Master Set #1 - Core 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

BD-RE

Blu-Ray Disc rewritable

Monthly general preventive computer maintenance

Check that fans are functioning correctly Check cable connections

Blackout

Complete loss of electrical power.

What are "if/then" statements called in Visual Basic?

Conditional statements.

What should you configure when setting up a wireless connection?

Configure the SSID and decide which encryption standard to use.

What are the 4 categories that are tracked by Event Viewer?

1. Applications. 2. Security 3. Setup 4. System. *

Give 5 examples of physical security.

1. Security guards, which are passive security 2. Mantraps 3. Locked doors, including access with keys, badges, smart cards, pin codes, or any combination of those. 4. Entry control roster. 5. Key fobs that let people into garages or buildings.

What are KDE, Gnome, and Cinammon?

3 of the available Linux desktop environments. These competing desktop environments often have to have software programs written to work with that specific environment.

What are the minimum system memory requirement of Windows Vista Home Basic?

512MB.

You want to build a new system that supports 6 GB of memory. Which of the following will be the MOST important consideration when building the computer?

64-bit processor

Guest Account

A Microsoft Windows user account with limited capabilities, no privacy, and is disabled by default.

surge protector

A device that protects computers and other electronic devices from power surges.

Sheet-fed scanner

A scanner in which the paper is passed over a fixed scan head.

What is Bitlocker To Go?

A version of Bitlocker that works on removeable media, and it does NOT require at TPM.

What type of connection interface is a scanner most likely to use?

All modern scanners will support USB. Some might have an Ethernet network port (RJ-45) or even wireless (Wi-Fi and/or Bluetooth), though this is more typical of Multifunction Devices (MFD) than standalone scanners.

What should be the first step when researching network problems?

Always check the physical connections and the physical indicators for clues as to what the problem might be.

NEW QUESTION 6 With which of the following types is a man-in-the-middle attack associated? A. Brute force B. Spoofing C. DDoS D. Zero-day

Answer: B

NEW QUESTION 7 A network administrator has given a technician documentation detailing the switchports the technician will need to patch in for a network upgrade. Which of the following documents did the network administrator MOST likely give to the technician? A. Process diagram B. Physical network diagram C. Fiber backbone diagram D. Logical topology diagram

Answer: B

You have a workstation running Windows 10, 64-bit edition. A local printer connected to a USB port is shared so that other users can print to that printer. Users running a 64-bit version of Windows do not have any problems. Which of the following actions will MOST likely fix this problem? (Select TWO).

-On your computer, ass the x86 drivers. -Manually install the correct driver on each computer that is having a problem.

You manage a Windows system. You want to view information about your computer, including the CPU utilization and information about disk I/O operations. Which tools could you use to do this? (Select TWO.)

-Performance monitor -Task Manager

After using your computer for a few months, you have decided it is best to install anti-malware software. After the software has been installed, you want to unsure that there are no existing files on you system that are infected. Which of the following is the BEST next step? (Select TWO).

-Run a full scan. -Download the latest definition files.

What are 3 of the switches that can be used with the xcopy command?

/s will copy the directory and all of its subfolders. /v will verify each file or folder is properly copied. /h will ensure that no hidden files are copied.

What is the different switch syntax used by robocopy to not copy any hidden files?

/xa:h after the robocopy command will ensure no hidden files are copied.

On the right side of a file allocation table, what hexidecimal character denotes the end of any given file that is referenced there?

0000FFFF.

What are the minimum computer requirements to run Windows 10?

1 Ghz processor, 1 or 2 GB of RAM, 16 or 20 GB hard drive, DirectX 9 or later with WDDM 1.0 driver, and 800 by 600 resolution. The variances in RAM and hard drive space depend on if you are installing a 32-bit or 64-bit version of Windows.

According to the A+ exam guide, what are the steps in malware removal?

1 Identify and research malware symptoms. 2 Quarantine the infected systems. 3 Disable System Restore (in Windows). 4 Remediate the infected systems. 5 Update the anti-malware software. 6 Scan and use removal techniques (safe mode, pre-installation environment). 7 Schedule scans and run updates. 8 Enable System Restore and create a restore point (in Windows). 9 Educate the end user.

What are the benefits of using a domain controller?

1) There is only one centrally managed repository of usernames and passwords, so you can log into that domain from any computer in that domain, and then you can access resources from any other computer that is in that domain. 2) Your personal user account settings and preferences will "follow" you to whatever computer in the domain that you log into.

Click the View Lab button and use the lab interface to find the answers to the following questions. 1. What is the IPv4 address of the server? 2. What is the subnet mask? 3. How did the computer get its IP configuration information? 4. Assuming the default gateway computer is connected to the Internet, what type of Internet access would this computer have?

1. 192.168.0.14 2. 255.255.255.0 3. Static (manual) configuration 4. Full access

What are 3 areas that most Windows troubleshooting issues fall under?

1. Boot problems, such as Windows not loading at all. 2. Windows desktop never fully loads. 3. Windows loads, but has one or more unexplainable errors.

Name 5 ways you can protect individual hosts.

1. Cable locks 2. Server locks that lock the physical server into the rack. 3. Turn off or lock USB ports 4. Privacy screens 5. Physical tokens that give out numbers that allow logon to a computer.

Name 4 features that can be configured on a firewall.

1. Enabling or disabling port security on certain ports. 2. Filtering inbound and outbound communication. 3. Protecting systems from malware and spyware. 4. Assigning, forwarding, and triggering ports.

What 6 Password-specific options can be set using the Local Security Policy?

1. Enforce Password History. 2. Maximum Password Age. 3. Minimum Password Age. 4. Minimum Password Length. 5. Password must meet complexity requirements. 6. Store Passwords using Reversible Encryption.

Describe the 5 NTFS permission levels for Files.

1. Full Control - Read, Write, Execute, Delete, Create, Assign permissions, etc. 2. Modify - Read, Write, and Delete. 3. Read and Execute - Open and run files 4. Read - Open and view files. 5. Write - Open and write to a file.

Describe the 6 NTFS permission levels for folders.

1. Full Control - you own the folder & can do whatever you want. 2. Modify - Read, Write, & Delete files & sub-folders. 3. Read & Execute - See all files in a folder or sub-folder, & execute any programs. 4. List Folder Contents - See the contents of any folder or sub-folder. 5. Read - View & open and files. 6. Write - Write files & create new files & folders.

What are the 3 ways to add a user account in Windows 10?

1. Go to Settings, then to Accounts. You can set up local or domain accounts. 2. You can add, remove, and administer user accounts through the Control Panel applet, User Accounts. 3. Via Administrative Tools in Control Panel, you can access Local Users and Groups, which is the most detailed way to add and manage users.

Place the steps for remediating a malware infected system in the correct order:

1. Identify and research malware symptoms 2. Quarantine the infected systems 3. Disable System Restore (in Windows) 4. Remediate the infected systems 5. Schedule scans and run updates 6. Enable System Restore and create a restore point (Windows)

What are the 7 CompTIA Malware Recovery Steps

1. Identify and research malware symptoms 2. Quarantine infected systems 3. Disable system restore 4. Remediate the infected systems by updating anti-malware software & actively scanning for new malware 5. Schedule malware scans 6. Turn system restore back on, create a new restore point, and delete old restore points 7. Educate end-users *

Sequence the steps typically used for applications in a Windows 10 upgrade readiness plan:

1. Identify important apps and assign importance levels to prioritize your applications 2. Identify and resolve problems with applications 3. Start the upgrade process

Place the steps in the troubleshooting process in correct order:

1. Identify the problem 2. Establish a theory of probably cause 3. Test the theory to determine cause 4. Establish a plan of action to resolve the problem and implement the solution 5. Verify full system functionality and, if applicable, implement preventative measures 6. Document findings, actions, and outcomes

In order, what are the 6 steps that you need to follow for creating a VPN connection?

1. In the Network and Sharing Center, click Set up a new connection or network. 2. Click Connect to a Workplace then click Next. 3. Click Use my Internet connection (VPN). 4. Enter your network properties and click Next or Create. 5. Enter your credentials, including destination domain if necessary. 6. Click Connect.

What are best practices with dynamic drives?

1. Keep your boot drive basic, not dynamic. 2. Use GPT rather than MBR whenever possible just to have more available options. 3. Remember that if you go back from having drives set up as dynamic drives and then make them basic drives, you will lose that data.

What 5 things does a system administrator need to know about when responding to an incident?

1. Know ahead of time what you will need to do 2. Identify the problem and report to management/authorities 3. Perform Data/Device preservation 4. Document the surroundings and very specific findings 5. Keep a chain of custody of evidence

Check Disk detects disk integrity errors and fixes them. Match the types of errors Check Disk detects and fixes on the left with the error description on the right. 1. A series of used clusters on the hard disk drive that are not associated with a specific file. 2. Occurs when two files claim the same cluster. 3. Files that exist on the hard drive but are not associated with a directory in the index. 4. A portion of the hard disk that cannot be used.

1. Lost clusters 2. Cross-linked file 3. Orphaned files 4. Bad sector

Name 3 ways that you can protect your computers from attacks.

1. Patch your systems, including the individual applications on your systems. 2. Run anti-malware software. 3. Run a host-based firewall.

What 6 components should be included in the documentation of safety procedures?

1. Personal safety includes using appropriate personal safety equipment and personal safety guidelines. 2. Equipment grounding to ensure equipment is properly grounded to reduce the risk of electrocution or component damage. 3. Safe component handling and storage. 4. Injury incident reporting system. 5. Toxic waste handling and disposal. 6. Compliance with all government regulations including federal, state, and local.

Give 8 symptoms of a computer being infected with malware.

1. Pop ups or pop-unders 2. Browser redirection 3. Security alerts from the operating system 4. Application crashes 5. OS update failure 6. Spam being sent from your email address 7. Getting instant automated responses from people who don't normally use them 8. Invalid certificates because your browser was redirected

Name 5 ways that you can permanently destroy a hard drive so that it can never be used again.

1. Put it through a degaussing machine, which hits the drive with a massive magnetic pulse that makes it completely unusable. 2. Shred it. 3. Put it in a punch-down machine to be crushed. 4. Incinerate it - especially if it is older media like floppy drives. 5. Manually destroy it yourself with a hammer or a drill to punch holes in it.

Name 6 attributes that you can set on a file or folder from the Properties dialogue box.

1. Read-only. 2. Hidden. 3. File is ready for archiving. 4. Allow this file to have contents indexed in addition to file properties. 5. Compress contents to save disk space. 6. Encrypt contents to secure data.

Name 4 symptoms that your computer has been infected with malware that could be used to trigger a Denial of Service attack.

1. Renamed system files 2. Inability to control aspects of your computer 3. Disappearing files 4. Changed permissions to files or folders on your own computer

Describe the 4 pooling options available when using Storage Spaces.

1. Simple, with no resiliency, which is just basically a bunch of disks. 2. Two-way mirror, which is the same as RAID 1. 3. Three-way mirror, which is Microsoft's proprietary RAID configuration 4. Parity, which is needed to create a RAID 5 configuration.

You work for a company that provides payroll automation software to its clients. You are creating a program that will automate payroll tasks for small businesses with few employees. You are on track to meet your deadline for the project, and you anticipate having a lot of money leftover in the project budget. Mid-project, you receive a call from the human resources manager at MakeStuff, a company that will use the small-business payroll software. The manager informs you that MakeStuff has decided to offer its employees a 401k investment option and asks whether the small-business payroll program can automatically manage 401k investments. Currently, the project plan does not include that function, but you believe making the addition would be valuable to your business. You are worried about requesting permission to add this functionality for two reasons. First, the deadline for this project is very close, and it cannot be moved. Second, you have created software that automates flexible savings account management, but you haven'e automated 401k investments before, and you know they are more complicated. You must fill out a change order from to request this change. Select the best option for each portion of the form. 1. Purpose of Change 2. Scope of Change 3. Plan for Change 4. Risk Analysis 5. Backout Plan

1. To provide every client using the software the functionality to automate 401k management. 2. Add 401k management to the payroll software. 3. Request to hire contractors to implement 401k management. 4. Using contractors could result in going over budget if there are problems with the project. 5. Back up the program and data before adding the new feature.

you have determined that a block-level file corruption on the disk has damaged the driver fiels for a critical piece of hardware. Multiple reboots have failed to correct the problem. You open Device Manager. Please put the steps in the correct order to fix the error:

1. Uninstall the device 2. Scan for hardware changes 3. Identify the correct drivers 4. Update the drievrs

What are 7 good password practices?

1. Use good passwords 2. Change passwords often 3. Use password-protected screensavers so people can't access your machine 4. Use pin codes and lock screens on mobile devices 5. Use BIOS/UEFI passwords for the administrators, and also set the user passwords there so they won't be stored on the hard drive of the computer. 6. Use passwords everywhere that you can, even if it is only optional. 7. Use multi-factor authentication.

What are the 3 indications that you can get from looking at Link lights?

1. When the computer is connected to a switch the link light will be steady. 2. The speed of the connection will be shown by the link light blinking. 3. The activity light will always be flickering.

When navigating between folders in the command shell, what are 2 differences between Windows and Linux?

1. Windows uses back slashes (\), while Linux uses forward slashes (/). 2. You do not need a leading slash when navigating between folders in Linux, but you do have to in Windows.

FAT12

12-bit file allocation table

How many primary partitions are support on GPT disks?

128

How many primary partitions are supported on GPT disk?

128

What are the minimum graphics memory requirement of Windows Vista Home Premium/Business/Enterprise/Ultimate?

128MB.

FAT16

16-bit file allocation table

How big can partitions be when using GPT?

18.8 million terabytes - also known as 18 exabytes.

What are the minimum system memory requirement of 32-bit Windows 8.1?

1GB.

What is the size difference to remember about Striping vs. Mirroring?

2 50GB striped drives in RAID 0 will actually give you 100GB of usable space, but if either drive dies, all of the data is lost. With mirroring, you are just making a copy on the other physical drive, so if you have 2 50GB drives, you will still only have 50GB of usable space.

Which of the following is a requirement for Windows 10 X 64?

2 GB RAM

Which of the following is a requirement for Windows 10 x64?

2 GB RAM

When did Microsoft release Windows 10?

2015

What are the minimum system memory requirement of 64-bit Windows 8.1?

2GB.

If you can't log into Windows to set any of the boot or safe boot options, how else can you get to a safe boot screen to customize startup?

3 times in a row, startup the computer and immediately shut it off each time you see the Windows startup screen. On the 4th time when the computer restarts, it will be at the automatic repair screen where you can click on Advanced Options.

FAT32

32-bit file allocation table

What is the effective upper limit for RAM in 32-bit processing?

4GB

What is Network Attached Storage, or NAS?

A "headless system" that doesn't have a keyboard, mouse, or monitor, because it is accessed over the network for file storage and file sharing.

What are common address bus specifications in modern computers?

A 32-bit computer can control up to 4GB of RAM, while a 64-bit computer can control so much RAM it isn't even a number that can be comprehended. It is over 18 exabytes.

When might you need to consult MSDS documentation?

A Material Safety Data Sheet (MSDS) should be read when introducing a new product or substance to the workplace. Subsequently, you should consult it if there is an accident involving the substance and when you need to dispose of the substance

What is another name that Windows uses for a partition?

A Simple Volume.

What is the difference between a stateless firewall and a stateful firewall?

A Stateless firewall does not care about what is happening at any given time - it just follows its configuration no matter what the circumstances are. A Stateful firewall will allow or deny activities based on the circumstances. For example, if a certain website has access, it can get through, but if it tries to access too frequently, it will be denied.

What is a Trojan?

A Trojan doesn't automatically replicate itself like malware does, but it does embed itself into computers usually via being manually passed around while hidden in a game or software program that people want to share with others. Once on a computer, it can activate or sit dormant until its activation event.

What is Samba?

A Windows printer and folder sharing emulation tool that is built into Linux or MAC OS so machines using those operating systems can still share resources with Windows machines.

What is the Component Object Model, or COM +?

A Windows-specific system of sharing various bits of information or parts of files with other computers, servers, or databases.

What is a Change Board?

A board or people who meet regularly to look at requests for changes, and then to approve or disapprove them.

What can you get from the organization that you went to in order to get your hard drives destoyed?

A certificate of destruction.

What is a Thin Client?

A computer that doesn't rely on its own internal storage. Network Connectivity is the most important consideration because that thin client will be connecting to its resources over some type of network, rather than relying on the resources of the thin client itself.

What is a Gaming workstation?

A computer that is built for power and speed. It will include a high-end multi-core processor, a motherboard with a chipset that will support the multi-core processor, a power supply that will produce enough watts to power all of the components, a liquid cooling system, at least one - but possibly two - high-end video cards, and high-end sound as well.

Line conditioners

A device that regulates, or conditions power, providing continuous voltage during brownouts and spikes. Cannot protect from blackouts

What is a Logical Diagram?

A diagram that shows the IP addresses and ports that all of the devices in a network use to connect to each other and the outside world.

What is a Physical Diagram?

A diagram that shows the physical location of all of the devices in any given network, sometimes put together in some sort of a floor plan.

What is Lightweight Directory Access Protocol, or LDAP?

A directory service protocol that defines how a client can access information, perform operations, and share directory data on a directory server.

What is a .vbs file?

A file written in the Visual Basic scripting language has a .vbs extension.

What is the difference between a file-level backup and a system image backup?

A file-level backup is when you choose - or let your operating system choose - what files to backup. In a system image backup, you are backing up entire partitions, including the operating system, applications, files, etc.

What is a "kernel panic"?

A generic term that describes when any Operating System has a fault so bad that it doesn't know how to handle it, and it just manifests as a Blue Screen of Death, or the Linux or MAC OS alternative.

What are the requirements for a computer that is going to be set up for NAS?

A good ethernet card, ideally a Gigabit NIC, and some type of RAID array to provide speed and/or redundancy based on the needs of the networked computers.

Barcode scanner

A handheld or pen-shaped device designed to scan patterns of different sized parallel bars, typically representing a product number, such as an ISBN, EAN, or UPC. USB connection is most common.

What are the results of the kill -l command in Linux?

A list of all running processes, along with their process IDs. In addition, if a process name is followed by a negative number, that means that process is in a group. If you kill that process, you will kill every process running in that group.

What is a blacklist on a firewall?

A list of websites or IP addresses that are restricted from access by the firewall.

What is a Homegroup?

A more secure and automated networking group that is better than a Workgroup for sharing files and folders, but not as powerful as an Active Directory domain. In today's Windows 10 computers, Homegroups aren't even an option anymore.

What are the 3 things you need to set up a VPN on a portable device?

A name that you give the VPN, set up the VPN in the settings of your device, and put in the IP address of your VPN server.

What is a personal license vs. an enterprise license for software?

A personal license is normally just for one copy of the software to be run on one computer. An enterprise license can be controlled by a Windows server to only allow however many copies of that software to be open at any time, based on however many licenses were purchased.

What is a Password policy?

A policy that defines the length, complexity, and frequency of passwords and password changes.

Spike

A powerful surge, such as that caused by lightning.

Closed

A question that can only be answered with a "Yes" or "No" or that requires some other fixed response ("What error number is displayed on the panel>" for instance).

Open

A question that invites the other person to compose a response, such as "What seems to be the problem?"

What is a rootkit?

A rootkit hides in the boot section of hard drives. Modern anti-malware tools know where to look for rootkits, however, so it isn't much of a problem with modern computers.

What is a RADIUS server?

A separate physical server on a network that users have to log into with their username and password.

What is an authenticator application on a portable device?

A separate security level that can be set up so that even after you enter the initial authentication, such as your username and password, or your fingerprint, you still have to go to your phone and get the code that was sent to the authenticator app before you can access the protected resource.

What is a function?

A set of code that does something very specific, and each function can be run over and over again instead of rewriting it each time it is needed.

What is msconfig?

A shortcut to get to the System Configuration dialogue that can also be accessed via the Administrative tools applet in Control Panel.

What is a Batch file?

A simple text file that has one command per line, and then a hard return. This is done to simulate typing those commands on the command line, and then executing them one at a time, but then automatically moving on to the next command after the previous one has finished. Batch files have a .bat extension. *

What GPT-specific information is contained in the Protective MBR area?

A small bit of information that automaticlly tells a GPT capable system that the drive is formatted with GPT.

What is a Thick Client?

A standard, desktop workstation computer.

What is a Wireless LAN Switch?

A switch that makes getting configuration and authentication information out to all of the WAP's in a network easier. Instead of having to manually configure every single WAP, the Wireless LAN Switch automatically configures all of them.

What is the difference between a system image and creating a system repair disc?

A system repair disc is a bootable media that can be used to start the Windows Recovery Environment.

What is Spear Phishing?

A targeted email phishing attempt that calls you out by name to get your attention. For example, the subject line could read, "Dear Aaron, enclosed is your prize" or some simiiar type of bait.

What is Performance Monitor?

A tool that can be used to see a real-time snapshot of how a Windows computer is performing, or it can be used to track performance over time, such as overnight, or over the weekend.

Quick Response scanner (QR scanner)

A type of 2D barcode scanner used to store information that can be read using a barcode scanner or the camera on a smartphone that has a barcode scanning app installed.

Variable

A type of identifier that contains a value that can change

Constant

A type of identifier that contains a value that cannot change

Ransomware

A type of malware that tries to extort money from the victim, by appearing to lock their computer or by encrypting their files, for instance.

Scanner

A type of photocopier that can convert the image of a physical object into an electronic data file.

What are Super Users, or Administrators?

A type of user account that every computer has that has full administrative control over that computer and all of the user accounts that are on that computer.

What is msinfo32?

A useful tool for getting detailed information about a Windows computer.

What is Autorun?

A utility that shows a very detailed list of every program and service that starts whenever the computer boots up. It is very useful for troubleshooting.

For toner spills use:

A vacuum verified or labeled as "toner safe. - Alternatively, use a toner cloth

What is NetBios or NetBt?

A very old, but still used naming convention for Windows computers.

What is a whitelist on a firewall?

A very specific list of websites or IP addresses that network computers can access, but they can't access anything that is not on that whitelist.

Why does the Local Security Policy have an option to set a Minimum Password Age?

A way to work around the Password History policy - say if you have to use 3 different passwords before reusing the first one - would be to just change your password 3 times in a row on the day a user has to change their password. The Minimum Password Age setting blocks that workaround.

How is logging onto a local Workgroup on a Windows machine different than logging into a domain that is controlled by Windows Server and Active Directory?

A workgroup is normally used in home or small office environments where there aren't very many computers. Every computer in any given workgroup can access the other computers, but every single computer in the workgroup must have exactly the same username and password for every user, as opposed to the SSO that is used by Windows Server.

A vRealize Automation user provisions virtual machines (VMs) but complains that the machine prefix for his VMs does not match that of his business group. The vRealize Automation administrator confirms that the blueprint component has the machine prefix set to "Use Group Default." Which step should be the administrator take to fix the issue with the incorrect machine prefix? A. Assign a new machine prefix to the reservation. B. Select the required machine prefix in the business group settings. C. Select the required machine prefix in the fabric group. D. Assign a new machine prefix to the vSphere endpoint.

A. Assign a new machine prefix to the reservation.

A vRealize Orchestrator administrator is tasked with creating a workflow that processes sensitive information that is subject to auditing. All workflow messages must be stored in the vRealize Orchestrator database. How can the administrator ensure that all log messages generated by the workflow are stored in the database? A. Configure a DEBUG level for the vRealize Orchestrator server. B. Use System.log() when printing out messages. C. Configure SQL plugin to write to the database directly. D. Use Server.log() when printing out messages.

