Master Set #4 - Core 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

In a security awareness class, the instructor discusses malicious software that relies on other applications to execute and infect the system. Which type of malware is being discussed?

A virus

In which of the following file extension types would a user expect to see the command "net use T:\\server\files'? A. .bat B. .vbs C. .js D. .py

A. .bat

A team needs to deploy a temporary server room at a site to provide support during construction. Which of the following should they use at this site while setting up the server room? A. Air filters B. Privacy screens C. Vacuums D. ESD mats

A. Air filters

Which of the following provide the BEST security for a server room? (Select two.) A. Badge reader B. Bollard C. Biometric lock D. Cable lock E. USB token F. Privacy window shades

A. Badge reader C. Biometric lock

Which of the following devices provides protection against brownouts? A. Battery backup B. Surge suppressor C. Rack grounding D. Line conditioner

A. Battery backup

When a system is running slow, which of the following may be able to help improve its performance?

A. DEFRAG

Joe, a user, returns his computer to the technician who performed a virus removal on it the week before. Joe states that several symptoms have returned. Which of the following should the technician have covered previously as part of the original repair? A. End-user education B. Pre-installation environment cleaning C. Disabling of System Restore D. Infected system quarantine

A. End-user education

A technician is PXE booting a computer. Which of the following is the technician MOST likely performing on the computer? A. Image deployment B. Multiboot configuration C. In-place upgrade D. System repair

A. Image deployment

A technician has been asked to recommend antivirus software for a home PC, but the user does not want to pay for a license. Which of the following license type should the technician recommend? A. Open license B. Personal license C. Corporate license D. Enterprise license

A. Open license

Which of the following is considered government-regulated data? A. PII B. End-user license agreement C. Digital Millennium Copyright Act D. DRM

A. PII

Creating a Restore Point is MOST useful in which of the following cases:

A. Prior to installing new software or hardware

Which of the following is a network protocol used to prioritize certain types of traffic over others? A. Quality of Service (QoS) B. Network Interface Card (NIC) C. Roaming Aggressiveness D. Transmit Power

A. Quality of Service (QoS)

A user's computer is displaying a black screen. The technician restarts the computer, but the OS still does not load. The technician discovers the OS was patched the previous evening. Which of the following should the technician attempt NEXT? A. Reboot into safe mode and roll back the updates B. Repair the Windows Registry C. Configure boot options in the BIOS D. Disable Windows services and applications

A. Reboot into safe mode and roll back the updates

A wireless access point is going to be configured in a small office located in a crowded building. Which of the following should the installation technician perform to increase the security of the wireless network? (Select two.) A. Reduce the transmit power B. Reduce the channel availability C. Disable the DHCP server D. Enable QoS management E. Disable the SSID broadcast F. Implement WPA encryption

A. Reduce the transmit power E. Disable the SSID broadcast

In most small to midsize organizations there is no single person responsible for physical security.

A. True

counter logs

Allow you to collect statistics about resources such as memory, disk, and processor

Event Viewer

Allows monitoring of Windows logs. System, security, application, and service events are recorded in these logs

Local Security Policy

Allows you to view and edit currenty security policy

A copyright provides the creator of an original work the right to distribute, sell, or transfer the copyrighted work for a set period of time, after which the creator can release or renew the copyright.

B. False

What provides the *best* security for a server room?

Badge reader

BD-R

Blu-ray Disc recordable

Which of the Apple software utilities enables installation of an alternative OS in a multiboot environment?

Boot Camp

Which of the following Windows 10 features has a WAN bandwidth optimization technology?

BranchCachd

Which of the following is a drop in voltage which may cause electronic devices to fail or behave unpredictably?

Brownout

An attack against encrypted data that relies heavily on computing power to check all possible password combinations until the correct one is found is known as:

Brute-force attack

0

---

2

-w-

Which of the following answers lists the filename extension of a Microsoft PowerShell script files?

.ps1

A collection of computers all working together to perform malicious acts is known as:

A. Botnet

What allows the user to shut down applications that are not responding? A. Task Manager B. Service C. Default Program D. Program and Features

A. Task Manager

Which toolset lets you restore a deleted Active directory object?

Active Directory Administrative Center

BNC

Bayonet Neill-Concelman

remote settings location

Control Panel ->System -> Advanced system settings ->System Properties->Remote Settings

Which mode is used with Linux to help troubleshoot GUI issues?

D. Recovery Mode

chkdsk C: /f

Fixes file system errors on the disk drive C

GPT

GUID partition table

Which computer virus type is usually targeted at Microsoft Office documents?

Macro

RFID

Radio Frequency Identification

A keylogger is what type of a malicious risk?

Spyware

Which of the following would indicate that the user is currently in "Super User" mode on a Linux system?

C. /# apt-get update

A new technician is learning how to use the dir command on a windows system. They would like to use a command switch but can't remember which one. How can help for this command be obtained? A. /n B. /x C. /? D. /c

C. /?

Your organization is concerned with unauthorized users downloading confidential data to removable media. You decide to encrypt the confidential data using the Encrypting File System (EFS). You need to copy an EFS-encrypted file. The file will be copied to an NTFS volume that does not implement EFS. What is the state of the file?

The original version of the file remains encrypted. The new version of the file is decrypted.

TLS

Transfer Layer Security

Joe, an employee, took a company-issued Windows laptop home, but is having trouble connecting to any of the shares hosted on his home media server. Joe has verified he is connected to the Internet. Which of the following would explain why Joe cannot access his personal shares? A. An IP conflict is present B. A corporate VPN is enabled C. A firewall exception must be set D. HomeGroup must be enabled

C. A firewall exception must be set

In the context of MS Windows system management, the term "Administrative share" refers to a hidden network share on a local computer designed to be accessed remotely by network administrators. T or F

True

Permission propagation occurs when a folder or file created inside another folder takes on (inherits) permissions applied to that folder (permissions applied to the so-called parent folder propagate down to its child objects, i.e. folders and files created inside the parent folder). T or F

True

TPM

Trusted Platform Module

TN

Twisted Nematic

UDP

User Datagram Protocol

What setup configuration would you choose for a new Windows 10 computer installed on your home network which does not include a server?

Workgroup

ATA

advanced technology attachment

BYOD

bring your own device

CD

compact disc

DaaS

data as a service

HCL

hardware compatibility list

HDMI

high definition media interface

MAN

metropolitan area network

NAC

network access control

NAT

network addressed translation

Naas

network as a service

NiMH

nickel metal hydride

NVMe

non-volatile memory express

OS

operating system

4

r--

6

rw-

WLAN

wireless local area network

WMN

wireless mesh network

WPA

wireless protected access

WWAN

wireless wide area network

ZIF

zero-insertion force

ZIP

zigzag inline package

shutdown -h

Halt or power off the system

A client wants a technician to create a PC naming convention that will make the client's PCs easier to track and identify while in use. Which of the following naming convention formats should the technician follow? A. Domain name, location, IP address B. Domain name, location, asset ID C. Asset ID, MAC address D. Location, RFID

C. Asset ID, MAC address

DIN

Deutsche Industrie Norm

apple menu items

Displays, Storage, Service

format D: /fs:NTFS /x

Enables file compression using NTFS

In Linux, if you want to run a batch of commands or a script to perform a backup or other maintenance task what is the scheduling service called? A. Task scheduler B. Finder C. Cron D. Time Machine

C. Cron

Which of the following is a contractual right to use agreement for copyrighted material?

C. Licence

Which of the following are examples of instruction sets that can be for automating tasks (choose two)?

Compiled program Script

Application Log

Contains information regarding the application errors

Tailgating

Entering a secure area without authorization by following close behind the person that has been allowed to open the door or checkpoint.

When a program installed in Windows stops responding or encounters an error, logs describing the error can be examined with the use of:

Event Viewer

Which of the following is the best way to dispose of a storage device to ensure it is unusable, and data unlikely to be retrieved from it?

D. Incinerate the device

A technician has identified malware on a user's system. Which of the following should the technician do NEXT according to malware removal best practices? A. Enable System Restore and create a restore point so no data is lost B. Educate the user about how to avoid malware in the future C. Update the antivirus software and run a full system scan D. Move the infected system to a lab with no network connectivity.

D. Move the infected system to a lab with no network connectivity.

What happens when you move a file structure from the fileserver's D: drive to E:?

File attributes (including security) are inherited from the new parent directory

Fragmentation

Files written in non contiguous clusters reducing read performance

Which of the following examples of inheritance possession (something you are) to support multifactor authentication?

Fingerprint and Retinal Scanner

Which of the Windows Active Directory Group Policy settings allows network administrators to map a folder on a user's PC to a server-based location?

Folder redirection

A rule-based access control mechanism implemented on routers, switches, and firewalls is known as:

(ACL) Access Control List

What's new in HomeGroup in Windows 10?

-HomeGroups are deprecated in Windows 10 -iPhone support

You work as a PC technician in an organization. You are working on you Windows computer. Suddenly, the screen of the computer crashes and a blue screen appears. Which of the following approaches d

-Reboot the computer to see if the problem is resolved -Note the error and research in Microsoft's Knowledge base

Which of the following remote access technologies provide features of screen sharing and file tranfer?

-Telnet -SSH

FAT12

12-bit file allocation table

FAT16

16-bit file allocation table

Finder

Is the macOS equivalent of Explorer in Windows

According to the CompTIA's best practice procedures for malware removal, disabling System Restore on a malware-infected Windows-based system should be performed as the next step after:

Isolating the infected system

LC

Lucent connector

What tool would you use to make a flat file database available to an application you are developing?

ODBC Data Sources

You are an IT technician in your organization. When you log into your account, you press a button on your keychain and then type in the new set of number it displays. What digital authentication element are you using?

OTP

Which of the following answers refer to a very basic UPS type commonly used for protecting a single PC?

Offline / Standby.

chkdsk C: /i /c

On NTFS volumes only skips part of the checking process

Which type of UPS provides the best power outage protection?

Online / Double-conversion.

Which of the following is *not* a feature of the *FOR* loop?

Only one variable can be initialized at a time in the for statement

Windows key + r

Opens the Run dialog box

dir/o:d

Order by date

dir/o:s

Order by size

Which of the following examples meets the requirement of multi-factor authentication?

Password and biometric scan

Which of the following password best practices would mitigate the security risk posed by temporary workers?

Password expiration

What does PCI DSS stand for?

Payment Card Industry Data Security Standard

What is the name of a router configuration feature that allows to open an inbound port based on the outbound requests made by hosts placed inside a private network?

Port triggering

taskkill /pid

Process ID used to specify a process to kill

Which of the following tabs would you access in Internet Options in order to manage add-ons?

Programs

Which of the following Control Panel applets in Windows provides options to uninstall, change, or repair applications?

Programs and Features

msinfo32

Provides a Windows interface to some of the configuration information contained in the registry.

msinfo32

Provides information about hardware resources, components, and thesoftware environment. Also known as System Information.

A type of identification badge that can be held within a certain distance of a reader device to authenticate its holder is called:

RFID badge

RFI

Radio Frequency Interference

Which of the following terms refers to an example of crypto-malware?

Ransomware

A user believes that malware has impacted the web browser that they use. What is a common symptom that affects a web browser?

Redirection

dumpster diving

Refers to combing through an organization;s (or individual's) garbage to try to find useful documents.

ren

Renames a file or directory

Hibernate/Suspend to Disk

Saves any data in memory (open files) to disk (as hiberfil.sys in the root of the boot volume) then turns the computer off.

According to the CompTIA's best practice procedures for malware removal, enabling System Restore and creating a restore point in Windows should be performed as the next step after:

Scheduling scans and running updates

Which statement is true regarding smart cards?

Smart cards can be deactivated or replaced

boot partition

The drive containing the operating system files (the system root) is referred to as the:

boot partition

The hard drive partition where the Windows OS is stored. The system partition and the boot partition may be different partitions.

What happens when you combine both Share and NTFS permissions on a share?

They combine to give the most restrictive permission

For a wireless client to be able to connect to a network, the security type (e.g. WEP, WPA or WPA2) and encryption type (e.g. TKIP or AES) settings on the connecting host must match the corresponding wireless security settings on a Wireless Access Point (WAP). T or F

True

UPnP

Universal Plug and Play

UAC

User Account Control. Informs you when a program makes a change that requires administrator-level permission, also adjusts the permission level of your user accounts

USMT

User State Migration Tool

BOIS

basic input/output system

VM

virtual machin

Which of the following is a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object?

(ACL) Access Control List

A type of document stipulating rules of behavior to be followed by users of computers, networks, and associated resources is called:

(AUP) Acceptable Use Policy

What is the name of a policy that allows employees to use private mobile devices for accessing company's restricted data and applications?

(BYOD) Bring Your Own Device.

In which of the mobile device deployment models employees can use corporate-owned devices both for work-related tasks and personal use?

(COPE) Company-issued, Personally-Enabled

A type of trusted third party that issues digital certificates used for creating digital signatures and public-private key pairs is known as:

(CSP) Content Security Policy

A type of control access technology providing protection against copyright infringements is called:

(DRM) Digital Rights Management

Which of the following provide the BEST security for a server room? (Select two.) A. Badge reader B. Bollard C. Biometric lock D. Cable lock E. USB token F. Privacy window shades

A. Badge reader C. Biometric lock

crontab -1

Add or delete a scheduled job in cron

Which tab of the System Properties (sysdm.cpl) applet in MS Windows provides access to system performance settings menu?

Advanced

Which of the following choices would you type into the Start menu search to configure virtual memory with the least administrative effort?

Advanced System Settings

A mobile device is not able to connect to any networks. What should be checked?

Airplane mode

A technician is working on a Windows 10 PC that is running slowly. Which of the following commands should the technician use to correct the issue? (Select two.) A. dir B. chdsk C. dism D. ipconfig E. forman F. diskpart

B. chdsk C. dism

An employee reported that a suspicious individual was looking through the recycle bin. Which of the following types of social engineering threats is this? A. Phishing B. Spear phishing C. Dumpster diving D. Impersonation

C. Dumpster diving

Which of the following drive formats is used for data and audio CD-ROMs?

CDFS

Performance Monitor

Configures detailed reports on different system statistics and log performance over time(can be accessed through administrative tools, Computer Management or perfmon.exe command line)

The purpose of PCI DSS is to provide protection for:

Credit cardholder data

Which of the following tools is used to filter air, remove debris, and return fresh air to a confined space?

Enclosures

Which of the following terms refers to an environmental control system?

HVAC

When speaking with a customer, what is the best way for a technician to explain a technical issue?

In a non-technical manner that is easy to understand

What is the function of archive bit?

Indicating whether a file has been modified since the last backup

Which of the following enables installation of software that is not available through the official Apple App Store?

Jailbreaking

Computer Management

Management console with multiple snap-ins to configure local users and groups, disks, services, and devices

NFS

Network File System - used to mount storage devices into a local file system in linux

Domain users are typically limited to the changes they can make on their computer because:

Not A,B

In forensic procedures, a sequence of steps in which different types of evidence should be collected is known as:

Order of volatility

shutdown -r

Reboot after shutdown

Which of the macOS features enables access to optical drive of another computer over a network?

Remote Disc

Which one of the following terms is defined as the likelihood and impact or consequence of a threat actor exercising a weakness?

Risk

SSL

Secure Sockets Layer

Which of the following locations in Windows 7 allows to enable/disable startup applications?

Startup tab of the System Configuration (msconfig.exe) utility.

Which of the following statements regarding Android phones is INCORRECT?

The Android GPS requires the help of cell towers to obtain a location

Open Source

The programming code used to design the software is freely available.

Security Log

This log holds the audit data for the system

Zombie

Unauthorized software that directs the devices to launch a DDoS attack

UNC

Universal Naming Convention

LPL

Windows Logo'd Product List- catalog of tested devices and drivers

Scan engine/components

fixes problems and makes improvements to the scan software itself

HTPC

home theater PC

PPM

pages per minute

7

rwx

An agreement granting the right to use software application in a manner determined by the software vendor is known as:

(EULA) End User License Agreement

Which type of software enables a centralized administration of mobile devices?

(MDM) Mobile Device Manager

Which of the following attacks relies on intercepting and altering data sent between two networked hosts?

(MITM) Man In The Middle attack

Which of the following acronyms refers to any type of information pertaining to an individual that can be used to uniquely identify that person?

