lost during a refresh.
Apple menu
Use ______________________ to put a macOS computer to sleep, log out, restart, or shut down the system.
fsmgmt.msc
Use the _____________ command to view a list of shared folders and volumes.
Enable Boot Logging
Use this option to see what did and did not load during the boot process.
Enable Low-Resolution
Use this option when the video settings don't allow you to see the screen well enough to fix a defective setting.
Guests group
User accounts that are issued a temporary user profile that is deleted when the user signs out are members of what group?
forest
Users and resources of a company or school managed by AD are organized into a _____________ (the entire enterprise)
.bat
VBScript file
"Press any key"
Variable
"sample text"
Variable
ps
What LINUX command below is used to test network connections by sending a request packet to a host?
Read Write
What NTFS permissions should you assign if the following user: create folders and files open files to read data not delete files not run programs in a folder
Lsass.exe
What Windows process is responsible for authenticating users?
starts critical services Starts the Session Manager Activates the HAL
What are some of the responsibilities of the kernel during the startup process? (Choose all that apply.)
sfc /scannow
What command can be used to check for file system errors?
bootrec /scanOS
What command can be used to scan for Windows installations not stored in the BCD?
icacls
What command can be used to take full access of a file?
diskpart
What command can be used to totally wipe a hard drive clean, including the partitioning system?
mstsc
What command launches the Remote Desktop client for Windows?
clean
What diskpart command should be used to remove volume information from a selected disk?
Error loading operating system Invalid partition table Missing operating system
What error messages are likely to appear if the BIOS/UEFI cannot find a Windows Boot Manager or cannot turn over operations to the boot manager?
It reads the settings in the BCD. The next step depends on entries in the BCD and these other factors:Option 1. For normal startups that are not dual booting, no menu appears and Boot Manager finds and launches the Windows Boot Loader program.Option 2. If the computer is set up for a dual-boot environment, Boot Manager displays the Choose an operating system screenOption 3. If Windows was previously stopped abruptly or another error occurs, the Windows Startup Menu appears to give you the option to troubleshoot the problem.
What events can occur during BootMgr's role in startup? (Choose all that apply.)
to connect to secured websites on a corporate network VPN
What is a valid reason for wanting to configure a proxy server via browser (Such as IE)?
Startup BIOS/UEFI
What is responsible for getting a system up and going and finding an OS to load?
Ntoskrnl.exe located in C:\Windows\System32
What is the file name given to the Windows kernel?
Cloner
What is the name of the macOS built-in backup utility?
End-of-life
What is the term used to designate that a particular operating system will no longer be supported by its manufacturer or managing entity?
X = 1
What is the value of X and what is the condition of the Do...Loop when execution ends in the following pseudo code?
X = 100
What is the value of X when execution ends in the following pseudocode?
F8
What key will cause the Windows Boot Manager to appear as long as it is pressed during the Windows 7 startup process?
command-option-esc
What keypress sequence is used to open the Force Quit window on a Mac?
kernel panic
What occurs when Linux or macOS encounters an error from which it cannot recover?
rights are assigned to accounts
What statement about controlling access to folders and files is accurate?
a user account can belong to only one group at a time
What statement about user accounts and groups is NOT true?
Windows Media Creation tool
What tool can you use to create a bootable flash drive in Windows 10?
chown
What two commands are used to change the permissions and ownership of a file or directory in Linux?
winresume.exe winresume.efi
What two programs are utilized when Windows resumes from hibernation, depending on the motherboard's BIOS/UEFI?
NTFS on NTFS volumes only
What type of permission should you set to control access to files and folders by local and network users?
root
What user account is known as the system administrator or superuser account?
\\server\sharedfolder
When mapping a drive, you can type in the path to the shared folder on the host computer. What is the syntax for the path?
outbound traffic can be throttled the priority is a number from 0 and 63
When using Group Policy to configure QoS, what options are available? (Choose all that apply.)
If you use both share permissions and NTFS permissions on a folder, the more restrictive permission applies.
When utilizing both share and NTFS permissions, what statement is inaccurate?
takeown, icacls
When working in Safe Mode with Command Prompt, use the _____[a]_____ command to take ownership of a system file and the ____[b]____ command to get full access to the file.
Users
When working with a workgroup, private data for an individual user is best kept in the C:\__________ folder for that user.
c:\windows\ntbtlog.txt
When you Enable Boot Logging, all files used for the load are recorded in the ______________________ file.
Windows\System32\drivers folder
Where can you go to look up a device driver's filename to determine what device uses the device driver?
C:\Windows\System32\Config
Where is the Windows system registry hive?
Smss.exe
Which file in the boot process is responsible for loading the graphical user interface and starting the client/server runtime subsystem?
macOS, Windows
Which of the following are closed source operating systems? (Select TWO)
if NTFS permissions conflict locally, the more liberal permission applies when a subfolder is created, it is assigned the permissions of its parent folder
Which of the following are true about NTFS permissions? (Choose all that apply.)
t*M&2.zY7
Which of the following best meets the requirements of a strong password?
Gestures
Which of the following describes the macOS feature that lets you use finger motions to perform functions, for example, spreading two fingers to zoom in?
TPM
Which of the following is a hardware component used to hold the BitLocker encryption key and ensures encrypted data is not accessed in the event a hard drive is lost or stolen?
Telnet does not have a common TCP port assignment, SSH does.
Which of the following is a major advantage to using SSH over Telnet for remotely accessing a Linux system?
ext4
Which of the following is the current Linux file system used to hold the operating system?
Disable AutoRun.
Which of the following security policies can be implemented to prevent removable media from automatically launching potentially harmful programs?
Account lockout threshold
Which of the following security settings can best help minimize brute force attacks on local user account passwords?