A. Configure a DEBUG level for the vRealize Orchestrator server.

What can be used in custom forms to prevent a user from entering too large a value (such as too much memory for a virtual machine)? A. Constraints for a field B. Regular expression for a field C. Quotas for a field D. Limitations for a field

A. Constraints for a field

Which two types of entities can be a part of a vRealize Orchestrator package? (Choose two.) A. Policy templates B. Inventory C. Configurations D. Logs E. Scripting elements

A. Policy templates B. Inventory

What are the 3 ACPI levels?

ACPI level 0 is enabled, but not used. Level 3 is sleep mode, but the RAM is still powered. Level 4 is hibernation, and RAM data is copied to a file on mass storage. Hibernation mode uses less power than ACPI Level 3, but it takes longer to come out of.

Which toolset lets you restore a deleted AD object?

AD Administrative Center

Surge

Abrupt, but brief change in the value of the voltage.

Can you throw away lithium ion batteries or toner cartridges?

Absolutely not - there are very specific recycling processes that need to be used.

What does the acronym AUP denote?

Acceptable Use Policy

You recently installed a Windows 10 system. During the installation process, you elected to sign into the system using a local user account. After using the system for a time, you decide to begin using an online Microsoft account to authenticate to the system instead. Click the Settings app option you would use to do this.

Accounts: Your accounts, email, sync, work, family

What are the user credentials stored on a Windows server with a domain controller collectively managed by?

Active Directory, and it gives the benefit of having Single Sign On, or SSO.

What are the 2 primary accounts available in Windows 10?

Administrator vs. Standard User.

What is ACPI?

Advanced Configuration and Power Interface. This is the technology that controls a computer going to sleep, or hibernating. Both in the BIOS as well as in system settings, you can change things like powering on or off at certain times of day, when certain things - such as the keyboard - are touched, etc.

What is AES?

Advanced Encryption Protocol is the wireless encryption protocol that is still widely used today.

Which of the following choices would you type into the Start menu search to configure virtual memory with the least administrative effort?

Advanced System Settings

How do you format a partition using diskpart?

After using the list partition command, select the partition in question with the select partition 1 command, or whatever the partition number is. Then format it with the command format FS=NTFS to use the NTFS file system on that partition. You can also end the command with the word quick if you only want a quick format.

Where are all Windows settings kept, and how can you access them?

All Windows settings are kept in the Registry. It is a binary file that can be accessed with the Regedit tool.

What does it mean to "end process tree"?

All programs use common features such as minimize and maximize buttons, scrollbars, etc. These common features are run as part of a process tree so that every application does not have to reinvent those basic type of features. The process tree can be ended in Task Manager just like the process itself can be.

Which of the following security practices are the BEST example of the principle of least privilege?

All users on a Windows workstation are limited users except for one user, who is responsible for maintaining the system.

What does the Base Video option do when booting into safe mode?

Allows you to troubleshoot potential video card issues.

Your DHCP server is acting up. Every time it does, clients fail to renew their IPs and can no longer communicate on the network. When this happens, you notice every affected machine has an IP address in the 169. 254.0.0/16 range. You open the Control Panel -> Network and Sharing -> Adapter Properties -> TCP/IP properties. From there, where will you navigate to in order to correct the issue?

Alternative Configuration

Your DHCP server is acting up. Every time it does, clients fail to renew their IPs and can no longer communicate on the network. When this happens, you notice every affected machine has an IP address in the 169.254.0.0/16 range. You open the control panel -> network and sharing -> adapter properties -> TCP/IP properties. From there, where will you navigate in order to correct the issue?

Alternative configuration

When replacing a laptop's A/C adaptor, what is a good practice, and why?

Always buy A/C adapters from the original manufacturer of that laptop, even though they will probably be more expensive. OEM adapters are not only higher quality that 3rd party knock-offs, but they often have proprietary connections to the laptop, and also the right volts, amps, and polarity for that particular model.

What is a good best practice to proactively protect your systems from malware?

Always have backup and restore systems in place so if you get hit with malware, you can restore back to a point before then.

What is an Acceptable Use Policy, or AUP?

An AUP defines what you can and cannot do with company equipment.

What should be avoided in communication when dealing with an angry customer?

An argument with the customer

What is A Zero-day attack?

An attack on a vulnerability that wasn't already known to the software developers. It gets the name because the developer of the flawed software has had zero days to prevent vulnerability. Patch management is used to fix such types of attacks.

What is an Authentication Server?

An authentication server contains an application that has an access lists and identifies the permitted access credentials. It examines the credentials of anyone trying to access the network and also determines if network access is granted.

What is Kerberos?

An authentication service that is based on a time-sensitive ticket-granting system. It uses an SSO method in which the user enters credentials that are then passed to the authentication server, which contains an access list and permitted access credentials.

Whistleblower

An employee (or ex-employee) who reports misconduct.

Multi-function device (MFD)

An imaging device that performs several related functions.

What is Endpoint Management?

An over-arching system that provides and controls not only intrusion detection and prevention, but anti-malware, system patching - pretty much anything to do with the security of the network.

What is an Unattended Installation?

An unattended installation utilizes image deployment and helps you by eliminating the need of sitting in front of the machine to complete the installation.

Post-Incident Activity

Analyzing the incident and responses to identify whether procedures or systems could be improved. It is also imperative to document the incident.

What is the difference between an Access Control List and an Access Policy?

And Access Control List is very specific and defines access or denial one line at a time. An Access Policy can put together multiple variables to determine access or denial, such as IP address, time of day, port number, etc.

Which of the following is an open source phone/tablet OS?

Android

What is the biggest attack problem that the Internet has today?

Denial of Service attacks.

Which of the following is a best practice in combating hackers?

Disable autorun

Name 3 popular Linux distributions.

Fedora, Ubuntu, Linux Mint.

What is the only drawback to allowing Disk Management, Storage Spaces, or some other operating system-based tool to manage RAID or drive pooling?

For larger, more powerful CPU's, it should not be an issue. However, for smaller systems, not having a separate, dedicated RAID array may over-tax the CPU.

Use a PC vacuum or one with a natural bristle brush to:

For removing dust from inside a system unit - Do not use home appliances due to ESD.

In Local Security Policy, what is the Maximum Password Age?

How long a password can be in effect until it has to be changed. *

What is a good rule of thumb when setting up the environment that your computers will be in?

If a human being is uncomfortable in that environment, a computer probably will be to.

How are Linux script files saved?

In Bash shell files that end with the extension .sh. *

Finder

Is the macOS equivalent of Explorer in Windows

What is the primary security concern around Credential Manager?

It allows passwords to be displayed

Without using the ls command, how can you visually see in a Linux command shell if you are in the root directory or in a user's home directory?

It is a very slight difference, but the home directory command prompt will have a tile (~) while the root directory command prompt will have a forward slash (/).

Describe the High Performance File System Plus.

It supports volume sizes up to 8 exabytes, and also file sizes up to 8 exabytes.

Is using Virtual Memory a good idea?

It's a good option to have available, but in a best-case scenario, if a computer is running out of RAM, more RAM needs to be installed.

Which command do you run to create a local user account?

Net user

Are NTFS permissions only on a local machine?

No, they are granted based on users or group memberships, and they propagate throughout entire networks and domains.

Are all Active Directory networks external to the local LAN?

No, you can set up a local Active Directory network, complete with local naming conventions, to just manage your local LAN.

Does creating a Restore point back up your entire system?

No. A Restore point only backs up Applications, the Registry, and a few critical system files.

Do dedicated wireless access points have A/C power?

Not normally. Most of them are Power over Ethernet, or PoE.

VBScript

Often used by network administrators to perform repetitive tasks

Who can change the permissions of any given file or folder in Linux?

Only the owner.

How can you create a Performance Baseline in Windows?

Open Performance Monitor and select whatever counters you are interested in. *

What is so special about Microsoft's 3-way mirror pooling option?

Ordinarily, when setting up a parity RAID, such as with 3 50GB drives, there is 100GB used for storage, and 50GB used for parity. However, if any of the 3 drives are of a different size, the extra gigabytes end up getting wasted. With Microsoft's proprietary 3-way mirror pooling option, that space is not wasted.

What does the acronym PII denote?

Personally Identifiable Information

What port does Telnet use, and what is it for?

Port 23, and it is used to access a command line on a remote computer.

What are the 2 ports that web browsers run on?

Port 80 is the http port, and port 443 is the https secure browsing port.

POST

Power On Self Test

Brownout

Power from the wall socket is insufficient to allow devices to function correctly.

What is a utility that you can use to perform Telnet operations?

PuTTY.

What is the most common scripting language that works on most operating systems?

Python works on almost every operating system, and it is popular because it is a lot easier to read than other scripting languages. All Python files have a .py extension.

Step 2 of remediating a malware infected system:

Quarantine the infected systems

What are the only 2 permissions options that are available when sharing resources over a network?

Read, or Read and Write.

What is a "brownout"?

Short-lived drop in voltage

What are 4 big benefits to using Active Directory domains?

Single Sign On, or SSO, Enforcement of domain policies, Roaming profiles, and user logon scripts.

What do all the upgrade advisors check and report on?

Software Hardware Drivers

SPDIF

Sony-Philips digital interface format

True or false? Any type of smartphone camera can be used to read a QR code.

TRUE

TKIP

Temporal Key Integrity Protocol

After running the ls -l command in Linux, what does the letter d mean at the beginning of the permissions string?

That line is describing a directory, not a file.

How do you copy or move files in Linux?

The CLI command for copy is cp, and the CLI command for move is mv.

What license are most Linux distributions managed by?

The GNU license.

What is the Master Boot Record, or MBR?

The MBR defines the partitions on a computer and tells the computer where to find the operating system during startup.

boot partition

The drive containing the operating system files (the system root) is referred to as the:

Why would you use an older file system when formatting a thumb drive?

The new systems such as NTFS have a large overhead that takes up a lot of space on a thumb drive. In addition, the larger volume and file sizes that are supported by more modern file systems aren't even possible to have on most thumb drives because they simply aren't big enough.

What color are link lights?

They are different on every system and switch, so you have to look up the system documentation to find out.

How are passwords stored on a computer?

They are saved to a file with a hash, which is a one-way value that is *always* the same length. When you type in the password, it is hashed again and compared to the original hash. If they match, you get authenticated.

Which of the following is included with MAC OS X?

Time Machine

At the Linux command prompt, how do you get back to the home directory?

Type cd, space, tilde (~).

What command is used if you want to map a drive to a shared folder over the local network?

Type the "net use" command followed by the drive letter and the UNC of specific folder, such as "net use c: \\foldername".

Zombie

Unauthorized software that directs the devices to launch a DDoS attack

USMT

User State Migration Tool

What is meant by a "clean install"?

Using operating system installation media to install that operating system onto a system that has no operating system loaded onto it.

.vbs

VBScript file extension

Which of the following network connections should always require data encryption?

VPN WWAN Wireless

What is Spoofing?

When someone tries to make themselves appear as some other entity.

Which version of Windows introduced Bitlocker To Go?

Windows 7

Which of the following Command line tools would you run to script the copy of all files (including hidden and system) from one directory to another?

Xcopy

Can you use the Linux dd command to wipe a folder or directory?

Yes. By using the "zero" syntax in the source part of the command, you will tell Linux to write nothing but zeros to the destination, such as dd if=/dev/zero of=/dev/destination

What does "activating" a portable device actually mean?

Your carrier just matches up the IMSI number that identifies you as their customer with the IMEI number that identifies your portable device.

AP

access point

ADSL

asymmetrical digital subscriber line

ATM

asynchronous transfer mode

You are working at the command line and want to add the Read-only attribute to a file and remove the Hidden attribute. Which command would you use?

attrib +r -h

A/V

audio video

BOIS

basic input/output system

BSOD

blue screen of death

BYOD

bring your own device

VFAT

bvirtual file allocation table

CNR

communications and networking riser

HTPC

home theater PC

HTTPS

hypertext transfer protocol secure

I/O

input/output

JBOD

just a bunch of disks

KVM

kernel-based virtual machine keyboard-video-mouse

Which software damages or disrupts a system without the owner's permissions?

malware

MicroDIMM

micro dual inline memory module

OS

operating system

QoS

quality of service

RAM

random access memory

Ext2

second extended file system

TCP

transmission control protocol

UPS

uninterruptible power supply

WIFI

wireless fidelity

>=

"greater than or equal to"

>

"greater than"

==

"is equal to"

!=

"is not equal to"

<=

"less than or equal to"

<

"less than"

What are 2 of the options used with the ifconfig command?

"up" Activates the specified interface, and "down" Deactivates the specified interface

What do all Linux script files begin with?

#! /bin/bash

Where on disk is the print file spooled in Windows?

%SystemRoot%\System32\Spool\Printers

You are an IT technician for your company. A coworker calls your department and asks for help fixing his malfunctioning internal Blu-ray drive, which he installed himself. When you arrive, you unplug and then open the employee's computer. As you begin to examine his computer, the employee begins to describe the steps he has taken to install and troubleshoot the issue on his own. You examine all of the connectors and discover that the employee forgot to connect the Blu-ray drive's power cable. Your initial thought is, "How stupid can this guy be?" but you restrain from making any comments. At that moment, another coworker calls your cell phone. The ringing of the phone distracts your thoughts, and while the owner of the computer is still explaining the troubleshooting steps already completed, you quickly connect the power to the device and close the computer. A quick test determines that the device is now working. Which of the following professionalism principles is the technician failing to follow? (Select TWO).

-Avoiding being judgmental - Actively listening

Who needs to approve a change before it is initiated? (Select TWO.)

-Change board -Client of end user

Joe, a bookkeeper, works in a cubicle environment and is often called away from his desk. Joe doesn't want to sign out of his computer each time he leaves. Which of the following are the BEST solutions for securing Joe's workstation? (Select TWO).

-Configure the screen saver to require a password. -Configure the screen lock to be applies after short period of nonuse.

You have a computer with a 64-bit dual-core processor that runs the 32-bit version of Windows 7 Professional edition. You would like to upgrade to the 64-bit version of Windows 10 Professional. You want to perform the upgrade with the least amount of effort possible. Which of the following steps are required to accomplish this? (Select TWO).

-Get 64-bit drivers for all hardware. -Perform a clean installation.

What is the best method to protect network cables from damage due to environmental factors, such as heat and liquid?

Cover the cables by using a protective material.

Which option do you use to create the backup file when using the Backup and Restore Windows 7 applet?

Create a System Image.

What recovery options should you immediately set up after installing Windows and updating all of the device drivers?

Create a Windows recovery image on a thumb drive that is at least 16GB in size, and then set up a restore point on Windows.

Which of the following actions would you take to minimize administrative overhead if you were responsible for managing just DHCP and DNS on a Windows Server on your network?

Create a custom mmc with only the DHCP and DNS snap-ins

You want to ensure that a particular application can always connect to the client in order to push update the latest application data regardless of the network the client is connected to. What do you do?

Create an inbound Firewall Rule Enable for All Profiles

Standby/Suspend to RAM

Cuts power to most devices (for example, the CPU, monitor, disk drives, and peripherals) but maintains power to the memory.

If print jobs do not appear at the printer and the queue is clear, what could you try first to solve the problem?

Cycle the power on the printer.

A system administrator created a tenant with URL name "fin" for the finance team. The fully qualified domain name (FQDN) of the appliance is vra.rainpole.local. What is the correct URL to log in to the finance tenant? A. https://vra.rainpole.local/vcac/org/fin B. https://vra.rainpole.local/org/finance C. https://vra.rainpole.local/org/fin D. https://vra.rainpole.local/vcac/org/finance

D. https://vra.rainpole.local/vcac/org/finance

What would you call an attach that used many devices to simultaneously make requests of your cloud services, overwhelming them to the pint where no one gets a response?

DDoS

What would you call an attack that used any devices to simultaneously make requests of your cloud services, overwhelming them to the point where no one gets a response?

DDoS

What is Deployment Imaging Servicing and Management, or DISM?

DISM works with the System File Checker, or SFC, to check and repair, if necessary, the backup copies of all critical system files. SFC, is run first to check backup files against the working copy. If any errors are found, SFC will try to replace damaged files with files from the backups. If that doesn't work, DISM is run to get fresh copies online.

Which of the following record types must you add to DNS to implement DNSSEC?

DNSKEY and RRSIG

Integer

Data type for whole numbers; 1-8B

String

Data type that is a collection of text characters; no storage limit

Char

Data type that is a single letter, symbol, or number; 1B

Float

Data type that supports fractions; 4-8B

Other than heavy resource management by running tasks, what else can you do to speed up a slow-running system?

Defragmentation and also running chkdsk to repair any disc issues.

Your computer has a single NTFS partition used for the C: drive with the following folders: -C:\Confidential -C:\PublicReports In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: -Reports.doc -Costs.doc The C:\PublicReports folder allows the Full Control permission to the Users group. There are no other permissions assigned expect for the default permissions. You then take the following actions: -Move Reports.doc from C:\Confidential to C:\PublicReports. -Copy Costs.doc from C:\Confidential to C:\PublicReports. Which of the following BEST describes the pernission the members of the Users group will have for the two files in the C:\PublicReports folder?

Deny Read to Reports.doc; Allow Full Control to Costs.doc.

What is the deny functionality in NTFS used for?

Deny is used to stop inheritance for any given permission that was inherited from a parent folder.

Describe the Compact Disc File System, or CDFS.

Despite the name, CDFS works on blueray and DVD's as well, and it is the file system used for optical media data storage. It supports file sizes up to 4 GB.

What does the Reset Account Lockout Counter After setting do?

Determines the number of minutes that must elapse after a failed logon attempt before the failed logon attempt counter is reset to zero.

Detection and Analysis

Determining whether an incident has taken place and assessing how severe it might be, followed by notification of the incident to stakeholders.

DIN

Deutsche Industrie Norm

What are Network Topology Diagrams?

Diagrams that show all of the devices in any given network.

Excessive heat affects computer reliability

Direct sunlight Placement near a heat source Airflow

Step 3 of remediating a malware infected system:

Disable System Restore (in Windows)

Employees in a small business have a habit of transferring files between computers using a USB flash drive and often bring in files from outside the company. Recently, a computer was infected with malware from a USB flash drive even though the employee did not access any files. Which of the following options would prevent this issue in the future?

Disable autorun.

Which of the following commands will mount the wim file E:\wims\install.wim to the mount directory E:\mount?

Disk /mount-wim /wimfile:E:\wims\install.wim /index 2 /mountain:E:\mount

Which tool would you use to create and delete partitions on hard drives?

Disk Management

What tool is used to see mass storage devices in Windows?

Disk Management.

Which of the following utilities would you use to shrink an existing drive partition?

Disk Manager

What does the -a switch for netstat do?

Displays all active connections, but also shows any connections that are open that the computer is listening for. For example, if a computer is connected to a local area network, there will be listening connections on port 445 waiting for other people on the LAN to connect to.

What does Device Manager do?

Displays all devices currently installed on the computer, and it can be used to modify the properties for those devices. You can also use Device Manager to manage and configure hardware devices and to resolve any resource conflicts and indications of drive failure.

Which configuration setup would you choose when implementing BranchCache in a remote office with no onsite server?

Distributed

What can you do if you want to upgrade from an earlier version of Windows such as Windows Home, but now you want Windows Professional?

Do a clean install of Windows Professional, rather than an upgrade install. However, you will have to reinstall all of your applications and set up all of your system preferences on the newly installed operating system.

Nathan, a long-time Mac user, has been using his Mac computer for some time now with no issues. Recently, however, he reported that his Mac will unexpectedly tell him that his computer must be restarted by holding down the Power button for several seconds or by pressing the Restart button. Assuming that this is a symptom of kernel panic, which of the following steps would by the BEST first step for troubleshooting this issue?

Do a safe boot.

Avoid distractions

Do not allow interruptions when you are working at a customer's site.

How can you ensure that your SSID is not seen by computers in other offices?

Do not broadcast the SSID.

What should you do if you encounter confidential information while troubleshooting at a client site?

Do not read or disclose the information. If the information is a document, you should turn the document over so that you cannot read the document.

What is the last step in troubleshooting theory?

Document findings, actions and outcomes

Step 6 of the troubleshooting process:

Document findings, actions, and outcomes

Which Firewall network profile is automatically enforced with no user intervention?

Domain

How do Domain Security Policies compare to Local Security Policies?

Domain Security Policies override the Local Security Policies that are set on the machine that is being used to access the domain resources.*

Dust/airborne particles can be:

Drawn in through ventilation holes Can prevent heat dissipation Can clog keyboards and mice Can make displays hard to read

When are ODBC connections normally set up by default?

During the installation process of the software that is going to be accessing the remote database.

What are Dynamic Disks?

Dynamic Disks are specific to Windows - they are not found on other operating systems. The volumes or partitions on dynamic drives can be shrunk down or expanded across any given drive, or even multiple physical drives.

A user has a file that contains sensitive data. Which of the following can be used to encrypt a single file?

EFS

In order to use Server Message Block, or SMB, to share files between different operating systems, what must each computer have?

Each computer must have a unique computer name that Windows can understand.

What is the 2 CPU per license rule that Microsoft has in place?

Each license that Microsoft gives out for workstation level computers is only good for up to 2 CPUs. If a computer has 4 CPUs, 2 licenses must be bought. Or, you could stick with a motherboard that has 2 CPUs with 2 cores each, and get the same number of CPUs, but only need 1 license. Look for questions like that on the test. *

Incident or ticket

Each request must be logged as an _____________

Which of the following actions would you take to make driers available to an automated installation of Windows 10?

Edit the unattend.xml file

Which of the following actions would you take to make drivers available to an automated installation of Windows 10?

Edit the unattend.xml file

According to the A+ exam guide, what is the last step in malware removal?

Educate the end user.

If Windows did not load a device driver during installation, what can you do?

Either load the driver that came with the hardware in question, or go to that hardware manufacture's website to get an updated device driver.

What are three ways to find almost every option or setting on a Windows computer?

Either via the right-click menu, the Settings area, or in the Control Panel.

Which type of electric current can cause severe damage to computer components while a technician is troubleshooting a hardware device?

Electrostatic discharge (ESD)

Maintain a positive attitude

Empathizing with the customer is a good way of developing a good relationship towards resolving their problem.

What must you do first as a prerequisite to establishing a Sync Partnership?

Enable Offline folders

Step 6 of remediating a malware infected system:

Enable system restore and create a restore point (Windows)

What is the best defense against man in the middle attacks?

Encrypting all communications so that even if they are intercepted, they won't be able to be read.

What legal responsibility do you have regarding the environmental controls used by your systems and your network?

Ensure your organization is compliant with local government regulations.

After malware removal, why should you educate the end user?

Enter the password yourself and install the program.

What should you do if a user needs an administrative password to install a program on his computer?

Enter the password yourself and install the program.

Tailgating

Entering a secure area without authorization by following close behind the person that has been allowed to open the door or checkpoint.

What are some things that are covered in the Material Safety Data Sheet, or MSDS?

Environmental impacts, how to handle the materials, how to dispose of the materials, and if it is poisonous or hazardous.

What are the 2 categories of optimizing mass storage devices?

Error checking and Optimization.

\

Escape character for Bash shell script, JavaScript, and Python

--% ' \

Escape character for PowerShell

'' ""

Escape character for VBScript

%%

Escape character for a batch file

Step 4 of the troubleshooting process:

Establish a plan of action to resolve the problem and implement the solution

Step 2 of the troubleshooting process:

Establish a theory of probable cause

After installing a new application, the machine performs slowly and frequently blue screens. The product documentation does not address this issue. What tool would you use to check for setup errors and messages?

Event Viewer

What is Event Viewer?

Event Viewer is a Windows utility used to keep a log of all recorded system and application events.

What Windows tool can you use to look back in history to see what has been happening with the computer?

Event viewer, which is a Windows utility used to keep a log of all recorded system and application events.

How often does CompTIA say you should change your password?