(PII) Personally Identifiable Information

An authentication subsystem that enables a user to access multiple, connected system components (such as separate hosts on a network) after a single login on only one of the components is known as:

(SSO) Single Sign On

Which of the following answers refers to a non-proprietary remote-access tool that enables control over another computer on the network with the use of a graphical user interface?

(VNC) Virtual Network Computing

A solution that simplifies configuration of new wireless networks by enabling non-technical users to easily set up new networks, configure network security settings, and add new devices to an existing network is known as:

(WPS) Wireless Protected Setup

You work as a support technician in an organization. You have been called to troubleshoot an issue in the customer's computer system at his place. What guidelines should you follow for providing good professional service to your customer?

-Avoid using technical jargon, acronyms, and slang -Address people appropriately -Act like you know what you're doing, even if you might have a doubt

You are providing training on security breaches regarding passwords and encryption. Which attacks often attempt this type of breach?

-Brute-force attack -Dictionary attack -Rainbow attack

There are different types of fire extinguishers on the market. Which fire extinguishing substances can be used for multiple types of fires?

-CO2 -Dry chemicals

You are aware that cell phones and tablets contain toxic materials including non-removable batteries. What will you take into considerations before disposing them off?

-Check for viability for donation to charity -Perform a factory reset -Send for recycling to device vendor

What are the layers defined in the defense in depth strategy?

-Data -Application -Host -Internal network -Physical facility

You are working as a desktop technician in an organization. Adam reports that some unauthorized users are accessing his email messages. He also reports that he received an email from an unauthorized user requesting confidential information about his bank account. What should you suggest Adam do?

-Delete the email message received from unauthorized users -Encrypt outgoing messages

Howard the maintenance supervisor has identified several devices in your company's facility that contain phosphorous. Which guidelines would you need to emphasize to his team regarding how to properly dispose of phosphorus?

-EPA guidelines -MSDS -OSHA guidelines

You are the CEO of an organization, your company is located in an area, where the air quality can impact the employees and devices. What tools will you use to protect the device and employees from airborne particles?

-Enclosures with good ventilation -Use of compressed air and mechanical blowers

You want to prevent your computer from any type of electrostatic discharge (ESD), while servicing the computer. Which actions should you NOT perform while servicing the computer?

-Ensure that the room in which computer is serviced is carpeted -Ensure that the room in which computer is serviced is cool and dry

Which of the following are the features which were once popular but have been deprecated since Windows 7?

-Gadgets -Windows Media Center -Backup and Restore

Jane is new to the PC technician world and is curious about ESD. Which steps would you tell her to use as preventative measures against static electricity?

-Have proper grounding of building and outlets -Wear anti-static bands while servicing computer components

John, a user, reports about slow system performance. What are the probable causes of this trouble?

-Heavily fragmented hard drive -Application errors that are taking over system resources

Melissa loves to listen to music while she is working out. However, every time she walks into the gym, her Bluetooth headphones stop working. What could be the problem?

-Her device is in discoverable mode -Other Bluetooth devices are trying to connect

Which of the following are examples of authentication possession (something you have) to support multifactor authentication?

-Key fob -Smart card

You launch Performance Monitor in Windows 7 Professional. Which components can you monitor using this tool?

-Memory -Processor -Disk -Network

Which two password policy settings to combine to make it impossible for users to quickly reuse their last password?

-Minimum Age -Enforce History

Which of the following are Storage Spaces configurations?

-Mirror -Simple -Parity

Which of the following record types must you add to DNS to implement DNSSEC?

-RRSIG -DNSKEY

What permissions must be assigned to the Authenticated Users group on the distribution share to ensure all users will have the application installed?

-Read -Read & Execute

Which of the following are examples of inheritance possession (something you are) to support multifactor authentication?

-Retinal scanner -Fingerprint reader

Which of the following are the causes of vertical lines on the page in the laser printing process?

-Toner on the main corona or transfer corona wire -Low resolution image -Print resolution setting is too low

You have been sent to clean up a computer that has been infected with malware. When you arrive at the computer, you identify the symptoms that are occurring, quarantine the system, and disable System Restore. Now you must remediate the computer. Which steps are parts of this process?

-Update the anti-malware software -Use scan and removal techniques to clean up the computer

You have determined that a block-level file corruption on the disk has damaged the driver files for a critical piece of hardware. Multiple reboots have failed to correct the problem. You open Device Manager. Please put the steps in the correct order to fix the error.

-Update the drivers -Uninstall the device

Which of the following actions would be appropriate responses to an "Invalid boot disk" error message in Windows?

-Verify boot order in SYSTEM BIOS -Remove USB -Remove CD/DVD

You purchased several new computers with dual physical processor configurations. The new computers have dual 1-gigahertz (GHz) processors and 2 gigabytes (GB) of RAM. Which editions of Windows 7 could you install to be able to utilize all components?

-Windows 7 Enterprise -Windows 7 Professional

You are a technician in an organization. You have been asked to perform in-place upgrades in every user's laptop. Which of the following are the valid paths which you can use during the upgrades?

-Windows 7 to Windows 8 -Windows 7 to Windows 10 -Windows 8 to Windows 8.1 -Windows 8.1 to Windows 10

You need to upgrade a computer running Windows 7 Home Premium with Service Pack 1 to Windows 8. To which editions of Windows 8 can this computer be upgraded?

-Windows 8 Basic -Windows 8 Pro

On which versions of Windows can PowerShell Core 6.0 be used?

-Windows 8.1 -Windows 10 -Windows 8

Which of the following network connections should always require data encryption?

-Wireless -VPN -WWan

Which type of script filename extension would be used to create a script file that extends the scope of interaction between a user and a web page?

.js

What is the correct order of the troubleshooting process?

1. Identify the problem 2. Establish a theory of probable cause 3. Test the theory to determine cause 4. Establish a plan of action to resolve the problem and implement the solution 5. Verify full system functionality and, if applicable, implement preventative measures 6. Document findings, actions, and outcomes

How many primary partitions are supported on GPT disks?

128

You need to install Windows 7 Professional on a user's x86 computer. Which hardware is NOT a minimum requirement?

2 gigabytes RAM

A customer contacts you with a technical issue you must research. After obtaining permission, you place the customer on hold to complete the research. What is the maximum amount of time the customer should remain on hold before receiving an update?

2 minutes

Which of the following is a requirement for Windows 10 x64?

2GB RAM

FAT32

32-bit file allocation table

You are configuring a Windows desktop to allow remote desktop sessions. For security purposes, you want to configure an alternate RDP (Remote Desktop Protocol) port. Which of the below is the default RDP port?

3389

sector

512 bytes on a disk

exFAT

64 bit Extended File Allocation Table used for large capacity removable hard drives and flash media.

Guest Account

A Microsoft Windows user account with limited capabilities, no privacy, and is disabled by default.

robocopy (robust file copy)

A Windows command that is similar to and more powerful than the xcopy command, used to copy files and folders.

diskpart

A Windows command to manage hard drives, partitions, and volumes.

A strong password that meets the password complexity requirement should contain:

A combination of characters from at least 3 character groups

tasklist

A command-line version of the Task Manager

swap partition

A disk partition disignated for swap space in linux

Remote Disc

A feature of OS X that gives other computers on the network access to the Mac's optical drive. system preferences -> Sharing

Event Viewer

A management console snap in for viewing and managing system logs (accessed through computer managment, administrative tools, or eventvwr.msc)

BranchCache

A new feature of Windows 7 that enables users to rapidly access data from remotely located file and web servers. This enables users at a small branch to cache copies of frequently accessed files from head office servers on a local computer.

Factory Recovery Partition

A partition that contains an image of the bootable partition created when the computer was built.(Restores OS to factory settings)

Spotlight Search

A search tool in the macOS

Which of the following statements apply to the definition of a computer virus?

A self-replicating computer program containing malicious segment / Requires its host application to be run to make the virus active / Attaches itself to an application program or other executable component.

Ransomware

A type of malware that tries to extort money from the victim, by appearing to lock their computer or by encrypting their files, for instance.

A user's phone contains customer's PII. The user cannot have the phone automatically wiped because the data is very valuable. Which of the following is the BEST method of securing the phone? A. Fingerprint lock B. Passcode lock C. Swipe lock D. PIN lock

A. Fingerprint lock

Which of the following security methods BEST describes when a user enters a username and password once for multiple applications? A. SSO B. Permission propagation C. Inheritance D. MFA

A. SSO

Joe, an end user, has been prompted to provide his username and password to access the payroll system. Which of the following authentication methods is being requested? A. Single-factor B. Multifactor C. RADIUS D. TACACS

A. Single-factor

A user's Windows laptop has become consistently slower over time. The technician checks the CPU utilization and see that it varies between 95% and 100%. After the technician closes some running applications, the CPU utilization drops to approximately 20%, and the laptop runs much faster. The next day the same user calls again with the same problem. Which of the following is a tool the technician can use to resolve the issue? A. Task Manager B. MSTSC C. MSConfig D. PerfMon

A. Task Manager

A MAC user's operating system became corrupted, and files were deleted after malware was downloaded. The user needs to access the data that was previously stored on the MAC. Which of the following built-in utilities should be used? A. Time Machine B. Snapshot C. System Restore D. Boot Camp

A. Time Machine

The 'Force Quit' tool is NOT used to safely save and close out of an application.

A. True

Which of the following devices are MOST likely to have a grounding wire attached to them based on the manufacturer's design? (Select two.) A. UPS B. Server rack C. PoE phone D. Desktop printer E. Modem F. Patch panel

A. UPS B. Server rack

Which of the following installation types would require the use of an answer file to install the OS? A. Unattended B. Clean C. Repair D. Upgrade

A. Unattended

A user is requesting a solution that will prevent file corruption and ensure a graceful shutdown while providing at least one hour of uptime in case of extreme weather conditions. Which of the following should a technician recommend? A. Uninterruptible power supply B. Surge protector C. Power strip D. Power distribution unit

A. Uninterruptible power supply

Which of the following is the most likely reason one would boot a system in Low-Resolution Video Mode?

A. When troubleshooting issues with a display

A user who is running Windows XP calls a technician to upgrade the computer to a newer Windows OS. The user states the computer has only 1GB of RAM and 16GB of hard drive space with a 1.7GHz processor. Which of the following OSs should the technician recommend to ensure the BEST performance on this computer? A. Windows 7 B. Windows 8 C. Windows 8.1 D. Windows 10

A. Windows 7

A junior Linux system administrator needs to update system software. Which of the following shell commands would allow the administrator to gain the necessary permissions to update the software? A. sudo B. chmod C. grep D. pwd

A. sudo

Which Active Directory security feature is a single sign-on system that uses the common Internet Standard SAML?

ADFS

Which of the following cryptographic algorithms is the least vulnerable to attacks?

AES

Which of the following is a package management system most often used on Debian and Debian-based Linux distributions?

APT

Which of the following Windows networking technologies pertains to the security control of authentication?

Active Directory

You need to broaden the area to which a wireless access point (AP) can transmit. What should you do?

Adjust the power level setting slightly higher

Which of the following choices would you type into the Start menu to search to configure virtual memory with the least administrative effort?

Advanced System Settings

A new Windows 10 PC is configured to obtain an IP (Internet Protocol) address using DHCP (Dynamic Host Configuration Protocol). You notice that the PC has an address of 169.254.1.20 and cannot connect to network resources. This computer is used on multiple networks and should have a static IP. What could be configured via the NIC (Network Interface Card) to remedy the PC's connectivity?

Alternate configuration

Business client

An OS designed to work as a client in a business network

Default Programs

An applet to set the programs you wish to use, or choosing which application is used to open files of a particular extension

System Information

An application used to provide detailed diagnostic information about your mac

shell

An interface between the user and computer and software

Which of the following protect you from electrostatic discharge (ESD)?

Antistatic wrist strap, Ground mat and antistatic bag

Time Machine

App facilitating backup operations in macOS.

Disk Utility

App in macOS used to verify or repair a disk or file system

Which of the following is the amount of memory a user is limited to with a 32-bit version of Windows? A. 2GB B. 4GB C. 8GB D. 16GB

B. 4GB

Which of the following is the amount of memory a user is limited to with a 32-bit version of Windows? A. 2GB B. 4GB C. 8GB D. 16GB

B. 4GB

Which of the following is the maximum RAM limit of a Windows 32-bit version? A. no limit B. 4GB C. 8GB D. 32GB

B. 4GB

Ann, a user, calls the help desk regarding an issue on her laptop. While working remotely, she appears to be connecting to WiFi but is unable to retrieve her corporate email. The wireless name is listed as "ConnectMe" and appears as unsecure. Which of the following should the help desk perform to fix the issue? A. Remote into Ann's system and restart the wireless adapted B. Ask Ann to open a browser and watch for a redirect page C. Advise Ann to plug an Ethernet cable into her laptop D. Direct Ann to run an antivirus program on her laptop

B. Ask Ann to open a browser and watch for a redirect page

What is the first step in replacing (rather than upgrading) an existing installation? A. Reinstall software applications and utilities. B. Back up data from existing target system. C. Restore data from the previous system using the backup you made. D. Install the new OS.

B. Back up data from existing target system.

A SOHO customer has recently experienced a major hurricane. The customer has no backups and has lost all data and hardware associated with the company. The customer calls a contractor to assist in the rebuilding process and needs suggestions on the best way to prevent this from happening again. Which of the following recommendations should the contractor give to the customer? (Select two.) A. Backup testing B. Cloud storage C. Local storage backups D. Data recovery E. Hot site F. Waterproof devices

B. Cloud storage E. Hot site

What network connection uses an analog modem to dial another modem on the ISP's remote access server, which then transfers the data onto the ISP's network then to and from the wider internet? A. Wireless WAN (Cellular) B. Dial Up C. Virtual Private Network (VPN) D. SOHO (small office/home office)

B. Dial Up

A company brings in contractors several times a year to perform inventory, and the contractors use company-supplied laptops. The company's security policy states that once the inventory is completed, the contractors should not be able to log in to the laptops until the next inventory. Which of the following BEST enforces this policy? A. Delete the user accounts B. Disable the user accounts C. Restrict the user accounts D. Reset the user accounts

B. Disable the user accounts

A user's mobile device appears to be losing battery life rapidly and often feels warms to the touch, even when it is put away. The device is relatively new, so the user is concerned it is defective. A technician inspects the device and sees the following: Which of the follow should be changed to resolve this issue? A. Privacy - Maps B. Display - Brightness C. Storage - Photos D. Mail - Work

B. Display - Brightness

After degaussing, a hard drive can be repurposed.

B. False

An in-place upgrade is also known as "clean install". Existing drive is reformatted and new OS installed.

B. False

Digital certificates are used to authenticate and authorize users to send encrypted information over an internet connection.

B. False

A technician uses a file level backup strategy for a user's files. Then, the technician creates a recovery image of the operating system and applications. Why did the technician create the file-level backup and the image separately? A. The user may not need the recovery image, but will need the data files B. Images take a relatively long time to create without including user files C. The partition containing the operating system cannot contain user files D. A new image needs to be made when data changes

B. Images take a relatively long time to create without including user files

If a Missing Operating System error is displayed, which of the following would be the first focus of troubleshooting?

B. Incorrect Boot sequence

An end user is browsing the Internet when multiple browser pages open by themselves. The user notices the PC is running slowly, even while not browsing the internet. Which of the following actions should the user take? A. Update antivirus definitions B. Install anti-malware software C. Enable the pop-up blocker D. Reboot the PC

B. Install anti-malware software

A department in an organization set up a proxy server to manage its Internet stage. A technician is configuring the Windows workstations to use the new proxy server. Which of the following Control Panel utilities should the technician use to configure the setting? A. Internet Options - Advanced B. Internet Options - Connections C. Internet Options - Security D. Internet Options - Content E. Internet Options - Privacy

B. Internet Options - Connections

Which of the following is a Linux command to stop a running process?

