CPT-257-414 Operating Systems--Chapter 15, 16. 17 & 18

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Live USB or Live CD

A bootable Linux USB flash drive or CD that can be used to repair system issues is known by what term, respectively?

grep

A Linux user needs to find all instances of the word admin in /var/log/auth.log.

Updates for macOS are downloaded and installed through the App Store.

A Mac user wants to update macOS and is searching Apple.com to locate update files. How are macOS updates typically obtained?

Windows Home editions do not support EFS.

A Windows 10 Home user is attempting to encrypt the contents of a folder on a volume formatted with NTFS. The user contacted you to ask why the option to encrypt the folder is disabled. What is the most likely reason the encryption option is disabled?

The file will lose all permissions.

A Windows 10 user is copying a file from the C:\data folder to the E:\data folder. The C: drive is formatted with NTFS, and the D: drive is formatted with FAT32. What happens to the permissions of the file on the D:\ drive when copied?

bootable

A Windows 10/8 recovery drive is a _____________ USB flash drive that can access Windows 10/8 repair tools. It is handy when you need to repair a computer that doesn't have an optical drive.

True

A Windows 7 system repair disc can be created using the Backup and Restore utility.

fixboot

A Windows 7/Vista command that repairs the boot sector of the system partition.

The user had previously encrypted her data files and folders using EFS.

A Windows user called the help desk to request that her local user account password be reset on her computer. The help desk technician connected to the computer using RDC and reset the password using the Network Places Wizard. After the password was reset, the user lost access to all the data files on the local HDD. Which of the following describes the most likely reason for the lost data files?

DMG

A ____________ file is a disk image file for a Mac and is similar to WIM or ISO files in Windows.

logon

A _____________ script is a list of commands stored in a script file that is performed each time a user signs in to Windows.

Set failed logon restrictions. Require strong passwords. Require user account passwords.

A company asked you help mitigate the brute force attacks carried out against its users' Windows account passwords. You successfully removed the malware responsible for the attacks You need to better secure the passwords assigned to the user accounts without limiting the system's usability. Which of the following should be included in securing the user accounts? (Select THREE.)

memory

A hard boot initializes the processor and clears ________.

$

A hidden share is a folder whose folder share name ends with a _____ symbol.

Linux

A system administrator is selecting an operating system for use by the company's research and development team. The team requires an OS that can be easily modified and changed to meet its particular requirements. Which of the following operating systems will be the best choice for the users?

Network printer

A technician is configuring the Windows computers on a network to print to a printer that is directly connected to the network via UTP cable. What term best describes this method of printer connectivity?

chown

A technician is logged in to a Linux computer as johnd and needs to reset group ownership for the file report.txt in the johnd home directory.

Click the Advanced button to open Advanced Security Settings for the file.

A technician is using the Security tab in the Properties dialog box in an attempt to remove the inherited status from a file's permissions but cannot locate where to make the change. Which of the following steps should the technician take to make this change?

The technician should be setting NTFS permissions instead of using Group Policy.

A technician wants to limit access to a group of folders and is using Group Policy to prevent the users in the sales department from accessing folders assigned to the accounting department. The technician is having difficulty achieving acceptable results. Which of the following is the most likely reason the technician is having difficulties?

Using the macOS Recovery tool

A technician wants to use a Time Machine backup to install a new copy of the macOS onto a Mac. Which of the following tools will the technician use to perform this task?

The Lock Screen timeout setting needs to be made in the AD OU GPO.

A technician, who was signed in to a Windows 10 computer as local administrator, accessed the Local Security Policy console and changed the Lock Screen timeout from 10 minutes to 60 minutes. After the technician completed the change, the user signed in to AD and discovered that the setting had reverted to 10 minutes. What can the technician do to keep the setting from reverting from 60 minutes to 10 minutes?

ps

A user is complaining about sluggish performance on her Linux system, and the technician suspects a running process is consuming excessive processor resources. Which of the following commands will the technician most likely use to locate the offending process?

soft, hard

A warm boot is also known as ____[a]_____ boot. A cold boot is also known as ____[b]_____ boot.

system

A(n) environmental variable (sometimes called a _________ variable) is information the OS makes available to a script. (one word answer)

redirection

AD is able to change a home folder location away from a user's local folder to a share on the network. This is called folder ________________.

lockout threshold

Account _____________________ sets the maximum number of failed logon attempts before the account is locked. (two word answer)

domains

Active Directory (AD) is a suite of services and databases provided by Windows Server that is used to manage Windows __________, including resource access and what users and computers can do.

