ITN 106 Final Study

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

You are running a web server app in Ubuntu Server. Users complain that their browsers are loading webpages with errors. Where are you likely to find the log file where the web server reports its errors?

/var/log

Which of the following best describes a variable when implemented in a script?

A container for storing data values that can be assigned, referenced, and manipulated.

What tool is best to use when destroying data on an SSD?

ATA Secure Erase

Derek's supervisor is concerned that the company's security system does not comply with the new standards the company has decided to employ. She has asked Derek to determine how members of the company are authenticated on the network. What does the computer or server use to verify the access to a specific resource on the network?

Access control list

Enable Safe Mode with Command Prompt

Allows Windows to load without the graphical interface.

Under the Advanced Options screen, what startup option should be enabled in order to view what did and did not load during the bootup?

Boot Logging

An error message is displayed during Windows startup about a service that has failed to start, and then the system locks up. You try to boot into Safe Mode, but get the same error message. What do you try next?

Boot to Windows RE and perform a startup repair.

James travels for business and is always worried that his laptop will be taken from his room. Which type of device will ensure that James's laptop will not be stolen while he travels?

Cable lock

Among the following, which is the best protection against ransomware?

Carbonite

What is the best way to determine if an email message warning about a virus is a hoax?

Check websites that track virus hoaxes.

A technician is using the Security tab in the Properties dialog box in an attempt to remove the inherited status from a file's permissions but cannot locate where to make the change. Which of the following steps should the technician take to make this change?

Click the Advanced button to open Advanced Security Settings for the file.

Where in Group Policy can you locate the policy that requires a smart card to be used to authenticate a user to Windows?

Computer Configuration, Windows Settings, Security Settings, Local Policies, Security Options

Your organization recently deployed a Windows domain controller with Active Directory. All the domain OU users need to run the same script file each time they sign in to Windows. How can the settings be configured with the least effort by the admin?

Configure Group Policy to run a logon script.

Which of the following is a hardware component used to hold the BitLocker encryption key and ensures encrypted data is not accessed in the event a hard drive is lost or stolen?

TPM

Enable Boot Logging

Use this option to see what did and did not load during the boot

As a computer starts up, you see an error message about a missing operating system. At what point in startup does this error occur?

When BIOS/UEFI is searching for an OS using devices listed in the boot priority order.

When a driver is giving problems in Windows 10, which tool offers the least intrusive solution?

Device Manager

You have set up a user group named Accounting and have put all employees in the Accounting department in this group, which has been given permission to use the Financial folder on a file server. You are now asked to create a subfolder under Financial named Payroll. Megan, the payroll officer, is the only employee in the Accounting department allowed to access this folder. What is the best way to configure the new share?

Create a new user group named Payroll, put Megan in the group, and assign the group read/write permissions to the Payroll folder.

1424

Integer

9

Integer

#Start

PowerShell comment

What type of employee badge does not have to be swiped by a card reader in order to allow the employee through a door?

RFID badge

The computer that you are working on is not able to complete a Windows update. The update process begins to download the file, but then you receive an error message saying that the Windows update was unable to download. You have checked your Internet connection, and it is working. You have tried the update on your other computer, and it worked. What should you do first to fix the problem with the Windows update?

Remove malware

Which of the following security policies can be implemented to prevent removable media from automatically launching potentially harmful programs?

Disable AutoRun

You recently created several new user accounts in the Sales OU and configured them with the appropriate group membership, logon scripts, and printer access. Except for one new sales employee, all employees are actively using the account. The remaining employee will be using the account within the next two weeks. What is best practice for the remaining unused account?

Disable the account until the employee is ready to use it.

Jackson has completed remediation of a virus-infected system. He eliminated all the startup program issues and uninstalled several browser add-ons. Jackson has scheduled scans to be performed daily and has run updates on Windows and the anti-malware program. He has enabled System Restore and created a new restore point. What should Jackson do to complete the malware removal process?

Educate the end user

James's computer is not booting properly. The computer begins to boot and then just stops and restarts. After the third restart, the computer attempts to repair the computer using Startup Repair. Startup Repair does not seem to work. Instead the computer asks you to choose an option from the Startup Settings screen. James has followed the Troubleshoot screen to the Startup Settings screen and clicked Restart. What setting in the Startup Settings screen will enable James to see which driver might be failing and causing his computer not to boot?