B. Kill

A technician is running updates on a Windows PC. Some of the updates install properly, while others appear as failed. While troubleshooting, the technician restarts the PC and attempts to install the failed updates again. The updates continue to fail. Which of the following is the FIRST option to check? A. Visit the Microsoft Update website to see if there is an issue with a specific update B. Look up the error number associated with the failed update C. Look at the system Event Viewer to find more information on the failure D. Download the failed update to install manually

B. Look up the error number associated with the failed update

Ann, a user, calls a technician and reports that her PC will not boot. The technician confirms the memory, power supply, and monitor are all working. The technician runs internal diagnostics on the PC, but the hard drive is not recognized. Which of the following messages will be displayed? A. NTLDR not found B. No boot device available C. Operating system not found D. BIOS ROM checksum error

B. No boot device available

A manager with a restricted user account receives the following error message: Windows Update cannot currently check for updates because the service is not running. The manager contacts the help desk to report the error. A technician remotely connects to the user's computer and identifies the problem. Which of the following should the technician do NEXT? A. Reboot the computer B. Restart the network services C. Roll back the device drivers D. Rebuild the Windows profiles

B. Restart the network services

A company has hired a new IT firm to manage its network switches and routers. The firm is geographically separated from the company and will need to able to securely access the devices. Which of the following will provide the ability to access these devices? A. Telnet B. SSH C. RDP D. VNC

B. SSH

Which of the following is a social engineering attack where the perpetrator tries to steal information by visually observing data a user is entering or viewing?

B. Shoulder surfing

Which of the following commands will shut down the system immediately and automatically reboot it?

B. Shutdown -r now

With which of the following types is a man-in-the-middle attack associated? A. Brute force B. Spoofing C. DDoS D. Zero-day

B. Spoofing

Which one of the user accounts in macOS can change their own settings, but not those of other users? A. Administrator B. Standard C. Managed with Parental Controls D. Sharing Only

B. Standard

A software end user license agreement (EULA) is an agreement between:

B. The end user and the owner of the software.

Which of the following cases is the BEST reason for a user to unhide system files or folders?

B. To locate or retrieve files infected by a virus

You would like to know the path that network traffic uses when you browse to an internal resource at work. What diagnostic tool should you use? A. Ping B. Tracert C. Arp D. Nslookup

B. Tracert

A technician setting up a SOHO wireless network for a healthcare office that does not have a server. The user requires the highest level of wireless security and various levels of desktop authentication to access cloud resources. Which of the following protocols and authentication methods should the technician implement? (Select two.) A. WPA B. WPA2 C. WEP D. TKIP E. RADIUS F. Multifactor G. TACACS H. SSO

B. WPA2 F. Multifactor

The Event Viewer displays each line or item in the source log file as an event and categorizes each event. What type of event may indicate future problems, such as when the system runs low on disk space? A. Information B. Warning C. Error D. Failure Audit

B. Warning

Which of the following is a Windows tool that collects and stores logs from system, application, and security events?

B. Windows Event Viewer

A network administrator notifies a technician that the company is experiencing a DDoS attack. Several internal Windows PCs are the source of the traffic. The network administrator gives the technician the Windows computer names and states they be scanned and cleaned immediately. With which of the following types of infections are the PCs MOST likely infected? (Select two.) A. Spyware B. Zombies C. Virus D. Ransomware E. Worm F. Botnet

B. Zombies E. Worm

A technician is working on a Windows 10 PC that is running slowly. Which of the following commands should the technician use to correct this issue? (Select two.) A. dir B. chdsk C. dism D. ipconfig E. format F. diskpart

B. chdsk C. dism

What executable launches the command line?

B. cmd.exe

Which of the following is an Apple service that allows a user to store documents, media, and other types of files, and access them using other OS X and iOS devices?

B. iCloud

BITS

Background Intelligent Transfer Service - a protocol in which the computer is enabled to browse update.microsoft.com and select updates for download and installation

Examples of devices/device components regulated under special disposal procedures due to environmental/safety hazards include:

Batteries / CRTs / Toner cartridges.

Control panel

Best place to configure your system in Windows 7

Which of the following data encryption tools can be used to secure a Windows workstation?

BitLocker (drive-level encryption) / EFS (file-level encryption)

A Microsoft Windows feature specifically designed to enable encryption of removable drives is known as:

BitLocker To Go

A technician contacts you and says that he needs to access the System Recovery Options on a Windows 7 computer. Which procedure or special key should he use?

Boot from the installation CD/DVD

Where in performance monitor can you create user-defined log files? A. Counter Logs B. Trace Logs C. Data Collector Sets D. Objects

C. Data Collector Sets

Which of the following is NOT a WiFi security mechanism?

C. Evolution Data Optimized

A technician is installing the latest OS on a user's system. The user wants all of the settings and file to remain intact during the installation. Which of the following upgrade methods should the technician use? A. Network installation B. Clean install C. In-place upgrade D. Image deployment

C. In-place upgrade

Which of the following is used to describe a fatal system error in Linux that results in a black proprietary crash screen?

C. Kernal Panic

What displays summary information about the computer, including the processor type and installed Random Access Memory (RAM), plus the Windows edition, product key, and activation status? A. Remote Settings B. System Protection C. System Properties D. System Restore

C. System Properties

Which of the following devices may pose a risk to electrical safety due to accumulated high voltage?

CRTs / Power Supply Units (PSUs) / Inverters / Laser printers.

Which of the following would you install to redress of laptops disappearing?

Cable locks

Which of the following is put in place to reduce the risk of service disruption?

Change management

What is the function of the Linux chmod command?

Changes file access permissions

chkdsk

Check Disk - checks the integrity of disks and can repair any problems detected

Which selection from the Power options navigation menu would you choose to make the Hibernate choice available in Windows 10, assuming compatible hardware?

Choose what the power buttons do

You have a script that needs to be edited with input values, but when you open the script you note there are several lines of text each preceded with "#", indicating these lines are which of the following?

Comments

System Log

Contains information about service load failures, hardware conflicts, and driver load failures

Which of the following locations in MS Windows allows to print a test page?

Control Panel (Icon view) -> Devices and Printers -> right-click on a selected printer -> Printer Properties -> General tab -> Print Test Page

Standby/Suspend to RAM

Cuts power to most devices (for example, the CPU, monitor, disk drives, and peripherals) but maintains power to the memory.

When sharing printers on a domain:

D. Access rights are determined by the administrator.

Which of the following are common issues that may cause systems of slow system performance?

D. All of the above

Which of the following is an option for upgrading in Microsoft?

D. All of the above

A user contacts a technician to troubleshoot server errors. The user explains that some files will not open on the server, the data backups are operational, and the weather has been bad. The technician notices missing time slots in the event log. Which of the following should the technician replace to prevent these issues in the future? A. System memory B. Surge protector C. Hard Drives D. Battery backup

D. Battery backup

In OS X, which Disk Utility feature helps to fix issues with file systems and partitions?

D. First Aid

A desktop technician is attempting to upgrade several machines to Windows 10. After realizing there is only one disc for the installation, the technician decides to upgrade over the network. Which of the follow boot methods initiates such an upgrade? A. SSD B. Optical Drive C. Flash Drive D. PXE

D. PXE

What is the practice of monitoring, obtaining, evaluating, testing and deploying fixes and updates? A. OS Updates B. Disk Defragmenter C. Check Disk D. Patch Management

D. Patch Management

A technician is installing a private PC in a public workspace. Which of the following password practices should the technician implement on the PC to secure network access? A. Remove the guest account from the administrators group B. Disable single sign-on C. Issue a default strong password for all users D. Require authentication on wake-up

D. Require authentication on wake-up

Which of the following is a Windows tool that can be used to locate system files that are missing or damaged, and attempt to repair them?

D. SFC

Joe, a systems administrator, is setting up a risk management plan for the IT department. Part of the plan is to take daily backups of all servers. The server backups will be saved locally to NAS. Which of the following can Joe do to ensure the backups will work if needed? A. Frequently restore the servers from backup files and test them B. Configure the backups to restore to virtual machines for quick recovery C. Set up scripts that automatically rerun failed backup jobs D. Set up alerts to let administrators knows when backups fail E. Store copies of the backups off-side in a secure datacenter

D. Set up alerts to let administrators knows when backups fail

What is the most common marketplace to host malware?

D. Third Party Stores

A technician arrives on site to find that two users who have the same model on Android smartphone are having the same issue with a specific application. Whenever they attempt to launch the application, it fails and gives an error message. Which of the following should the technician do FIRST? A. Reinstall the application B. Roll back the application to the earlier version C. Clear the application cache D. Update the OS of the smartphones

D. Update the OS of the smartphones

An Internet browser redirecting a user to a website other than intended indicates a security issue related to:

DNS

A Windows 10 PC on the network is only able to connect to other resources, both public and private, by using IP addresses. What setting needs to be checked via the NIC (Network Interface Card) properties?

DNS (Domain Name System) address

Which of the following can be used by system administrators to selectively block access to known malware sites?

DNS configuration

Which of the following record types must you add to DNS to implement DNSSEC?

DNSKEY and RRSIG

chkdsk C: /x

Dismounts volume C:

Which configuration setup would you choose when implementing BranchCache in a remote office with no onsite server?

Distributed

Full Control

Do anything with the object, including change its permissions and its owner

Modify

Do most things with an object but not to change its permissions or owner

What is the last step in troubleshooting theory?

Document findings, actions and outcomes

Which Firewall network profile is automatically enforced with no user intervention?

Domain

A user believes there is a virus on a laptop. The user installs additional real-time protection antivirus software but is now experiencing extremely slow performance on this laptop. Which of the following should a technician do to resolve the issue and avoid recurrence? A. Activate real-time protection on both antivirus software programs B. Uninstall one antivirus software program and install a different one C. Run OS updates D. Enable the quarantine feature on both antivirus software programs E. Remove the user-installed antivirus software

E. Remove the user-installed antivirus software

Which of the following actions would you take to make drivers available to an automated installation of Windows 10?

Edit the unattend.xml file

man/ --help

Either parameter will generate a detailed explanation of the command

Reviewing System and Application logs on a Windows-based PC might provide useful information while troubleshooting security-related issues. System and Application logs in MS Windows can be found in:

Event Viewer (eventvwr.msc)

What is the correct hierarchy of precedence for permissions settings in NTFS?

Explicit Deny -> Explicit Allow -> Inherited Deny -> Inherited Allow

A macOS file manager application is known as:

Finder

Your company has several security measures that they have implemented on all mobile devices. Which of the following is NOT a security measure for mobile devices?

Geotracking

popular linux GUIs

Gnome, KDE, Cinnamon, Xfce

In Windows Active Directory environment, this feature enables centralized management and configuration of operating systems, applications, and user account settings.

Group Policy

David works in the IT department and is training his team on how to look for certain attacks. He is discussing a type of attack that is used by an attacker to persuade the Internet browser to connect to a fake server that appears as a valid session. Which type of attack is he discussing?

Hyperlink spoofing

According to the CompTIA's best practice procedures for malware removal, putting a malware-infected Windows-based system into a quarantine should be the next step after:

Identifying and researching malware symptoms

Which of the following terms is used a synonym for the bare-metal backup concept?

Image-level backup

You are instructing a new IT technician on securing networks and using permissions. What would you tell Graham that the default permission position should be?

Implicit deny

A user requests that his Windows 7 computer display dates using the yyyy-mm-dd format. Where should you go to make this change using the least administrative effort?

In Control Panel Category View, click Clock, Language, and Region. Select Region and Language

Screen Sharing

In OS X, a utility to remotely view and control a Mac and is similar to Remote Assistance in Windows.

What should you do if you discover inappropriate material on a company-owned computer but no specific company computer-use policy exists?

Inform your supervisor of the inappropriate material

Windows Settings

Interface for managing a Windows 10 computer

Boot Camp

Is a utility supplied with macOS that allows a full Windows installation to be made on a Mac.

PII

Is data that can be used to identify, contact, or locate and individual or, in case of theft, to impersonate them.

A customer has contacted you and expressed anger about the service provided by your company. During the call, you discover that another technician responded to the customer's original issue. In spite of the customer's tone, you remain calm. What should you do next?

Listen to the entire complaint

What is the role of *Winload.exe* in the Windows boot process?

Loads the hardware abstraction layer, the Registry, and boot device drivers into memory

Which of the following answers refers to a basic programming construct that repeats a sequence of instructions until a specified condition is reached?

Loop

A technician is recycling PCs to be used by a middle school. Which of the following methods is *most* appropriate for ensuring that data has been removed from the PCs?

Low-level format

Which of the following terms is used to describe initial hard drive formatting typically performed at the factory by the drive manufacturer?

Low-level format

Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as:

Malware

Which of the following correctly identifies a document describes procedures for safe handling, use, storage, and disposal of potentially hazardous materials?

Material safety data sheet (MSDS)

Which of the following correctly identifies a document describing procedures for safe handling, use, storage and disposal of potentially hazardous materials?

Material safety data sheet (MSDS)

Which of the following password policy settings prevents attackers using cracked passwords from gaining permanent access to a Windows workstation?

Maximum password age setting

You have several old computers that you need to dispose of. By following best security practices, you employ remnant removal. Which of the following are you NOT concerned with?

Memory

Which of the answers listed below refers to an example order of volatility for a typical computer system?

Memory dump, temporary files, disk files, archival media

domain

Microsoft client/server network model that groups computers together for security and to centralize administration

In which of the following Mac OS X versions does the dark mode to reduce eyestrain has been introduced?

Mojave

A user has a Windows 7 computer with 512 MB of RAM and two hard drives, named drive C and drive D. the paging file is located on drive C. The user complains that his computer does not perform well after running for a couple of hours. What should you tell the user to do?

Move the paging file to drive D.

What types of operating systems (OSs) are designed to run on servers in a business network?

Network Operating System (NOS)

NOS

Network Operating System - an OS designed to run on servers in business networks

When is an operating system compatability error likely to occur?

Not B

A user who receives an email believing it was sent from their bank and, in turn, clicks in a link contained within the email causing a download to initiate, might be what type of attack?

Not C,D

Before a technician physically takes a system or device from a user to troubleshoot, what should the technician request the user do before turning over that system or device?

Not D

Which of the following password policy settings determines the number of unique new passwords that must be associated with a user account before an old password can be reused?

Password history setting

A user is having problems with a PC after clicking an attachment in an email message. Which of the below would categorize unexpected or threatening messages appearing on the screen?

Performance Symptoms

You have two wireless networks in your buidling. The wireless networks do not overlap. Both of them use Wi-Fi Protected Access (WPA). You want to ensure that no unauthorized wireless access points are established. What should you do?

Periodically complete a site survey

Which is primarily used to segregate network traffic, optimize network speed, and to permanently assign a network path for a specific protocol or network service?

Port forwarding

Which of the following solutions will allow a server with a private IP address to handle requests from an outside (public) network?

Port forwarding

Which of the following is sued to restrict devices which connect to the notwork or to detect and block some attacks using spoofed MAC addresses?

Port security

POST

Power On Self Test

What are the characteristic features of RADIUS?

Primarily used for network access / Combines authentication and authorization / Encrypts only the password in the access-request packet.

Which of the following can restrict the use of a mobile device camera to certain areas within an organization's facilities?

Profile of security requirements

Windows Registry

Provides remotely accessible database for storing, operating system, device, and software application configuration information

Operating System (OS)

Provides the interface between the hardware, application programs, and the user.

A type of contactless smart card that can be read at a close range from a reader device is commonly referred to as:

Proximity card

You have arrived 30 minutes late at a customer site to address a technical issue. Which area of customer service has been impacted the most?

Punctuality

Which format type in MS Windows does not erase disk data?

Quick format

file attributes

R - read only H - hidden S - system, can not be deleted A - archive, modified since last backup

Which of the following authentication systems is used as the authentication back end for Wi-Fi networks using WPA Enterprise security?

RADIUS

Which of the following should you install to support wireless authentication and network access?

RADIUS server

Write

Read a file and change it, or create a file within a folder, but not to delete it

Which of the following enables troubleshooting a malware-infected system that doesn't boot up?

Recovery console

You would like to give a user the ability to request help and allow a connection from the support team to a Windows computer. Which setting do you configure?

Remote Assistance

You are implementing mobile security in the workplace. To help protect devices in the event they are lost or stolen, which policies do you propose (choose two)?

Remote wipe Device lockout

Which of the following would let you change the screen resolution with least administrative effort?

Right -click desktop --> display settings

Which of the following malwares fakes system problems or virus detection in order to make you buy paid security scanners?