Every 30 to 90 days. In reality, that creates a ton of administrative work because people forget their passwords, or they engage in baseline password practices because they have to remember so many passwords, and they are very easy to crack.

What are ESSIDS?

Extended SSIDs are when 2 or more wireless access points use the same SSID. This should always be done in an enterprise environment so employees can move around without losing their network connectivity.

Kepp Computer's away from:

Extreme temperatures Dampness and dust Regularly inspect and clean surroundings

What key do you strike before the Windows logo screen appears to enter the Advanced Boot Options menu?

F8

What is the difference between FAT 16 and FAT 32?

FAT 16 uses 4 hexidecimal characters to identify the LBA's on a mass storage device, while FAT 16 uses 8 hexidecimal characters. FAT 16 is a 16-bit file allocation table while FAT 32 is a 32-bit file allocation table. Each hexidecimal character is 4 bytes, so 4 times 4 is 16 and 4 times 8 is 32.

If you get locked out of your portable device, what can you do?

Factory reset the device.

True or false? To enable printer sharing via Windows, the print device must be connected to the Windows PC via an Ethernet or Wi-Fi link.

False—any print device can be shared via printer properties. The print device can be connected to the Windows print server over USB, Bluetooth, Ethernet, or Wi-Fi. Other clients connect to the printer via the share, however, so the Windows PC must be kept on to facilitate printing.

Encrypting File System (EFS)

Feature of NTFS supports file and folder encryption.

What options are available in File Explorer when you click on a file, folder, etc.?

File Explorer recognizes certain types of files and folder, and when they are clicked on, different options to manage those files or folders are displayed in the top bar of File Explorer.

What happens when you move a file structure from the fileserver's D: drive to E:?

File attributes (including security) are inherited from the new parent directory

What happens when you move a file structure from the fileservers D:drive to E:?

File attributes (including security) are inherited from the new parent directory

What are the 2 types of encryption for mass storage devices?

File based and Disk based.

What is the difference between file-based encryption and disk-based encryption?

File-based encryption is for encrypting specific files or folders that are chosen to be encrypted, while disk-based encryption encrypts entire mass storage devices.

What does Inheritance mean with file and folder permissions?

Files and folders that are put into other folders will inherit whatever NTFS permissions that their parent folder has.

What are powershell scripts saved as?

Files called cmdlets and they can be edited in a special editor that make it easier to write and edit the commands. The editor is called the Integrated Scripting Environment. *

What is the MAC OS program that is most like Windows File Explorer?

Finder.

Which of the following examples of inheritance possession (something you are) to support multifactor authentication?

Fingerprint and Retinal Scanner

What is the most secure method for locking a smartphone?

Fingerprint lock is a type of biometric device that enables a user to unlock a mobile device using a fingerprint, which is the most secure way to unlock the smartphone.

Which of the following are examples of inheritance possession (something you are) to support multi factor authentication?

Fingerprint reader Retinal scanner

Which of the following is the BEST device to deploy to protect your private network from a public, untrusted network?

Firewall

What does an Enterprise software license allow?

For commercial purposes, an enterprise license permits an organization to install the application on an agreed-upon number of PCs.

What are 2 dust mitigation techniques?

For computers - especially servers - they can be put in a ventilated enclosure. For people, wear masks or air filters when necessary.

What OS would you choose if you wanted full access to the kernel and source code, were not concerned about security, and had no budget?

FreeBSD

You have installed an automatic duplex unit in an office laser printer. What configuration setting would you change to make the unit available for print jobs?

From Devices and Printers or Settings, select Printer Properties and then select the Device Settings tab. Select the Duplex Unit setting and select Installed.

How do you set up the Windows Recovery Environment?

From inside Control Panel.

How do you get to Resource Monitor in Windows 7?

From the Performance tab in Task Manager.

How do you initiate the vi text editor?

From the command line, type the command vi followed by the name of the file that you want to create or edit. Once in the file, type the letter I to get into insert mode.

In Linux, where are almost all critical activities managed?

From the command prompt, also sometimes called a terminal, or the shell.

How do you find the IMEI number of your portable device?

From the telephone dialing screen, type *#06#

Which type of backup uses maximum disks and tapes for storing data?

Full backup

Which of the following describes a NIC card that can utilize 100% of its available upstream and downstream bandwidth simultaneously?

Full duplex

GPT

GUID partition table

In addition to the power and performance needs of a gaming computer, what are the storage needs?

Gaming files tend to be very large, so a gaming computer will need a lot of mass storage space in addition to the rest of the higher-end components.

Which of the following tabs would you select in File Explorer -> Options to disable Quick Access?

General

What does the acronym GDPR denote?

General Data Protection Regulation

Python

General-purpose programming language for developing many different kinds of applications

What should you do if your smart card is stolen?

Get it inactivated and replaced.

After installing Windows, what is one of the first things you should do when you log in?

Go to Device Manager to ensure that Windows recognized and loaded drivers for the hardware and peripherals that are part of your computer.

Once you are booted into Windows, where should you go to research what has been going wrong with the system?

Go to Event Viewer and click on the System area. The most recent events will give you clues to what has been going wrong with that computer.

If an application frequently crashes, other than uninstalling and reinstalling it, what are 2 other things you can try?

Go to Programs and Features in Control Panel and right-click on the application. Some applications will give you a Repair option. You can also update the application to get the latest version.

How do you make Windows boot into Safe Boot mode?

Go to System Configuration and choose the safe boot option with whatever other options you need.

How do you access the System Restore options in Windows 10?

Go to System from inside the Control Panel, and then click the System protection link.

What is the easiest way to see how the startup options are configured on a Windows computer?

Go to the Administrative Tools applet in Control Panel and then choose System Configuration.

Where can you customize how File Explorer looks and acts?

Go to the View tab, and then go to the Options section.

How do you see how much Virtual Memory is set up on a system?

Go to the advanced portion of a system's properties. The exact path varies depending on the OS.

What is the first thing you should do after copying or moving files from the command line?

Go to the destination to ensure the copy or move was successful. If you assume it worked, but didn't, it will cause problems later when you try to find or work with those files.

In addition to looking for link lights on the computer you are working on, what is the other half of that connection that has to be checked?

Go to the switch that the computer is connected to and ensure the link lights for the port that computer is plugged into are also on.

What is HKLM shorthand for?

HKEY LOCAL_MACHINE.

How are passwords hacked if they are stored as a hash?

Hackers know where in computers to find the actual hash file that is used to encrypt passwords, so all it takes is for them to get access to your system - even remotely - and they can copy the hash value. Then, they run that hash through a password generation system to create billions of combinations until they find the correct password.

Which of the following is responsible for ensuring the integrity of the data (arrives unchanged) as it traverses the public Internet?

Hash algorithm

Which of the following is responsible for ensuring the integrity of the data (arrives unchanged) as it traverses the public internet?

Hash algorithm

What are the principal environmental hazards to consider when installing PC equipment?

Heat and direct sunlight, excessive dust and liquids, and very low or high humidity. Equipment should also be installed so as not to pose a topple or trip hazard

What is the primary file system used on the MAC OS?

High Performance File System Plus, or HPFS+. It might just be called HFS on the CompTIA exam.

Humidity levels effect computers as follows:

High can cause condensation Low can cause ESD risks Strive for around 50% relative humidity Allow moved equipment to adjust to room temperature before running Make sure HVAC system adequately maintains proper temperature, humidity, and ventilation.

What's new in HomeGroup in Windows 10?

HomeGroups are deprecated in Windows 10

Whats new in HomeGroup in Windows 10?

HomeGroups are deprecated in Windows 10

Why would you set up a host-based firewall?

Host-based firewalls have very granular controls that can filter traffic based on Process IDs, Application names, filenames, etc.

Name 3 layers of security that protect individual computers, networks, and all of the supporting hardware.

Host-based security, Network-based security, and Physical security.

What does the Scope of a Change mean?

How is a change request going to affect others, and the organization as a whole.

What are the three parts of first response when an incident occurs?

Identify Report through proper channels Data/device preservation

Step 1 of remediating a malware infected system:

Identify and research malware symptoms

According to the A+ exam guide, what is the first step in malware removal?

Identify and research malware symptoms.

Step 2 of typically used applications in a windows 10 upgrade readiness plan:

Identify and resolve problems with applications

Step 1 of typically used applications in a windows 10 upgrade readiness plan:

Identify important apps and assign importance levels to prioritize your applications

You have determined that a block-level file corruption on the disk has damaged the driver files for a critical piece of hardware. Multiple reboots have failed to correct the problem. You open device manager, what is step 3 to fix this error?

Identify the correct drivers

Step 1 of the troubleshooting process:

Identify the problem

What can cause a "black screen"?

If a computer boots up, but you can't see anything, there is probably a device driver issue with the video card.

What is a good analogy to remember what partitioning is?

If a hard drive is a house, then partitioning is building the rooms in the house so you can put stuff in those rooms.

Describe the concept of a group policy.

If a local computer or network has local security policies in place, those policies govern every computer on that network. However, if that network is part of a domain that is controlled by a domain controller, the domain's Group Policy overrides any local computer or local network policies.

Why is it a bad idea to give individual users on a network permissions, compared to creating User Groups with certain permissions, and then putting people into those groups?

If an individual with certain permissions goes away, say because they quit or were fired, that person is the only one who has those permissions. By using User Groups instead, any/all people in those groups can access all of the same information.

What can you try to do to research why the blue screen of death happens?

If it's hardware-related, then research that hardware and your operating system combination to see if they are compatible. You can also boot into safe mode and look at the Event Viewer to do more troubleshooting.

What is the benefit of creating a Windows Recovery Environment image?

If something goes wrong with your system, you don't have to go find the original installation media.

What does the Active Directory Repair safe boot option do?

If the computer you are trying to fix is a member of a domain, you can do a safe boot to repair any potential domain issues.

Where are programs installed on a Windows computer?

If the program is 64-bit, it goes into the Program Files folder. If it is a 32-bit program, it goes into the Program Files(x86) folder.

When mapping network drives, why is there an option to log onto it with different credentials?

If you are in a local workgroup, rather than logging into a domain, every computer in that workgroup has user accounts on it that have access to whatever the shared content is. If the computer you are accessing the network share through has different login credentials than the shared computer, you will have to enter the other computer's credentials.

What is a network benefit to using MMC?

If you are in a network environment, you can create the customized groups of snap-ins on other computers inside your network so you can work on them remotely.

What is a drawback to using System Restore?

If you collect a lot of System Restore points, not only do they start to take up a lot of storage space, but if you go too far back to restore from a point a long time ago, you will also lose every other update that you've made since then, even updates that did not cause problems.

Why is that oftentimes a service that you know is running cannot be found in Task Manager?

If you go back to the Services utility itself for that service, you can see that it is part of the Service Host service that is the "catch-all" application that runs Windows, and many of the other services are run as part of svchost.exe.

What is Mobile Device Management, or MDM?

If you have a Corporate Owned Device, or COPE, the administrators have very granular control over what can and cannot happen with that phone, including managing and exercising security options.

Do you need to set up a DMZ outside of your network?

If you have services that you need the outside world to access, such a file server, web server, printer server, etc., then a DMZ is a good idea to have between the outside world and your internal network. Otherwise, just having one router set up with NAT will protect your internal network.

What is an account risk that you take if you choose to use online backup accounts?

If you lose the device that you are backing up, you may not be able to get the communications from that provider in order to authenticate your account, and not only will you have lost your device, but you will have lost all of your backed up data as well.

Do you need to install a firewall application on portable devices?

If you only install software from trusted sources, such as the Apple or Google stores, probably not. However, it is not a bad idea, especially if you ocassionally install software packages that aren't from trusted sources.

What are the 2 options for setting up a DMZ between your network and the outside world?

If you want to set up your own DMZ, you'll need a 2nd router - one to the outside world, and one between your network and the DMZ. You can also buy a router or some other security device, and pay a monthly fee for a 3rd party to keep it up to date.

Why would you ever take a computer's NIC out of full-duplex?

If you were using a crossover cable to connect 2 computers to each other, both of their NICs would need to be set to half-duplex.

What should technicians do if they receive a personal call on their mobile phone while servicing a computer at a customer's residence?

Ignore the call and focus on the customer's problem.

You are a PC technician for a company. An employee has gone to a meeting while you fix the computer in her office. She accidentally left a report open next to her computer. It states that a friend of yours in accounting will be submitted for review if their poor work performance continues. What of the following is the BEST action to take?

Ignore the paper and tell no one of its contents.

What controls what Internet Explorer will and will not display?

In Internet Explorer, the Content tab controls what your browser will and will not display. It enables you to grant access to insecure or objectionable sites using certificates as well as a parental-control tool called Family Safety.

What is different about downloading and installing updates from Windows 7 to Windows 10?

In Windows 7, you had the option of not downloading and/or not installing available updates. In Windows 10, you can temporarily pause updates, but you do not have the option of not installing them eventually. The only exception is if you are using Windows Enterprise edition, in which case updates are managed by the System Administrators.

What are the names for privileged users in Windows, MAC, and Linux?

In Windows the Super Users are called Administrators, and in both MAC and Linux, the Super Users are called root.

Name 4 types of shells - or Command Line Interfaces - available today.

In Windows you have the command prompt and also Windows Powershell. In Linux, you have the Bash shell. On a MAC, the shell is very similar to the shell used in Linux.

What is the primary difference between how Windows vs. MAC OS or Linux display partitions?

In Windows, each partition has a drive letter, like C:, D:, E:, etc. In Linux or MAC OS, each different partition is shown as a separate directory in the file structure of the computer.

What are the default, on-going backups that both Windows and MAC OS automatically perform?

In Windows, it is called File History, and on a MAC it is called Time Machine.

How can you take a snapshot of the installation from one computer and then put that same installation - including user settings - on other computers?

In Windows, use the User State Migration Tool, or USMT, or the 3rd party application Ghost to create an image. That image can then be "deployed" to other computers over a network - even hundreds of computers at a time.

How do you actually quit a MAC program?

In addition to text menu options, you can also click the Command key followed by the letter "q".

Can you disable a device if updating its driver does not fix the issue?

In some cases, yes, such as a video card, sound card, etc. Windows will normally have default options that can be used until the non-functioning devices can be fixed.

How can you view content in File Explorer that you normally wouldn't be able to see?

In the Options dialogue box of File Explorer, go to the View tab and check the option to "Show hidden files, folders, and drives".

How is patch management performed on the MAC OS?

In the Systems Settings area, there is an option to search for updates, and it is easily set up to be done automatically.

Where can you view and shut down processes that are running in Windows?

In the Task Manager on the Processes tab.

Where is the information from Event Viewer kept?

In the Windows Logs inside Event Viewer.

How do you enable Wake on LAN on computers?

In the power management section of the NIC Properties, check the "Allow this device to wake the computer" box and also check the "Only allow a magic packet to wake the computer" box.

What are Organizational Units?

Individual groups that exist in an Active Directory environment that individual user accounts and also user groups are added to in order to either get access to certain resources, or be restricted from certain resources.

Branch

Instructs computer to execute a different sequence of instructions

Loop

Instructs computer to repeat a task until a condition is met

What do Intrusion Prevention Systems, or IPS, do?

Intrusion Prevention Systems actively monitor for suspicious activity, and then take action to stop it, such as telling the firewall to close a port, block a specific website, etc. Alerts are also sent out when attacks are blocked.

What do Intrusion Detection Systems, or IDS, do?

Intrustion Detection Systems are either hardware or software-based systems inside your network that monitor all traffic coming into the network from the router. If they see something suspicious, they send out an alert.

spike

Is a powerful surge, such as that caused by a lightning storm.

Trojan Horse

Is a program (usually harmful) that is packaged as something else, function as backdoor applications.

User Account Control (UAC)

Is a solution to the problem of elevated privileges. In order to change important settings on the computer, such as installing drivers or software, administrative privileges are required.

Boot Camp

Is a utility supplied with macOS that allows a full Windows installation to be made on a Mac.

surges

Is an abrupt but brief change in the value of the voltage.

Incident

Is an event that breaches security policy.

PII

Is data that can be used to identify, contact, or locate and individual or, in case of theft, to impersonate them.

mantrap

Is two sets of interlocking doors inside a small space, where the first set of doors must close before the second set opens.

What is SSH, or Secure Shell?

It accesses remote computers, just like Telnet, but the entire communication line is encrypted, including the username and password.

What does the isolation setting do on a Wireless Access Point?

It allows all of the devices in that area to stay connected to the network and all of the network resources, but they won't be able to communicate with each other - not even via ping. This would be useful in a public area where you don't want people using large amounts of bandwidth passing files back and forth.

What does the -l switch do in Linux when using the ls command?

It brings up the same list of files and folders, but with details. Those details include the permissions, the owner, the group, the size, and the last date and time they were edited.

What is a Zero Day attack?

It can be any kind of attack, but the zero day aspect comes from the fact that the details of the attack have never been seen before, so no one has any defense against it.

When setting up port forwarding on the router that protects your network, you have to set up an incoming IP address that the port request will be coming from. How do you determine that IP address?

It depends on where from the outside world you are going to be trying to connect to it. In the case of a home surveillance camera, you could set up one rule that allows incoming connections from your office IP address, and another that allows incoming connections from the IP address of your smart phone.

What is a Recovery Console?

It describes an old anti-malware system that was only on Windows XP.

What does a face recognition scanner do?

It determines whether to authenticate a user by scanning the user's face and comparing that scan to face scans already on file.

What does an iris scanner do?

It determines whether to authenticate a user by taking a picture of the iris of the user's eye and comparing the picture with iris pictures on file.

You have installed anti-malware software that checks for viruses in e-male attachments. You configure the software to quarantine any files with problems. You receive an email with an important attachment, but the attachment is not there. Instead, you see a message that the file has been quarantined by the anti-malware software. Which of the following BEST describes what happened to the file?

It has been moved to a folder on your computer

What is a Distributed Denial of Service attack, or DDoS?

It is a Denial of Service attack where malware has been previously distributed to hundreds or even thousands of computers - usually via email - and the malware then turns those computers into Zombies that attack other servers.

What is Trusted Platform Module, or TPM?

It is a chip that is part of the motherboard or that gets plugged into a system that allows decryption of documents that were encrypted at the disk level, rather than the file level.

How is the Windows 10 Task Manager better than the Windows 7 Task Manager?

It is a much cleaner interface and gives information in specific numbers, such as the amount of available RAM, as opposed to moving percentages that were shown in Windows 7.

What is Data Execution Prevention, or DEP?

It is a security patch that ensures viruses or malware can't force memory usage on a Windows computer to overrun memory usage of other programs, causing them to crash. It can be enabled in the Advanced System Settings area of the System applet from Control Panel.

What are Storage Spaces?

It is a software tool available in Windows where you can "pool" together drives in a more flexible manner than the Windows Disk Management tool will allow.

What is Open Database Connectivity, or ODBC?

It is a tool that uses Structured Query Language, or SQL, which allows almost any application to talk to almost any database. ODBC is the actual communication channel between the applications and the database.

What is Active Directory Repair?

It is a tool that will attempt to use your legitimate username and password to re-establish a connection to the Active Directory server.

What is TCPView?

It is a utility from www.sysinternals.com that works similar to netstat, but with a GUI. In addition to viewing what is happening with various color codes, it will also allow you to close connections by right-clicking on them.

What is the Windows Recovery Environment, or Win RE?

It is a way to make a bootable copy of the version of Windows that is already on a computer so that when you try to "install" Windows from that media, Windows will see that there is already a Windows copy installed, and will ask you if you want to repair that copy rather than install a fresh version.

What does the net command do on the command line?

It is a way to perform very detailed network management, depending on the switches that are used. By itself, the net command will give you a list of the areas you can affect, such as accounts, computers, configurations, groups, etc.

What can low connectivity, unexpected power drain, or high resource utilization indicate if you are in an area or situation where you normally don't experience those things?

It is actually a symptom of someone trying to attack your portable device, and you should turn it off immediately. Get away from that physical area and run an antivirus/antimalware program on your device as soon as possible.

What is almost always the cause of blue screens of death, kernel panic, etc.?

It is almost always a hardware issue, especially if the error happens after installing a new video card or other new piece of hardware.

What is the most common reason for computers to run slowly, other than not having enough RAM?

It is almost always a malware infection of some kind.

What is the Microsoft Management Console, or MMC?

It is an area where you can add and remove "snap-ins" which are Control Panel applets or other utilities in Windows, only with MMC you can create customized groups of those features to group whichever ones you want to use together, such as Disk Management and Device Manager.

What is a smart card?

It is an authentication card with an integrated circuit built in.

What is a File Allocation Table?

It is an index on every mass storage device to keep track - on an LBA by LBA basis - of where everything on that device is stored.

What is the Safe Boot option in System Configuration?

It is another way to customize how Windows starts with minimal services and drivers running in order to perform diagnostics.

What are the Hard Faults per second that are listed in the Memory section of Resource Monitor?

It is basically how many times per second that computer is hitting the Page files because its RAM can't keep up with the demand. If a computer is getting a lot of Hard Faults per second, that computer definitely needs more RAM installed.

What does the Windows xcopy command do?

It is built for larger scale copying on the command line, such as copying entire directories and subfolders.

Describe the FAT 32 file system.

It is extremely old, supports long filenames, supports up to 8TiB volumes, and any given file can be as big at 4 GiB.

What are 2 benefits of using Linux?

It is free, and you can customize it however you like by downloading a specific "distribution", such as Ubuntu.

What is antivirus software?

It is no longer a relevant term, because everything is anti-malware now.

Describe a Commercial license for software.

It is software that was built and compiled by someone else. The commercial license just gives you the right to use the software, not to reconfigure it or try to reverse engineer it.

What does the dd command do?

It is the Linux copying command used for bit-by-bit copying of large amounts of data.

What is EFS?

It is the Windows-based encryption tool called the Encrypted File System. It is actually built into the NTFS file system.

What is Virtual Memory?

It is the act of taking a part of a computer's hard drive and making it act like RAM for those very rare ocassions when so many programs are running that a computer actually uses all of its RAM.

When using Task Scheduler, what is a Trigger?

It is the action or time that tells a task from Task Scheduler to start.

What is a benefit of formatting thumb drives?

It is the fastest, most effective way to delete all files, folders, and folder structures off of the thumb drive.

What is a preshared key?

It is the logon protocol used frequently in coffee shops and other public areas. The "key" is set on the wireless access point, and then given to the customers when they need to access the wi-fi. It is called a preshared key because you have to be given the key before you can access the WAP.

What is the Universal Naming Convention, or UNC?

It is the universal method of how to name shared resources over a network. It always begins with two backslashes, i.e. - \\FileFolder\Subfolder.

What can cause a portable device to "lock-up"?

It is usually a particular application that is streaming or using too many CPU cycles. Shut it down and uninstall it.

What does the Boot Log option do when booting into safe mode?

It logs the boot tasks so you can use them to troubleshoot.

What does it mean if you see astericks in the returned data after running a tracert or traceroute command?

It means those particular routers are configured to not respond to ICMP - or ping - commands.

What must be done to a partitioned mass storage device before it can be used?

It must be formatted.

In the Account Lockout Policy, what does the Account Lockout Threshold do?

It sets the number of times someone can try to log into a computer before their account is disabled.

What does the Span feature do when using dynamic drives?

It spans data across to physical drives, but it is not a very good idea. If either physical drive dies, all of the data on both drives will be lost.

Describe ext4.

It supports volume sizes up to 2 exabytes, and file sizes up to 2 tebibytes.

Describe ext3.

It supports volume sizes up to 32 tebibytes, and file sizes up to 2 gibibytes.

What does the Boot Loader do?

It tells the computer which of the 4 Master Boot Record partitions to boot from in order to boot whichever operating system is stored there.