No boot device found, Hard drive not found
Which of the following text error messages can indicate that BIOS/UEFI could not find a hard drive? (Choose all that apply).
The Guest user is created automatically and disabled by default when Windows is initially installed
Which of the following user accounts are created automatically and disabled by default when Windows is installed?
The initial steps must be performed by the BIOS/UEFI
Why does a normal hard boot take longer than a normal soft boot?
1803
Windows 10 Version _________ and higher does not support homegroups.
True
Windows 10 automatically launches diagnostic and repair procedures after several restarts within a few minutes
Microsoft Edge
Windows 10 features what new web browser (be default), which is designed to replace Internet Explorer?
Mission Control
__________________________ gives you a quick view of all open windows and desktops and lets you switch among them.
True
Windows Firewall is automatically configured when you set up your security level for a new network connection.
.js
Windows PowerShell script file
hidden, lean
Windows RE is normally stored on a ____[a]____ partition on the hard drive and is a ____[b]____ operating system that can be launched to solve Windows startup problems
True
Windows RE provides a graphical and command-line interface.
.py
Windows batch file
False
Windows can read from storage devices that are using the APFS.
9
Windows environment variable
Take ownership of the folder and then change permissions.
You are having difficulty changing permissions for a folder on an NTFS volume that was created by another user. How can you best solve this issue without losing data in the folder?
Lengthen the time period between forced password changes.
You have been tasked with training end users in security best practices and have observed a trend among users in which many are writing down their passwords. Which of the following procedures can be implemented to provide enough security to protect resources while minimizing the need for users to write down their passwords?
Enable the supervisor password in the BIOS/UEFI setup.
You have received several trouble tickets from the employees in the warehouse for the stand-alone computers used to control various shipping machines because the computers are not booting when powered. Each time a technician resolves the booting issue the boot order is changed in the firmware. Each computer is required to have the USB ports disabled in the firmware to keep employees from connecting rogue devices. Which of the following steps should be taken to eliminate these trouble tickets?
reset
You might want to perform a Windows 8 ___________ when you're about to give away a computer, recycle it, or totally want to start over.
BitLocker
You need to secure your Windows 7 computer in a way that prevents access to the entire HDD even if the drive is moved to another system. Which solution will you implement?
Line number 3
You opened a batch file in Notepad and are observing the following lines. (The line numbers are for reference only.) ECHO This batch file deletes the temp files DEL %TEMP%\*.* /Q REM The temp files were deleted PAUSE Which of the lines is a comment?
Disable the account until the employee is ready to use it.
You recently created several new user accounts in the Sales OU and configured them with the appropriate group membership, logon scripts, and printer access. Except for one new sales employee, all employees are actively using the account. The remaining employee will be using the account within the next two weeks. What is best practice for the remaining unused account?
cable lock
Your company CEO is traveling on vacation (without electronics) and is worried that his laptop will be taken from his office. Which type of device will ensure that the laptop will not be stolen while he travels?
Inherited permissions
Your computer has a single HDD formatted with NTFS with the following data folders:C:\DocumentsC:\Pictures You create a new child folder under the C:\Documents folder. What term describes the permissions the new folder automatically attains from the C:\Documents folder?
Configure Group Policy to run a logon script.
Your organization recently deployed a Windows domain controller with Active Directory. All the domain OU users need to run the same script file each time they sign in to Windows. How can the settings be configured with the least effort by the admin?
Repair upgrade
Zach wants to install Windows 10 over his existing copy of Windows 10. He wants to keep his personal files, apps, and Windows settings. He currently has a USB drive with a Windows 10 ISO. What type of installation will you recommend for Zach?
Privileges are assigned to an account, and permissions are assigned to data files and folders.
________[a]________ are assigned to an account, and ________[b]_________ are assigned to data files and folders.
Keychain
_________________ is the macOS built-in password manager utility. (one word answer)
Phishing
_____________________ is a type of identity theft in which the sender of an email hoax scams you into responding with personal data about yourself.
Screen Sharing
______________________________ is a macOS utility to remotely view and control another Mac; it is similar to Remote Desktop in Windows. (two word answer)
diskpart
a command to manage hard drives, partitions, and volumes.
Windows Recovery Environment (RE)
a lean operating system that can be used to troubleshoot problems when Windows refuses to start
POST (power-on self test)
a self-diagnostic program used to perform a simple test of the CPU, RAM, and various I/O devices
Boot Configuration Data (BCD) store
a small Windows database structured the same as a registry file and contains configuration information about how Windows is started
gpedit.msc
a subset of policies in Group Policy that applies only to the local computer or local user
secpol.msc
a subset of policies in Local Group Policy that applies only to a local computer's Windows security settings.
acceptable violations
an ____[a]_____ use policy (AUP), explains what users can and cannot do on the corporate network or with company data and explains the penalties for _____[b]_____.
wpeinit
enable networking
EFI System Parition (ESP)
for a GPT hard drive, the bootable partition used to boot the OS and contains the boot manager program for the OS
Windows Boot Manager (BootMgr)
in Windows 8/7/Vista, the program responsible for loading Windows.
proprietary
macOS, formally called Mac OS X, is a ___________________ operating system that is only available for Macintosh computers by Apple Inc. (one word answer)
bcdedit
manually edit the BCD
inherited permissions
permissions assigned by Windows that are attained from a parent object
Last Known Good Configuration
registry settings and device drivers that were in effect when the computer was last logged into successfully
chkdsk
repair a drive
bootsect
repair a dual boot system
bootrec
repair the BCD and boot sectors
cold boot
restarts the computer by turning off the power or by pressing the Reset button
administrative shares
the folders that are shared by default on a network domain that administrator accounts can access
soft boot
to restart a PC without turning off the power