Rogue antivirus

You need to run Disk Defragmenter, but several other applications are running. Why should you shut down all running applications first?

Running other applications may result in disk operations forcing Disk Defragmenter to restart continually

Which of the following is a US federal law designed to prevent fraudulent accounting practices?

SOX

Which of the following Windows utilities provides access to print spooler settings?

Services (services.msc)

SPDIF

Sony-Philips digital interface format

What term best describes an attack that involves sending an email addressed to everyone in your company, that appears to come from an internal address and requires your network credentials in order to open an attachment, all in an attempt to steal the credentials?

Spear phishing

Which MAC OS feature allows you to search all kinds of files, including documents, music, photos, emails, and contacts?

Spotlight

Services

Start, stop, and pause services

Which one of the following is a vulnerability concern with physical security?

Tailgating

A 64-bit application is causing problems on a Windows 10 computer. You are following a support document while troubleshooting the application. In which of the following areas does an application typically NOT install during installation?

The C:\windows\system32 folder

You manage a network installed with multiple Windows 8.1 workstations. One of the users reports that his computer does not boot to Windows. You notice that the computer generates the following message during boot up: "Windows 8.1 could not start because the following file is missing or corrupt: \WINDOWS\SYSTEM32\CONFIG\SYSTEM

The registry is corrupt

Remote Desktop

The remote user can initiate a connection at any time. The remote user needs to sign on the local machine using an authorized account.

Which of the following account management security solutions provide countermeasures against brute-force attacks?

Timeout period between login attempts / Failed attempts lockout.

Which of the following best describes the function of organizational units?

To organize like managed objects in the directory

Which mode of Bitlocker authentication allows the user to start up the computer and log into Windows as normal?

Transparent operation

Which layer is *not* defined in the defense in depth strategy?

Transport

UDF

Universal Disk Format - updated file system for optical media with support for multi-session writing

USB

Universal Serial Bus

UTP

Unshielded Twisted Pair

What *applet in Settings* will let you recover a failed installation?

Update & Security

Isaac purchased a refurbished iPhone and installed the latest version of iOS. However, his iPhone, will not hold a charge for very long. What will you recommend him to alleviate extremely short battery life?

Use the Low Power Mode setting

When explaining new equipment features to a customer, all of the following are acceptable practices, EXCEPT:

Use the correct acronyms with the customer

Which of the following is a set of firewall entries containing information on traffic considered safe enough to pass through?

Whitelist

Which of the following tools would be of help in determining the optimal WAP placement?

Wi-Fi analyzer

Which tool would you use to boot Windows following a stop error from which the machine is unable to restart?

WinPE

Which edition of Windows 10 is designed for small and medium-sized businesses and comes with networking and management features designed to allow network administrators more control over each client device?

Windows 10 Pro

Which version of Windows introduced Bitlocker in the *Professional* edition?

Windows 8

Which of the following steps provide access to the Disk Cleanup utility in MS Windows?

Windows Explorer (Windows 7) File Explorer (Windows 8/8.1/10) -> right-click on a drive -> Properties -> General tab -> Disk Cleanup / Windows Control Panel -> Administrative Tools folder -> Disk Cleanup shortcut icon / Windows Run dialog box -> type in diskmgmt.msc + press Enter -> right-click on a drive -> Properties -> General tab -> Disk Cleanup

Which of the following steps provide access to the disk defragmenter utility in MS Windows?

Windows Explorer (Windows 7) File Explorer (Windows 8/8.1/10) -> right-click on a drive -> Properties -> Tools tab -> Optimize and defragment drive -> Optimize / Windows Control Panel -> Administrative Tools folder -> Defragment and Optimize Drives shortcut icon / Windows Run dialog box -> type in diskmgmt.msc + press Enter -> right-click on a drive -> Properties -> Tools tab -> Optimize and defragment drive -> Optimize

Mission Control

a feature of macOS that enables a user to set up one more desktops with different sets of apps and backgrounds

Bitlocker

a microsoft utility to encrypt a drive

AUPacceptable use policy

acceptable use policy

ACL

access control list: with respect to a computer file system, is a list of permissions attached to an object.

AP

access point

WOW64

acts as the emulator for allowing 32-bit applications to run seamlessly on a Windows 64-bit OS

ARP

address resolution protocol

ACPI

advanced configuration power interface

AES

advanced encryption standard

AHCI

advanced host controller interface

APM

advanced power management

ATAPI

advanced technology attachment packet interface

ATX

advanced technology extended

AC

alternating current: voltage or current that changes; polarity changes; electrons move in different direction

Option

apple equivalent of Alt

Command

apple equivalent of Ctrl button

What is the name of a software tool used for finding and installing software packages on Debian and Debian-based Linux distributions?

apt-get

ADSL

asymmetrical digital subscriber line

ATM

asynchronous transfer mode

Which of the following answers lists the correct syntax for applying the read-only attribute to a file?

attrib +R [drive:] [path] [filename]

A/V

audio video

ASR

automated system recovery

ADF

automatic document feeder

APIPA

automatic private internet protocol addressing

Which type of script file would be used to store a series of commands designed to automate tasks in DOS, OS/2 and Microsoft Windows?

bat

hive

binary files that store the registry database

BSOD

blue screen of death

A technician contacts you that he cannot locate the NTLDR file on a Windows 7 computer. You explain that his file was replaced. Which file replaced it?

bootmgr

While trying to start their Windows machine, a user receives "Windows Boot Configuration Data file is missing required information" error message. Which of the following bootrec options should be used by a technician for manual CLI troubleshooting of this error?

bootrec /rebuildbcd

ext3 vs ext4

both 64 bit file systems that suppor journaling but ext 4 delivers better performance

VFAT

bvirtual file allocation table

dd

can be used to specify that date within the month(0-31) in cron

trace logs

can collect statistics about services, providing detailed reports about about resource behavior

CRT

cathode-ray tube

Which of the following Linux command-line commands enables directory traversal?

cd

You are browsing a user folder while using the command prompt window in Windows 10. The current directory is c:\users\david. You would like to navigate to the documents subdirectory. Which of the following two commands could you use?

cd c:\users\david\documents cd documents

CFS

central file system, common file system, or command file system

CPU

central processing unit

Which command is used for changing the owner or the group of a file or directory?

chown

CIDR

classless inter-domain routing

cls

clears the command prompt screen

CIFS

common internet file system

COMx

communication port (x=port number)

CNR

communications and networking riser

CDFS

compact disc file system - legacy file system used for optical disc media

CD-ROM

compact disc-read-only memory

DoS

denial of serbice

DLP

digital light processing or data loss prevention

DC

direct current

dir *.*

displays all files and directories in the current directory

dir let *.doc

displays all files with the DOC extension that start with the letters LET

dir let *.doc /s

displays all files with the DOC extension that start with the letters LET and searches for subdirectories

dir *.

displays all files without an extension.

DFS

distributed file system

DNS

domain name service or domain name server

DDR

double data rate

DDR RAM

double data rate random access memory

DIMM

dual inline memory module

DHCP

dynamic host configuration protocol

DRAM

dynamic random access memory

EEPROM

electrically erasable programmable read-only memory

EMI

electromagnetic interference

EMP

electromagnetic pulse

ESD

electrostatic discharge

ERD

emergency repair disk

A Linux command-line command that enables searching files for lines containing a match to a given text pattern is called:

grep

linux user commands

groupadd, groupmod, groupdel

taskkill /t /pid processid

halts any child processes

HDD

hard disk drive

HPFS

high performance file system

HDCP

high-bandwidth digital content protectioin

HIPS

host intrusion prevention system

HTML

hypertext markup language

HTTP

hypertext transfer protocol

HTTPS

hypertext transfer protocol secure

Force Quit

in Apple menu or press command+option+esc

IrDA

infrared data association

IaaS

infrastructure as a service

I/O

input/output

apt-get install (package name)

install new application

clean install

installing an new OS that completely replaces the old one

in-place upgrade

installing on top of an existing version of OS

IEEE

institute of electrical and electronics engineers

IDE

integrated drive electronics

IIS

internet information services

IMAP

internet mail access protocol

IPP

internet printing protocol

IP

internet protocol

IPConfig

internet protocol configuration

IPSec

internet protocol security

ISP

internet service provider

IRQ

interrupt request

IDS

intrusion detection system

IPS

intrusion prevention system

A Windows 10 PC was not resolving local server names correctly. You discovered that the network card properties on the PC had an incorrect DNS (Domain Name Server) address specified. You have corrected the address and would now like to clear the DNS cache. Which command do you use to do so?

ipconfig

Which ipconfig switch and arguments forces a Dynamic Host Configuration (DHCP) client to renew the lease it has for an Internet Protocol (IP) address? A. ipconfig /all B. ipconfig /release AdapterName C. ipconfig /renew AdapterName D. ipconfig /displaydns

ipconfig /renew AdapterName

Which of the following is a Linux command-line command used for configuring network interface parameters specific to the wireless communication?

iwconfig

JBOD

just a bunch of disks

Which of the Linux command-line commands allows to terminate a running process?

kill

KB

knowledge base

LED

light emitting diode

LDAP

lightweight directory access protocol

LPD/LPR

line printer daemon / line printer remote

LPT

line printer terminal

dd

linux command that makes a copy of an input file to an output file

swapon

linux command used to activate the partition swap space

grep

linux command used to search and filter contents of files displaying the lines that match the search string

fdisk

linux command-line program used to create and manage partitions on a hard disk

mkfs

linux command-line program used to format a partition

mkswap

linux command-line program used to format a swap partition

ext

linux file system

cron

linux task scheduler

LCD

liquid crystal display

dir/t:c

list by date created

dir/o:e

list by extension

LBA

logical block addressing

LVD

low voltage differential

MFA

multifactor authentication

devmgmt.msc

opens device manager from runline

diskmgmt.msc

opens disk management console from runline

format D: /fs:EXFAT /q

performs a quick format that doesn't scan for boot sectors

PCI

peripheral component interconnect payment card industry

PCIe

peripheral component interconnect express

PCIX

peripheral component interconnect extended

PAN

personal area network

PC

personal computer

PCMCIA

personal computer memory card international association

PIN

personal identification number

PII

personally identifiable infromation

PAL

phase alternation line

PGA

pin grid array

PGA2

pin grid array 2

PaaS

platform as a service

PnP

plug and play

PPP

point-to-point protocol

PPTP

point-to-point tunneling protocol

PoS

poitn of sale

PAT

port address translation

POP3

post office protocol 3

PoE

power over ethernet

PSU

power supply unit

PXE

preboot execution evirnonement

PE

preinstallation environment

PGP

pretty god protection

PRI

primary rate interface

Which of the following are examples of administrative share names in Windows?

print$ / IPC$

PCL

printer control language

virtual memory

process of optimizing RAM storage by borrowing hard drive space

PROM

programmable read-only memory

What is the name of a Linux command-line utility used for displaying statistics of running processes?

ps

PKI

public key infrastructure

command

the command or script to run along with the full path to the file

MITM

The attacker sits between two communicating hosts and transparently monitors, captures, and relays all communication between them.

Which of the following best describes the kind of malware that infected the CFO's laptop after he downloaded and installed a popular file sharing app?

Trojan

Which of the following best describes the kind of malware that infected the users laptop after downloading and installing a popular file sharing app?

Trojan

A common example of channel overlapping in wireless networking would be the 2.4 GHz band used in 802.11, 802.11b, 802.11g, and 802.11n networks, where the 2.401 - 2.473 GHz frequency range is used for allocating 11 channels, each taking up a 22-MHz portion of the available spectrum. Setting up a wireless network to operate on a non-overlapping channel (1, 6, and 11 in this case) allows multiple networks to coexist in the same area without causing interference. T or F

True

HAL

hardware abstraction layer

HAV

hardware assisted virtualization

SaaS

software as a service

Freeware

software that is available free of charge

SSD

solid state drive

Time Machine

Apple equivalent of system restore

CD-RW

compact desc-rewritable

CDFS

compact disc file system

CMOS

complementary metal-oxide semiconductor

CERT

computer emergency response team

CGA

computer graphics and application

CAD

computer-aided design

dir *.doc

displays all files with the DOC extension in the current directory

ps

displays linux processes that are currently running

to adjust settings of an apple track pad

System Preferences -> Trackpad

adding a new account in MacOS

System Preferences ->users and groups

Data Sources

control connection to databases set up on the local computer

GPS

global positioning system

GSM

global system for mobile communications

GUID

globally unique identifier

GUI

graphical user interface

GDI

graphics device interface

GDDR

graphics double data rate

GPU

graphics processing unit

workgroup

Microsoft peer to peer network model in which computers are grouped together with access to shared resources

SMB

Server Message Block

AES-based encryption mode is a characteristic feature of:

WPA2

Which of the following is a characteristic of Easy Transfer?

Not D,E

FQDN

fully qualified domain name

ugo

user group others

WAN

wide area network

Where are the log files stored?

%SystemRoot%\System32\Winevt\Logs folder

Which of the following terms refers to a group of experts that handle computer security breaches?

(CIRT) Cyber Incident Response Team.

Which of the following acronyms refers to software or hardware-based security solutions designed to detect and prevent unauthorized use and transmission of confidential information outside of the corporate network?

(DLP) Data Loss Prevention

Which of the following regulates personal data privacy of the European Union (EU) citizens?

(GDPR) General Data Protection Regulation

The US Health Insurance Portability and Accountability Act (HIPAA) provides privacy protection for:

(PHI) Protected Health Information

Which of the following answers refers to a hierarchical system for the creation, management, storage, distribution, and revocation of digital certificates?

(PKI) Public Key Infrastructure

1

--x

Alan of NOrthern Company is traveling to several conferences in various states to present his new product line to consumers. He usually uses a Slimport to project his Android screen but accidentally left his cables at the last site where he was. His next presentation is in four hours. What can he request from the hotel technical team to keep the show rolling for Alan?

-A Miracast or Chromecast -A Micro HDMI cable

Wendy has decided to implement an uninterruptible power supply for several servers. Which functions can it provide her?

-A warning when the power source fails -Short-term battery backup -Surge protection

Which of the following can restrict the risk of unauthorized login?

-Access control -Strong password

Daniel is new to your department and is asking about wireless networks. What would you tell him are three conditions that affect the external vulnerabilities of wireless networks?

-Access point power -Antenna placement -Antenna selection

You want to ensure that a particular application can always connect to the client in order to push update the latest application data regardless of the network the client is connected to. What do you do?

-Create an inbound Firewall Rule -Enable for All Profiles

Which of the following actions are you most likely to take in the vent your mobile device has suffered unauthorized access via malware?

-Hard reset -Restore from Cloud backup

Alen, a security administrator, is configuring SOHO network, this network does not provide most of the security zones and subnets. To keep then network devices secure, what points will you consider?

-Harden network devices like switches, routers and firewalls by disabling unnecessary services -Disable remote management of routers and other network devices

Which of the following statements are true about the homegroup sharing model?

-Homegroups are created by one user and can be joined by anyone with a shared password -Computers in domains can join homegroups, but not create them -Home and business editions of Windows can join homegroups

Which factors generate and promote the transmission of electrostatic discharge (ESD) to devices?

-Humidity less than 40 percent -Improper grounding -Moving machines -Moving people

You are instructing your company's IT technicians on how to calibrate the screen of a touch screen device. The technician will need to perform this step only in certain conditions. Which conditions will require this?

-Nothing happens when touching an application -Incorrect application opens

Stephen, a server administrator, is assigned the task to securely overwrite an entire hard drive, for that he requires formatting utilities. So, which utilities will he apply?

-Perform a full format -Implement data destruction utilities -Perform a low-level format

Susan is constantly shutting down her laptop improperly due to moving from meeting to meeting. Which file is in jeopardy of being affected the most?

-Registry

Several users will be using a new Windows 7 computer. You have been asked to configure the accounts in the appropriate manner to maximize security. Which procedures should you implement?

-Rename the Administrator account -Rename the Guest account -Disable the Guest account

A user has recently upgraded the video adapter drivers on a Windows 7 computer. Since that time, the computer has been continuously restarting. You tried rebooting the computer using the Last Known Good Configuration, but it does not affect the problem. What should you do to fix the problem using the least administrative effort?