Domain Services

Active Directory _______________________ (AD DS) authenticates accounts and authorizes what these accounts can do. (two word answer)

True

Administrative shares are hidden by default.

option

After Windows is installed on a Mac Computer, press and hold the _________ key when starting the computer to reach the Startup Manager.

Enable Safe Mode with Command Prompt

Allows Windows to load without the graphical interface.

Backward compatibility for legacy operating systems and applications.

An administrator is assigning Windows user accounts to user groups based on the user's role and notices the built-in Power Users group. What is the purpose of the Power Users group in Windows 7 and later?

Advanced Boot Options screen appears

As Windows 10 is loading, assuming it is enabled, what will happen when F8 is pressed?

Anonymous

As an __________________ user, you might be allowed to use File Explorer or Windows Explorer to view shared folders and files on the remote computer, but you cannot access them

source

Basic versions of LINUX OS are open source, and all the underlying programming instructions (called __________ code) are freely distributed.

dual

Boot Camp can split a partition and install Windows in the new partition for a _______ boot.

Windows

Boot Camp is a utility in macOS that allows you to install and run _________ on a Mac Computer.

Drive mapping is managed by a Windows component called the Network File System (NFS)

Drive mapping is managed by a Windows component called the ____________________________ or NFS.

%TEMP%

Executes the same commands until a condition is met

Homegroup

For Windows 8/7, when all users on a network require the same access to all resources, what simple type of network model should you use?

GRUB is the current Linux boot loader, which can handle dual boots with another OS installed on the system.

GRUB is the current Linux boot loader, which can handle dual boots with another OS installed on the system.

A rouge antivirus program

Hector is trying to use Windows Defender to run an antivirus scan. Windows Defender refuses to run. When he opens the Action Center, Hector realizes that Windows Defender has been disabled and another antivirus software is running. Hector does not recognize the other antivirus software. ​ What type attack has infected Hector's computer?

True

If a Windows computer belongs to a domain, all security is managed by the network administrator for the entire network.

factory

If an OEM recovery partition is present, a system can be reset to its _________ state.

|

If you need to redirect the output from a command, what symbol should you use?

sfc /scannow

If you suspect corrupted system files are causing issues, what command can be run to search for and replace the corrupted files?

NetBoot

If you want to boot to a deployment server on the network to reinstall macOS from a disk image, you will use the Apple technology called _____________.

redirect virus

If your Internet home page has changed and a strange-looking search engine appears when you try to search the Internet, what type of attack are you experiencing?

True

If your problem is caused by a bad hardware or software installation and you get an error message the first time you restart the system after the installation, using the Last Known Good Configuration can, in effect, undo your installation and solve your problem.

vi editor

In Linux and macOS, this text editor works in command mode (to enter commands) or in insert mode (to edit text).

Snapshots

In macOS, ____________________ is the search app that can be configured to search the local computer.

Snapshots

In macOS, the ___________________ window functions something like File Explorer in Windows; use it to find and access files, applications, and utility programs.

Ctrl+C

In order to break out of a Linux command or process on a terminal, what keys should you press?

/Library/StartupItems and /System/Library/StartupItems

In order to ensure that a Mac has no startup items, what two directories should you check for items?

#Start

Integer

The last step in the process is to educate the user on what she can do to prevent this type of attack or issue from happening again.

Jackson has completed remediation of a virus-infected system. He eliminated all the startup program issues and uninstalled several browser add-ons. Jackson has scheduled scans to be performed daily and has run updates on Windows and the anti-malware program. He has enabled System Restore and created a new restore point. What should Jackson do to complete the malware removal process (as described in our reading)?

.sh

JavaScript file

Based on these indicators, what should Joann do with her computer? (Select all that apply.)