What does the /? Switch do on the command line?

It tells you what options are available for whatever command that you typed prior to the /?. *

What does a retinal scanner do?

It uses a laser to scan the blood vessels in the back of the eye to authenticate a person's identity.

How is a File Allocation Table set up?

It uses a system called FAT 16, FAT 32 or something similar which is a 2-column spreadsheet. In the left column are the LBA locations such as LBA 1, LBA 2, etc., and each one is assigned a hexidecimal character in the range between 0000 and FFFF. In the right column of the spreadsheet is whatever content is in each of those LBA's.

Describe the exFAT file system.

It uses similar file and volume size limitations as NTFS, but a lot of the overhead has been taken out of the Master File Table so it can be used on smaller-sized drives. exFAT does not support encryption and compression like NTFS does, but it is an ideal file system for thumb drives and smaller storage devices.

What does the %HomePath% variable do in a script?

It will insert the actual homepath of whatever user is logged in at that moment. For example, if the script was being used to delete the log files that are automatically put on each user's Desktop at night, the same script to delete those log files could be run on everyone's computer because of the %HomePath% variable.

What is one thing to remember about OS upgrade media?

It will normally only let you upgrade at the same level of whatever OS you are using, such Windows 7 Home to Windows 10 Home, etc.

Why are plasma displays smaller than 32 inches not typically sold?

It would be too cost prohibitive to manufacture plasma screens under 32 inches.

.js

JavaScript file extension

How can you test your local DNS server without running nslookup?

Just ping a fully qualified domain name, such as google.com from the command line. The responses back from the ping will include both the domain name and that domain's IP address if the DNS server is working properly.

How do you share a folder on a network?

Just right-click on it and then choose "Give access to" and choose the people or groups you want to share it with.

How do you encrypt a file or folder using EFS on Windows?

Just right-click on the file or folder, go to Properties, then go to Advanced.

How do you access Remote Desktop in Windows?

Just type it into the search bar and the program will come up.

How do you navigate to a different drive in the Windows command shell?

Just type the drive letter followed by a colon. For example, to go from the C drive to the D drive at the command prompt, just type d:.

While you are working at a job site, what should you do if you overhear that the company plans to lay off 45 percent of the workforce at that location?

Keep the information confidential.

Laptop are typically used in dirtier environments regular maintenance should include:

Keep vents clear of dust and debris Use on a flat surface to allow airflow If used on a lap, use a chiller pad or mat to allow airflow Use compressed air to clean keyboard Use soft cloth and approved cleaner for screen, touchpad, and case

What is the advantage of using Kerberos?

Kerberos can be used to manage access control to several services by using one centralized authentication server.

Which of the following are examples of authentication possession (something you have) to support multifactor authentication?

Key fob and Smart card

Which of the following is the MAC password management tool?

Keychain

What is Keychain on a MAC?

Keychain is a password management system built into OS X. It stores passwords and account information for users.

What does a Keylogger do?

Keyloggers try to hide inside other software that you are running, and then they record all of your keystrokes, including whenever you enter your usernames and passwords.

What does the kill command do in Linux?

Kills any specified running process. To see a list of available processes to kill, type the kill -l command, and then to kill them, just type the kill command followed by the process ID.

If the Protective MBR is kept in LBA 0, where is GPT initialized?

LBA 1 contains the Primary GPT Header.

When creating a backup of files, what are the 2 options?

Let Windows choose what to backup, or choose manually.

A new laptop was delivered to you home and left on the porch while you were at work. It is very cold outside, and you don't know how long it has been there. You unpack the computer. You would like to know if it is working properly. Which of the following is the BEST action to take?

Let the computer warm up to room temperature before turning it on.

What is Tailgating?

Letting someone come in behind you into a secure area even though they don't have the proper credentials or because you didn't realize they were there.

What is different between Windows and Linux when using text on the command line?

Linux commands are case-sensitive, but Windows CLI commands are not.

.sh

Linux shell script file extension

Shell script

Linux's batch file

What diskpart command will show the partitions of the selected disk?

List partition.

What does the tasklist command do?

Lists all tasks that are presently running on that system. It includes the process name and process ID number, which is useful to have if you want to turn a process off.

What is a Local Security Policy?

Local Security Policies are only in effect on the specific system that they were created on.

What tool would you use to set a password policy for the client machine's local user accounts?

Local Security Policy

Which of the following tools would you use to rest a local account password?

Local Users and Groups

What should you do every single time you walk away from your computer, even for a short time?

Lock your computer and remove any tokens, smartcards, etc.

What is LBA0?

Logical Block Address 0 is the first part of a mass storage device where the computer looks for the operating system. It is the location of the Master Boot Record.

Of the following choices, which action could be most physically harm to you?

Looking into the end of a fiber optic cable.

Surge protectors

Low cost Protect one or two devices Rated by various standards (UL 1449)

What are the three recycling or repurposing methods listed on the A+ exam guide?

Low-level format vs. standard format Overwrite Drive wipe

LC

Lucent connector

What is the current version of the MAC OS?

MAC OS X.

What is the Memory Controller Chip, or MCC?

MCC's used to be external chips, but most modern versions are built into CPU's. The MCC has as many wires as the number of external data buses on the CPU and is connected to them. It's job is to grab bytes of information from RAM and put those bytes onto the CPU's external data buses.

In order to ensure maximum security for your corporate owned mobile devices, which of the following should you make certain the device supports before you make your buying decisions?

MDM policy, Remote wipe and lockout policies

Which of the following utilities would you use to quickly determine the non-Windows applications configured to launch automatically at start-up?

MSConfig

What must you plan for when running Windows Memory Diagnostics that is not a concern with most other administrative tools?

Machine downtime

What are two 3rd party tools you can use to create backup images for Windows computers?

Macrium Reflect 7 and EaseUS ToDo Backup. You would still use the WinRE to recover your system, but the images from those products are more effective than the native Windows 10 images.

What should you do if you receive an urgent message from your office while working on-site?

Make a short call to determine the nature of the urgency.

What should you do before installing Windows?

Make sure your computer meets the minimum requirements.

Preparation

Making the system resilient to attack in the first place. (Hardening systems, writing procedures, and establishing confidential lines of communication).

What happens during a Denial of Service attack?

Maleformed http requests are sent to a web server that overload the server while it tries to figure out the requests. The maleformed requests are sent in such volume that the server can't keep up, and people legitimately trying to access that server's resources are unable to.

Where should you download 3rd arty drivers from?

Manufacturers website

What is often happening when you run netstat and see opening listening ports that you can't identify?

Many hardware manufacturers set up their devices to always be listening for a call from the manufacturer to get on-going updates. It is also possible that there is malware on the computer, but that is easy to check for.

In which specific area of a hard disk drive does a boot-sector virus place its starting code?

Master Boot Record (MBR)

Which of the following correctly identifies a document describing procedures for safe handling, use, storage, and disposal of potentially hazardous materials?

Material Safety Data Sheet (MSDS)

Which documentation states hazardous nature, ingredients, precautions to follow, health effects, safe handling information, and other important information about chemicals?

Material Safety Data Sheets (MSDS)

Which of the following correctly identifies a document describing procedures for safe handling, use, storage and disposal of potentially hazardous materials?

Material safety data sheet (MSDS)

UPS rated according to maximum VA it can supply

Maximum power rating determined by battery specs and power handling of inverter and circuitry Total watts needed by devices, multiply by 1.67 Vendor configuration wizard

Respect

Means that you treat others (and their property) as you would like to be treated.

What is included with Windows 7 but not other versions?

Media Center, which was software meant to allow you to watch, listen, and control all of your pictures, videos, music, movies, etc. Windows 7 is the only version that natively came with Media Center.

MBSA

Microsoft baseline security analyzer

MSConfig

Microsoft configuration

MMC

Microsoft management console

Which two password policy settings combine to make it impossible for users to quickly reuse their last password?

Minimum age and Enforce history

Can a 64-bit processor run 32-bit programs?

Most of the time, yes, but the program itself will only ever be able to use up to 4GB of RAM because that is all a 32-bit processor can control, even on a 64-bit system.

When you are sizing the load for a UPS, how would you calculate the power used by a PC component?

Multiply its Voltage (V) by the Current (I) it draws to calculate power drawn in Watts (W=V*I). You may then need to convert this to a VA rating by multiplying by 1.67. When power is supplied, some is lost through the function of inverters and capacitors. This means that the supply, measured as VA, must exceed the watts drawn by about 70%. This ratio is also described as the Power Factor (PF).

Name 3 types of file formats.

NTFS for Windows, HFS for MAC, or EXT4 for Linux.

What is New Technology File System, NTFS?

NTFS is the standard file structure for the Windows operating system. It includes innovative data structures that increased performance, improved metadata, and added expansions like security access control via ACL's, reliability, disk space utilization, and file system journaling.

What controls the permissions that individual people or User Groups have in modern versions of Windows?

NTFS.

Which of the following commands will map the network drive x: to the share "DATA" on the file server "SRV01" each time someone logs into the machine, but using the currently logged on user's credentials?

Net use x: \\SRV01\data /persistent:yes /savecred

Which of the following should contain the unpacked installation binaries to support an automated network-based rollout of your new OS?

Network Share

What is the name of a Microsoft WIndows feature that allows for user-based filed level encryption?

New Technology File System (NTFS)

What is the name of a Microsoft Windows feature that allows for user-based file level encryption?

New Technology File System (NTFS)

Which of the following is the correct PowerShell cmdlet to create a user object in AD?

New-ADUser

Which of the following is the correct PowerShell cdmlet to create a user object in Active Directory?

New-AdUser

Do all Linux distributions perform updates just like Ubuntu?

No - each distribution is different.

Are the default settings in the Local Security Policy automatically audited?

No - you have to turn on the specific local policy events that you want to track. *

What was the only significant difference between Windows 8 and Windows 8.1?

No one liked the fact that Windows 8 did not have a Start button, so the only significant change in Windows 8.1 was the addition of a Start button that worked in a similar fashion - but not exactly - like the Windows 7 Start button.

What is the size limitation of the 4 partitions contained in a Master Boot Record?

No partition can be larger that 2TB. GPT overcame that size limitation.

Daily general preventive computer maintenance

No ventilation slot obstructions Equipment is installed securely No liquid hazards

Are Windows the only computers that use domain controllers?

No, MAC has a similar feature called file and print sharing, and the Linux version is called Samba. In both cases, those other operating systems are still using a Windows domain controller.

Do you need a password to open documents that you encrypted with EFS?

No, as long as you are logged in as the same user who encrypted them in the first place. Those documents will only be encrypted for other users.

Do NAS computers need high-end CPU's?

No, because they do not need to perform at the higher levels supported by more powerful processors.

Can the options for waking up a computer be set to run while the operating system is sleeping?

No, because when a computer is asleep, there is no operating system. The options for waking a computer up must be set in the BIOS.

Can you throw away CRT monitors?

No, but there are people who will take them off of your hands for free because they want to strip the metal out of them.

Do MAC and Linux have built in file or disk encryption tools?

No, but there are plenty of 3rd party applications that will work.

Do Linux systems have drive letters?

No, everything is done in folders and subfolders, so navigating a command shell is similar to Windows, but there are no drives to navigate to.

Can you only move up or down one folder at a time when using a command shell?

No, if you know the specific path that you want to go to, you can "jump" all the way to it. For example, to jump down from the root directory of c:\ to get into the Windows\tracing folder, just type cd, space, backslash, Windows, backslash, tracing. You can also jump all the way back to the root directory by typing cd c:\.

Are Windows updates permanent?

No, if you suspect an update has caused a problem, you can uninstall it.

Is the Properties area of the NIC the only place that Wake on LAN can be configured?

No, it can also sometimes be enabled or disabled in the System Setup, depending on the type of motherboard that is being used, so always check both areas.

Is Samba automatically installed on all Linux systems?

No, it depends on the distribution.

Is Visual Basic commonly run on MAC computers?

No, it is almost always run in the Windows environment.

Is a computer's power button an actual power button that will turn a computer on and off?

No, it is just a switch that can be programmed to do various things based on the manufacturer and the options that are available in the BIOS. Often times it will turn a computer off, put it to sleep, or turn the computer off after a brief delay.

Does NTFS use a FAT file system?

No, it uses a system called MFT, or Master File Table.

Are NTFS permissions to files or folders the same as network sharing of files and folders?

No, network sharing is a separate type of permission granting.

Are all programs that run on open source systems such as Linux also open source?

No, not necessarily. Just because the operating system distribution is open source doesn't mean that commercially available software can't be run on it.

Is Telnet encrypted?

No, the connection is not encrypted, not even the username and password that you use to log into a remote location.

Is written code ready to be executed?

No, the original code is a simple text file. It has to be compiled into an executable file before it can be run.

Do all user groups in Windows have actual people in them?

No, there are groups for things like performance monitoring and similar functions that are just there to have a set of permissions available for tending to those various administrative tasks.

Are programs written in Interpreted Languages made into executable files?

No, they are "read" by an interpreter on whichever machine they are being run on, and the interpreter gives the operating system whatever it needs to properly run the program.

Do DDoS attacks happen as soon as a computer is infected with the malware that will control the attack?

No, to the contrary. Attackers will set up some sort of a signal that the DDoS server sends to all of the computers at once months or even years later that tells them all to attack at the same time. The owners of the computers aren't even aware that they are infected with the malware.

Does Linux use standard tools for formatting and partitioning like Windows does?

No, you can choose from whatever tool you enjoy using.

Are you stuck with the default Event Viewer settings?

No, you can edit the Audit Policy and set up your own events to keep track of.

In Windows, while creating partitions on a new drive, do you have to give that partition a drive letter?

No, you can mount it inside a pre-existing NTSF folder rather than assigning it a specific drive letter, or you could just choose to not give it a drive letter at all.

To protect a Windows 10 system, you've configured System Restore to automatically protect your system using restore points. Will this adequately protect the user data on the system?

No, you need to enable File History.

Is sharing automatically enabled on Linux and MAC OS systems?

No, you often have to enable it, and it will create a new area in file browsers called "Other Locations" or something similar. Those other locations are other computers that any given computer has access to.

Are shares that are accessed using SAMBA automatically available when you try to access them?

No, you still have to put in your username, password, and name of the domain that the shares are accessed over.

Will Bitlocker work in Windows if a TPM module is not installed, or is not turned on in the BIOS?

No, you will get an error message saying that TPM is missing.

Do you have to be able to load Windows in order to use Restore points?

No, your saved Restore points can be loaded during in the Windows Recovery Environment.

You need to back up user data on a Windows 10 system. The computer has a single SSD storage device installed that contains both the Windows operation system (in C:\Windows) and user profile data (in C:\Users). You plan to do the following: -Use Backup and Restore to backup user data. -Run the backup automatically every night at 11:00 p.m. -Store the backups in the C:\Backups folder. -Include a system image in each backup. Will this configuration work?

No. Backups created with Backup and Restore can't be stored on the drive that contains the information being backed up.

Is the TPM module always turned on?

No. On desktop systems, you often have to have a separate device that is plugged into the computer. If TPM is on the motherboard - as is often the case with laptops - you have to turn on TPM in the system settings.

Do all routers support Dynamic DNS?

Not all routers can configure Dynamic DNS. Sometimes you have to pay a 3rd party service for your Dynamic DNS name.

Is file sharing automatically turned on in Linux or on the MAC OS?

Not necessarily, and even if it is, you want to go into system settings to ensure the specific resources that you want to share are set up with the people or groups that you want to share them with.

Do laptop batteries last the life of the laptop?

Not normally. Depending on usage, laptop batteries can die within 2-3 years and will need to be replaced, no matter how long your charge them.

Can you delete directories in Windows that have contents in them?

Not using the rd command, no. Using the command shell, you can append the /s switch to the rd command, and you will be prompted whether or not remove a directory that has folders in it. Using Powershell, you can just use the rd command without the /s switch, and Powershell will give you a similar prompt.

Do 3rd party VPN providers use the built-in ability on a portable device to set up a VPN?

Not usually. Most of the good providers will have their own application that gets installed on the portable device, such as the Private Internet Access company.

Which of the following can you use to strip all the formatting away from data to make it nearly universally portable?

Notepad

You are setting up a print server and want to enable access for the widest range of Windows 7 machines possible. Should you install separate drivers for the Home and Enterprise editions?

No—there is no difference between editions in this regard. You do need to install drivers for x86 (32-bit) and x64 (64-bit) versions, though

You have booted your Windows workstation into Safe Mode and enabled Boot Logging. To which log file is the boot logging information now being written?

Ntbtlog.txt

What tool would you use to make a flat file database available to an application you are developing?

ODBC Data Sources

What should you do to help a customer if you notice that your coworker is unable to provide resolution to customer queries and the customer is becoming irritated?

Offer your help to the co-worker and the customer.

How can you troubleshoot the connection between any given client and any other device or website that you are trying to connect to?

On Windows, run the tracert command from the command line, such as tracert google.com. On a MAC or Linux machine, run the same command, only spell out traceroute, such as traceroute google.com.

What is a Protective MBR?

On drives that have been partitioned with GPT, if that drive gets put into a machine that supports MBR, a warning will be displayed. The warning will say something like "Cannot read LBA partitions" so the operator of that computer will know there is already data on that drive. That data is kept in LBA 0 so it is read first.

Where is fragmentation the biggest problem?

On magnetic hard drives. It is not as big of a problem on SSD's.

Where are NTFS permissions listed for any given file or folder?

On the Security tab of the Properties dialogue.

Where is FAT 32 used in modern computers?

On very small hard drives, and sometimes on thumb drives.

Containment, Eradication, and Recovery

Once the incident is contained, the cause can then be removed and the system brought back to a secure state.

When setting up a host-based firewall, what are the 3 firewall options depending on the type of network you are connecting to?

One firewall for logging into an Active Directory domain, one for logging into a Workgroup, and one for logging into a public or guest network, such as when at a coffee shop, or using the free wi-fi at an airport.

What is Unified Threat Management, or UTM?

One, all-encompassing security solution. It will include things such as firewalls, IPS, anti-malware, etc. It will usually have quick-look reporting screens where you can easily monitor your network, and often times will also be cloud-based so the network can be watched and managed remotely.

What happens when MAC filtering is enabled on a wireless network?

Only MAC addresses that are specifically allowed connection are granted connection.

When do you run DISM?

Only after you have run SFC, and SFC found some problems that it could not repair. If you do have to run DISM, you should run SFC again afterward to ensure everything was fixed.

What does the principal of least privilege mean?

Only give people enough resources or options to do whatever it is that they need to do.

Will the Master Boot Record's limitation of having only 4 primary partitions apply to an entire computer?

Only if that computer only has one mass storage device. The MBR limitations are per hard drive or mass storage device, not per computer.

When is the only time that a computer administrator will be using Component Services or ODBC?

Only when a programmer has asked you to make changes, and they will walk you through the process.

How can you automate tasks that need to be run regularly in Windows?

Open Control Panel, go to Administrative Tools, and then open Task Scheduler.

How do you edit the Audit Policy?

Open the Local Security Policy program.

You want to be able to access your home computer using Remote Desktop while traveling. You enable Remote Desktop, but you find that you cannot access your computer outside of your home network. Which of the following is the BEST solution to you problem?

Open the firewall port for the Remote Desktop protocol.

Environment affects a computer's:

Operation and Lifespan

What is the function of OCR?

Optical Character Recognition (OCR) software can convert a scanned image of text into a digital text file that can be edited in a text editor or word processor.

What is Port Forwarding?

Ordinarily, routers will block all incoming connection requests that weren't initiated from inside a private network, such as for Port 80 for web pages. However, if you want to allow a certain port to go through, say to access the web-based GUI of a home security camera, you can forward incoming port requests to specific devices or computers inside your network.

What should you do if the wireless signal in your area suddenly becomes intermittent or the signal becomes weak?

Other than too many hosts using the available bandwidth, use a wi-fi analyzer to see how many SSIDs are broadcasting in that area. You may need to move from 2.4 Ghz to 5 Ghz, or just move to a different channel in either of those bands that isn't as crowded with other SSIDs.

Which disk management function is available in the MAC disk utility but NOT in the Microsoft disk management tools?

Overwrite

What are the 4 types of data that administrators need to monitor and control?

PII, Personal Health Information, or PHI, the EU General Data Protection Regulation, or GDPR, and the Payment Card Industry Data Security Standard, or PCI-DDS.

You want to use a protocol that can encapsulate other LAN protocols and carry the data securely over an IP network. Which of the following protocols is suitable for this task?

PPTP

What is the Preboot Execution Environment, or PXE?

PXE is a booting or installation technique in which a computer loads the operating system from a connected network rather than from a boot device. It is also known as network share booting.

What are the 2 ways to boot a computer over a network?

PXE or Apple's Net Boot.

Which of the following are Storage Spaces configurations?

Parity Simple Mirror

Which of the following are storage spaces configurations?

Parity, Simple and Mirror

What are 4 common partitions to put on hard drives?

Partitions for the operating system, the swap files, recovery partitions, and personal preference, such as putting data files in their own partition so they don't interfere with the operating system.

What does the Store Passwords using Reversible Encryption option do?

Passwords in Windows are normally stored with a non-reversible encryption called a Hash. The Reversible Encryption option still encrypts the password, but it is not as secure as using a Hash in case you wanted to try to recover it later.

As far as CompTIA is concerned, what are the best type of passwords to use?

Passwords that have upper and lower case letters, numbers, and special characters. In reality, the dictionary attacks and rainbow table attacks only have hashes for something like 12 or so character passwords. If you make your password a really long phrase, even if it's just regular text, the hacking algorithms won't be able to guess it.

How do you fix the effects of a Zero-day attack?

Patch management.

What does the acronym PCI denote?

Payment Card Industry

On an organizational level, other than your administrative tasks protecting your systems from malware, what else can be done to stop the spread of malware?

Perform end-user education about what malware is, what symptoms to be on the lookout for, and what to do if those symptoms happen.

Which of the following actions should you take before repurposing a hard disk?

Perform low level format

Which of the following tools would you use to create a baseline of system performance?

Performance Monitor

What are the 3 layers of physical security?

Perimeter security, security of rooms, and security of individual computers.

What does the acronym PHI denote?

Personal Health Information

What is Phishing or Whaling?

Phishing is trying to trick people into giving you information over email or even via web pages. Whaling is that same attempt, only targeting high-ranking officials and managers.

Name 6 social engineering attacks.

Phishing, Spear Phishing, Tailgating, Shoulder Surfing, Dumpster Diving, and Telephone Scams.

What is the difference between 1st generation PoE and PoE+?

PoE+ provides more electricity than 1st generation PoE. Both the device getting the power and the switch that it is plugged into have to support PoE+ for it to work, but it the most common standard used today.

What port does SSH use?

Port 22.

Sag

Power supply to components briefly dips below required levels.

What is the difference between the permissions that an Administrator account has vs. a Power User account?

Power users have all of the same powers and permissions that Administrator accounts have except that power users cannot take control of a different user's account, but Administrators can.

.ps1

PowerShell file extension

What tool can you use to confirm that basic print functionality is available?

Print a test page by using the option in the setup wizard or on the General tab of the Printer Properties dialog box

What tool would you use to share a printer with least administrative effort?

Print management

A user reports that the printed output is not up to the usual standards for her printer. You will need to resolve this issue so she can print her report. What is the overall process for troubleshooting this issue?

Print out a test page to see if you can reproduce the problem the user reported. If you see the same problem as reported by the user, identify the print defect, based on the type of printer, to resolve the problem. Document the steps you took to resolve the problem.

Name the 7 tabs found in Windows 10 Task Manager.

Processes, Performance, App History, Startup, Users, Details, and Services.

Which of the following tabs would you access in Internet Options in order to manage add-ones?