-Restart the computer in Safe Mode -Roll back the video adapter drivers

Smith, a system administrator in an organization, is working on computer equipments and peripheral devices, and he needs to keep himself safe from any kind of injury. What personal safety guidelines should Smith follow?

-Secure loose cables out of the way -Disconnect the power before repairing a computer or other device -Use proper lifting techniques when moving heavy equipment -Remove loose items such as jewellery, scarves, or ties that could get caught on components -Be prepared for electrical fires and have a Class C fire extinguisher handy

You are researching the biometrics for identification and verification of employees in an organization. Which attributes or details of an employee can be used by biometric devices?

-Signature -Fingerprints -Hand geometry -Face -Iris -Voice -Retina

Which of the following tools are used to protect against problems with the power supply?

-Surge protector -Electrical generator

Your company's network contains workstations that run Windows 8, Windows 8.1, Windows 10 Professional, and Windows 7 Ultimate. You need to install the Multilingual User Interface (MUI) on all the workstations. Which operating systems will provide multilungual support for both the operating systems and applications?

-Windows 7 Ultimate -Windows 8 -Windows 8.1 -Windows 10 Professional

3

-wx

Which of the following answers refers to an example of filename extension used in a cross-platform, general-purpose programming language?

.py

Files with this filename extension are used in a scripting language based on the Microsoft's Visual Basic programming language.

.vbs

Which of the following file extension of a script runs through the Windows Scripting Host instead of command shell?

.vbs

What is the correct order for remediating a malware infected system?

1. Identify and research malware symptoms 2. Quarantine the infected systems 3. Disable System Restore (in Windows) 4. Remediate the infected systems 5. Schedule scans and run updates 6. Enable System Restore and create a restore point (Windows)

In which of the following Mac OS X versions does the dark mode to reduce eyestrain has been introduced?

10.14 Mojave

You have configured a new Windows 10 PC, and for some reason it will not communicate properly on the network. You decide to ping the loopback address to test the PC's TCP/IP (Transmission Control Protocol/Internet Protocol) settings. Which of the below is the loopback address?

127.0.0.1

You want to install Windows 7 Professional 64-bit edition on a new computer. Which hardware is NOT a minimum requirement?

16 GB available hard drive space

You are configuring a wireless access point for the office you work in. You are configuring both 2.4GHz (Gigahertz) and 5GHz for users. Which wireless standard will only use the 5GHz spectrum?

802.11ac

service

A Windows process that does not require any sort of user interaction and so runs in the background

Boot Camp

A utility on macOS that allows a full windows installation to be made on a Mac. Applications ->Utilities folder

A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LAN do not exhibit this symptom. Which of the following needs to be adjusted on the workstation to fix the issue? A. Date and time B. UEFI boot mode C. Logon times D. User access control

A. Date and time

A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LAN do not exhibit this symptom. Which of the following needs to be adjusted on the workstation to fix the issue? A. Date and time B. UEFI boot mode C. Logon times D. User access control

A. Date and time

A security team is auditing a company's network logs and notices that a USB drive was previously inserted into several of the servers. Many login attempts were then successfully performed using common login information. Which of the following actions should be taken to close the vulnerability? (Select two.) A. Disable guest account B. Remove admin permissions C. Modify AutoRun settings D. Change default credentials E. Run OS security updates F. Install a software firewall

A. Disable guest account C. Modify AutoRun settings

What app can be used to verify or repair a disk or file system in macOS? A. Disk utility B. Patch Management C. Windows Update D. Package Manager

A. Disk utility

Which of the following features has undergone the most significant changes from Windows 7 to Windows 10 and greatly simplified the operation system installation process? A. Driver detection B. Metro interface C. Account control D. PXE installation

A. Driver detection

Which of the following is a Linux tool that can be used for troubleshooting Failure to Boot issues?

A. Grub

A Windows user is attempting to install a local printer and is unsuccessful on permissions. Which of the following user types BEST describes this user? A. Guest B. Power User C. Administrator D. Standard User

A. Guest

A technician is setting up a kiosk. The technician needs to ensure the kiosk is secure and users will have access to only the application needed for customer interaction. The technician must also ensure that whenever the computer is rebooted or powered on it logs on automatically with a password. Which of the following account types would the technician MOST likely set up on this kiosk machine? A. Guest B. Administrator C. Power User D. Remote Desktop User

A. Guest

On a Linux system, which of the following commands would dsiplay all the file details such as permissions, owner, size and date within the present working directory?

A. Is -l

An end user's PC is taking a long time to boot. Which of the following operations would be the BEST to resolve the issue with minimal expense? (Select two.) A. Remove applications from startup B. Defragment the hard drive C. Install additional RAM D. Install a faster hard drive E. End the processes in Task Manager F. Run the Disk Cleanup utility

A. Remove applications from startup B. Defragment the hard drive

Which of the following is not a method of testing a backup? A. Restoring a file to the production environment B. Restoring a file to a test directory C. Verifying that the backup contains the correct number of files D. Verifying that all backup devices and media are working

A. Restoring a file to the production environment

A user calls the help desk regarding a new Windows issue that started in the morning. The user can no longer use any locally attached devices, such as a mouse or a printer, and a reboot did not fix the problem. Which of the following would MOST likely fix the issue? A. Roll back updates B. Disable the Windows Update service C. Check for updates D. Restore hidden updates

A. Roll back updates

A technician is working on a user's workstation and notices a lot of unknown processes running in the background. The user informs the technician than an application was recently downloaded from the internet. Which of the following types of infection does the user MOST likely have? A. Rootkit B. Keylogger C. Trojan D. Ransomware

A. Rootkit

Ann, a user, has purchased a new Android phone and is attempting to access a public hotspot. When she gets a message indicating the page cannot be displayed. She notices there is a "?" in the radio icon in the toolbar. She has verified Bluetooth is active, airplane mode is off, and tethering is turned on. She uses the cell phone to call a technician for assistance. Which of the following is the MOST likely issue Ann is experiencing? A. There is unauthenticated wireless connectivity B. She has exceeded the data allowance C. The phone is only 3G capable D. It is an unrooted phone E. The SIM card was not activated F. A data plan was not purchased

A. There is unauthenticated wireless connectivity

A computer becomes infected with malware, which manages to steal all credentials stored on the PC. The malware then uses elevated credentials to infect all other PCs at the site. Management asks the IT staff to take action to prevent this from reoccurring. Which of the following would BEST accomplish this goal? A. Use an antivirus capable of performing heuristic analysis B. Use a host-based intrusion detection system on each computer C. Disallow the password caching of accounts in the administrators group D. Install a UTM in between PC endpoints to monitor for suspicious traffic E. Log all failed login attempts to the PCs and report them to a central server

A. Use an antivirus product capable of performing heuristic analysis

Which of the following is protected by a password at initial creation that is required by each subsequent computer in order to join?

A. Workgroup

After a virus has been spread unknowingly via USB removable hard drives, a technician is tasked with limiting removable hard drive access to certain network users. USB ports are used for many devices, including scanners, printers, and signature pads, so a policy is created to deny access to removable hard drives only. When testing the policy, a removable drive is plugged in but can still be accessed. Which of the following command-line tools should the technician use to apply the new policy? A. grupdate B. diskpart C. gpresult D. net use

A. grupdate

A type of hierarchical database structure used in Windows Server environments that enables centralized management of devices and resources on a network is known as:

Active Directory

Windows networking supports two types of accounts. Local accounts are used for the local system and domain accounts are used for access to Windows servers. Where are domain accounts stored?

Active Directory (AD)

Active Directory Users and Computers (ADUC) is a Microsoft Management Console (MMC) snap-in included in most Windows Server OSs. The Active Directory Users and Computers snap-in allows system administrators to manage resources in the Active Directory (AD) environment (e.g. to create, delete, disable, unlock accounts, or to reset account passwords). On a Windows Server OS, the Active Directory Users and Computers snap-in resides in:

Administrative Tools folder in Windows Control Panel

Restoring data from an incremental backup requires:

All copies of incremental backups made since the last full backup / Copy of the last full backup.

Home Client

An OS designed to work on standalone or workgroup PCs in a home or small office

Which of the following locations in macOS provide access to multi-touch interface settings (a.k.a. Gestures)?

Apple menu -> System Preferences... -> Mouse / Apple menu -> System Preferences... -> Trackpad.

Activity Monitor

Apple verstion of performance monitor

Which of the following statements describing share permissions in MS Windows are true?

Apply only to network users / Can be set on a folder level.

Which of the following statements describing NTFS permissions in MS Windows are true?

Apply to both network and local users / Can be applied to a folder or individual file.

Worms

Are memory-resident malware that replicate over network resources.

MT-RJ

mechanical transfer registered jack

MAC

media access control / mandatory access control

MAU

media access unit / media attachment unit

You are at a customer's site. The customer reports problems staying connected to the Internet, but does not provide any specific information. What should you do to gather more information on the problem?

Ask the customer to demonstrate the problem

Which of these options if the most appropriate handling of a customers password when troubleshooting requires it?

Ask user to type in the pw themselves

Which of the following is one of the functions provided by RADIUS and TACACS servers?

Authentication

Which of the following best describes the Principle of Least Privilege?

Assign users the least permission level required to do their jobs

RPO

recovery point objective

What is a remote tool that allows a user to ask for help from a technician or co-worker? A. Remote Desktop B. Remote Assistance C. Remote Credential Guard D. Telnet

B. Remote Assistance

CAPTCHA

Completely Automated Public Turing Test To Tell Computers and Humans Apart

RTO

recovery time objective

You are using remote desktop to troubleshoot a Windows 10 system. You would like to restart the computer with a command line. Which command would you use? A. Net use B. Taskkill C. Sfc D. Shutdown

D. Shutdown

If intending to reuse a storage device, transferring to a different user, which of the following processes would be best to perform?

Not E

Control

Not the apple equivalent of the Ctrl button

Which of the following threats uses personalized information in an attempt at obtaining information? A. Whaling B. Impersonation C. Spoofing D. Spear phishing

D. Spear phishing

RGB

red green blue

Which of the following threats uses personalized information in an attempt at obtaining information? A. Whaling B. Impersonation C. Spoofing D. Spear phishing

D. Spear phishing

popular linux distros

redhat/CentOS, SUSE, Debian/Ubuntu, Knoppix

A company has hired a new IT firm to manage its network switches and routers. The firm is geographically separated from the company and will need to able securely access the devices. Which of the following will provide the ability to access these devices? A. Telnet B. SSH C. RDP D. VNC

B. SSH

RISC

reduced instruction set computer

Which of the following is a utility used to back up OS X systems?

B. Time Machine

The following command can be used for turning off or restarting a Linux host.

shutdown

shutdown -h 17:30

shutdown at 5:30

shutdown -t 30

shuts the computer down in 30 seconds

Windows Desktop Gadgets were introduced in what system?

D. Windows Vista

SEC

single edge connector

SIMM

single in-line memory module

SSO

single sign-on

SCSI

small computer system interface

SCSI ID

small computer system interface identifier

SFF

small forma factor

Which firewall network profile is automatically enforced with no user intervention?

Domain

SOHO

small office/home office

SoDIMM

small outline dual inline memory module

Which of the following is required for membership in a Windows Active Directory (AD) domain (choose two)?

Computer account User account

UPS

uninterruptible power supply

What is the name of a Microsoft Windows feature that allows for encrypting entire drives?

BitLocker

BD-RE

Blu-Ray Disc rewritable

You run the *systeminfo* command on a Windows 7 computer. What will NOT be displayed?

Boot options

Which of the following do you make available first so that your network-based automated deployment can proceed with exclusive access to the installation volume?

Boot.wim

Which Linux command is used to change the ownership of a file or directory?

D. Chown

For a file-level backup, which of the following would be the best backup strategy? A. Daily full backups B. Daily full backups, weekly differential backups C. Weekly incremental backups D. Daily incremental backups, weekly full backups

D. Daily incremental backups, weekly full backups

A user is having issues using a new wireless mouse. The anti-malware program has identified the mouse driver as malware and prevents it from installing. Which Safe Mode option will help the user troubleshoot this issue?

D. Disable early launch anti-malware protection

An actor might sift through garbage, recycled material, and other items thrown out of an organization in an effort to find relevant information about the organization. What is this activity called?

D. Dumpster Diving

When cleaning a computer with compressed air to remove dust from the components, which protective gear item should computer technicians wear? A. Anti-static wristband B. Eye protection C. Gloves D. Dust Mask

D. Dust Mask

An employee is unable to view in-office network folders while working at home. Which of the following is the MOST likely cause of the problem? A. Untrusted software B. Outdated antivirus C. MDM policies D. Inactive VPN

D. Inactive VPN

Remote Assistance

The local user sends a request to another user on a remote computer inviting them to view or control their desktop.

Which of the following technologies is used by malicious employees to obtain user passwords? A. Man-in-the-middle B. Phishing C. Tailgating D. Shoulder surfing

D. Shoulder surfing

When configuring a system backup, it is recommended to store the backup on an internal storage device. This ensures the backup data does not get lost.

FALSE

When disposing of hardware storage devices, which of the following may you be required to obtain to ensure regulatory compliance for data security?

Certification of destruction

An incident has happened with a user's workstation. Several technicians have been investigating the problem and have used the system and tampered with possible evidence. Nothing has been documented. What has been compromised?

Chain of Custody

Following a network compromise, which of these terms describes your record of who was in possession of evidence at a particular time?

Chain of custody

In forensic procedures, a chronological record outlining persons in possession of an evidence is referred to as:

Chain of custody

In wireless networks, a situation where multiple channels share the frequency band causing interference and performance degradation for devices operating on channels that are too close to each other is known as:

Channel overlapping

Which of the following would be the best recommendation for a minimum password length?

At least 8 characters

APFS

Apple File System - used in macOS High Sierra or later which supports native file encryption

Finder

Apple equivalent of file explorer in Windows

You need to troubleshoot a driver issue. When windows 7 is booting, you press F8 to enter the Advanced Boot Options menu. Which option is *NOT* an option listed in the menu?

Automated system recovery

A technician is working at a help-desk form and receives a call from a user who has experienced repeated BSODs. The technician is scheduled to take a break just after the call comes in. Which of the following is the BEST choice for the technician to make? A. Politely ask the user to call back B. Ask another technician to take the call C. Troubleshoot the issue for the user D. Input the issue as a ticket and escalate to Tier 2 E. Put the user on hold and troubleshoot after the scheduled break

B. Ask another technician to take the call

A user's smartphone is making the camera shutter noise even when the user is not taking pictures. When the user opens the photo album, there are no new pictures. Which of the following steps should be taken FIRST to determine the cause of the issue? A. Uninstall the camera application B. Check the application permissions C. Reset the phone to factory settings D. Update all of the applications on the phone E. Run any pending OS updates

B. Check the application permissions

Your organization is updating the backup procedures to include an off-site backup location, in addition to the on-site backup. Which of the following is an example of an off-site backup location? A. A fireproof safe located away from the server room B. Cloud storage as a service C. A backup on a Network Attached Storage (NAS) server in the server room D. A tape backup in the vault in the server room

B. Cloud storage as a service

A network administrator wants to plan a major OS upgrade of the router, which acts as a default gateway in an organization. The administrator has documented the purpose of the change, scoped the change, and completed a comprehensive risk analysis. Which of the following is an important part of the change request process for which the administrator still must plan? A. inform management regarding the anticipated amount of downtime B. Document a backout plan to roll back changes to the router C. Configure a redundant data path to eliminate downtime D. Make the downtime window larger than actually anticipated

B. Document a backout plan to roll back changes to the router

Freeware is software permited to use at no cost. As such, license agreements are not applicable.

B. False

If copyrighted material is freely available for download, there will not be distribution or licensing terms for use of the material.

B. False

In order for a computer to be part of a domain, it must also be part of a workgroup.

B. False

Windows 7 Professional does not support domains, EFS, or offline files.