Joann turned on her Windows 10 computer today, and while the computer was booting up, it shut down. She restarted the computer and it booted fine but ran slowly. She opened Task Manager and noticed that her CPU was running at 98% capacity and her network at 75% capacity. When she checked to see what process was using so much network connectivity, she received a message saying that access to the process was denied. Based on these indicators, what should Joann do with her computer? (Select all that apply.) start here

A botnet

Kevin recently discovered that unknown processes are running in the background on his company's web server. During a performance review, he also noticed that the CPU is working at 80% during downtimes. Kevin believes that software is running in the background and causing the CPU to run at such a high percentage. Kevin discovers that his server along with several other computers in the company have been used to perform a DDoS on another website. What type of attack occurred?

The scope of change defines all individual responsibilities in the change plan.

Larry has participated in a change proposal for his company. During the planning stage, Larry was told that his role in the change would be small but important. In the implementation stage, Larry completed his task according to the stipulations and timeframe of the plan. However, Larry was called in five times during the change to help others complete the change process. Where in the change management process did the problem occur?

*?

Linux utilizes what two different wildcard characters at the command line?

/sbin

On Linux, where are the commands required for system administration stored?

$X

PowerShell comment

Loop

PowerShell comment

False

Programs that automatically launch at startup are called login items.

.vbs

Python script file

C:\Windows\System32\Config\RegBack

Registry files, if deleted, can be restored from those saved in what folder?

It was created by GPT to store Windows boot and startup files.

Sara installed Windows 10 for the first time on her computer. During the installation process, she noticed that a new system partition called ESP partition was created. Sara cannot access this new partition to see what it contains. What can you tell Sara about the ESP partition?

Configure logon time restrictions.

Several computers in your organization are being used from within the building after hours when the company is closed. Your manager has asked you to configure the computers to limit access to business hours. Which of the following steps can be taken to limit access to the computers?

1424

String

HKEY_LOCAL_MACHINE\HARDWARE

The kernel reads from the registry and builds into memory the registry key ______________________________________________ using information that has been collected about the hardware.

FAT32

The __________ file system can be read and written by Linux, macOS, and Windows, and is therefore the file system of choice when you are concerned with compatibility.

sudo

The _____________ (substitute user) command is used to perform a command as superuser when logged in as a normal user.

System Preferences

The ________________________ window is used to change and customize macOS settings and is similar to the Settings app in Windows 10.

defense in depth

The best protection for computer resources is layered protection. When securing a workstation, use as many layers of protection as you reasonably can that are justified by the value of the resources you are protecting. These layers are collectively called __________________________. (three word answer)

Bash

The default shell for the terminal is the ________ shell, which stands for "Bourne Again Shell"

First Aid

The macOS disk utility tool called __________________________ scans a hard drive or other storage device for file system errors and repairs them. (two word answer)

Launchpad

The macOS utility __________________ is used to launch and uninstall applications.

least privilege

The principle of _________________________ is an approach to permissions in which a user is given only the permissions required to perform her job and no more.

Share the folder or volume on the file server that will store the shared data files.

The users in the sales department need a central location on the network to share data files. All the client computers in the organization are running Windows 10 and have network and Internet connectivity. The file server that hosts the network drive for the sales department is running Windows Server 2016. Which of the following is the first step in implementing this data share?

False

There is no option for networking access when using Safe Mode.

BitLocker

This encrypts data on a USB flash drive and restricts access by requiring a password:

Enable Safe Mode

This option allows you to launch programs to help solve Windows issues without third-party drivers and software loaded.

Enable Debugging

This tool moves system boot logs from the failing computer to another computer for evaluation.

Authenticated Users

To which group does Windows give access to folders that you create which are not part of your user profile?

Use Safe Mode to boot.

Today you turned on your computer after being on vacation for a week. You see spinning white dots on a black screen. You decide that an update might be installing, so you allow the computer to work for approximately 20 minutes. After 20 minutes, you turn off your computer and then restart it, and it fails two more times. What tool should you use first to help repair your computer?