Programs

How do you get around the problem of compiled executable files being specific to any given operating system or CPU?

Programs can be written in Interpreted Languages instead, such a Visual Basic, Python, and Javascript.

In addition to proper temperature and humidity, what else is important for computer environments?

Proper ventilation to ensure they don't overheat, and to remove any hotspots that aren't obvious to the humans.

Battery backups

Protection against blackouts. Battery backups provide temporary power at the component level. (Power redundancy)

msinfo32

Provides a Windows interface to some of the configuration information contained in the registry.

What does the ps aux command do?

Provides extremely detailed information about all processes running on the system, for all users.

What does the ps command do in Linux?

Provides information about the currently running programs, including their process IDs, for the present user. The 4 details included are PID, TTY, TIME and CMD. TIME is the amount of CPU (central processing unit) time in minutes and seconds that the process has been running. CMD is the name of the command that launched the process.

Operating System (OS)

Provides the interface between the hardware, application programs, and the user.

Which of the following acts as a firewall and web filter, provides share network connections, and caches data to speed up common requests?

Proxy

You have a workstation running a 64-bit version of Windows 8.1 Professional that you would like to upgrade to Windows 10 Professional. You want to perform the upgrade with the lowest cost and least effort. Which of the following would be the BEST way to install Windows 10?

Purchase a 64-bit upgrade version of Windows 10 and perform an in-place upgrade.

You have a workstation running Windows Vista Business edition that you would like to upgrade to Windows 10 Enterprise edition. You want to perform the upgrade with the least amount of effort and cost. Which of the following would BEST meet your needs?

Purchase a full version of Windows 10 and perform a custom installation.

After any changes have been made, what are the next 2 critical steps?

Put together detailed documentation describing the change, and also put together a lessons learned database.

.py

Python file extension

While running a full system scan using your anti-malware software,three files have been identified as possible problems. You want to keep the files intact so you can review them later, but you also need to ensure they can't harm anything else on your computer. Which of the following is the BEST next step?

Quarantine the files.

Which of the following should you install to support wireless authentication and network access?

RADIUS server

What is Remote Desktop Protocol, and what port does it run on?

RDP is a way to control a remote computer as if you were sitting in front of it, including keyboard, mouse, etc. It uses Port 3389.*

Which of the following record types must your add to DNS to implement DNSSEC?

RRSIG DSNKEY

RFID

Radio Frequency Identification

RFI

Radio Frequency Interference

How did the visual interface of Windows 8 differ from Windows 7?

Rather than a start button, the desktop interface was replaced by a "metro" version that had tiles you clicked to do various activities. You could also type in the name of any given program and it would come up as an option to be clicked on.

How does the Linux command line handle switches?

Rather than using a forward slash like Windows does, Linux uses a dash followed immediately by whatever the switch is.

What is your effective permission to a share (accessed across the network) to which you have been assigned Read share permissions and NTFS Modify permissions to?

Read

What permissions must be assigned to the Authenticated Users group on the distribution share to ensure all users will have the application installed?

Read Read and Execute

What are the 3 permission levels used in Linux and MAC OS?

Read, Write, and Execute. These permissions apply to the Owner of files and folders, and there are also Read, Write, and Execute permissions that are applied to all Groups that anyone is a member of. There is also an Everyone permission level that an owner can assign globally to a file or a folder.

chain of custody

Records where, when, and who collected the evidence, who has handled it subsequently, and where it was stored.

dumpster diving

Refers to combing through an organization;s (or individual's) garbage to try to find useful documents.

Which of the following tools do you use on a Windows 10 machine when the Microsoft guidance directs you to edit a registry key?

Regedit

Considerations when purchasing UPS (Uninterruptible Power Supply)

Reliability Cost Uptime Maintenance System performance and features

Step 4 of remediating a malware infected system:

Remediate the infected systems

What is the difference between allowing remote assistance on a computer vs. allowing RDP?

Remote assistance still allows the local computer to have control over the mouse and the keyboard while the remote assistance connection has control of their own version of mouse and keyboard on the remote system. In a remote desktop connection, only the person connected via RDP has control.

Which of the following actions would be appropriate responses to an "invalid boot disk" error message in Windows?

Remove USB Verify boot order in SYSTEM BIOS Remove CD/DVD

How can you get rid of old smart phones and tablets?

Remove all of your accounts from them, save the data to another device, then factory reset them. After that, someone will buy them or take them off your hands.

What does the -n switch for the netstat command do?

Removes a lot of the excessive text that is returned from the command and gives a more succint, numerical display.

What should you do to secure the built-in admin and guest accounts on any Windows machine?

Rename them

When users are found in possession of content restricted by your Acceptable Use and corporate compliance policies, which of the following should be part of your first response?

Reporting through proper channels, Data/device preservation and Problem identification

Which of the following actions are you most likely to take in the event your mobile device has suffered unauthorized access via malware?

Restore from Cloud back, Uninstall apps, Reinstall apps and Change your password

You need to restart the Print Spooler service on a Windows 7 machine. You have logged on as Administrator. What are your next steps?

Right-click Computer and select Manage. Select Services and Applications→Services. Right-click Print Spooler and select Restart

Which of the following would let you change the screen resolution with least administrative effort?

Right-click Desktop -> Display settings

In addtion to Control, Alt, and Delete as well as Control, Shift, and Escape, what is another way to access Task Manager if you are in Windows 10?

Right-click on the Start button.

How do you perform error checking on any given mass storage device?

Right-click on the disk and go to Properties. From there, access the Tools tab.

How do you view the contents of an operating system ISO file?

Right-click on the file and choose "mount" to view the files on that ISO.

Where would you find the settings to change the speed that a computer's network card works at?

Right-click on the network card in device manager, go to Properties, Advanced tab, and then click on Speed & Duplex.

What is a fast way to get to the System information applet in Control Panel from inside File Explorer?

Right-click on this "This PC" in the navigation pane and go to Properties.

Why will using Robocopy at the command prompt to copy a corrupt profile into a new folder potentially fix it?

Robocopy run as an Administrator will only copy good, working files. If there are any corrupted files in the original, corrupted profile folder, robocopy will not copy those files into the new profile folder.

What software program can be used to put installation ISO's on thumb drives or other removable media?

Rufus.

What is the first thing to do after starting the diskpart tool?

Run the list disk command to see the status of the system drives.

SSH

Runs on TCP port 22. A remote administration and file copy program that is flexible enough to support VPNs too (Using port forwarding).

What does Secure Shell, or SSH allow you to do?

SSH enables a user or an application to log on to another device over a network, execute commands, and manage files. It creates a shell or session with a remote system, offers strong authentication methods, and ensures that communications are secure over insecure channels.

Hibernate/Suspend to Disk

Saves any data in memory (open files) to disk (as hiberfil.sys in the root of the boot volume) then turns the computer off.

You have determined that a block-level file corruption on the disk has damaged the driver files for a critical piece of hardware. Multiple reboots have failed to correct the problem. You open device manager, what is step 2 to fix this error?

Scan for hardware changes

Step 5 of remediating a malware infected system:

Schedule scans and run updates

How can you find out the best way to track the performance of a given piece of hardware or software?

Search the Internet for discussions about what type of counters to load into Performance Monitor to find the specific information that you are looking for.

Which of the following features of Bitlocker is unavailable without a TPM 2.0 module?

Secure Boot (per boot security)

SSL

Secure Sockets Layer

What is Secure Sockets Layer, or SSL?

Secure Sockets Layer (SSL) is a security protocol that combines digital certificates for authentication with public key data encryption

What are the 2 methods that are used to encrypt https connections?

Secure Sockets Layer, or SSL, and Transport Layer Security, or TLS.

Marcus was attempting to tweak the way his Windows 10 workstation boots when he inadvertently corrupted his system boot files. It will now no longer boot to a logon prompt. He boots the system from the Windows installation disc and access the Recovery Environment. What should he do next?

Select Troubleshoot > Advanced Options > Startup Repair

SMB

Server Message Block

What are 4 devices that frequently use Linux?

Servers, Routers, Raspberry Pi, and Android phones.

What tool would you use to restart a stopped instance of the SQL Service?

Service.msc

Which of the following tools would you use to determine service dependencies?

Services

What are some of the options that can be controlled by the Services utility on Windows?

Services can be started, stopped, disabled, or set to run automatically, manually, or at a specific time.

A small business hires an after-hours cleaning service that is known to have a high turnover of employees. they want to prevent unauthorized access to their computers, but do not want to spend money on new hardware. Which of the following is the BEST solution?

Set login time restrictions.

Which option do you use to create a backup of your actual files when using the Backup and Restore Windows 7 applet?

Set up a Backup.

Incident response policy

Sets out procedures and guidelines for dealing with security incidents

In Local Security Policy, what does the Enforce Password History option do?

Sets the number of passwords that will have to be used before you can reuse a previous password. For example, if it is set to 3, you will have to use 3 different passwords before you can reuse the first one again.

What are the 2 things that the Local Security Policy program does?

Sets up the Policy for that system, and allows editing of the Audit Policy.

Which of the following commands would you run to check and fix protected operating system files?

Sfc

What is a brownout?

Short lived drop in voltage

What does the /ah switch do when using the dir command?

Shows all files with the hidden attribute.

What does the net view command do?

Shows all of the computers that are on the network of the computer that ran the net view command.

What does the netstat command do?

Shows the present status of all TCP and UDP connections running on a computer. This includes all connections to all devices, web pages, etc., - not just the one connection that the computer is using to access the Internet.

What should you do with documents that are no longer needed, but have official or sensitive information on them, including PII?

Shred them, rather than putting them in a dumpster where they can be found and exploited via dumpster diving.

You found an exposed electric wire, which can be dangerous for people working near it. What should you do FIRST before repairing the wire?

Shut down the electricity.

What does the taskkill command do?

Shuts down any given service that is running on a computer either by its process name or process ID number.

What can cause signal drop?

Signal drop is a momentary loss of signal in a communications system, caused by noise, propagation anomalies, or system malfunctions. In mobile devices, a dropout of more than a few seconds results in a dropped call and allows the intervention of call hackers to affect the security.

SNMP

Simple Network Management Protocol

What is an Extended Partition?

Since Master Boot Record is limited to no more than 4 partitions, you can take the final 4th partition and divide it up into logical, extended partitions/drives that will each have their own drive letter. The other 3 partitions will be known as Primary partitions.

What is a file sharing benefit of using Active Directory domain accounts on individual computers?

Since all computers will have a domain login in addition to logging into their same local workstation with that domain account, each local computer can share files and folders with every other computer in that domain.

What is Dynamic DNS, or DDNS?

Since the WAN IP address of your router might change from time to time because it is probably set up with DHCP by your ISP, some routers have a DDNS feature that "names" whatever WAN IP address you have. The DNS name that your router has will not change, so you can set up port forwarding to that name, rather than to a specific IP address.

Why do you have to be extremely careful when using copy and move commands from the command line?

Since there are few warnings if you do something wrong, you can easily mess something up pretty badly without even realizing it until much later.

What would you call an authentication solution that enables a user to access multiple systems (such as your network and a cloud-based service) with your network login, despite the second service normally needing a separate username/password?

Single Sign-On (SSO)

Which of the following security technologies stored identification information in a magnetic strip, radio frequency transmitter, or hardware contact to authorize access to a computer?

Smart card

Which of the following are samples of authentication possession (something you have) to support multi factor authentication?

Smart card Key fob

What can a shutdown and restart of your Windows 10 mobile device also be called?

Soft reset

Optical Character Recognition (OCR)

Software that can identify the shapes of characters and digits to convert them from printed images to electronic data files that can be modified in a word processing program.

What is Ransomware?

Software that makes it seem like a virus has attacked a computer, and then points the user to a website for "free" anti-virus that will solve the problem. People download and install the anti-virus software, and that is the actual virus that has now infected that computer. Sometimes people will actually charge to remove the alleged virus.

What is Spyware?

Software that watches what is happening on your computer, and then takes action or produces ads related to what you are doing in order to drive traffic to other websites.

Shareware

Software that you can install free of charge so that you can evaluate it for a limited period.

Do wireless access points only broadcast on one radio?

Some will broadcast 2.4 Ghz on one radio, and 5 Ghz on a second radio. Be sure to configure both radios when setting up the WAPs.

Why should you not store passwords in a text file on your desktop?

Someone can open the file and read your passwords.

What is a brute force password attack?

Someone uses a program that tries every possible hash combination for any given password length until they find they right one, even though there could be billions of possibilities.

What are the 3 different authentication factors, and give an example of each.

Something you are, such as biometrics like a fingerprint or a retinal scan, something you have, such as a smart card, and something you know, such as a password or pin code.

On Linux or MAC OS, are there user accounts that are automatically configured to communicate with Windows machines on those same domains?

Sometimes, but not always. In both Linux and MAC OS, you can go to the local user account area, and if the user accounts are not already there, you can create them.

What term best describes an attack that involves sending an email addressed to everyone in your company, that appears to come for an internal address and requires your network credentials in order to open an attachment, all in an attempt to steal the credentials?

Spear phishing

What term best describes an attack that involves sending an email addressed to everyone in your company, that appears to come from an internal address and requires your network credentials in order to open an attachment, all in an attempt to steal the credentials?

Spear phishing

Which of the following best describes the activity of an intruder on the network who has changed the MAC address of their laptop to gain access to a network with MAC Filtering enabled?

Spoofing

Which of the following best describes the activity of an intruder on the network who has changed the MAC address of their laptop to gain access to a network with MAC filtering enabled?

Spoofing

What is Spotlight?

Spotlight is a search feature in Mac OS X used to search for documents, images, applications, and so on.

Step 3 of typically used applications in a windows 10 upgrade readiness plan:

Start the upgrade process

shoulder surfing

Stealing password or PIN, by watching the user type it.

What should you do if you cannot delete a job stuck in the print queue?

Stop the print spooler service, delete the spooled file, then restart the spooler.

Environment variable

Storage location in OS's command shell; uses %%

What does su stand for in Linux?

Super User.

In windows, what is the actual file name of the paging file?

Swapfile.sys, and it is normally a hidden file in the root directory.

What do battery backups and UPSs allow you to do?

Switch to alternate power source Shut down device properly Save files Length of time depends on the load

Once in the WinRE, what are the 5 troubleshooting options?

System Restore, Uninstall Updates, System Image Recovery, Startup Repair, and Command Prompt.

What is the volume containing the boot configuration database called?

System Volume

True or false? When you print 10 copies of an uncollated job, 10 copies of page one are printed, followed by 10 copies of page two, then 10 copies of page three, and so on.

TRUE

AND

TRUE if both conditions are true

OR

TRUE if either condition is true

XOR

TRUE if either condition is true, but NOT BOTH

If it is impossible to resolve a computer problem when it happens, how should you deal with an angry customer?

Take the ownership of resolving the problem and regularly communicate the progress to the customer.

Professionalism

Taking pride in one's work and in treating people fairly.

Which of the following utilities would you use to kill an unresponsive application?

Task Manager

What is Telnet?

Telecommunications Network, or Telnet, protocol is a terminal emulation protocol that enables users at one site to simulate a session on a remote host as if the terminal were directly attached.

You are an IT technician for your company and would like to be able to: -Establish a remote server management session. -Send unencrypted (clear text) transmissions to the remote server. -Manage specialized industrial and scientific devices. Which of the following utilities would be the BEST to use to accomplish these tasks?

Telnet

What is TKIP?

Temporal Key Integrity Protocol is a wireless encryption protocol that was not as predictable as RC-4, but still not very secure.

What is a good practice when choosing and executing the system backups for your computers and devices?

Test the backups regularly to make sure they are still working, especially if you are backing up to a thumb drive or an external hard drive.

Step 3 of the troubleshooting process:

Test the theory to determine cause

In Local Users and Groups, what does it mean if an account icon has a down arrow on it?

That account is disabled.

What does a black dot under an application's icon on a MAC indicate?

That application is running, even if it is not displaying on the screen at that time.

What has to happen before you can connect to a computer using remote desktop protocol?

That computer must be configured in system settings to allow RDP connections.

How many wires connect the CPU to the Memory Controller Chip?

That depends on the system, and it also depicts how many bytes of RAM can be commanded over those lines. If there are 16 lines, then the CPU can tell the MCC to get anything from 0 bytes of RAM up to 65,536 bytes of RAM, or 2 to the 16th power.

What do striping and mirroring do when using dynamic drives?

That is just the Windows version of being a RAID controller. Striping is RAID 0 across however many physical drives, and Mirroring is RAID 1 across however many physical drives.

What is the System Protection option that is available from the System screen on Windows?

That is the area where you set up and configure restore points, and also where you access those restore points later if they are needed.

What is the command to see the network users that have accounts on the computer you are on at the time?

The "net users" command.

What is apt-get?

The *DEBIAN* software repository. Ubuntu is Debian, so apt-get is how you install Ubuntu updates. Apt-get is actually getting deprecated in favor of just apt, but for the CompTIA exam, apt-get is how to update Debian systems.

When setting the Account Lockout Threshold, what else is automatically put into place?

The Account Lockout Duration and the Reset Account Lockout Counter After.

How does the Memory Controller Chip know which bytes of memory need to be put onto the CPU's external data buses?

The Address Bus is a direct, information-only communication line between the CPU and the MCC that the CPU uses to tell the memory controller chip which bytes of information that it needs.

What applet in Control Panel has a lot of the settings that are part of administering a Windows computer?

The Administrative Tools applet.

What are the 3 primary window areas of a MAC OS desktop?

The Apple menu in the upper left-hand corner that changes based on which applications are open. The status menu in the upper right-hand corner. The Dock along the bottom of the screen.

What service should a network print device run to enable an Apple iPad to use the device over Wi-Fi?

The Bonjour service

What 5 sections is the Master Book Record broken up into?

The Boot Loader, and no more than 4 different partitions.

What happens when you use the change directory command followed by 2 dots?

The Command prompt is taken up one directory above wherever it is at the time. For example, if the command prompt is in the C:\Windows\tracing folder, typing cd\ .. will put the command prompt in the C:\Windows folder.

What can you do if a Service fails to start?

The CompTIA answer is to go into the Task Manager and restart the service. In reality, you have to go to Event Viewer to find out what kept it from starting in the first place.

What application in Windows do you need to access in order to have more detailed control over user accounts?

The Computer Management function under the Administrative Tools in Control Panel will give you access to Local Users and Groups.

What is a Linux user interface tool that is similar to the Windows taskbar?

The Dash.

What is most open source software licensed under?

The GNU General Purpose License, or GNU GPL. It basically says that even if you download a compiled executable in order to install the software, the creators have to give you the option of looking at the source code if you ask for it. If you change the software, you have to give attribution to the original author.

What is GPT?

The GUID Partitioning Table is a system that allows a computer to use modern UEFI BIOS schemes.

What does GUID stand for?

The Global Unique Identifier is a 128-bit identifier that identifies your particular partitioning system and it is 100% unique to just your system.

What is the IMEI number on a smartphone?

The International Mobile Equipment Identity number is the number that identifies the mobile device itself.

What is the IMSI number on a smartphone?

The International Mobile Subscriber Identity number is the number that describes the actual user of a portable device, such as their rate plan, telephone number, etc. This is the information that is found on the SIM card.

What occurs when MAC filtering is enabled on a wireless access point?

The MAC address of each network interface card (NIC) that attempts to connect to the network is checked.

When using Task Manager to diagnose a slow-running system, what should you be looking for?

The Memory column is only showing what your RAM is doing, so unless the computer is out of RAM, looking at the Disk and CPU usage columns can often show where tasks or services are using too many resources.

What 2 things came out in Windows 8 for the first time?

The Microsoft Store and the Charms bar.

Describe the NTFS file system.

The New Technology File System is used by all modern Windows computers. It supports volumes up to 16 Exabytes, individual file size up to 256 TiB, encryption, compression, and it uses the de facto security standards that are used on individual computers as well as networked systems, and on all operating systems industry-wide.

What do operating systems need to have in order to use programs written in Interpreted Languages?

The OS must have the correct interpreters for whichever language was used to write that program, such as Visual Basic, Python, and/or Javascript.

What is the part of a hard drive that is being treated as virtual memory called?

The Paging File.

In addition to IP address information, what other critical piece of information does netstat return?

The Port numbers that are being used for each connection, which can give you clues as to which connections are doing what.

What is the PRL on a CDMA phone?

The Preferred Roaming List is updated based on your carrier's settings and it is how a smartphone manages its connections to the outside world.

What data safety feature does GPT offer?

The Primary GPT header partition is followed immediately by a backup, Secondary GPT Header, such as in LBA 2 for example. If LBA 1 gets corrupted, LBA 2 can boot the GPT partitions without a loss of partition structure.

How are Linux permissions configured using numbers?

The Read permission has a value of 4, the Write permission has a value of 2, and the Execute permission has a value of 1. In practice, this means that if a User, Group, or Other has permissions of 777, they have read, write, and execute permissions. 6 would mean just read and write, and 4 would just mean read.

Where are the primary system components managed on a Windows 10 system?

The Settings area can manage everything on the system, although the Control Panel is still available as well.

What is the Shadow Copy feature?

The Shadow Copy feature allows taking manual or automatic backup copies or snapshots of computer files or volumes, while they are in use. It creates backup copies or snapshots of the system's data and stores them locally or to an external location, either manually or at regularly scheduled intervals.

What is WinPE?

The Windows Pre-installation Environment - it's what you see when you are actually installing Windows.

What area in Windows should you visit to set up security on a newly installed system?

The Windows Security area is where you can turn on and manage anti-malware and the firewall.

What is the standard method of keeping a Windows-based computer up to date with the latest patches and security updates?

The Windows Update feature.

How do wildcards work when moving or deleting files in Linux?

The asterick (*) is still used, but it can be used more freely. For example, to delete all filenames that start with the letter M, use the command rm M*. You could also delete all text files with filenames that ended with the letter M by typing rm *M.txt

MITM

The attacker sits between two communicating hosts and transparently monitors, captures, and relays all communication between them.

What is one drawback to allowing cloud backups for the computers in your organization?

The backup process uses a lot of bandwidth. If one or more users decide to randomly back up their entire hard drive during the middle of the workday, it can cause a loss of productivity for other users who don't have enough bandwidth to do their jobs in a reasonable amount of time.

What is the only drawback to using File History or Time Machine to backup file histories?

The backups must be kept on an external drive or network share that must remain available to that computer at all times.

EULA

The basic restriction is usually that the software may only be installed on one computer

What is actually happening during error checking on a Windows computer?

The chkdsk utility is being run to check for bad sectors.

What storage option was introduced with Windows 8?

The cloud-based OneDrive.

How does the shutdown command work on Linux?

The command itself is the same as with Windows - just the word shutdown. In Linux, you can cancel the shutdown, however, by typing shutdown -c after you have initiated the shutdown. Shutdown /r reboots the computer, and shutdown now just shuts it down.

proper documentation

The customer knows what to expect in terms of items that are supported, how log incidents may take to resolve, when they can expect an item to be replaced instead of repaired, and so on.

What is a Captive Portal?

The customizable page that you can create for people to put in their usernames and passwords to access the wi-fi network.

When running the "dir" CLI command in Windows, what 4 aspects of the files and folders will you see?

The data and time they were last accessed, the file size, and the file name. In the case of folders, you won't see any of that information, but you will see <DIR> instead. Directories and folders are the same thing in this regard.

What happens when you choose to do a quick format rather than a full format?

The directory structure for whatever file system you are using will be built, but the individual LBA's will not be checked for their read and write ability, so it is not a very good idea.

What are the 2 steps to adding a new computer to an A/D domain?

The domain administrator must add that computer to the domain, and then the actual computer needs to be added to the domain in System settings.

How is optimization done on a Solid State Drive?