B. False

A department in an organization set up a proxy server to manage its Internet stage. A technician is configuring the Windows workstations to use the new proxy server. Which of the following Control Panel utilities should the technician use to configure the setting? A. Internet Options - Advanced B. Internet Options - Connections C. Internet Options - Security D. Internet Options - Content E. Internet Options - Privacy

B. Internet Options - Connections

A small business has an open WiFi network for employees but does not want customers to connect to the access point. A technician has been dispatched to address the business's concerns. Which of the following configuration settings should the technician change to satisfy the requirements of the business? (Select two.) A. Default SSID B. MAC filtering C. NAT D. QoS E. Signal strength F. Encryption

B. MAC filtering E. Signal strength

A SOHO technician recently moved some data from one server to another to increase storage capacity. Several users are now reporting they cannot access certain shares on the network. When the users attempt to access the shares, they get the following error: Access Denied. The technician confirms the users are all in the proper security groups and have the proper access, but they are still unable to access the shares. Which of the following are the MOST likely reasons for these issues? (Select two.) A. Administrative share permissions B. Mapped drives C. Group Policy hours restriction D. Denied write/delete permissions E. Disabled proxy settings

B. Mapped drives D. Denied write/delete permissions

Which of the following is an example of software that is distributed for anyone to use or alter?

B. Open-source software

Which task management tool do you select to view resource usage? A. Networking B. Performance C. Users D. Processes

B. Performance

A network administrator has given a technician documentation detailing the switchports the technician will need to patch in for a network upgrade. Which of the following documents did the network administrator MOST likely give to the technician? A. Process diagram B. Physical network diagram C. Fiber backbone diagram D. Logical topology diagram

B. Physical network diagram

Which of the following is described as a window that opens without user prompting and is intended to advertise a service, but may also deliver a malicious link.

B. Pop up

A SOHO user reports desktop applications are performing slowly, and no emails have been received all morning. A technician remotes in and determines Internet pages' load slowly or not at all, CPU performance is normal, and the local router can successfully ping. The remote connection drops periodically. Which of the following steps should the technician take NEXT to resolve the problem? A. Reboot into safe mode, uninstall the latest OS updates, and run a repair on the OS B. Update the antivirus software, run an antivirus scan, verify the browser settings, and check all email settings C. Reboot to BIOS setup, verify the TPM is enabled, and start a System Restore from safe mode D. Send a test email, open a command prompt to check the file system, and empty the browser cache

B. Update the antivirus software, run an antivirus scan, verify the browser settings, and check all email settings

You decide to edit the boot order for your Windows 8 computer using the *MSCONFIG* utility. To which file is this edit saved?

BCD

A technician has just finished installing a secondary OS on a workstation. After rebooting the computer, the technician receives the follow error: No OS found. The technician confirms the boot.ini file is correct. Which of the following is MOST likely causing this error? A. The computer has GRUB Legacy installed B. Windows Startup services are not running C. An incompatible partition is marked as active D. An unsupported version of Windows is installed

C. An incompatible partition is marked as active.

What piece of equipment protects connected devices from brownouts and also powers the device for a short time during blackouts? A. Generator B. A surge protector C. An uninterruptible power supply (UPS) D. A voltmeter

C. An uninterruptible power supply (UPS)

Joe, a customer, has informed a Tier 2 help desk technician that a computer will not boot up. After about ten minutes of troubleshooting, Joe is increasingly concerned and claims that the technician is wasting his time because he has already tried everything that has been suggested. Which of the following should the technician do? A. Since Joe is concerned about time, suggest calling back later when Joe has more time to troubleshoot B. Record the call and send it to the local intranet for future technicians to learn how to deal with calls like this one C. Ask more open-ended questions to see if the issue can be narrowed down in order to properly identify the issue and save time D. Inform the customer that there is a troubleshooting script that must be followed to get the issue resolved

C. Ask more open-ended questions to see if the issue can be narrowed down in order to properly identify the issue and save time

A client wants a technician to create a PC naming convention that will make the client's PCs easier to track and identify while in use. Which of the following naming convention formats should the technician follow? A. Domain name, location, IP address B. Domain name, location, asset ID C. Asset ID, MAC address D. Location, RFID

C. Asset ID, MAC address

A project team is organized to implement a new wireless solution for a school. The team has already done the network diagrams and knows the locations that will need to be addressed in the project. The team is in the process of creating a SOW for the project as a whole and needs to add the critical pieces to the SOW to complete it and move to the next stage. Which of the following would the project team MOST likely add to the SOW? A. Risk analysis B. Plan to change C. Backout plan D. Change board approvals

C. Backout plan

Ann, an employee at a company, calls the help desk to report issues logging on to a vendor's website. Joe, the technician, is able to log in successfully with his credentials before going to Ann's office. However, when he attempts to log in from Ann's office, Joe experiences the same issue. Ann asks Joe questions about the new software installed on the laptop from the pop-up notification. Which of the following are the NEXT steps Joe should take to resolve the issue? (Select two.) A. Ask Ann for her credentials to verify and log on to the vendor's website from Ann's laptop B. Verify Ann's laptop has the correct browser settings C. Check all browser cached files on Ann's laptop and log on to another vendor's website D. Attempt to log on to another vendor's website from Ann's laptop E. Ask Ann about the notification and review the installed programs F. Reinstall the browser, reboot the laptop, and check the vendor's website again.

C. Check all browser cached files on Ann's laptop and log on to another vendor's website E. Ask Ann about the notification and review the installed programs

A small office's wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network. Which of the following configurations MOST likely allowed the attack to take place? (Select two.) A. Guest network B. TKIP C. Default login D. Outdated firmware E. WPS F. WEP

C. Default login F. WEP

A small office's wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network. Which of the following configurations MOST likely allowed the attack to take place? (Select two.) A. Guest network B. TKIP C. Default login D. Outdated firmware E. WPS F. WEP

C. Default login F. WEP

Which of the following steps should a technician take FIRST to prevent an electrical hazard when repairing a PC? A. Put on an ESD strap B. Place components on an ESD mat C. Disconnect the power before servicing the PC D. Place the PC on a grounded work bench

C. Disconnect the power before servicing the PC

A manager requests remote access to a server after hours and on weekends to check data. The manager insists on using the server. Before granting the access, which of the following is the MOST important step a technician can take to protect against possible infection? A. Create a policy to remove Internet access from the server during off hours B. Set the local antivirus software on the server to update and scan daily C. Ensure the server is patched with the latest security updates D. Educate the manager on safe Internet browsing practices

C. Ensure the server is patched with the latest security updates

A technician needs to edit a protected .dll file but cannot find the file in the System32 directory. Which of the following Control Panel utilities should the technician use? A. System B. Display C. Folder Options D. Indexing Options

C. Folder Options

A technician is installing Windows 7 64-bit OS on a VM but keeps getting errors. The specifications for the malware are: . Two 1 GHz CPUs . 2GB of memory . 15GB hard drive . 800x600 screen resolution Which of the following should the technician do to resolve the problem? A. Increase the number of CPUs B. Increase the amount of memory C. Increase the amount of hard drive space D. Increase the screen resolution

C. Increase the amount of hard drive space

A technician is recycling PCs to be reused by a middle school. Which of the following methods is MOST appropriate for ensuring data has been removed from the PCs? A. Standard formatting B. HD drilling C. Low-level formatting D. HD partitioning

C. Low-level formatting

Ann, a user, is attempting to log in to her email service from a third-party email client on her phone. When Ann enters her usual username and password, she receives an error message saying the credentials are invalid. Ann then decides to reset her email password, but after the reset, the new credentials still do not work in the third-party email client. Which of the following settings or features is responsible for the problems Ann is experiencing? A. Full device encryption B. Account lock C. Multifactor authentication D. Strong password requirements

C. Multifactor authentication

A small business has an open wireless network so vendors can connect to the network without logging in. The business owners are concerned that a nearby company is connecting and using the wireless connection without permission. If the small business requires that the network remain open, which of the following configuration settings should be changed to address these concerns? A. Default SSID B. MAC filtering C. Power levels D. Content filtering E. Firewall

C. Power levels

An administrator is setting up a Windows terminal server. Which of the following settings should the administrator modify to increase server security? (Select two.) A. Change the default access port B. Enforce password complexity C. Put the terminal server into the router's DMZ D. Disable logon time restrictions E. Block all unused ports on the LAN smart switch F. Use the local client certificate for server authentication

C. Put the terminal server into the router's DMZ E. Block all unused ports on the LAN smart switch

An administrator is setting up a Windows terminal server. Which of the following settings should the administrator modify to increase server security? (Select two.) A. Change the default access port B. Enforce password complexity C. Put the terminal server into the router's DMZ D. Disable logon time restrictions E. Block all unused ports on the LAN smart switch F. Use the local client certificate for server authentication

C. Put the terminal server into the router's DMZ E. Block all unused ports on the LAN smart switch

Which of the following is a commonly exploited vulnerability to infect systems with malware?

C. Systems and antivirus software not updated regularly

What type of malicious code sneaks past security measures by masquerading itself as non-threatening?

C. Trojan Horse

You are navigating through directories pm a Windows computer using the command line. You would like to move to a different directory. Which command do you use? A. dir B. ren C. cd D. md

C. cd

Your computer is not resolving network computer names correctly. You need to clear the cache to remedy the problem and decide to use the command line to do so. Which command do you use? A. ipconfig /renew B. ipconfig /release C. ipconfig /flushdns D. ipconfig /all

C. ipconfig /flushdns

Security guards

Can be placed in front of and around a location to protect it.

An electrical fire has started in your server room. Which type of fire extinguisher should you use?

Class C

Stark, a user, is configuring screen lock in iOS as he is anxious about the security of the system, he wants to change his passcode for which he tapped *Turn Passcode On*, then he tapped *Passcode Options* as he wants to have a passcode of eight digits. Which of the following steps should he take *next* to further complete the process?

Click Change Passcode

If an application written for an earlier version of MS Windows doesn't run correctly, the operating system can emulate its own older version to allow a given program to work with newer hardware or software. The compatibility mode settings in Windows can be changed manually by right-clicking the program icon and:

Clicking on the Properties menu item, and then applying the required settings on the Compatibility tab

You are thinking about configuring a Data Loss Prevention (DLP) solution at work. This will help to prevent sensitive files from being distributed outside of the workplace. Which of the following is NOT a component of Data Loss Prevention (DLP)?

Client access license

Which of the following steps provide access to Windows Reliability Monitor?

Control Panel (Category view) -> System and Security -> Security and Maintenance -> Maintenance -> View reliability history / Control Panel (Icon view) -> Security and Maintenance -> Maintenance -> View reliability history

Which of the following steps in MS Windows allows to update/roll back the network adapter driver or disable/uninstall the device?

Control Panel (Icon view) -> Device Manager -> expand Network Adapters list -> right-click on the network adapter -> select Properties from the pop-up menu -> select the required action from the Driver tab / Windows Run dialog box -> type in devmgmt.msc + press Enter -> expand Network Adapters list -> right-click on the network adapter -> select Properties from the pop-up menu -> select the required action from the Driver tab.

What is the correct sequence of steps for accessing the manual configuration interface for IPv4 connections in MS Windows?

Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields.

Which of the following locations in MS Windows provide access to an automated printer troubleshooting tool?

Control Panel (Icon view) -> Troubleshooting -> Hardware and Sound -> Printer / Control Panel (Category view) -> System and Security -> Troubleshoot common computer problems -> Printer / Control Panel (Icon view) -> Devices and Printers -> right-click on a selected printer -> Troubleshoot.

Which of the following steps enable displaying protected system files in Windows 8/8.1/10?

Control Panel -> File Explorer Options -> View tab -> Advanced settings -> select Show hidden files, folders, and drives / Control Panel -> File Explorer Options -> View tab -> Advanced settings -> clear the checkbox next to Hide protected operating system files.

Which of the following steps enable displaying protected system files in Windows 7?

Control Panel -> Folder Options -> View tab -> Advanced settings -> clear the checkbox next to Hide protected operating system files / Control Panel -> Folder Options -> View tab -> Advanced settings -> select Show hidden files, folders, and drives

You need to locally install Windows 7 Ultimate on a new computer. Which installation method will you most likely use?

DVD

Which of the following answers describe(s) possible cause(s) of the "Missing operating system" error message displayed during system boot?

Damaged hard drive / BIOS does not detect the hard drive / System partition not set as active / Corrupt Master Boot Record (MBR).

Mobile device security has two principal challenges: portability and capacity. What does capacity refer to in this context?

Data storage

You work as a security administrator in an organization. You have saved some secret details of the organization on a magnetic hard drive. You want to destroy the drive to secure the details from getting leaked to any unauthorized person. Which of the following should you use to destroy the details in this situation?

Degaussers

The NIST (National Institute of Standards and Technology) Computer Security Incident Handling Guide identifies stages in an incident response lifecycle. Which of the below is concerned with reporting the incident to stakeholders?

Detection and Analysis

After determining the scope of a user's job, what is the next step in implementing the principle of least principle?

Determine the minimum set of privileges needed to perform the user's job

A user's Windows 10 PC is experiencing problems with a video card. The user states that it was working fine until a recent driver update. Which Control Panel applet would you use to roll back the video card driver?

Device Manager

You need to perform a backup on a Windows computer. You only want to back up those files that have changed or have not been previously backed up. You also do not want them to be marked as backed up. Which type of backup would you choose?

Differential

A user needs to download a file from a website. The site displays as unsecure in the web browser. Which of the following may be the problem?

Digital certificate Certificate Authority (CA)

According to the CompTIA's best practice procedures for malware removal, removing malicious software on a Windows-based system should be performed as the next step after:

Disabling System Restore

Which of the following would be of help in preserving the integrity of a digital evidence?

Disk imaging / Hashing.

Reliability Monitor

Displays a log of "system reliability" events

EFS

Encrypting File System - a windows feature that can encrpyt a folder or a file

What are the characteristics of TACACS+?

Encrypts the entire payload of the access-request packet / Primarily used for device administration / Separates authentication and authorization.

Which of the following would be the best malware-prevention method/tool?

End user education

An antivirus software is kept up to date via:

Engine updates / Virus signature updates

HFS Plus

Extended Hierarchical File System - the file system older macOS uses

If personal files, such as email, documents, or photos are lost or deleted, Windows System Restore can be used to recover such files. T or F

False

In NTFS, a folder or file moved from one location to another on the same volume inherits the permissions of its new parent folder. T or F

False

In NTFS, permissions inherited from a parent object (e.g. a folder or user group) take precedence over permissions applied directly to an object (explicit permissions). T or F

False

In Windows domain environment, the term "Home Folder" refers to a directory on a local PC where users can back up their data and files. T or F

False

In a differential backup strategy, restoring data from backup requires only a working copy of the last full backup. T or F

False

A user is trying a biometric device to gain access to a computer. The system is denying access. What is occurring?

False negative

Encrypting File System (EFS)

Feature of NTFS supports file and folder encryption.

Which of the following adversely affect performance of a magnetic hard drive?

File fragmentation / Excessive paging & disk thrashing / Insufficient amount of RAM.

Ten computers in your department need the BIOS updated, and it needs to be completed within a two-hour timeframe. What is the fastest way to accomplish the task?

Flash the BIOS

Martha, a Mac OS user, faced an issue, which required her to close an unresponsive app, which tool will you use to troubleshoot the issue?

Force Quit

You are accessing the Tools tab of the hard drive's properties dialog box on a Windows 7 computer. Which of the following is NOT a disk maintenance utility found there?

Format

You have a 3-TB drive on which you want to install Windows. How must you format the drive to have the operating system recognize the entire drive?

GPT

GPT

GUID Partition Table, part of EUFI, successor to MBR. Windows allows up to 128 partitions at 2TB each. It also has a back up copy for parition entries

Which of the following tabs of the system configuration settings is used to choose the type of startup for the next time the computer boots to troubleshoot system startup problems?

General

Which of the following tabs would you select in File Explorer -> Options to disable Quick Access?

General

Which of the following tabs would you select in File Explorer -> options to disable Quick Access?

General

Which of the following is considered to be a security concern when using a mobile device?

Geotagged images

GPO

Group Policy Objects - a windows policy in which a computer remotely installs an application from a network folder without any administrator intervention

Which of the following registry subtrees contains all the file association information to determine which application Windows should open whenever you double-click a file with a specific extension?

HKEY_CLASSES_ROOT

You have been troubleshooting a user's smartphone. Due to numerous applications freezing during use, you decide to restore the phone to factory defaults. What action will you be performing?

Hard resetting the device

What kind of general term is used to describe the process of securing a computer system?

Hardening

Which of the following is responsible for ensuring the integrity of the data (arrives unchanged) as it traverses the public Internet?