Enable Boot Logging

Your company's email server has been filling up employee's email boxes with advertisements they did not request. You have been asked to research how to stop these types of messages from getting to your coworker's email client software. What will you recommend to your supervisor?

Enable the spam filter

In the previous question, your friend is having problems finding the bootmgr file and asks for your help. What is your best response?

Explain to your friend that performing a startup repair is a better option.

You work in the Accounting department and have been using a network drive to post Excel workbook files to your file server as you complete them. When you attempt to save a workbook file to the drive, you see the error message: "You do not have access to the folder 'J:\'. See your administrator for access to this folder." What should you do first? Second? Explain the reasoning behind your choices.

First: Check File Explorer to verify that you can connect to the network. Second: Save the workbook file to your hard drive.

A scanner connected to your Mac is giving problems and you suspect corrupted device drivers. What should you do first? Second?

First: Download and install drivers from the scanner manufacturer. Second: Update macOS

You are seeing multiple errors about device drivers failing to launch at startup. Of the following, which is the best option to try first? Second?

First: Perform a startup repair. Second: Restore the SYSTEM hive from backup

If you are having a problem with a driver, which of the following should you try first? Second?

First: Update the driver Second: Update Windows

What is the first thing you should do when you discover a computer is infected with malware? The second thing?

First: Update the installed anti-malware software. Second: Quarantine the computer.

When error messages indicate that the Windows registry is corrupted and you cannot boot from the hard drive, what tool or method is the first best option to fix the problem? The second best option?

First: Use bootable media to launch Windows RE and perform a startup repair. Second: Use bootable media to launch Windows RE and use System Restore to apply a restore point.

You sign in to your personal computer with your Microsoft account and then you want to set up your computer as a trusted device to make changes to the account settings. Microsoft sends a code to your cell phone in a text message. You enter the code on a Windows screen. This type of authentication is called:

Multifactor authentication

Which security features are available on Windows 10 Home? Select all that apply.

NTFS permissions Internet Options

Which of the following is true about NTFS permissions and share permissions? Select all that apply.

NTFS permissions work only on an NTFS volume.

A technician needs to boot macOS over the network using an image stored on a server. What Apple technology will best assist the technician?

NetBoot

Becky has been assigned to help with a major change to her company's accounts database. During the time of the change, Becky notices that her task will need to be modified to complete the change. Instead of telling her supervisor, she determines that the minor detail must have been overlooked and fixes what she believes is the problem. The minor detail that Becky did not tell her supervisor causes the change to fail. What is Becky's mistake called?

Out of scope modification

At a restaurant, you overhear people discussing an interesting case they treated while working in a dental office that day. Which type of regulated data policies are most likely to have been violated?

PHI

Alexandria works for a non-for-profit company that asks for donations to help the homeless people in her community. Recently the database that holds all the contact information about the donners was hacked, and all the data was copied. hat type of data was taken?

PII

When setting up OUs in a new domain, why might it be useful to put all computers in one OU and all users in another?

Policies generally apply to either computers or users.

Stop errors happen when which type of processes encounter an error?

Processes created by Windows components running in kernel mode

Which type of server can function as a firewall?

Proxy server

As a bank employee, you often work from home and remotely access a file server on the bank's network to correct errors in financial data. Which of the following services is most likely the one you are using to authenticate to the network and track what you do on the network?

RADIUS

A virus has attacked your hard drive. Instead of seeing the Windows Start screen when you start up Windows, the system freezes and you see a blue screen of death. You have important document files on the drive that are not backed up and you cannot afford to lose. What do you do first? Explain why this is your first choice.

Remove the hard drive from the computer case and install it in another computer.

Zach wants to install Windows 10 over his existing copy of Windows 10. He wants to keep his personal files, apps, and Windows settings but freshen up all Windows components. He currently has a USB drive with a Windows 10 ISO. What type of installation will you recommend for Zach?