The drive is "trimmed" which means that all available pages that make up every block of data are checked. If they are available, they are marked as A F U, or Available for Use.

What is the goal of Multi-factor Authentication, or MFA?

The goal of MFA is to create a layered defense and make it more difficult for an unauthorized person to access a target such as a physical location, computing device, network, or database.

How do you view what group policies are being applied to any given computer?

The gpresult /r command will include any group policies that were recently enacted on that machine, and it will also list the security policies that apply to that machine from the group level.

What does the gpresult command do?

The gpresult command displays group policy settings and Resultant Set of Policy (RSOP) for the specified user or computer.

What command is used on the Windows command line to grant permissions to files or folders.

The icacls command. It has very complex switches, and is not on the CompTIA exam, but can be researched on the command line by typing help icacls.

When sharing local files or folders from a local machine that is part of an Active Directory domain, does everyone in the domain automatically get access to those resources?

The individual computer sharing those resources can choose to share them with everyone, with only certain groups, or even with specific users who are part of that domain.

What is WPA2?

The industry standard wireless version that uses AES encryption. *

What does the cd / (forward slash) command do in a Windows shell?

The is the Change Directory command and it will take the command prompt back to the root directory.

Remote Assistance

The local user sends a request to another user on a remote computer inviting them to view or control their desktop.

Who is Mark Russinovich?

The man who created the Sysinternals website, a group of very frequently used and referenced Microsoft utilities. www.sysinternals.com

Where should you download 3rd party drivers from?

The manufacturer's website

Computer Security Incident Response Team (CSIRT)

The members should be able to provide the range of decision making and technical skills required to deal with different types of incidents.

What happens when you "delete" something on a mass storage device?

The name of the document in the directory for that drive is changed to have a sigma symbol in front of it to show that it was deleted, but the data itself was not actually deleted. Back in the file allocation table, whatever LBA's were used to store that file's contents are simply marked as available to be written over. Until that happens, the data is still there.

What does the net computer command line utility do?

The net computer command-line utility adds or removes a computer from a domain.

What does the net sessions command line utility do?

The net sessions command-line utility lists or ends communication sessions with network computers.

What does the net share command line utility do?

The net share command-line utility lists, creates, and removes network shares on the local computer.

What are the 2 steps to creating and using a partition?

The partition must be created first using whatever tool your operating system uses, and then the partition must be mounted before it can be used.

What must you know in order to allow an app through the Windows Defender Firewall?

The path to the executable

Where does an Active Directory user's "home" folder always live?

The physical location for the data is ultimately up to the domain administrator, but the important thing is that no matter which computer they log into, they will have access to that same home folder.

What 2 utilities can be used to find the IP addresses of computers whose domain names are known?

The ping and tracert TCP/IP utilities can be used to find the IP addresses of computers whose domain names are known.

When looking at possible changes in IT equipment or procedures, what is important to remember?

The potential compatibility or lack thereof with present equipment, processes, and procedures.

New Technology File System (NTFS)

The preferred file system, largely because it supports a much larger hard disk (up to 16 exabytes), long file names, and enhanced security.

What configuration information does a user need to use a print device connected to the same local network?

The print device's IP address or host name. You might note that vendor utilities can search for a connected device on the local network, so "None" could also be a correct answer.

Why should you not use the "end process tree" command?

The processes that are running to support whatever application you are interested in are probably also supporting other running applications, and if you shut down the process tree, you will shut down those other applications as well.

Open Source

The programming code used to design the software is freely available.

Mean Time Between Failures (MTBF)

The rating on a device or component that predicts the expected time between failures.

Remote Desktop

The remote user can initiate a connection at any time. The remote user needs to sign on the local machine using an authorized account.

What other copy command is similar to xcopy, but is more powerful?

The robocopy command performs more verification and is also faster.

What can the shredding technique be used for?

The shredding technique is used to destroy media such as hard drives, CD, DVDs, and so on.

How is the Start menu different in Windows 10 than previous editions?

The start menu itself works like it did in Windows 7, but the options were modified quite a bit. In addition, small versions of the Windows 8 "metro" tiles are available from the Windows 10 Start menu.

Collection of evidence

The two principal questions here are: * What evidence must be collected? * How should the evidence be collected?

What is Digital Rights Management, or DRM?

The type of licensing that is meant to protect audio and video content.

What is a problem with uninstalling programs?

The uninstaller doesn't always get everything that was affected by the installation. There might be registry changes that need to be undone, additional files or folders that were left behind, temporary files, etc.

What is Social Engineering?

The use of deception to get people to give away information that they wouldn't normally give away.

What does it mean if you try to go to a website and the certificate has been revoked?

The website did something wrong to have their certificate revoked, and you should definitely not go there.

Although the term virus is going away, what 2 things did viruses originally do?

Their first job was to replicate by putting themselves into RAM, and then copying themselves onto removable media. Their second job was to activate and do whatever that particular virus was programmed to do.

What are the Linux permission string definitions?

There are 3 sections, each with 3 permissions. In order, the sections are User, Group, and Everyone. In the same order in each section are the permissions Read, Write, and Execute, written as rwx. If there is a dash (-) in any of those columns, then no permissions have been set there.

What if you have a device that supports PoE, but the switch that it is plugged into doesn't?

There are PoE adapters that can be plugged into a switch via an RJ-45 connection, and then a separate RJ-45 cable comes out the other side and gets plugged into the device that supports PoE. That is a good method to keep the clutter inside the server room instead of out in public where the WAP or other device is located.

What are the proper temperature and humidity levels for computers?

There are few hard and fast rules, other than the fact that computers, printers, and servers would rather be colder than most people like, and they like the air to be drier as well. This applies to the server room, of course, but it also applies to the equipment that is out on the floor.

What does Wake on LAN do?

There is a "magic packet" that an administrator can send out over the network that will wake up any sleeping computers in order to perform maintenance on them, install system updates, etc.

How does Ubuntu handle patch management?

There is a Software & Updates section that gives very granular control over what type of updates are available and how or when they are installed, including using OpenSource options. There is also a Livepatch option which is much more automated.

How do you fix a corrupted profile in Windows 10?

There is a long, but effective method that involves backing up and editing the Windows Registry.

What is one area of Finder that is different than Windows File Explorer?

There is a menu item called Applications that will show you all of the applications installed on that MAC.

What 2 areas of the Start button offer more features that previous versions of Windows?

There is a small list of icons that come up to the left of the Start button when you press it, including the ability to get to the Settings area. In addition, if you right-click on the Start button, several frequently needed options are available there as well.

What are the individual account benefits of having users log into an Active Directory environment?

There is significantly more detail about each user that can be added as well as controlled, and other users in that domain can then use that information to find people, such as their physical location, telephone number, email address, etc.

What type of computer is required to run an Active Directory domain?

There must be a dedicated system running Windows Server software which acts as the domain controller.

In the Windows logs from Event Viewer, what can give you a clue that something isn't working properly?

There will often be a red Error indicator inside the logs.

What is one thing that both xcopy and robocopy can do that standard copy commands can't do?

They are both network-aware, which means you can put in a UNC address to copy files to a network share. The syntax for robocopy would be robocopy c:\backup "\\server\backup" to copy all of the files from the backup folder on the c drive to the backup folder on the server.

What is the problem with compiled executable files?

They are compiled for very specific operating systems and even specific CPUs. For example, the same compiled executable that opens Microsoft Word on a Windows machine will not open Microsoft Word on a MAC.

What do "for" statements do in Javascript?

They are conditional loops that tell the script to keep doing something as long as something else is happening.

Describe Windows Home editions.

They are designed to work in homes and small offices. They lack some features, but often come with extra tools such as media options.

What are Environment Variables?

They are locations or names of files, programs, folders, utilities, etc., that are used throughout a Windows operating system. By learning what these are using the set command on the command line, you can input needed information into scripts.

What do the pound signs in Linux scripts mean?

They are non-executable areas where remarks can be entered to help understand what is happening in that script.

When are gpupdates normally run?

They are often part of scripts that run outside of normal business hours in order to keep all computers in sync with the group policies without having to manually run the gpupdate command.

What are GPT partitions called?

They are often referred to as volumes, and there are no primary or extended volumes like there is when using MBR.

What happens when you combine both Share and NTFS permissions on a share?

They combine to give the most restrictive permission

Do domain controllers only control one domain?

They control at least one domain, but administrators can set up as many domains as they want to. For example, if the local domain is called .domain1, there can be users@domain1, administrators@domain1, managers@domain1, etc. Each domain is it's own network inside the larger domain1 network.

What was the original driving force behind Microsoft creating Windows 8?

They wanted a Windows version that would work on other types of devices, such as tablets, rather than just desktop workstations.

How do you configure dedicated wireless access points?

They will normally come with software or a web-based GUI. You can configure things such as the IP address, usernames and passwords, descriptions, wi-fi channels, wi-fi versions, max clients, vlans, etc.

What are Rainbow Tables?

They work similar to dictionary attacks, but in a Rainbow Table, each type of character is in a separate table, such as a table for letters, a table for numbers, a table for special characters, etc. The password cracking software then indexes every possible combination using those tables.

What type of computer often uses the option to boot over a network?

Thin clients that don't have a lot of internal storage space.

What are the principal characteristics of a surge protector?

This is a circuit designed to protect connected devices from the effect of sudden increases or spikes in the supply voltage and/or current. Surge protectors are rated by clamping voltage (low values are better), joules rating (higher values are better), and amperage (the maximum current that can be carried).

Which settings app configures time, date, region and language settings?

Time and Language settings

Which Settings app configures time, date, region, and language settings?

Time and language settings

What is the ifconfig command used for?

To configure network interfaces for Linux servers and workstations. It is also used to view the current TCP/IP configuration of a system, including the IP address and the netmask address.

What command line utility can be used to display or connect to shares on remote computers?

To display or connect to shares on remote computers, you will use the net use command-line utility.

What is the purpose of an MSDS?

To document how to safely handle and dispose of hazardous materials.

What is the diskpart CLI command used for in Windows?

To open up the interactive command line tool for partitioning hard drives.

Which of the following best describes the function of Organizational Units?

To organize like managed object in the directory

Which of the following best describes the function of organizational units?

To organize like managed objects in the directory

Why should backup media be stored offsite?

To prevent the same disaster from affection both the system and its associated backup media.

What does Windows use port 445 for?

To talk to other computers on the local area network.

Problem Management

Tracking and auditing support request.

According to the A+ exam guide, what is the purpose of the chain of custody?

Tracking of evidence/documenting process

TLS

Transfer Layer Security

When should you transfer an angry customer to your supervisor?

Transferring a customer to a supervisor should only be done if you cannot handle the customer's problem.

Which of the following best describes the kind of malware that infected the CFO's laptop after he downloaded and installed a popular file sharing app?

Trojan

Which of the following best describes the kind of malware that infected the users laptop after downloading and installing a popular file sharing app?

Trojan

True or False: Removing the CD/DVD would be appropriate responses to an "invalid boot disk" error message in Windows?

True

True or False: Removing the USB would be appropriate responses to an "invalid boot disk" error message in Windows?

True

True or False: Verifying boot order in SYSTEM BIOS would be appropriate responses to an "invalid boot disk" error message in Windows?

True

TPM

Trusted Platform Module

What should you do to ensure you can rollback document changes on a Windows computer?

Turn on the File History option, which is not turned on by default.

TN

Twisted Nematic

How can you use the net command to share files on the local computer?

Type "net share shareit=c:\\foldername"

How do you delete a user using the net command?

Type "net user aaron delete".

How do you create a network user using the net command?

Type "net user aaron password /add".

How do you run commands as an administrator in Linux?

Type "sudo" prior to the command, i.e. - sudo ls which is the equivalent of running the dir command in Windows as an administrator.

How do you navigate to the actual root directory using the Linux command prompt, rather than navigating to the home directory of whichever user is logged on at the time?

Type cd, space, forward slash (/). That will take you to the actual critical folder directory for the entire Linux system.

How do you use the change directory command to go to a specific directory?

Type cd\ (backslash) followed immediately by the name of the directory, such as cd\Windows.

How do you use the chmod command to change permissions for a file or a folder?

Type chmod 777 filename.txt to change the permissions for filename.txt to be read, write, and execute for the user, the group, and other. Likewise, chmod 770 filename.txt would give the user and group read, write, and execute permissions, but other would have no permissions.

How do you close a shell when you are done with it?

Type exit, quit, or just close the window.

How do you create a folder at the Windows command prompt?

Type md followed by the name you want the folder to have, such as md Aaron, and then press enter.

How do you delete folders from the Windows command line?

Type rd followed by the folder name, such as rd Aaron to remove the Aaron directory.

How do you get help about any given command in Linux?

Type the "man" command followed by the command you want to learn about, such as "man ls" to get the manual on the ls command.

How can you see what is available to be shared on the computer you are on at the time?

Type the "net share" command without any other information.

How can you get help with the available switches for any given command on the command line?

Type the command followed by the /? switch to get help about the switches for that particular command.

How do you run DISM from the command line?

Type the dism command followed by the /online switch, then the /cleanup-image switch to tell DISM to look at your backup files, and then the /restorehealth switch to tell DISM to fix any problems that it finds. Altogether, the command is dism /online /cleanup-image /restorehealth.

Which of the following are you most likely to use for a one-off, manual installation of Windows 10 on a machine with no CD/DVD access or network deployment solution?

USB

UEFI

Unified Extensible Firmware Interface

UTM

Unified Threat Management

URL

Uniform Resource Locator

Which of the following actins are you most likely to take in the event you our mobile device has suffered unauthorized access via malware?

Uninstall apps Restore from Cloud backup Change your password Reinstall apps

You have determined that a block-level file corruption on the disk has damaged the driver files for a critical piece of hardware. Multiple reboots have failed to correct the problem. You open device manager, what is step 1 to fix this error?

Uninstall the device

After Joe, a user, installs a new game app on his mobile phone, downloads and webpage loads become slower than usual. Which of the following actions would BEST address this issue?

Uninstall the new app and scan for malware.

What is an Unintended Wi-Fi connection?

Unintended Wi-Fi connections can result in data theft and eavesdropping. Wi-Fi should be turned off when not in use.

Which device contains a battery and Automatic Voltage Regulation (AVR) circuitry to protect a computer from power sags?

Uninterruptible Power Supply (UPS)

UNC

Universal Naming Convention

UPnP

Universal Plug and Play

USB

Universal Serial Bus

UTP

Unshielded Twisted Pair

When using GPT, how many partitions can you have on any single drive or mass storage device?

Up to 128 individual partitions, as compared to only 4 partitions when using MBR.

What applet in Settings will let you recover a failed installation?

Update and Security

Which Settings app configures the Active Hours settings to prevent forced reboots when users are logged on?

Update and Security

Which settings app configures the Active Hours settings to prevent forced reboots when users are logged on?

Update and security

You have determined that a block-level file corruption on the disk has damaged the driver files for a critical piece of hardware. Multiple reboots have failed to correct the problem. You open device manager, what is step 4 to fix this error?

Update the drivers

What is Patch Management?

Updating software, firmware, operating systems, and security to ensure systems are up to date and as secure as possible. It is a critical system maintenance task.

How can you use Performance Monitor to track a computer's performance over time?

Use Data Collector Sets, which are just user-defined performance monitor options.

What is the best way to get around Microsof's 2 CPU per license fee for server software?

Use Linux for servers instead of Microsoft Windows. Linux is free, and is better server software.

What should you do to prevent your computer from increased voltage or brownouts?

Use an uninterruptible power supply (UPS).

You have 5 salespersons who work out of your office and who frequently leave their laptops laying on their desk in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the BEST protection to implement to address your concerns?

Use cable locks to chain the laptops to the desks.

How should you communicate with a customer if you and the customer do not understand a common language?

Use hand gestures and visual aids to give details.

How can you tell chkdsk to fix any errors that it finds on a drive?

Use the /f switch after the chkdsk command.

How can you keep a Windows 10 system from automatically restarting after a critical system error occurs?

Use the Disable automatic restart after failure option of the Advanced Startup Options menu.

Which of the following actions would let you recover from a system failure with the least administrative effort?

Use the Factory Recovery Partition

How do you set up File History in Windows?

Use the File History applet in Control Panel.

What shortcut can be used to type commands in a Windows or Linux shell?

Use the Tab key to finish folder or subfolder names.

How do you copy files from the Windows command line?

Use the copy command followed by the name of the file, then the location where you want to copy it to.

What is the dd command used for?

Use the dd command to copy BLOCKS of data from one device to another in Linux. The cp command is used to copy files in Linux.

How do you delete multiple files with the same file extensions from the Windows command prompt?

Use the del command followed by an asterick (*) as a wildcard, followed by the extension of the files you want to delete, such as del *.txt to delete all text files.

How do you delete all files in any given directory?

Use the del command followed by an asterick, a dot, and an asterick. In this case, Windows will prompt you if you want to delete all of those files.

How do you create folders from the Linux command prompt?

Use the mkdir command followed by the name of the folder, such as mkdir Aaron

How do you move files from the Windows command line?

Use the move command followed by the name of the file, then the location where you want to copy it to.

How do you delete files from the Linux command line?

Use the rm command followed by the filename.

How do you remove a directory in Linux that has contents in it?

Use the rm command with the -r switch.

How do you remove a directory in Linux?

Use the rmdir command followed by the folder name.

How do you tell diskpart which disk to partition.

Use the select disk 1 command, with 1 just being an arbitrary number. That will be whatever number the drive has that you want to partition.

How do you run the System File Checker from the command line?

Use the sfc command followed by the /scannow switch.

How do you uninstall a program on a Linux Debian system?

Use the sudo apt-get remove command

How do you upgrade the software on an entire Linux system from the command line?

Use the sudo apt-get upgrade command. You can also use the sudo apt-get upgrade programname to just upgrade a specific program.

PowerShell

Used for management and administrative tasks; uses ISE

JavaScript

Used to create web-based content and apps

compressed air blaster

Used to dislodge dust from difficult to reach areas.

PC vacuums

Used to remove dust from inside the system unit, specially from the motherboard, adapter cards, and fan assemblies.

gloves

Used when cleaning up a toner spill.

What is UAC in Windows?

User Account Control. It is what makes it so that you have to have the proper administrative rights to make certain changes to a Windows computer.

UDP

User Datagram Protocol

What is Secure DNS?

Using a DNS server that is different than the one that your ISP provides, because your ISP often logs the websites that you go to, and they often show you advertisements if you try to go to a website that doesn't exist. Use Google's 8.8.8.8 DNS server instead.

What is the difference between server-side and client-side applications?

Using a web browser as an example, a server-side web page is created in its entirety on the web server, and then sent as a whole to the computer's web browser. In a client-side setup, the web server just sends raw code to the user's computer, and the computer then recreates it into a web page.

Wear a mask and gloves when you are:

Using compressed air. Working around toner spills or in a dusty environment.

What is a danger with using the "su" command in Linux?

Using the "su" command basically makes you an administrator for every single command that you enter after that. As opposed to having to type "sudo" before doing any administrator level commands, if you use "su" to become an administrator, it can be easy to forget that you have the power to damage that computer's configuration.

How do you set up an Answer Key so you can perform Unattended Installations?

Using the Windows System Image Manager. This creates a file called autounattend.xml that is put into the main directory of the installation media for Windows. When a Windows installation begins, that file will be read and the options it contains will become a part of that Windows installation.

How do you change ownership of a file or folder in Linux.

Using the chown command. If you own the file, you do not have to use sudo. Otherwise, the command is sudo chown aaron file.txt would change the ownership of file.txt to the username aaron.

What can you do if a mobile device touchscreen is unresponsive or not working properly?

Usually it just means that the system is overtaxed. Try restarting it first, and if that doesn't work, there are probably too many apps installed on it, or the phone is too full of data and some of it needs to be deleted.

While on a business trip, an employee accesses the company's internal network and transfer files using an encrypted connection. Which of the following digital security methods is being used?

VPN

What are 2 ways to defend against spoofing?

Valid web certificates when dealing with the Internet, and Digital IDs when dealing with email communications.

Step 5 of the troubleshooting process:

Verify full system functionality and if applicable, implement preventative measures

How do we use the Component Object Model?

Via Component Services.

How is optimization done on a Magnetic Drive?

Via defragmentation.

How does a CPU communicate with the motherboard and the rest of the computer?

Via its external data buses. An 8-bit CPU has 8 external data buses, a 32-bit CPU has 32 external data buses, etc.

VDI

Virtual Desktop Infrastructure

If Remote Desktop Protocol is used for remote connections in the Windows environment, what is used for Linux or MAC OS machines?

Virtual Network Computing, or VNC is built into most Linux and MAC OS computers.

Which wireless security protocol is most secure: WPA, WPA2, or WEP?

WPA2

Which wireless security solution should you choose?

WPA2 (AES)

Which of the following encryption protocols are recommended for the SOHO?

WPA2/AES

Which of the following encryption protocols are recommended for the Small Office Home Office (SOHO)?

WPA2/AES

What are Documented Business Processes?

Ways that any given department performs their duties, so that if a change request comes from that department, the request has to show how the change request will be in alignment with those processes.

What should a technician wear to prevent electrostatic discharge (ESD) while installing sensitive memory chips?

Wear an anti-static wrist strap.

Give 2 examples of things that can be controlled by the Local Security Policy.

What type of passwords have to be used, how many login attempts a user gets, and any similar event that the computer administrators want to control.

What is a man-in-the-middle attack?

When a hacker is positioned on both sides of the attack to intercept communication between two sessions and devices

When are server-side applications often used?

When accessing large stores of information that are kept on remote servers, such as database servers.

What is Fragmentation?

When files are stored in a file allocation table, attempts are made to put all of that file's data in consecutive blocks on the storage media, but it is not always possible. When some parts of any given file have to be stored in physically separated areas of the mass storage device, that is called fragmentation.

What is a Dictionary password attack?

When hackers try to gain access to a system using known types of passwords that people commonly use.

When does a zero-day attack occur?

When live environments become vulnerable and targeted before a fix or patch can be created by the vendor

What is Network Discovery?

When logging into a network, you can decide whether or not you want to broadcast your presence in order to share files and resources with other computers. Windows can automatically search for such computers using Network Discovery. It should always be turned off when using a public network.

When it comes to learning about individual Windows updates, what is different between Windows 7 and Windows 10?

When looking at the update history, in Windows 7 there was just a text name of the update that you would have to manually research. In Windows 7, the updates are hyperlinks that will take you to a page with details about that update.

Digital Rights Management (DRM)

When purchase music or video online, the vendor may license the file for use on a restricted number of devices.

What is a Rogue Access Point?

When someone brings their own WAP and tries to plug it into a network. The settings on wireless access points can be customized to keep that from happening.

What is Shoulder Surfing?

When someone looks over your shoulder to gain information that they shouldn't have, like your password or your communications with others.

What is a "man in the middle" attack?

When the communication between a sender and a receiver is intercepted by someone else. This can be done wirelessly, between servers and computers, and even between a web server and individual computers viewing that web content.

What is an "upgrade install"?

When you already have a copy of an operating system, and you are updating it to a newer version.

How do you get into the WinRE, or Windows Recovery Environment?

When you are in WinPE, instead of hitting the Install button, click the "Repair this computer" link.

What is Multiboot?

When you divide up the mass storage devices on a computer into partitions so more than one operating system can be installed. When the computer starts up, you will be prompted to choose which OS to use. Multiboot is still around today, but it is being largely replaced by virtualization.

What happens if you try to execute a program from the command line that is available for your system, but is not installed at that time?

When you execute the command, Linux will tell you that it is not installed, but it will also give you proper apt commands to install it.

How can you find out what has been happening recently with any given device in order to troubleshoot?

When you go to the device in Device Manager and look at the properties, you can click the Events tab to see all recent actions for that device. Look at the latest event that happened before the device stopped working and use those details to research the problem.