Hash algorithm

Which of the following is responsible for ensuring the integrity of the data (arrives unchanged) as it traverses the public internet?

Hash algorithm

Which of the following answers refers to the contents of a rainbow table entry?

Hash/Password

Examples of secure network protocols used for establishing VPN connections include:

IPsec / TLS

What includes the practices and procedures that govern how an organization will respond to an incident in progress?

Incident Management

You are implementing a disaster recovery plan. The plan includes backing up mission critical servers. Which of the following backup types will require the longest time to restore?

Incremental

You need to upgrade a Windows 7 Home Premium computer to Windows 8 Home Premium. What should you do prior to the upgrade?

Install the latest service pack

Which of the following is a basic variable type designed to store whole numbers?

Integer

You are modifying a script that automates a task on a computer. Which of the following basic data types is used for whole numbers?

Integers

Which of the following utilities in Windows provides access to configuration options of a built-in pop-up blocker?

Internet Properties (inetcpl.cpl)

Trojan Horse

Is a program (usually harmful) that is packaged as something else, function as backdoor applications.

User Account Control (UAC)

Is a solution to the problem of elevated privileges. In order to change important settings on the computer, such as installing drivers or software, administrative privileges are required.

mantrap

Is two sets of interlocking doors inside a small space, where the first set of doors must close before the second set opens.

An IT technician reports that he ran the *sfc* utility on a user's computer. Why would this utility be used?

It repopulates the dllcache folder when contents are corrupted

Which of the following terms refers to removing software restrictions imposed by Apple on its iOS operating system?

Jailbreaking

Which of the following authentication protocols can be used to enable SSO in Windows-based network environments?

Kerberos

Which of the following are examples of authentication possession (something you have) to support multifactor authentication?

Key fob and Smart card

Which of the following is an example of spyware?

Keylogger

Administrative Tools

Located in Control Panel in Windows 7, is a collection of predefined Microsoft Management Consoles

On a Windows domain, this tool can be used by system administrators to configure initial desktop environment (which may include mapping a network drive or setting up access to a shared printer) for a specific user.

Login script

Which of the following account management security measures narrows down a user's computer access to specified hours?

Login time restrictions

In order to ensure maximum security for your corporate owned mobile devices, which of the following should you make certain the device supports before you make your buying decisions?

MDM policy, Remote wipe and lockout policies

You suspect that a Windows 7 computer has been infected with a Trojan horse. You need to determine if any Trojan horses are loading at system startup and remove them. Which tool should you use to find out if any Trojan horses are being loaded at startup?

MSCONFIG

Which is a system utility that is specifically used to troubleshoot issues that can arise during system startup?

MSConfig

What utility is used to troubleshoot system problems ranging from hardware failures to problems with software and device drivers?

MSINFO32

MBSA

Microsoft baseline security analyzer

MSConfig

Microsoft configuration

MMC

Microsoft management console

DISM

Microsoft's Deployment Image Servicing and Management - a tool that reads the contents of a drive and writes the output to a .WIM format file.

Sysprep

Microsoft's System Perperation Tool - a utility to be run before imaging a disk to solve possible configuration problems

Which two password policy settings combine to make it impossible for users to quickly reuse their last password?

Minimum age and Enforce history

Which password policy setting prevents users from repeatedly changing their passwords to bypass the password history policy setting and get back to their original/preferred password?

Minimum password age setting

Which part of RADIUS is the device that users directly connect to that also relays all communication between users and the RADIUS server?

NAS (Network Access Server)

A user has connected to a second monitor to his Windows 7 Ultimate computer. The new monitor is detected. However, the dual-monitor configuration is not configured as he wants it. What should the user do to change the dual-monitor configuration of the monitors?

Navigate to Control Panel\Appearance and Personalization\Display\Adjust Resolution

What is the name of a Microsoft Windows feature that allows for user-based file level encryption?

New Technology File System (NTFS)

NTFS

New Technology File System - proprietary file system used exclusively with Windows

Which of the following is the correct PowerShell cmdlet to create a user object in Active Directory

New-AdUser

Michael runs a mobile devices repair business and is responsible for keeping up to date with all mobile devices. What is one of the top common software issues he can expect to see on a regular basis?

No Bluetooth connectivity

Which of the following is the system firmware responsible for hardware intitialization during the boot process?

Not A,D

What OS X tool is used to download new applications and fetch system updates and security patches?

Not B

What type of attack is described as targeting new vulnerabilities in an application, or making changes to an existing exploit which creates a new, unexpected signature?

Not B

Why is running a system in Safe Mode used as a troubleshooting malware remediation technique?

Not C

Security center bundles the controls for which of the following?

Not D

Windows 7 has a number of versions including:

Not D

You are a support specialist in an organization. As some problems persisted, you are performing the change management process. You are in the last step of the process in which you have to finalize the changes. You have tested the results of the change and enabled the necessary services. Which of the following will be your next step in this process?

Notify users and administrators

Sam is delighted with his new Android phone. However, one of the apps causes performance issues with the other apps almost every time he launches the app. What does he need to do with this app when this happens?

Perform a force stop

Which of the following actions should you take before repurposing a hard disk?

Perform low level format

Which of the following tools in Windows provide access to real-time performance data on CPU, RAM, hard drive, and network interface utilization?

Performance Monitor (perfmon.exe) / Resource Monitor (resmon.exe) / Task Manager (taskmgr.exe).

64 bit application files location

Program Files

32 bit application files location

Program Files(x86)

You need to view system log files on an Android device. How can this be accomplished?

Put the device in developer mode.

Which formatting type(s) would typically be performed by a user to reinstall an OS?

Quick format / Standard format / High-level format

While configuring a Windows 10 workstation for a new high priority project, you decide to mirror the operating system disk drive for redundancy. Which type of RAID (Redundant Array of Independent Disks) will you be configuring in Windows disk management?

RAID 1

Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is known as:

Ransomware

The share permissions on a shared Windows folder grant the user Read access and the local NTFS permissions grant the user Modify access. Which of the following are the effective user permission levels?

Read when accessing the share remotely / Modify when accessing the folder locally.

The share permissions on a shared Windows folder grant the user Full Control access and the local NTFS permissions grant the user Read access. Which of the following are the effective user permission levels?

Read when accessing the share remotely / Read when accessing the folder locally.

Which of the following answers refers to a common solution for troubleshooting user login problems on a Windows domain?

Rebuilding Windows profiles

Setup

Records events generated during installation

You are a PC technician. You have been provided with a Windows XP computer which is not booting and is affected by a malware which has compromised the operating system enough to prevent repair. Which of the following should you use in this situation?

Recovery Console

crontab -r

Removes jon from a scheduled list in cron

What should you do with the default admin and guest accounts on a Windows system?

Rename them

When users are found in possession of content restricted by your Acceptable Use and corporate compliance policies, which of the following should be part of your first response?

Reporting through proper channels, Data/device preservation and Problem identification

You remove the toner cartridge from a laser printer. what should you do with it?

Return it to the manufacturer for recycling

Which of the following actions in Windows allow to invoke the User Account Security (UAC) access control feature and run an application with administrator account permissions?

Right-click on an application icon -> select Run as administrator from the pop-up menu / In Windows Start menu press and hold Control + Shift keys -> Left-click on an application icon / Launch Windows Run dialog box (Windows logo key + R) -> type in the application's name -> press Control + Shift + Enter.

A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network is known as:

Rootkit

SSH

Runs on TCP port 22. A remote administration and file copy program that is flexible enough to support VPNs too (Using port forwarding).

Which of the following would not be applicable to an electrostatic discharge (ESD) workstation?

Safety goggles

Which of the following power issues can lead to a brownout?

Sag

Which of the following features of Bitlocker is unavailable without a TPM 2.0 module?

Secure Boot (preboot security)

Which of the following locations in Windows provides an interface for managing background applications?

Services (services.msc)

Which MS Windows utilities provide an interface for managing applications/services that might affect the system by slowing down the boot process?

Services (services.msc) / Task Manager (taskmgr.exe).

Print Management

Set properties and monitor local printers and manage print sharing on a network

Which of the following locations allows to configure display brightness levels on an Android device?

Settings -> Display -> Brightness level

Windows power plans manage how the computer is using power. The Balanced (recommended) power plan (used by default in certain Windows versions) scales the CPU performance based on its current utilization, which might have a degrading effect on system performance. If the system is running slow, one of the troubleshooting methods is to enable the High performance power plan or customize the current plan settings. In Windows, the power configuration settings can be found in:

Settings menu (Windows 8/8.1/10) / Power Options applet in Windows Control Panel.

Edith and Clarence are studying for their A+ exam and want to learn more about NTFS permissions versus share permissions on Windows 8 computers. Which of the following statements is FALSE?

Share permissions include Read, Write, Modify, and Full Control

What is a brownout?

Short lived drop in voltage

Which activity is covered under the confidentiality objective of the CIA triad, and involves examining someone's computer to steal confidential information?

Shoulder surfing

Installing mobile apps from trusted sources (e.g. Apple's App Store for iOS devices, or Google Play for Android devices) decreases malware-related security risks. T or F

Sideloading

The practice of installing mobile apps from untrusted sources (i.e. websites and app stores other than the official marketplaces) is called:

Sideloading

SNMP

Simple Network Management Protocol

Shareware

Software that you can install free of charge so that you can evaluate it for a limited period.

Which tool troubleshoots the startup process of an operating system and Windows services?

System Configuration

Which of the following best describes the activity of an intruder on the network who has changed the MAC address of their laptop to gain access to a network with MAC filtering enabled?

Spoofing

Which of the following is a complete application installer which requires a network connection to download the applications but once downloaded, the user has all the files that are needed?

Standalone

Which of the following user groups in Windows 7/8/8.1/10 can use most software and change system settings that don't affect other users or computer's security?

Standard Users

Which formatting type in Windows 7/8/8.1/10 prevents data recovery by overwriting the contents of hard drive sectors?

Standard format

You detect the humidity of your server room fluctuating towards the lower side. What could be the possible effect of low humidity in server room?

Static electricity

shoulder surfing

Stealing password or PIN, by watching the user type it.

A basic data type designed to contain text information is known as:

String

Daisy, a student, is assigned a task to design a webpage for XYZ organization. She has used the scripting language to manage the behavior of the webpage, while coding she has used a variable which is a sequence of alphanumeric characters. Which of the following data types has she used?

String

What are the characteristic features of a WPA/WPA2 Enterprise mode?

Suitable for large corporate networks / Requires RADIUS authentication server.

What is the correct sequence of steps for enabling automatic virtual memory management in MS Windows?

System applet in Control Panel -> Advanced system settings -> Performance -> Settings -> Advanced -> Virtual memory -> Change... -> enable Automatically manage paging file size for each drive / Windows Run dialog box -> type in sysdm.cpl + press Enter -> Advanced tab -> Performance -> Settings -> Advanced -> Virtual memory -> Change... -> enable Automatically manage paging file size for each drive.

end-of-life system

System for which vendors have dropped all support for security updates due to the system's age.

An exact copy of the entire state of a computer system is known as:

System image

Which of the following would be the easiest step to troubleshoot the Blue Screen of Death (BSoD) in MS Windows?

System restart

A security protocol designed to strengthen WEP implementations is known as:

TKIP

Which cipher is used by the Wi-Fi Protected Access (WPA) encryption standard to encrypt network traffic?

TKIP

It is NOT recommended to leave system files and folders unhidden.

TRUE

Reverting a malware-infected system back to a previous restore point does NOT guarantee that a system is free of malware.

TRUE

You have installed a new software application on a Windows 10 PC. The user has mentioned that the PC now runs very slow. Which utility can be used to view the resources that are being used by the new application?

Task Manager

A user wants to be able to restore his system files on his Windows 7 computer to an earlier point in time. He asks that you ensure that a restore point is created every day at the same time. Which tool should you use to schedule the restore point creation?

Task Scheduler

TKIP

Temporal Key Integrity Protocol

system partition

The active partition of the hard drive containing the boot record and the specific files required to start the Windows launch.

What must you know in order to allow an app through the Windows Defender Firewall?

The path to the executable

New Technology File System (NTFS)

The preferred file system, largely because it supports a much larger hard disk (up to 16 exabytes), long file names, and enhanced security.

kernel

The software component that provides the core set of operating system functions

According to your organization's data backup policy, you must keep track of the number and location of backup versions of the organization's data. What is the main purpose of this activity?

To ensure proper disposal of information

While performing your IT technician duties, you plan to use the USMT tool. Why should you use this tool?

To migrate user settings and files from one operating system to another

A type of critical file that a computer system depends on to operate properly is known as a system file. In Microsoft Windows, system files are hidden by default; they might also have Read-only attribute turned on to prevent accidental changes to the file contents. Windows system files can be permanently displayed in Windows Explorer (Windows 7), or File Explorer (Windows 8/8.1/10) after modifying file and folder settings in the Folder Options applet in Windows 7 Control Panel, or File Explorer Options applet in Windows 8/8.1/10 Control Panel. T or F

True

A type of software that performs unwanted and harmful actions in disguise of a legitimate and useful program is known as a Trojan horse. This type of malware may act like a legitimate program and have all the expected functionalities, but apart from that it will also contain a portion of malicious code that the user is unaware of. T or F

True

According to the CompTIA's best practice procedures for malware removal, user education should be the final step of the malware removal process. T or F

True

An MS Windows feature enabling automatic execution of code contained on a mounted drive is called AutoRun. Since disabling AutoRun decreases potential security risk related to the propagation of malware, Windows 7/8/8.1/10 have AutoRun disabled by default. T or F

True

Because the Guest account in MS Windows allows a user to log on to a network, browse the Internet, and shut down the computer, it is recommended to keep it disabled when it isn't being used. T or F

True

Event Viewer (eventvwr.msc) is a Windows utility for monitoring system health and troubleshooting problems with applications, operating system, and hardware. Event Viewer allows for browsing and managing event logs. The most common logs available in Event Viewer include Application, System, and Security logs. Depending on the severity of the event, Application and System logs display events that fall into three categories: Information, Warning, and Error. Information events denote normal operation of the system (such as starting and stopping of system services, or successful completion of some routine background tasks), warning events point to non-critical errors (for example when installation of a software component fails because the component is already on the system), error events point to serious issues, for example when programs stop responding and need to be closed by Windows. Security log contains events such as valid and invalid logon attempts, as well as events related to res. T or F

True

Hash functions allow for mapping large amounts of data content to a small string of characters. The result of hash function provides the exact "content in a nutshell" (in the form of a string of characters) derived from the original data content. In case there's any change to the data after the original hash was taken, the next time when hash function is applied, the resulting hash value calculated after content modification will be different from the original hash. T or F

True

In IT security, the term "Entry control roster" refers to a list of personnel allowed to access restricted areas. T or F

True

In IT security, the term "User authentication" refers to the process of proving user identity to a system. Authentication process can be based on different categories of authentication factors, including unique physical traits of each individual, such as fingerprints ("something you are"), physical tokens such as smart cards ("something you have"), or usernames and passwords ("something you know"). Additional factors might include geolocation ("somewhere you are"), or user-specific activity patterns such as keyboard typing style ("something you do"). Multi-factor authentication systems require implementation of authentication factors from two or more different categories. T or F

True

In MS Windows, a set of troubleshooting utilities (including tools for solving network-related problems) can be found in the Troubleshooting applet located in Windows Control Panel. T or F

True

In MS Windows, the attrib command is used to display or change file attributes. Some of the available options for this command include read-only (R), archive (A), system (S), and hidden (H). With attrib, the "+" symbol sets an attribute for a file, the "-" sign removes the attribute. T or F

True

In NTFS, a folder or file copied or moved from one location to another on a different volume inherits permissions of its new parent folder. T or F

True

NTFS permissions apply to both network and local users. NTFS permissions can be applied to a folder or individual file. T or F

True

One of the ways of confirming that a software application comes from a trusted source is the verification of its digital signature. A digitally signed software proves the identity of the developer and guarantees that the application code hasn't been tampered with since it was signed. The authenticity and integrity of the application's code can be verified by comparing results of a cryptographic hash function (original hash published by the application developer vs. hash obtained from a downloaded app).