To get rid of the malware, turn off System Protection so that anti-malware software can clean the System Volume Information folder. Realize that when you turn off System Protection, all your restore points are lost, so first consider whether you might need those restore points to troubleshoot the malware infection before you disable System Protection.

Turn off System Protection when attempting to get rid of malware.

.ps1

Unix or Linux shell script file

applications

Unless you're working with a custom refresh image, Windows 8 settings and desktop _____________ are lost during a refresh.

Apple menu

Use ______________________ to put a macOS computer to sleep, log out, restart, or shut down the system.

fsmgmt.msc

Use the _____________ command to view a list of shared folders and volumes.

Enable Boot Logging

Use this option to see what did and did not load during the boot process.

Enable Low-Resolution

Use this option when the video settings don't allow you to see the screen well enough to fix a defective setting.

Guests group

User accounts that are issued a temporary user profile that is deleted when the user signs out are members of what group?

forest

Users and resources of a company or school managed by AD are organized into a _____________ (the entire enterprise)

.bat

VBScript file

"Press any key"

Variable

"sample text"

Variable

ps

What LINUX command below is used to test network connections by sending a request packet to a host?

Read Write

What NTFS permissions should you assign if the following user: create folders and files open files to read data not delete files not run programs in a folder

Lsass.exe

What Windows process is responsible for authenticating users?

starts critical services Starts the Session Manager Activates the HAL

What are some of the responsibilities of the kernel during the startup process? (Choose all that apply.)

sfc /scannow

What command can be used to check for file system errors?

bootrec /scanOS

What command can be used to scan for Windows installations not stored in the BCD?

icacls

What command can be used to take full access of a file?

diskpart

What command can be used to totally wipe a hard drive clean, including the partitioning system?

mstsc

What command launches the Remote Desktop client for Windows?

clean

What diskpart command should be used to remove volume information from a selected disk?

Error loading operating system Invalid partition table Missing operating system

What error messages are likely to appear if the BIOS/UEFI cannot find a Windows Boot Manager or cannot turn over operations to the boot manager?

It reads the settings in the BCD. The next step depends on entries in the BCD and these other factors:Option 1. For normal startups that are not dual booting, no menu appears and Boot Manager finds and launches the Windows Boot Loader program.Option 2. If the computer is set up for a dual-boot environment, Boot Manager displays the Choose an operating system screenOption 3. If Windows was previously stopped abruptly or another error occurs, the Windows Startup Menu appears to give you the option to troubleshoot the problem.

What events can occur during BootMgr's role in startup? (Choose all that apply.)

to connect to secured websites on a corporate network VPN

What is a valid reason for wanting to configure a proxy server via browser (Such as IE)?

Startup BIOS/UEFI

What is responsible for getting a system up and going and finding an OS to load?

Ntoskrnl.exe located in C:\Windows\System32

What is the file name given to the Windows kernel?

Cloner

What is the name of the macOS built-in backup utility?

End-of-life

What is the term used to designate that a particular operating system will no longer be supported by its manufacturer or managing entity?

X = 1

What is the value of X and what is the condition of the Do...Loop when execution ends in the following pseudo code?

X = 100

What is the value of X when execution ends in the following pseudocode?

F8

What key will cause the Windows Boot Manager to appear as long as it is pressed during the Windows 7 startup process?

command-option-esc

What keypress sequence is used to open the Force Quit window on a Mac?

kernel panic

What occurs when Linux or macOS encounters an error from which it cannot recover?

rights are assigned to accounts

What statement about controlling access to folders and files is accurate?

a user account can belong to only one group at a time

What statement about user accounts and groups is NOT true?

Windows Media Creation tool

What tool can you use to create a bootable flash drive in Windows 10?

chown

What two commands are used to change the permissions and ownership of a file or directory in Linux?

winresume.exe winresume.efi

What two programs are utilized when Windows resumes from hibernation, depending on the motherboard's BIOS/UEFI?

NTFS on NTFS volumes only

What type of permission should you set to control access to files and folders by local and network users?

root

What user account is known as the system administrator or superuser account?

\\server\sharedfolder

When mapping a drive, you can type in the path to the shared folder on the host computer. What is the syntax for the path?

outbound traffic can be throttled the priority is a number from 0 and 63

When using Group Policy to configure QoS, what options are available? (Choose all that apply.)