What is software RAID?

When you let your operating system manage a local RAID configuration. You don't need a separate RAID controller. With Windows you can set up RAID 0 or RAID 1 using Disk Management. Only more advanced versions of Windows can go up to RAID 5.

How does a Windows Server running its Domain Controller work?

When you log into a Windows computer that is a part of the domain that is managed by that Domain Controller, you are actually logging into the Windows Server, not the local computer that you are sitting at.

What is the Windows version of performing CLI commands as a Super User?

When you open up the Command Shell, or the Command prompt as it is commonly known, you can right-click on that executable file and run it as an Administrator.

If Bitlocker To Go does not need TPM, how does it authorize decryption of removable media?

When you set up Bitlocker To Go, it will require you to either set up a password, or use a smart card.

How does an Unattended Installation work?

When you want a large number of computers to all have exactly the same settings and options during installation, you can set up an "answer file" that will automatically choose the correct installation options, and then you don't have to sit in front of all of those computers during the installation process.

What is a backout plan?

Whenever any change is planned, you need to have a plan to "fix it" if the change did not work as planned. Things to consider are how long to keep old equipment, what scheduling needs to be prepared for in case the change needs to be undone, etc.

How does the Boot Loader know which operating system partition on the Master Boot Record to boot from?

Whichever partition is marked as the Active Partition.

What is WPA?

Wi-fi Protected Access is the combination of the TKIP wireless encryption protocol plus a preshared key. The combination is more secure than WEP, but still not entirely secure. *

What is WPS?

Wi-fi Protected Setup is an automated way to connect wireless hosts and wireless access points. For devices like wireless printers, it is a great way to connect them without having access to a GUI. It is very easily hacked, however, so shouldn't be used.

Uninterruptible Power Supply (UPS)

Will provide a temporary power source in the event of complete power loss.

What hardware consideration is a part of the consideration needed when building a Thick Client?

Will the hardware meet the minimum recommended requirements of the operating system that will be installed on that system?

Which tool would you use to boot Windows following a stop error from which the machine is unable to restart?

WinPE

What OS would you choose if you required 64-bit processing, a user-friendly GUI, support for an encrypted file system, and a command line interface?

Windows

What 4 Windows versions are on the CompTIA A+ exam?

Windows 7 from 2009, Windows 8, Windows 8.1, and Windows 10.

Which version of Windows introduced Bitlocker in the Professional edition?

Windows 8

Which 3 Windows 7 versions will allow an in-place upgrade to Windows 8?

Windows 8 Core can do an in-place upgrade from Windows 7 using Windows 7 versions Starter, Home Basic, and Home Premium.

What native antispyware feature is included with Windows?

Windows Defender

Describe Windows Professional editions, sometimes referred to as workstation editions.

Windows Professional machines have all of the common tools needed to work at a small business level, including the ability to join a domain, and the ability to maximize use of the computer's CPU.

Where do users find additional Windows 10 themes?

Windows Store

What are 2 categories that are not included in the Windows Update feature?

Windows Update will not look for updates for indidividual software packages that are installed on a Windows system, and it also won't look for updates to Device Drivers.

.bat

Windows batch file extension

SET

Windows command to view, create, and modify environment variables

What is important to remember about capitalization when creating folders from the Windows command prompt?

Windows does not care about capitalization like Linux does, so you can't have a directory called Aaron with a capital A, and another directory called aaron with a lowercase a. Windows will not let you create what it sees as a duplicate folder.

What 5 things are listed on the System screen that is accessed from Control Panel?

Windows edition, System properties, Computer name, Domain settings, and Windows activation status.

How are the Open Database Connectivity connections set up between local applications and the distant databases that they need to access?

Windows has an ODBC Administration tool that can be used to take the SQL server address and logon information and create communications lines between the local system and that database.

Clean peripherals such as Mice, Keyboard, and Displays with:

Wipes or cloths and cleaning solutions designed for PC components:

What is WEP?

Wired Equivalency Protocol is an old wireless security protocol that required both the client and the wireless access point to type in a hexidecimal or ASCII character in order to authenticate to each other. It used the easily crackable RC-4 mechanical encryption protocol and is no longer widely used, but most routers still support it.

Which three protocols provide encrypted communications between 802.11x wireless clients and wireless access points?

Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), and WPA2

What does the acronym WPA denote?

Wireless Protected Access

What is the difference between a dedicated wireless access point, and a router that generates a wireless signal?

Wireless access points are just that - they don't do anything else but generate wireless signals. They are normally the type of WAPs used in enterprise environments.

How can you see and manage the services that are running on a Windows computer?

With the Services utility.

How do you delete files from the Windows command prompt?

With the del command.

How do local computers get the latest security policy updates from their domain controller?

With the gpupdate command run from the command shell. To see the results of the gpupdate command, run the gpresult /r command.

How do you use diskpart to assign a drive letter?

With the partition in question still selected, type the command assign letter=x to assign the drive as the letter x.

How do you change directory to get into a subfolder of the folder that the command prompt is in?

Without using a backslash, just type cd, then a space, then the name of the subfolder. For example, if the command prompt is in the Windows folder, to get into the subfolder called "tracing", just type cd, space, tracing.

What setup configuration would you choose for a new Windows 10 computer installed on your home network which does not include a server?

Workgroup

Which configuration would you choose if you managed an office of less than 10 users?

Workgroup

Which configuration would you choose if you managed an office of less than ten users?

Workgroup

OSHA-compliant employers must provide:

Workplace free of recognized hazards. Personal protective equipment. Labeling, MSDS, and hazmat training.

What is a Worm?

Worms were the first generation of malware that would use networking to replicate themselves. In today's world, pretty much all malware uses the network to replicate itself.

Can you use one wireless access point to set up different SSIDs?

Yes, and it is a good idea because you can customize the settings in order to maximize the use of the available bandwidth.

Can a firewall stop malware after it has infected a computer?

Yes, because most malware will try to contact off-site servers or websites, so host-based firewalls can block that transmission.

When sharing resources over a network, is it a good idea to give everyone read and write access?

Yes, because the NTFS permissions can be used to create much more granular and effective controls per users or groups than simply Read, or Read and Write which are the only options available when sharing over the network.

Can you vacuum the inside of a computer?

Yes, but don't use a full-size vacuum because they generate a huge amount of static electricity that will fry the system. If compressed air isn't enough to clean out the system, use a special anti-static vacuum.

Can you change the size of a computer's paging file?

Yes, but in most cases it is best to leave the automatic configuration of the paging file option checked.

When using the Windows command line, can you format drives?

Yes, but you have to be running the command shell as an administrator.

Can you set up RAID 5 in Windows using the Storage Spaces tool?

Yes, but you have to have at least 3 drives, and you have to choose the Parity pooling option.

Can you recycle laptops?

Yes, but you have to pull out the hard drives first.

Can you set up an encrypted request to DNS servers?

Yes, by setting up a separate physical DNS server inside your network that your devices use as their DNS server, but then it sends encrypted requests to a public DNS server. On a smartphone, there are apps that will encrypt all of your DNS requests.

Do you need to keep the inside of computers clean?

Yes, dust and debris can block ventilation, create short-circuits, and even start fires.

Is a mass storage device physically checked during the formatting process?

Yes, each LBA is checked to ensure data can be read from it and written to it, because almost all mass storage devices have at least a few bad areas that won't be usable.

Can you use the Internet when booting into safe mode?

Yes, if you choose the Network option when configuring safe boot.

Can hardware issues cause a black screen?

Yes, if you just installed new RAM, a new hard drive, or some other new hardware, something could be damaged or not working. The fix is to just undo whatever you just did to see if that fixes the problem.

Other than the System Configuration, is there another way in Windows 10 to customize startup options?

Yes, in the Settings area there is a Recovery option where you can restart and then set Advanced Startup options.

Do you have to pay for a separate Microsoft Windows license if you put another copy of Windows on a Virtual Machine?

Yes, it is the same as if you were installing it on a completely new computer.

Can you use wildcards to move files on the Windows command line?

Yes, it works exactly as the copy command does, only the files are moved instead of copied.

Can you create images and bootable media using the Linux dd command?

Yes, just copy the information to a filename. For example, dd if=/div/source of=~/backup.img will put everything from the source directory into a file called backup.img.

Can you create a directory with subfolders from the command line?

Yes, just specify the entire path, such as mkdir Desktop/Aaron/sub to create a folder called sub in the Aaron folder that is on the Desktop.

Can you jump from a root directory into a subfolder using the Linux command prompt?

Yes, just type the exact path. For example, to get into the Dowload_subs folder inside the Downloads folder, type cd, space, Downloads/Download_subs.

Can user accounts cause Windows logon issues?

Yes, sometimes account profiles get corrupted, which is why it is a good idea to always have a backup administrator login that you can use to troubleshoot.

Can you save the group of snap-ins that you create using MMC?

Yes, the configurations can be saved as .msc files to be reused in the future.

Is it possible to run SFC in a mode that will not automatically fix damaged files?

Yes, there are options to only be notified of issues if you want to investigate problems rather that just letting SFC automatically fix them.

Can you remote desktop into a Linux or MAC computer from a Windows computer?

Yes, there is a program called TightVNC that will allow that type of connection.

Does Javascript use conditional statements?

Yes, using terms like "if", "then", and "else".

Can you shut down a Windows computer using the command line?

Yes, with the shutdown command. It is not normally used without various switches, such as /s to just shut it down, or /r to restart the system. There are also switches to have all users logoff first, or to set a specific time to shut the computer down.

Can you use the ps aux command to get detailed information about a specific program?

Yes. You can get the name of the process from the ps aux command, and then rerun the command for just that program. For example, ps aux | grep "libre"

What is the danger of deleting files using the command prompt?

You are not asked to confirm if you actually want to delete the file, and there is no recycle bin to recover it from if you delete something that you shouldn't have.

What happens when Windows Defender is turned on?

You are notified when spyware or other potentially unwanted software tries to install itself or run on your computer.

What is a TPM recovery option that is available in case the TPM key is lost or damaged?

You can back up the TPM key to a file so you always have access to it.

Device Manager

You can change device settings, update drivers, and resolve any known conflicts.

What startup options can System Configuration help with?

You can do a diagnostic startup which will only run the bare minimum programs, services, and device drivers in order to troubleshoot problems. You can also choose to run or not run startup programs and/or startup services in order to perform troubleshooting.

How do you add member accounts to groups in Windows?

You can either go to the "Member of" tab from the properties of their user account, or you can go to the group(s) that you want to make them a member of and add them from there.

What can you do in the Services tab of System Configuration?

You can enable/disable and start/stop any computer services. In addition, you can check or uncheck them to be run at system startup, which is a great diagnostic tool to figure out which service is causing any given problem.

What is a safety option that can keep you from hurting your Registry when making edits?

You can export any or all of the Registry to create a full or partial copy. That will create an actual file that can either merge with the Registry or replace it completely.

What does the Activities option in Linux allow you to do?

You can jump back and forth between different desktops that are running simultaneously during that session.

What command line utility can be used to manage network shares?

You can manage network shares from within the Windows GUI, but you can also do so by using the net command-line utility.

What is a network maintenance task that Active Directory networks can employ?

You can set up logon scripts that run everytime someone logs into their local machine. Those scripts can either take actual actions on individual computers, or even just pop up a message that every user sees when they login.

In addition to the /? Switch on the command line, what other tool can you use to find out what commands are available?

You can type the command "help" followed by the action you are interested in, such as help dir, or help del, to get help on the directory or the delete command, respectively. *

In Linux, what is an alternative to putting sudo prior to any command that you want to run as an administrator?

You can type the command "su" followed by an administrator username and password, and everything that is done after that is done as an administrator.

After running the new view command, what can you do to get more information about the computers on the local network?

You can type the name of any of the local computers following the net view command, such as "net view win10px" to see all of the shares that are available from any given computer in that network.

Describe Windows Enterprise editions.

You can't buy Enterprise edition licenses at a local store. The licenses are bought in volume and the software has the ability to manage upwards of hundreds of thousands of computers.

How do you wipe the data off of a hard drive?

You can't just low-level format them to get rid of the data. * You have to overwrite the data with ones and zeros, theoretically up to 7 times in order to guarantee that it can't be recovered.

What are some drawbacks to Windows Home editions?

You cannot join that computer to a domain, and no more than 20 computers can be connected together at a time.

What did the Charms Bar allow you to do in Windows 8?

You could access a Settings area where you could perform tasks that used to be managed exclusively by control panel.

Active listening

You give them your full attention and are not trying to argue with, comment on, or misinterpret what they have said.

How do you boot over a network?

You have to configure your computer to boot from the Internet address where the boot file resides.

What is the first part of partitioning a hard drive in diskpart after you have selected it?

You have to create a primary partition with the command create partition primary.

What do you have to do when using variables in Visual Basic?

You have to declare variables as being a certain type of character, such as a number, a string, a letter, etc.

How do you view the contents of other drives, such a CD drive, using the Linux command prompt?

You have to go to the actual root directory first, where is a folder called media. Change directory into the folder, and any available media will be listed there as a directory. Change directory into that media, such as cd cdrom, and the contents of that media will be displayed on the screen.

How do you change a password from the Linux command line?

You must be logged in as the user that you want to change the password of. From the command line, type sudo passwd, and hit Enter. You will be prompted to enter the new password twice.

What is important to remember about using Robocopy to copy a corrupted user's profile information into a new folder?

You must use the /s switch to copy over all of their sub-folders.

What are 2 network considerations when installing a computer on an enterprise network?

You need to know the procedures or naming convention for setting up a local account on that computer and/or you need to know the procedures and naming conventions for how to add that computer to the enterprise domain.

What is an important thing to remember about the reports that will be generated by Performance Monitor over time?

You need to make the log files Cyclic, which means when a certain file size is reached, the old data will start to be overwritten. Otherwise, the log files from Performance Monitor will quickly fill up the computer's mass storage devices.

Using proper language

You need to use clear and concise statements that avoid jargon, abbreviations, acronyms that a user might not understand.

Which physical barrier acts as the first line of defense against an intruder?

a fence

What is a mantrap?

a set of double doors that are generally monitored by a security guard

AUPacceptable use policy

acceptable use policy

What does the acronym ACL denote?

access control list

ACL

access control list: with respect to a computer file system, is a list of permissions attached to an object.

Which terms should NOT be used while explaining the strength of technology to a customer?

acronyms and technical jargon

Which is a structured form of listening and responding that focuses the attention on the speaker?

active listening

ARP

address resolution protocol

ACPI

advanced configuration power interface

AES

advanced encryption standard

AHCI

advanced host controller interface

APM

advanced power management

ATA

advanced technology attachment

ATAPI

advanced technology attachment packet interface

ATX

advanced technology extended

Which three types of characters can be used in combination to set a strong password in Windows?

alphabetic, numeric, and special characters

AC

alternating current: voltage or current that changes; polarity changes; electrons move in different direction

What is a locator application?

an application that helps locate a mobile device when it is stolen

What is a digital certificate?

an electronic file that establishes your identity via a public key infrastructure (PKI) to complete transactions

Which type of software can assist you in protecting your computer against virus-related problems?

antivirus software

ASR

automated system recovery

ADF

automatic document feeder

APIPA

automatic private internet protocol addressing

What should be documented to ensure that you can return to normal operations and reverse a change if a change does not work or causes problems?

backout plan

Cultural Sensitivity

being aware of customs and habits used by other people.

Which authentication method uses fingerprint recognition as a method to identify an individual?

biometric authentication

CRT

cathode-ray tube

CFS

central file system, common file system, or command file system

CPU

central processing unit

Which of the following utilities checks the disk for bad clusters?

chkdsk

CIDR

classless inter-domain routing

CIFS

common internet file system

COMx

communication port (x=port number)

CD-RW

compact desc-rewritable

CD

compact disc

CDFS

compact disc file system

CD-ROM

compact disc-read-only memory

CMOS

complementary metal-oxide semiconductor

CERT

computer emergency response team

CGA

computer graphics and application

CAD

computer-aided design

DaaS

data as a service

DBaas

database as a service

What is the syntax of the Linux dd command?

dd if=/dev/source of=/dev/destination will copy everything from the source directory and put it in the destination directory.

DMZ

demilitarized zone

DoS

denial of serbice

DLP

digital light processing or data loss prevention

DLT

digital linear tape

DRM

digital rights management

DSL

digital subscriber lin

DVD

digital versatile disc

DVD-RAM

digital versatile disc-random access memory

DVD-ROM

digital versatile disc-read only memory

DVD-R

digital versatile disc-recordable

DVD-RW

digital versatile disc-rewritable

DVI

digital visual interface

DVI-D

digital visual interface-digital

DC

direct current

DMA

direct memory access

DAC

discretionary access control

DDoS

distributed denial of service

DFS

distributed file system

DNS

domain name service or domain name server

DDR

double data rate

DDR RAM

double data rate random access memory

DIMM

dual inline memory module

DHCP

dynamic host configuration protocol

DRAM

dynamic random access memory

EEPROM

electrically erasable programmable read-only memory

EMI

electromagnetic interference

EMP

electromagnetic pulse

ESD

electrostatic discharge

ERD

emergency repair disk

EFS

encrypting file system

EIDE

enhanced integrated drive electronics

EPP

enhanced parallel port

EPROM

erasable programmable read-only memory

ECC

error correcting code

What are the 2 primary file systems that are used on Linux?

ext3 and ext4.

ECP

extended capabilities port

exFAT

extended file allocation table

XGA

extended graphics array

EVGA

extended video graphics adapter/array

eSATA

external serial advanced technology attachment

FPM

fast page mode

FAT

file allocation table

FTP

file transfer protool

Which attributes or details of an employee can be used by biometric devices?

fingerprint, face, signature, iris, and retina

FDD

floppy disk drive

You have a hard disk that has a single primary partition and has been assigned D: as the drive letter. Which tool would you use to configure the drive to use the FAT32 file system?

format

What command is used on the Windows command line to format a drive?

format e: /FS:filesystem - such as NTFS, FAT32, etc., where e is the drive letter that you are formatting and the file system name you choose is the file system you want the drive to be formatted with. You can alse use the /q switch along with that command to do a quick format.

FSB

front-side bus

FQDN

fully qualified domain name

GPS

global positioning system

GSM

global system for mobile communications

GUID

globally unique identifier

Which of the following would you use after rejoining a client machine that had lost its trust relationship to the domain?

gpupdate /force

GUI

graphical user interface

GDI

graphics device interface

GDDR

graphics double data rate

GPU

graphics processing unit

HDD

hard disk drive

HAL

hardware abstraction layer

HAV

hardware assisted virtualization

HCL

hardware compatibility list

HDMI

high definition media interface

HPFS

high performance file system

HDCP

high-bandwidth digital content protectioin

HIPS

host intrusion prevention system

1. Read the newest PassLeader 220-1002 exam questions/practice test from this Blog:

http://www.comptiadump.com/?s=220-1002

2. Download more NEW PassLeader 220-1002 PDF dumps from Google Drive here:

https://drive.google.com/open?id=13vUuTATazaO0hrkrQIRv_mOwcbXT2Q-o

HTML

hypertext markup language

HTTP

hypertext transfer protocol

IRP

incident response plan

ISA

industry standard architecutre

IR

infrared

IrDA

infrared data association

IaaS

infrastructure as a service

Material Safety DataSheet (MSDS) will contain information about:

ingredients. Health hazards, precautions, and first aid information. What to do if the material is spilled or leaks. How to recycle any waste product or dispose of it safely

IEEE

institute of electrical and electronics engineers

IDE

integrated drive electronics

ISDN

integrated services digital network

ICR

intelligent character recognition

IMEI

international mobile equipment identify

IMSI

international mobile subscriber identity

ISO

international organization for standardization

ICMP

internet control message protocol

IIS

internet information services

IMAP

internet mail access protocol

IPP

internet printing protocol

IP

internet protocol

IPConfig

internet protocol configuration

IPSec

internet protocol security

ISP

internet service provider

IRQ

interrupt request

IDS

intrusion detection system

IPS

intrusion prevention system

What is the purpose of asset tags and barcodes?

inventory management

Which of the following commands would you use to determine if a client's IP address is statically or DHCP assigned?

ipconfig

airborne particles

is drawn in to the computer via ventilation holes.

What is the primary security concern around credential manager?

it allows passwords to be displayed

Which commands would you likely run if there was a process you wanted to terminate? (Choose 2)

kill Ps

KB

knowledge base

Which documentation is maintained by hardware or software vendors?

knowledge base/articles

What is war chalking?

leaving notations about the wireless network on the outside of a building

LED

light emitting diode

LDAP

lightweight directory access protocol

LPD/LPR

line printer daemon / line printer remote

LPT

line printer terminal

LCD

liquid crystal display

LAN

local area network

LBA

logical block addressing

LVD

low voltage differential

What is a virus?

malicious software (malware) that relies upon other application programs to execute and infect a system

MBR

master boot record

MSDS

material safety data sheet

MT-RJ

mechanical transfer registered jack

MAC

media access control / mandatory access control

MAU

media access unit / media attachment unit

MAPI

messaging application programming interface

MAN

metropolitan area network

mATX

micro advanced technology extended

MDM

mobile device management

MPEG

moving picture experts group

MP3

moving picture experts group layer 3 audio

MP4

moving picture experts group layer 4

MFA

multifactor authentication

MFP

multifuncion products

MFD

multifunction device

MUI

multilingual user inteface

MIMO

multiple input multiple output

MIME

multipurpose internet mail extension

MIDI

musical instrument digital interface

NTSC

national transmission standards comittee

NFC

near field commmunication

NAC

network access control

What does the acronym NAC denote?

network access control

NAT

network addressed translation

Naas

network as a service

NetBEUI

network basic input/output extended user interface

NFS

network file system

NIC

network interface card

NNTP

network news transfer protocol

NTP

network time protocol

Which documentation will show the layout of the network?

network topology diagrams

NAS

network-attached storage

NetBIOS

networked basic input/output system

NLX

new low-profile extended

NTFS

new technology file system

NTLDR

new technology loader

NiCd

nickel cadmium

NiMH

nickel metal hydride

NVMe

non-volatile memory express

What is nslookup?

nslookup is a DNS utility that displays the IP address of a host name, or the host name of an IP address. It is used for diagnosing and troubleshooting domain name system, or DNS, problems. It functions by sending queries to the DNS server and obtaining detailed responses at the command prompt.

OCR

optical character recognition

OLED

organic light emitting diode

OEM

original equipment manufacturer

PPM

pages per minute

Which two default elements should you change to secure a newly configured wireless network from unauthorized access?

password and SSID

PVA

patterned vertical alignment

PCI

peripheral component interconnect payment card industry

PCIe

peripheral component interconnect express

PCIX

peripheral component interconnect extended

PVC

permanent virtual circuit

PAN

personal area network

PC

personal computer

PCMCIA

personal computer memory card international association

PHI

personal health infromation

PIN

personal identification number

PS/2

personal system/2 connector

PAL

phase alternation line

Which type of attack is conducted by an e-mail request from a financial institution asking you to log in and change your password using the provided link?

phishing

PGA

pin grid array

PGA2

pin grid array 2

PaaS

platform as a service

PnP

plug and play

PPP

point-to-point protocol

PPTP

point-to-point tunneling protocol

PoS

poitn of sale

Which feature in web browsers will prevent pop-ups from launching?

pop-up blocker

PAT

port address translation

POP3

post office protocol 3

PoE

power over ethernet

PSU

power supply unit

PXE

preboot execution evirnonement

PE

preinstallation environment

PGP

pretty god protection

PRI

primary rate interface

PCL

printer control language

PROM

programmable read-only memory

PKI

public key infrastructure

PSTN

public switched telephone network

RF

radio frequency

ROM

read-only memory

RTC

real-time clock

RAID

rebundant array of independent (or inexpensive) discs

RPO

recovery point objective

RTO

recovery time objective

RGB

red green blue

RISC

reduced instruction set computer

RJ-11

registered jack function 11

RJ-45

registered jack function 45

RAS

remote access service

RADIUS

remote authentication dial-in user server

RDP

remote desktop protocol

RIS

remote installation service

RMA

returned materials authorization

What is the syntax of the robocopy command?

robocopy c:\backup x: will copy all files from the backup folder to the x drive.