Repair upgrade

A company asked you to help mitigate the brute force attacks carried out against its users' Windows account passwords. You successfully removed the malware responsible for the attacks and need to better secure the passwords assigned to the user accounts without limiting the system's usability. Which of the following should be included in securing the user accounts? (Select THREE.)

Require user account passwords Require strong passwords Set failed logon restrictions

Your boss asks you to work through the weekend to install new software on the applications server that serves up applications to 20 users. The following Monday, all users report they cannot open their data files. After speaking with technical support for the new application, you discover it is not compatible with the old data files. Which type of documentation should you refer to first to address this problem?

Risk analysis documents

Recently, Frank's computer has slowed down dramatically. He has also noticed that the time on the computer is not accurate. Frank has run several antivirus scans, but has not found an issue. Today while surfing the web, he was redirected several times to a website that he did not request. Then a BSOD error occurred on his computer, and when he turned on his computer, the antivirus software was disabled. What kind of malware could be causing the issues on Frank's computer?

Rootkit

A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The coworker recalls there is a setting in the Internet Options dialog box to prompt the user before downloading ActiveX controls, but can't remember which tab to use. Which of the following tabs will you suggest to the coworker?

Security tab

The users in the sales department need a central location on the network to share data files. All the client computers in the organization are running Windows 10 and have network and Internet connectivity. The file server that hosts the network drive for the sales department is running Windows Server 2016. Which of the following is the first step in implementing this data share?

Share the folder or volume on the file server that will store the shared data files.

What is responsible for getting a system up and going and finding an OS to load?

Startup BIOS/UEFI

"Press any key"

String

"sample text"

String

Which of the following are natively supported by the Windows, Mac, and Linux operating systems?

Support for reading and writing to FAT32 partitions

Your friend sees an error message during Windows startup about a corrupted bootmgr file. He has another computer with a matching configuration and decides to copy the bootmgr file from the working computer to the computer with the problem. Where can he locate the bootmgr file?

System Reserved\bootmgr

You are helping your friend troubleshoot a problem with his Linux server. You enter a common Linux command and discover it doesn't work exactly as you expected. What might be the problem and what do you do next?

The Linux shell is not the one you expected; use the echo $0 command.

Your computer displays the error message "A disk read error occurred." You try to boot from the Windows setup DVD and you get the same error. What is most likely the problem?

The boot device order is set to boot from the hard drive before the optical drive.

A technician is logged in to a Linux system with a user account that has been assigned root privileges. Each time the technician attempts to run a specific terminal command, a "Permission denied" message is displayed. What is the most likely reason for this message?

The command needs to be preceded by sudo.

Based on her research of the symptoms, Sara believes her computer is infected with a virus. Sara has an anti-malware program on the computer. What should she do before she runs the anti-malware program?

Update malware signatures

Today you turned on your computer after being on vacation for a week. You see spinning white dots on a black screen. You decide that an update might be installing, so you allow the computer to work for approximately 20 minutes. After 20 minutes, you turn off your computer and then restart it, and it fails two more times. What tool should you use first to help repair your computer?

Use Startup Repair.

How can you eliminate the need to open a dedicated TCP port on your corporate firewall when using Mac computers to share screens from the local and remote computers?

Use a third-party remote access app that uses a browser.

A stop error halts the Windows 10 system while it is booting, and the booting starts over in an endless loop of restarts. How can you solve this problem of endless restarts?

Use the Windows Startup Settings screen to disable automatic restarts.

Your Windows system boots to a blue screen stop error and no Start screen or desktop. What do you do first?

Use the web to research the stop error messages and numbers

Enable Low Resolution

Use this option when the video settings don't allow you to see the screen well enough to fix a defective setting.

$X

Variable

You have noticed that your computer is running slower than normal and that the amount of storage space on the hard drive is decreasing, even though you have not been doing anything different on your computer. You believe a program is replicating by attaching itself to other programs.What type of malware is on your computer?

Virus

As a computer starts up, you see an error message about the HAL. At what point in startup does this error occur?

When Windows attempts to launch critical device drivers

Henry wants to create a bootable flash drive with Windows 10. He wants to use it on multiple computers to troubleshoot Windows 10 startup issues.