If you use both share permissions and NTFS permissions on a folder, the more restrictive permission applies.

When utilizing both share and NTFS permissions, what statement is inaccurate?

takeown, icacls

When working in Safe Mode with Command Prompt, use the _____[a]_____ command to take ownership of a system file and the ____[b]____ command to get full access to the file.

Users

When working with a workgroup, private data for an individual user is best kept in the C:\__________ folder for that user.

c:\windows\ntbtlog.txt

When you Enable Boot Logging, all files used for the load are recorded in the ______________________ file.

Windows\System32\drivers folder

Where can you go to look up a device driver's filename to determine what device uses the device driver?

C:\Windows\System32\Config

Where is the Windows system registry hive?

Smss.exe

Which file in the boot process is responsible for loading the graphical user interface and starting the client/server runtime subsystem?

macOS, Windows

Which of the following are closed source operating systems? (Select TWO)

if NTFS permissions conflict locally, the more liberal permission applies when a subfolder is created, it is assigned the permissions of its parent folder

Which of the following are true about NTFS permissions? (Choose all that apply.)

t*M&2.zY7

Which of the following best meets the requirements of a strong password?

Gestures

Which of the following describes the macOS feature that lets you use finger motions to perform functions, for example, spreading two fingers to zoom in?

TPM

Which of the following is a hardware component used to hold the BitLocker encryption key and ensures encrypted data is not accessed in the event a hard drive is lost or stolen?

Telnet does not have a common TCP port assignment, SSH does.

Which of the following is a major advantage to using SSH over Telnet for remotely accessing a Linux system?

ext4

Which of the following is the current Linux file system used to hold the operating system?

Disable AutoRun.

Which of the following security policies can be implemented to prevent removable media from automatically launching potentially harmful programs?

Account lockout threshold

Which of the following security settings can best help minimize brute force attacks on local user account passwords?

No boot device found, Hard drive not found

Which of the following text error messages can indicate that BIOS/UEFI could not find a hard drive? (Choose all that apply).

The Guest user is created automatically and disabled by default when Windows is initially installed

Which of the following user accounts are created automatically and disabled by default when Windows is installed?

The initial steps must be performed by the BIOS/UEFI

Why does a normal hard boot take longer than a normal soft boot?

1803

Windows 10 Version _________ and higher does not support homegroups.

True

Windows 10 automatically launches diagnostic and repair procedures after several restarts within a few minutes

Microsoft Edge

Windows 10 features what new web browser (be default), which is designed to replace Internet Explorer?

Mission Control

__________________________ gives you a quick view of all open windows and desktops and lets you switch among them.

True

Windows Firewall is automatically configured when you set up your security level for a new network connection.

.js

Windows PowerShell script file

hidden, lean

Windows RE is normally stored on a ____[a]____ partition on the hard drive and is a ____[b]____ operating system that can be launched to solve Windows startup problems

True

Windows RE provides a graphical and command-line interface.

.py

Windows batch file

False

Windows can read from storage devices that are using the APFS.

9

Windows environment variable

Take ownership of the folder and then change permissions.

You are having difficulty changing permissions for a folder on an NTFS volume that was created by another user. How can you best solve this issue without losing data in the folder?

Lengthen the time period between forced password changes.

You have been tasked with training end users in security best practices and have observed a trend among users in which many are writing down their passwords. Which of the following procedures can be implemented to provide enough security to protect resources while minimizing the need for users to write down their passwords?

Enable the supervisor password in the BIOS/UEFI setup.

You have received several trouble tickets from the employees in the warehouse for the stand-alone computers used to control various shipping machines because the computers are not booting when powered. Each time a technician resolves the booting issue the boot order is changed in the firmware. Each computer is required to have the USB ports disabled in the firmware to keep employees from connecting rogue devices. Which of the following steps should be taken to eliminate these trouble tickets?

reset

You might want to perform a Windows 8 ___________ when you're about to give away a computer, recycle it, or totally want to start over.

BitLocker

You need to secure your Windows 7 computer in a way that prevents access to the entire HDD even if the drive is moved to another system. Which solution will you implement?