RIP

routing information protocol

Which type of shoes should you wear while working around electronics?

rubber-soled shoes

SLI

scalable link interface or system level integration or scanline interleave mode

What is dumpster diving?

searching the garbage collection area or dustbin to look for non-shredded confidential documents

SCP

secure copy protection

SD card

secure digital card

SFTP

secure file transfer protocol

S.M.A.R.T

self-monitoring, analysis, and reporting technology

SATA

serial advance technology attachment

SAS

serial attached SCSI

DB-25

serial communications D-shell connector, 25 pins

DB-9

serial communications D-shell connector, 9 pins

SMTP

server mail transfer protocol

SP

service pack

SSID

service set identifier

As you are working on your Windows 10 computer during a fierce thunder storm, lightning strikes the nearby transformer, and your office loses all power. Since your laptop's battery is dead, your computer instantly turns off. Once power to the building has been restored, you turn your computer on and notice that you are now getting a missing DLL error message. Which of the following tools it MOST likely to rectify this issue?

sfc

STP

shielded twisted pair

SEC

single edge connector

SIMM

single in-line memory module

SSO

single sign-on

SCSI

small computer system interface

SCSI ID

small computer system interface identifier

SFF

small forma factor

SOHO

small office/home office

SoDIMM

small outline dual inline memory module

Which authentication method uses a small card with an embedded silicon chip which stores information on it?

smart card authentication

SaaS

software as a service

Freeware

software that is available free of charge

Windows Image Acquisition (WIA)

software used by modern scanners that present options for image output formats (jpg, pdf)

SSD

solid state drive

What does three-factor authentication use?

something you know (i.e. username or password), something you have (i.e., smart card), and something you are (i.e., biometric authentication)

Which software gathers the user's information through the user's Internet connection without the user's knowledge?

spyware

SPGA

staggered pin grid array

SRAM

static random access memory

SAN

storage area network

ST

straight tip

SIM

subscriber identity module

SC

subscription channel

What do all apt-get commands start with?

sudo apt-get so that you are executing that command as a super user.

What is the command to update a Debian-based system with apt-get?

sudo apt-get update.

SXGA

super extended graphics array

SFC

system file checker

What is the syntax for the taskkill command?

taskkill /pic 4908 would kill the task with the process ID number 4908.

TACACS

terminal access controller access-control system

In iOS, which feature is responsible for locating and remotely wiping lost devices?

the Find My iPhone feature in iCloud

What is tailgating?

the act of gaining unauthorized access to a facility by using another user's access credentials without the permission of the authorized person

Which guidelines should you refer to if you find that someone has breached the security of the server room?

the company's security policy

As a technician, what should you refer to while explaining the strength of technology to a customer?

the manual

computer forensics

the scientific collection, examination, authentication, preservation, and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law

TDR

time domain reflectomeneter

Why does WPA use Temporal Key Integrity Protocol (TKIP)?

to ensure that a new encryption key is provided for every packet that is sent

Why should a company document all incidents?

to provide incident documentation to help with future incidents

A technician located at a branch office can't communicate with a company server at the home office. Which of the following commands could be used to determine where the communication is blocked?

tracert

You are the network administrator of a branch office of your company. The branch office network is part of a WAN that covers most of the United States. Users have been complaining that they are unable to access resources over the WAN at the main headquarters. You suspect that one of the routers between your office and the main headquarters is not working properly. To troubleshoot the routers, which of the following TCP/IP utilities would be BEST to use?

tracert

TCP/IP

transmission control prptocol/internet protocol

TFTP

trivial file transfer protocol

UXGA

ultra extended graphics array

Twain-based software

used by older scanners

mask

used when you are using a compressed air canister or working in an otherwise dusty environment.

UAC

user account control

UDF

user defined functions or universal disk format or universal data format

VA

vertical alignment

In Linux, what is vi?

vi is a very old text-editor for the Linux operating system.

VESA

video electronics standards association

VGA

video graphics array

BRAM

video random access memory

Which device can be installed to monitor visitor entry in server room when there is not enough manpower to escort the visitor?

video surveillance cameras or closed-circuit television (CCTV)

VLAN

virtual LAN

VM

virtual machin

VNC

virtual network computer

VPM

virtual private network

What does the acronym VPN denote?

virtual private network

VoIP

voice over internet protocol

VDC

volts DC

What is shoulder surfing?

watching someone when he enters his login credentials

WAN

wide area network

WUXGA

wide ultra extended graphics array

WPA2

wifi protected access 2

WPS

wifi protected setup

WINS

windows internet name service

WEP

wired equivalent privacy

What does the acronym WEP denote?

wired equivalent privacy

WAP

wireless access protocol/wireless access point

WLAN

wireless local area network

WMN

wireless mesh network

WPA

wireless protected access

WWAN

wireless wide area network

Which command would you use to copy all files and subdirectories in a directory, including empty subdirectories?

xcopy /e

What is the syntax of the xcopy command?

xcopy c:\backup x: will copy everything in the backup folder to the x drive.

Whom should you consult if you are working on-site and your customer asks you to perform a task that is not in your scope?

your supervisor

ZIF

zero-insertion force

ZIP

zigzag inline package

NEW QUESTION 11 A junior Linux system administrator needs to update system software. Which of the following shell commands would allow the administrator to gain the necessary permissions to update the software? A. sudo B. chmod C. grep D. pwd

Answer: A

NEW QUESTION 13 A technician is working on a user's workstation and notices a lot of unknown processes running in the background. The user informs the technician that an application was recently downloaded from the Internet. Which of the following types of infection does the user MOST likely have? A. Rootkit B. Keylogger C. Trojan D. Ransomware

Answer: A

NEW QUESTION 14 Which of the following is considered government-regulated data? A. PII B. End-user License Agreement C. Digital Millennium Copyright Act D. DRM

Answer: A

NEW QUESTION 3 Which of the following security methods BEST describes when a user enters a username and password once for multiple applications? A. SSO B. Permission propagation C. Inheritance D. MFA

Answer: A

NEW QUESTION 5 Which of the following installation types would require the use of an answer file to install the OS? A. Unattended B. Clean C. Repair D. Upgrade

Answer: A

NEW QUESTION 9 A user calls the help desk regarding a new Windows issues that started in the morning. The user can no longer use any locally attached devices, such as a mouse or a printer, and a reboot did not fix the problem. Which of the following would MOST likely fix the issue? A. Roll back updates B. Disable the Windows Update service C. Check for updates D. Restore hidden updates

Answer: A

NEW QUESTION 2 Which of the following is the amount of memory a user is limited to with a 32-bit version of Windows? A. 2 GB B. 4 GB C. 8 GB D. 16 GB

Answer: B

NEW QUESTION 8 A network administrator notifies a technician that the company is experiencing a DDoS attack. Several internal Windows PCs are the source of the traffic. The network administrator gives the technician the Windows computer names and states they be scanned and cleaned immediately. With which of the following types of infections are the PCs MOST likely infected? (Choose two.) A. Spyware B. Zombies C. Virus D. Ransomware E. Worm F. Botnet

Answer: BE

NEW QUESTION 10 A technician is setting up a SOHO wireless network for a healthcare office that does not have a server. The user requires the highest level of wireless security and various levels of desktop authentication to access cloud resources. Which of the following protocols and authentication methods should the technician implement? (Choose two.) A. WPA B. WPA2 C. WEP D. TKIP E. RADIUS F. Multifactor G. TACACS H. SSO

Answer: BF

NEW QUESTION 4 A technician needs to edit a protected .dll file but cannot find the file in the System32 directory. Which of the following Control Panel utilities should the technician use? A. System B. Display C. Folder Options D. Indexing Options

Answer: C

NEW QUESTION 1 A technician is installing a private PC in a public workspace. Which of the following password practices should the technician implement on the PC to secure network access? A. Remove the guest account from the administrators group. B. Disable single sign-on. C. Issue a default strong password for all users. D. Require authentication on wake-up.

Answer: D

NEW QUESTION 12 A desktop technician is attempting to upgrade several machines to Windows 10. After releasing there is only one disc for the installation, the technician decides to upgrade over the network. Which of the following boot methods initiates such an upgrade? A. SSD B. Optical drive C. Flash drive D. PXE

Answer: D

NEW QUESTION 15 Which of the following technologies is used by malicious employees to obtain user passwords? A. Man-in-the-middle B. Phishing C. Tailgating D. Shoulder Surfing

Answer: D

Which of the following protect your from electrostatic discharge (ESD)?

Anti static bag Anti static wrist strap Ground mat

Which of the following protect you from electrostatic discharge (ESD)?

Antistatic wrist strap, Ground mat and antistatic bag

What are 2 things that considerably decrease the battery life of a portable device?

Any applications that are using GPS, or that are constantly syncing in the background.

What do you connect the end of an ESD wriststrap that is not on your wrist to?

Any grounding component inside the motherboard. Look up the motherboard specifications if you need to know where those areas are.

What is a security problem with using Port Forwarding with a standard port, such as Port 80?

Anyone scanning for open ports into private networks could accidentally come across the open port that let's them into your network. The way to mitigate it is to set up a random non-frequently used port number, such as 11461, when you put the port forwarding rule into your router.

What is a "switch" when using the CLI?

Anything that is put on the end of a command, such as /p following the dir command to only show one page of results at a time for the dir command.

Time Machine

App facilitating backup operations in macOS.

What 7 tabs are available in the Task Manager window in the Windows 8 operating system?

App history, Details, Performance, Processes, Services, Startup, and User.

Name the 6 tabs found in Windows 7 Task Manager.

Applications, Processes, Services, Performance, Networking, and Users.

How much data can be stored in any given Logical Block Address?

Approximately 4MB.

Worms

Are memory-resident malware that replicate over network resources.

What is the most basic troubleshooting action, especially if Windows won't fully load?

As simple as it seems, just rebooting the system. Try it up to 3 times, and if it still doesn't work, then the 4th startup will take you into recovery mode anyway, which is where you need to be to get to advanced startup options.

Can you use MBR on a Windows 10 computer?

As the primary partitioning service, no. You can read from MBR drives, but the mass storage of the computer itself will be GPT if you are on a Windows 10 machine.

What should you do when you do not understand a customer's problem while talking to the customer?

Ask for clarification if there is something that you did not understand.

What should you do if the customer's child is interfering with the troubleshooting process while you are visiting a customer site?

Ask the customer to keep the child away from the work area.

What should you do if a personal item near the work area is interfering with the troubleshooting procedure?

Ask the customer to remove the personal item.

Which of these options is the most appropriate handling of a customer's password when troubleshooting requires it?

Ask user to type in the password themselevs

Which of these options if the most appropriate handling of a customers password when troubleshooting requires it?

Ask user to type in the pw themselves

If a person is able to express positive and negative ideas and feelings in an open, honest, and direct way, what would you call this type of behavior?

Assertive behavior

How should you set up the IP addresses on wireless access points?

Assign them static IP addresses so as the administrator you always know how to contact them, verify connectivity, etc. In addition, by assigning the IP addresses and keeping them in a local spreadsheet, it will be very easy to remember or find out the IP addresses for all of the WAPs in your network.

Which of the following best describes the Principle of Least Privilege?

Assign users the least permission level required to do their jobs

Approximately how big will a thumb drive need to be in order to create a Windows Recovery Environment image?

At least 16GB for modern versions of Windows.

What are 2 locations in your network where you can set up a firewall?

At the edge or border of your network, your router usually doubles as a firewall filtering out certain ports, IP addresses, MAC addresses, etc. In addition, individual hosts in the network can have firewalls set up as well.

What does AAA stand for in the enterprise wireless world?

Authorization, Authentication, and Accounting. Enterprise environments won't used the pre-shared keys common in public environments, but will instead authenticate users via either RADIUS or TACACS+ servers.

Which uninterruptible power supply (UPS) feature provides protection from power surges and power drops?

Automatic Voltage Regulation (AVR)

Which three vRealize Automation content types are supported by content lifecycle management in vRealize Suite Lifecycle Manager? (Choose three.) A. Resource actions B. Endpoints C. Reservations D. Composite blueprints E. Entitlements F. Property definitions

B. Endpoints D. Composite blueprints F. Property definitions

Which role is required in vRealize Automation to add a vCenter endpoint to vRealize Business for Cloud? A. Business group manager B. Infrastructure administrator C. Business management controller D. Business management administrator

B. Infrastructure administrator

A new Windows operating system machine blueprint is created and is ready to be added to a new service catalog. Which step must be performed for the catalog item to be visible to business users? A. Entitle the blueprint with all appropriate actions. B. Publish the blueprint. C. Entitle a business user to add the blueprint to the catalog. D. Add the catalog item to the business group's reservation.

B. Publish the blueprint.

An administrator configures a pre-approval event subscription to run vRealize Orchestrator workflow. The workflow does not run when a machine that matches the defined criteria is requested in the service catalog. What can the administrator do to resolve this issue? A. Verify that approvers have executed the approve option. B. Verify that the workflow subscription is published. C. Verify that approvers belong to specific users and groups. D. Verify that the approval policy is associated with the correct resource action.

B. Verify that the workflow subscription is published.

What is a Windows stop error commonly called?

BSoD

You work as the IT administrator for a small startup company. Lily's computer has two internal hard drives and runs Windows 10. She is concerned that she may accidentally delete a file of that her primary hard disk may fail at some future time. She has come to you for suggestions about how to protect her files. Due to the size and revenue of this startup company, Resources are somewhat limited. Which of the following would BEST protect Lily's files?

Back up her files using File History.

What are the Windows 7 services called in the Windows 10 version of Task Manager?

Background processes.

What type of imaging input device would be most useful for a Point-of-Sale (POS) system?

Barcode scanner.

Name 3 types of updates that happen on smartphones.

Baseband updates, Broadband updates, and Radio firmware updates.

contact image sensor (CIS)

Based on scanners that use an array of LEDs that strobe between red, green and blue to illuminate the image. Typically used on sheet-fed scanners and automatic document feeders (ADF)

What is important to remember about where to put wireless access points?

Based on the type of antenna that the WAPs have, they will put out different propagation fields. Research the WAPs in advance and buy the versions that will give the most effective coverage for the areas that will need the wireless signal.

What can you monitor with Performance Monitor?

Basically, everything. You can choose very specifically how little or how much detail you want to see about your system, and even other systems thare are on your local network.

What does the echo command mean in a Linux script?

Basically, to just display on the screen whatever follows the echo command. If you put the echo command on a line by itself and then hit Enter, it will display a blank line. If you use the command echo "Show me this" and hit Enter, the words "Show me this" will display without the quotation marks.

BNC

Bayonet Neill-Concelman

What should be the first step when dealing with irate customers?

Be an active listener while customers vent their frustration.

Compressed air dislodges dust from hard to reach areas however you should be:

Be aware of risk of contaminating the environment with dust. Use in a controlled work area. Use air filter mask and safety goggles.

What should you do when you do not have an answer to the customer's question?

Be honest. Tell the customer that you will find out the answer and report back by calling the customer, if required.

An employee's responsibility for environmental safety is to:

Be informed of potential hazards. Always use safe practices.

Why should you never use a home vacuum cleaner to clean a PC?

Because they generate large amounts of static electricity that may damage sensitive components.

Boolean

Binary data type (1 or 0) that indicates TRUE/FALSE, ON/OFF; 1b

What is the name of a Microsoft Windows feature that allows for full volume encryption?

Bitlocker

What are the 3 ways to perform disk-level encryption in Windows, MAC, and Linux?

Bitlocker for Windows, File vault for MAC, and 3rd party apps for Linux.

BD-R

Blu-ray Disc recordable

What is Boot Camp?

Boot camp is used to install Windows on a Mac computer and allows you to choose between operating systems at boot.

How do you fix a corrupted profile in Windows 7?

Boot into safe mode, go to Control Panel, then Administrative Controls, then right-click on Computer Management and Run as Administrator. Once there, go to Local Users and Groups and create a new profile, such as User2. Then open the command prompt as Administrator and copy the corrupted profile files into the new profile with Robocopy.

How can you fix a bad device driver?

Boot into safe mode, go to Device Manager, and rollback or update the device driver in question. If you look at the version of the device driver, there are often websites that will tell you compatibility issues with various drivers and operating system versions.

Which of the following do you make available first so that your network-based automated deployment can proceed with exclusive access to the installation volume?

Boot.wim

How are backups and restores for files - not system settings - accomplished in Windows?

Both Windows 7 and Windows 10 still use the Backup and Restore Windows 7 applet in the Control Panel.

What makes a MAC similar to a Linux machine?

Both are based on the UNIX programming language, so there a many similiarities, especially when using a command prompt.

What is a Botnet?

Botnet malware converts the computer into a zombie; part of a large network of computers that performs distributed network attacks.

What type of Fire extinguisher puts out electrical fires?

C-rated fire extinguishers.

When using the Generate Form option, what are two items for which custom form tabs are automatically created? (Choose two.) A. Each network component defined on a blueprint B. Each disk that is associated with each virtual machine that is already defined in the blueprint C. Each custom property defined on a blueprint D. Each custom property group defined on a blueprint E. Each virtual machine component defined on a blueprint

C. Each custom property defined on a blueprint E. Each virtual machine component defined on a blueprint

What is a good program that cleans up artifacts left behind after uninstalling programs in Windows?

CCleaner, which can be found at https://www.ccleaner.com/. However, always back up the registry prior to using it because it can and will make changes to the registry.

What are the 5 root classes that all Windows Registry settings are divided into?

CLASSES_ROOT, CURRENT_USER, LOCAL_MACHINE, USERS, and CURRENT_CONFIG - all begin with HKEY.

What are the 4 areas that detailed information can be viewed for in Resource Monitor?

CPU, Disk, Network, and Memory.

Which of the following would you install to redress issues of laptops disappearing?

Cable locks

Which of the following would you install to redress of laptops disappearing?

Cable locks

Which of the following machines is best suited to have a BIOS/UEFI password for security?

Campus computer lab

Security guards

Can be placed in front of and around a location to protect it.

Which commands can you run from the Command line to navigate to the root form C:\Program Files (x86)\Microsoft Office\PackageManifests and list the directories and files on the root drive?

Cd \. then run dir

What are certificates when it comes to browsing the Internet?

Certificates are the actual encryption keys that make a secure connection between a web page and the client that is accessing that page. The certificates are verified by a 3rd party, such as Verisign.

When disposing of hardware storage devices, which of the following may you be required to obtain to ensure regulatory compliance for data security?

Certification of destruction

Following a network compromise, which of these terms describes your record of who was in possession of evidence at a particular time?

Chain of custody

What type of sensor is used to capture an image for conversion to a digital file?

Charge Coupled Device (CCD) or Complementary Metal Oxide Semiconductor(CMOS)

What is a common cause of a "black screen" even if the video card is working, or the "OS not Found" error?

Check the boot order and ensure no thumb drives or other bootable devices are plugged into the computer.

What does chkdsk do?

Chkdsk performs error correction on any drive that it is run on. It does not actually fix any drive issues, but it does mark off any bad areas so they are not used.

When installing Windows, what do you do if it looks like you have to log into your Microsoft online account, but you don't want to?

Choose the installation option to join a domain instead, even if you aren't going to be joining a domain. This will let you set up a local user account on that computer.

Which selection from the Power options navigation menu would you choose to make the Hibernate choice available in Windows 10, assuming compatible hardware?

Choose what the power buttons do

Which of the following are examples of p;roper communication and professional skills while dealing with a difficult customer?

Clarify customer statements Narrow the scope of the problem

Weekly general preventive computer maintenance

Clean exterior of monitor and system unit Clean keyboard and mouse

Control dust by:

Cleaning devices Maintaining HVAC filters Maintaining fan inlet air and dust filters If necessary, placing a system in enclosure with its own air filters and fans

How do you handle errors with applications or applications not loading on portable devices?

Clear the cache of the application if that is an option. You can also uninstall and reinstall the application, and try restarting the portable device as well.

What does the clear command do?

Clears the screen of all recent activity in Linux.

What does the cls command do?

Clears the screen of all recent activity in Windows.

What is Javascript the most effective tool for writing code for?

Client-side applications. All javascript files have a .js extension.

What is the FIRST action you should perform if you find that your fellow technician has left the door of the server room open?

Close the door.

Batch files

Collection of command-line instructions

What do you get when you combine applications and services on a computer?

Combined they make up a Process, and a Process is a program that is running and taking up memory that must be managed by the operating system.

//

Comment delimiter for JavaScript

#

Comment delimiter for Python, PowerShell, and Bash shell scripts

'

Comment delimiter for VBScript

Rem or ::

Comment delimiter for batch files

You have a script that needs to be edited with input values, but when you open the script you note there are several lines of text each preceded with "#", indicating these lines are which of the following?

Comments

What are Windows executable files made up of?

Compiled code that is written by programmers in languages such as C and C#.

blackout

Complete power failure

CAPTCHA

Completely Automated Public Turing Test To Tell Computers and Humans Apart

What is the key to avoiding environmental damage when disposing or recycling devices and components?

Comply with environmental control requirements. MSDS documentation for identifying potentially hazardous substances.

What is a Virtualization workstation?

Computers that have a maximum amount of RAM and multi-core processors to support the virtualized environments that will be running on them. They also need extra mass storage devices to support the files and operating systems of the multiple virtual machines that will be running on them.

What is a Graphic, CAM, or CAD design workstation?

Computers that have powerful, multi-core CPU's, high-end video, and a maximum RAM that can support the software and processing speeds needed for graphic and video production.

What is an audio and video editing workstation?

Computers with high-end video cards, audio cards, large, fast hard drives, and dual monitors.

To tightly control the anti-malware settings on your computer, you elect to update the signature file manually. Even though you vigilantly update the signature file, the machine becomes infected with a new type of malware. Which of the following actions would BEST prevent this scenario from occurring again?

Configure the software to automatically download the definition file updates as soon as they become available.

Material Safety Data Sheet (MSDS)

Contains information about: Ingredients, health hazards, precautions, and first aid information, what to do if the material is spilled or leaks and how to recycle any waste product or dispose of it safely.

What is Content Filtering?

Content filtering can set limits on user browser sessions. It can be based on location, time, and user privileges. With this option, administrators have the flexibility to whitelist and blacklist websites and applications so that employees are limited to browsing trusted websites.

Which of the following terms describes the difference between white and black in an LCD monitor?

Contrast ratio

A user has reported they accidentally sent multiple print jobs to the wrong printer. Where do you go to purge the queue?

Control Panel -> Devices and Printers

Where are Windows features enabled and disabled in the Windows 10 GUI?

Control Panel -> Programs and Features

What is the primary method of managing the features and setting on a Windows 7 machine?

Control Panel dominated Windows 7 management.

On a MAC, what are the System Preferences comparible to on a Windows machine?

Control Panel or Settings.

What are 2 hot key combinations used to open Task Manager?

Control, Alt, and Delete and also Control, Shift, and Escape. *


Ensembles d'études connexes

System of Equations, Systems of Equations in 3 Variables

View Set

Ch 1-5 Question and Answer Study Guide - Night - Ms. Brown

View Set

different types of vegetarian diets

View Set

Ch. 13 Marketing: Helping Buyers Buy

View Set

Chapter 39: Assessment of Musculoskeletal Function PrepU

View Set