Windows Media Creation tool

%TEMP%

Windows environment variable

Eric is working on a computer that has a device driver error. Eric can find the name of the device driver however the actual device is not available. Unfortunately, Eric does not have access to the Internet. Where can Eric go to look up the device driver's filename to help him determine what device uses the device driver?

Windows\System32\drivers folder

You open a folder Properties box to encrypt the folder, click Advanced, and discover that Encrypt contents to secure data is dimmed. What is the most likely problem?

You are not using an edition of Windows that supports encryption.

Sara installed Windows 10 for the first time on her computer. During the installation process, she noticed that a new system partition called ESP partition was created. Sara cannot access this new partition to see what it contains. What can you tell Sara about the ESP partition?

It was created by GPT to store Windows boot and startup files

You opened a batch file in Notepad and are observing the following lines. (The line numbers are for reference only.) 1. ECHO This batch file deletes the temp files 2. DEL %TEMP%\*.* /Q 3. REM The temp files were deleted 4. PAUSE Which of the lines is a comment?

Line 3

A system administrator is selecting an operating system for use by the company's research and development team. The team requires an OS that can be easily modified and changed to meet its particular requirements. Which of the following operating systems will be the best choice for the users?

Linux

Which Windows program must be running before a user can sign in to Windows?

Lsass.exe

You have important data on your hard drive that is not backed up and your Windows installation is so corrupted you know that you must refresh the entire installation. What do you do first?

Make every attempt to recover the data.

You work at an IT help desk and have been asked to set up 25 new user accounts in Active Directory. Your boss tells you to save time by using a PowerShell script that's available on a network share. You look at several script files named CreateNewUsers that are stored on the drive. Which one is likely to be the one you want?

The file with a .ps1 file extension

A technician wants to limit access to a group of folders and is using Group Policy to prevent the users in the sales department from accessing folders assigned to the accounting department. The technician is having difficulty achieving acceptable results. Which of the following is the most likely reason the technician is having difficulties?

The technician should be setting NTFS permissions instead of using Group Policy.

A Windows user called the help desk to request that her local user account password be reset on her computer. The help desk technician connected to the computer using RDC and reset the password using the Network Places Wizard. After the password was reset, the user lost access to all the data files on the local HDD. Which of the following describes the most likely reason for the lost data files?

The user had previously encrypted her data files and folders using EFS.

Enable Safe Mode

This option allows you to launch programs to help solve Windows issues without loading third-party drivers and software.

Enable Debugging

This tool moves system boot logs from the failing computer to another computer for evaluation

A technician is logged in to a Linux computer as johnd and needs to reset group ownership for the file report.txt in the johnd home directory. Which of the following commands will perform this function?

chown

technician wants to use a Time Machine backup to install a new copy of the macOS onto a Mac. Which of the following tools will the technician use to perform this task?

macOS Recovery

Your macOS installation is corrupted and you want to boot from an external Thunderbolt hard drive to repair the installation. Which key(s) do you hold down at startup to boot from the external hard drive?

option key

Windows 10 Professional will not boot on Jackson's computer. During the boot process, the computer fails. While troubleshooting, Jackson determines that the graphical user interface did not load. Which file in the boot process is responsible for loading the graphical user interface and starting the client/server runtime subsystem?

smss.exe

In Linux, when logged in as a normal user with root privileges, which command must precede the aptget command in the command line in order to install a program?

sudo

You have set up an FTP server in Ubuntu Server. Jason, a user, calls to say he gets an error when trying to put a file in his /home/jason/files directory. You look at the directory structure and see that you forgot to give the user ownership of the directory. Which command can fix the problem?

sudo chown jason:jason /home/jason/files

You are managing an FTP server installed in Ubuntu Server. The server has created a very large log file, vsftpd.log. Which command is appropriate to search the log file for activity of the user charlie?

sudo grep "charlie" /var/log/vsftpd.log


Ensembles d'études connexes

TERM 4 Ch 28 Care of Patients Requiring Oxygen Therapy or Tracheostomy

View Set

Introduction to Computers Module 7

View Set

Chapter 12- Commercial Marine and Aviation Insurance

View Set

Chapter 4 U.S. History Review Questions

View Set