Line number 3

You opened a batch file in Notepad and are observing the following lines. (The line numbers are for reference only.) ECHO This batch file deletes the temp files DEL %TEMP%\*.* /Q REM The temp files were deleted PAUSE Which of the lines is a comment?

Disable the account until the employee is ready to use it.

You recently created several new user accounts in the Sales OU and configured them with the appropriate group membership, logon scripts, and printer access. Except for one new sales employee, all employees are actively using the account. The remaining employee will be using the account within the next two weeks. What is best practice for the remaining unused account?

cable lock

Your company CEO is traveling on vacation (without electronics) and is worried that his laptop will be taken from his office. Which type of device will ensure that the laptop will not be stolen while he travels?

Inherited permissions

Your computer has a single HDD formatted with NTFS with the following data folders:C:\DocumentsC:\Pictures You create a new child folder under the C:\Documents folder. What term describes the permissions the new folder automatically attains from the C:\Documents folder?

Configure Group Policy to run a logon script.

Your organization recently deployed a Windows domain controller with Active Directory. All the domain OU users need to run the same script file each time they sign in to Windows. How can the settings be configured with the least effort by the admin?

Repair upgrade

Zach wants to install Windows 10 over his existing copy of Windows 10. He wants to keep his personal files, apps, and Windows settings. He currently has a USB drive with a Windows 10 ISO. What type of installation will you recommend for Zach?

Privileges are assigned to an account, and permissions are assigned to data files and folders.

________[a]________ are assigned to an account, and ________[b]_________ are assigned to data files and folders.

Keychain

_________________ is the macOS built-in password manager utility. (one word answer)

Phishing

_____________________ is a type of identity theft in which the sender of an email hoax scams you into responding with personal data about yourself.

Screen Sharing

______________________________ is a macOS utility to remotely view and control another Mac; it is similar to Remote Desktop in Windows. (two word answer)

diskpart

a command to manage hard drives, partitions, and volumes.

Windows Recovery Environment (RE)

a lean operating system that can be used to troubleshoot problems when Windows refuses to start

POST (power-on self test)

a self-diagnostic program used to perform a simple test of the CPU, RAM, and various I/O devices

Boot Configuration Data (BCD) store

a small Windows database structured the same as a registry file and contains configuration information about how Windows is started

gpedit.msc

a subset of policies in Group Policy that applies only to the local computer or local user

secpol.msc

a subset of policies in Local Group Policy that applies only to a local computer's Windows security settings.

acceptable violations

an ____[a]_____ use policy (AUP), explains what users can and cannot do on the corporate network or with company data and explains the penalties for _____[b]_____.

wpeinit

enable networking

EFI System Parition (ESP)

for a GPT hard drive, the bootable partition used to boot the OS and contains the boot manager program for the OS

Windows Boot Manager (BootMgr)

in Windows 8/7/Vista, the program responsible for loading Windows.

proprietary

macOS, formally called Mac OS X, is a ___________________ operating system that is only available for Macintosh computers by Apple Inc. (one word answer)

bcdedit

manually edit the BCD

inherited permissions

permissions assigned by Windows that are attained from a parent object

Last Known Good Configuration

registry settings and device drivers that were in effect when the computer was last logged into successfully

chkdsk

repair a drive

bootsect

repair a dual boot system

bootrec

repair the BCD and boot sectors

cold boot

restarts the computer by turning off the power or by pressing the Reset button

administrative shares

the folders that are shared by default on a network domain that administrator accounts can access

soft boot

to restart a PC without turning off the power


Ensembles d'études connexes

CIS intro cybersec Final ch. 5, 7, 9, 10

View Set

NUT 121 (nice name) [CHAPTER 1-4]

View Set

phil 110: socratic method of thinking

View Set

Universal Law of Gravitation / Quiz

View Set

Capitulo 2 Ambiente y Sustentabilidad

View Set

Chapter 4 Gene Expression: 3D Animation, LS7A Midterm 2 Learning Objectives + Chapter 3 Quiz 1, 2, 3

View Set

Baking and Pastry Arts - Pies and Tarts

View Set