True

One of the ways of confirming that a software application comes from a trusted source is the verification of its digital signature. A digitally signed software proves the identity of the developer and guarantees that the application code hasn't been tampered with since it was signed. The authenticity and integrity of the application's code can be verified by comparing results of a cryptographic hash function (original hash published by the application developer vs. hash obtained from a downloaded app). T or F

True

One of the ways to prevent data recovery from a hard drive is to overwrite its contents. The data overwriting technique is used by drive wipe utilities which might employ different methods (including multiple overwriting rounds) to decrease the likelihood of data retrieval. As an example, a disk sanitization utility might overwrite the data on the drive with the value of one in the first pass, change that value to zero in the second pass, and finally perform five more passes, overwriting the contents with random characters (the Schneier method). T or F

True

Physical and logical network diagrams provide visual representation of network architecture. A physical network diagram contains information on hardware devices and physical links between them. A logical network diagram describes the actual traffic flow on a network and provides information related to IP addressing schemes, subnets, device roles, or protocols that are in use on the network. T or F

True

Program Compatibility Troubleshooter is a Windows system utility used for automatic resolution of problems with older applications failing to run on newer versions of MS Windows. Program Compatibility Troubleshooter can be accessed via the Troubleshooting applet in Windows 7/8/8.1/10 Control Panel. Selecting the "Run programs made for previous versions of Windows" option in the Troubleshooting applet launches a guided tool for fixing problems with older programs installed on the current version of Windows.

True

Rainbow tables are lookup tables used to speed up the process of password guessing. T or F

True

Restarting a PC regularly might help in resolving slower performance issues as it shuts down all background processes and clears out the system memory. T or F

True

Restoring the entire system from a known good backup copy is the most reliable method for effective malware removal. T or F

True

Service Set Identifier (SSID) is another term for the name of a Wireless Local Area Network (WLAN). Wireless networks advertise their presence by regularly broadcasting the SSID in a special packet called beacon frame. In wireless networks with disabled security features, knowing the network SSID is enough to get access to the network. SSID also pinpoints the wireless router that acts as a Wireless Access Point (WAP). Wireless routers from the same manufacturer are frequently configured with default (well-known) SSID names. Since multiple devices with the same SSID displayed on the list of available networks create confusion and encourage accidental access by unauthorized users (applies to networks that lack security), changing the default SSID is a recommended practice. T or F

True

Some of the Windows services require other background applications to run. If a service fails to start, one of the ways for troubleshooting such problem is to check whether all required components for a given service are also up and running. In MS Windows, the list of all connected services for a given service can be found by launching the Services (services.msc) utility, right-clicking on a service, selecting Properties, and checking the Dependencies tab. T or F

True

The process of securing a workstation should involve keeping track of available system updates and patches. A single PC running Windows can be updated and patched via the Windows Update service. A similar type of service that enables centralized management and distribution of updates and patches to multiple Windows-based hosts in a corporate environment is known as Windows Server Update Services (WSUS). T or F

True

The term "Unified Threat Management" (UTM) refers to a network security solution, commonly in the form of a dedicated device (called a UTM appliance or a web security gateway), which combines the functionality of a firewall with additional safeguards such as URL filtering, content inspection, spam filtering, gateway antivirus protection, IDS/IPS functionality, or malware inspection. T or F

True

VPN connection types are divided into remote-access VPNs (used for connecting a computer to a network), and site-to-site VPNs (used for connecting networks). T or F

True

Windows Active Directory service allows for grouping users and computers into containers known as Organizational Units (OUs). An OU is the smallest unit to which system administrators can assign Group Policy settings to manage the configuration and use of accounts and resources within a given OU. T or F

True

You are a help desk technician for your company. Several hours into the day, you receive your first technical call from a customer. Your radio is on, and you are in the process of eating your lunch. What should you do?

Turn off your radio, stop eating, and listen to your customer

What applet in Settings will let you recover a failed installation?

Update and Security

You have recently installed the latest version of Microsoft Edge on a Windows 7 computer. You want to prevent fraudulent Web sites from gaining access to your personal information through Microsoft Edge. What should you do?

Turn on the SmartScreen filter

UEFI

Unified Extensible Firmware Interface

UTM

Unified Threat Management

URL

Uniform Resource Locator

A user reports that an app that has worked fine in the past will no longer launch. He indicates that he closed out the app and then turned off and back on the device. What should you suggest that he do NEXT?

Uninstall and then reinstall the app

Recently, you upgraded a user's computer to a dual-core processor. The user complains that an application's performance did not increase after the upgrade. You need to ensure that the application fully utilized the dual-core processor. What should you do?

Upgrade the application to a version that supports multithreading

You are a PC technician in an organization. You are working on a Windows computer and get to know that some necessary DLL files are missing. Which of the following will you do to troubleshoot the missing DLL files?

Use REGSRV32

Which of the following actions would let you recover from a system failure with the least administrative effort?

Use the Factory Recovery Partition

The VPN protocols are managed either by software running on a host or router, or on a specialized hardware appliance known as __________.

VPN concentrator

Which of the following is typically NOT a specified system requirement for a word processing software application?

Video card

Read/list/execute

View the contents of a file or folder or start a program

Reliability and Performance Monitoring

View the performance of the local computer

VDI

Virtual Desktop Infrastructure

You are installing a 32-bit application on a Windows 10 64-bit computer. What is the special environment where a 32-bit application runs on a 64-bit system?

WOW64 (Windows on Windows 64-bit)

Which wireless security solution should you choose?

WPA2 (AES)

You are installing a wireless access point. Rather than manually configure security settings, you decide to use the Wi-Fi Protected Setup (WPS) feature. Which security mechanism will be used for wireless access?

WPA2 (Wi-Fi Protected Access 2)

An optimal Wireless Access Point (WAP) antenna placement provides a countermeasure against:

War driving

You are creating a wireless network for your company. You need to implement a wireless protocol that provides maximum security while providing support for older wireless clients. Which protocol should you choose?

Wi-Fi Protected Access (WPA)

Which of the following steps provide access to configuration settings for Windows system visual effects, such as animations and shadow effects?

Windows Run dialog box -> type in sysdm.cpl + press Enter -> Advanced tab -> Performance -> Settings... -> Visual Effects / Windows Explorer (Windows 7) File Explorer (Windows 8/8.1/10) -> right-click on the Computer icon (Windows 7) This PC icon (Windows 8/8.1/10) -> Properties -> Advanced system settings -> Advanced tab -> Performance -> Settings... -> Visual Effects / Control Panel -> System applet -> Advanced system settings -> Advanced tab -> Performance -> Settings... -> Visual Effects.

Which of the following locations in MS Windows provide access to an interface containing options for configuring restore settings, managing disk space, and deleting restore points?

Windows Run dialog box -> type in sysdm.cpl + press Enter -> System Protection -> Configure. / Control Panel (Icon view) -> Recovery -> Configure System Restore -> Configure.

WSUS

Windows Server Update Services - a program on a server that allows the network administrator to approve updates for certain groups

Which of the following locations in Windows 8/8.1/10 provide access to an interface for managing startup applications?

Windows Settings (Settings -> Apps -> Startup) / Startup tab of the Task Manager utility.

Which of the following terms describes a large network of Windows-based PCs under single administration?

Windows domain

The process of planning and designing new WLANs for optimal performance, security and compliance typically involves:

Wireless site survey

A small business owner has five computers in the office that need to be networked. The users need to share files and print services and manage the administration of their shared resources. Which type of network would you recommend to the owner?

Workgroup

What is the name of a standalone malicious computer program that typically propagates itself over a computer network to adversely affect system resources and network bandwidth?

Worm

Device Manager

You can change device settings, update drivers, and resolve any known conflicts.

vi/vim

a text file editor in linux

ISO file

a file that contains all the contents of an optical disc

cluster

a group of sectors

shutdown -a

aborts command prompt shutdown

answer file

an xml text file that contains all the instructions a Windows Setup program would need to install and configure an OS with out any administrator intervention

dock

bottom of screen gives one-click access to favorite apps and files in macOS

chown

change ownership in linux

chmod

change permission modifiers in linux

chgrp

changes the group in linux

format D: /v: E

changes the name of drive D to drive E

df and du

check free space and report usage by directories and files

fsck

checks partition errors (partition should be unmounted before running this tool)

DBaas

database as a service

A low-level utility that can be used for creating/restoring filesystem backup copies in Linux is called:

dd

You need to create a hard drive image on a Linux computer. Which command should you use?

dd

You need to defragment a hard drive. When the defragmentation is complete, you want to view both the analysis and defragmentation reports. Which command should you run?

defrag /v

DMZ

demilitarized zone

DLT

digital linear tape

DRM

digital rights management

DSL

digital subscriber lin

DVD

digital versatile disc

DVD-RAM

digital versatile disc-random access memory

DVD-ROM

digital versatile disc-read only memory

DVD-R

digital versatile disc-recordable

DVD-RW

digital versatile disc-rewritable

DVI

digital visual interface

DVI-D

digital visual interface-digital

DMA

direct memory access

DAC

discretionary access control

Which of the following commands will mount the wim file E:\wims\install.wim to the mount directory E:\mount?

dism /mount-wim /wimfile:E:\wims\install.wim /index 2 /mountdir:E:\mount

ifconfig/iwconfig

displays the current state of network interfaces within linux

DDoS

distributed denial of service

EFS

encrypting file system

EULA

end user license agreement

EIDE

enhanced integrated drive electronics

EPP

enhanced parallel port

crontab -e

enters the editor

EPROM

erasable programmable read-only memory

ECC

error correcting code

ECP

extended capabilities port

exFAT

extended file allocation table

XGA

extended graphics array

EVGA

extended video graphics adapter/array

eSATA

external serial advanced technology attachment

FPM

fast page mode

FAT

file allocation table

FTP

file transfer protool

FDD

floppy disk drive

format D: /fs:NTFS /x

forces the volume to dismount

format D: /fs:EXFAT

formats D drive to an exfat file system

FSB

front-side bus

Which of the following commands are used on a Linux system to check a disk for errors?

fsck

Which application is used to factory reset an iOS device?

iTunes

A Linux command-line utility used for displaying and modifying network interface configuration settings is called:

ifconfig

IRP

incident response plan

ISA

industry standard architecutre

IR

infrared

ISDN

integrated services digital network

ICR

intelligent character recognition

IMEI

international mobile equipment identify

IMSI

international mobile subscriber identity

ISO

international organization for standardization

ICMP

internet control message protocol

MBR

master boot record

MSDS

material safety data sheet

KVM

kernel-based virtual machine keyboard-video-mouse

dir/t:w

list by last modified

dir/t:a

list by last time accessed

help netsat

lists all switches for the netstat command

netstat /?

lists all switches for the netstat command

dir/w/p

lists both wide format and one screen at a time

dir/p

lists files one screen at a time

dir/w

lists files using a wide format with no file details

LAN

local area network

Which of the following addresses can be pinged to test the functionality of a Network Interface Card (NIC)?

localhost / ::1 / 127.0.0.1

Component Services

located in Administrative Tools, enables you to register new server applications or reconfigure security permissions for existing services

Which of the following Linux commands is used to display information about files and directories contained within the current working directory?

ls

MAPI

messaging application programming interface

mATX

micro advanced technology extended

MicroDIMM

micro dual inline memory module

Which Windows utility command can be used to create a custom management console?

mmc

MDM

mobile device management

MPEG

moving picture experts group

MP3

moving picture experts group layer 3 audio

MP4

moving picture experts group layer 4

MFP

multifuncion products

MFD

multifunction device

MUI

multilingual user inteface

MIMO

multiple input multiple output

MIME

multipurpose internet mail extension

MIDI

musical instrument digital interface

What is the name of the Linux command used for renaming files and directories?

mv

Which of the following is a Linux command for transferring files/directories to a different directory?

mv

NTSC

national transmission standards comittee

NFC

near field commmunication

NetBEUI

network basic input/output extended user interface

NFS

network file system

NIC

network interface card

NNTP

network news transfer protocol

NTP

network time protocol

NAS

network-attached storage

NetBIOS

networked basic input/output system

NLX

new low-profile extended

NTFS

new technology file system

NTLDR

new technology loader

NiCd

nickel cadmium

compmgmt.msc

opens the Computer Management console from runline

OCR

optical character recognition

OLED

organic light emitting diode

OEM

original equipment manufacturer

PVA

patterned vertical alignment

PVC

permanent virtual circuit

PHI

personal health infromation

PS/2

personal system/2 connector

PSTN

public switched telephone network

A Linux command displaying an absolute path to (i.e. full filename of) the current working directory is called:

pwd

QoS

quality of service

control + C

quits a running program in command prompt

5

r-w

RF

radio frequency

RAM

random access memory

ROM

read-only memory

RTC

real-time clock

shutdown -r +10

reboot 10 minutes from now

RAID

rebundant array of independent (or inexpensive) discs

apt-get update

refresh the local database with information about the packages available from the repository

RJ-11

registered jack function 11

RJ-45

registered jack function 45

RAS

remote access service

RADIUS

remote authentication dial-in user server

RDP

remote desktop protocol

RIS

remote installation service

rm -r

removes a directory and its contents recursively

secure boot

restricts OS installation to trusted software

RMA

returned materials authorization

A command-line command in Linux used for deleting files and directories is known as:

rm

RIP

routing information protocol

Standby/Sleep Mode

saves current session to memory and put the computer into a minimal power state

hibernate mode

saves the current session to disk before powering off the computer

SLI

scalable link interface or system level integration or scanline interleave mode

chkdsk C: /r

scans and attempts to recover bad sectors on drive C

Ext2

second extended file system

SCP

secure copy protection

SD card

secure digital card

SFTP

secure file transfer protocol

SSH

secure shell

S.M.A.R.T

self-monitoring, analysis, and reporting technology

SATA

serial advance technology attachment

SAS

serial attached SCSI

DB-25

serial communications D-shell connector, 25 pins

DB-9

serial communications D-shell connector, 9 pins

SMTP

server mail transfer protocol

SP

service pack

SSID

service set identifier

weekday

sets the day of the week in cron in either numerical or text format

Which of the following answers refers to a script file type designed to be run in Unix command line?

sh

STP

shielded twisted pair

tasklist /svc

shows a list of services within each process

Resource Monitor

shows an enhanced version of the sort of snapshot monitoring provided by task manager

mm

specifies minutes past the hour in cron(0-59)

hh

specifies the hour in cron(0-23)

MM

specifies the month in numerical or text format in cron

format D: /a:512

specifies the size of allocation units

taskkill /im

specify image name to kill

SPGA

staggered pin grid array

SRAM

static random access memory

kill

stops a process using its Process ID

SAN

storage area network

ST

straight tip

Which of the following is a Linux command that allows to assume the identity of a different system user and execute commands with security privileges of that user account?

su

SIM

subscriber identity module

SC

subscription channel

A Linux command that temporarily modifies security privileges to allow an execution of a single command that requires root access permissions is called:

sudo

SXGA

super extended graphics array

SFC

system file checker

system protection tab

tab in system properties that provides option for system restore

image

template containing the OS and required software

TACACS

terminal access controller access-control system

taskkill /f /pid processid

terminates process without any user notification

multiboot

the capability for choosing between two or more operating systems to boot from when a computer is turned on. A separate partition is required for each operating system.

TDR

time domain reflectomeneter

bootsect

tool to copy code to make the parition bootable

diskpart

tool to setup partitions on a hard drive. Sets up active partition

TCP

transmission control protocol

TCP/IP

transmission control prptocol/internet protocol

TFTP

trivial file transfer protocol

UXGA

ultra extended graphics array

apt-get upgrade

update all packages with latest versions

UAC

user account control

UDF

user defined functions or universal disk format or universal data format

linux group commands

useradd, usermod, userdel

xcopy

utility that allows you to copy the contents of more than one directory at a time and retain the directory structure

VA

vertical alignment

Which of the following commands is used for invoking a text editor in Unix-like operating systems?

vi

VESA

video electronics standards association

VGA

video graphics array

BRAM

video random access memory

VLAN

virtual LAN

VFAT

virtual file allocation table - file system for linux

VMM

virtual memmory monitor - manages the memmory mappings and assignments

VNC

virtual network computer

VPM

virtual private network

VoIP

voice over internet protocol

VDC

volts DC

WUXGA

wide ultra extended graphics array

WPA2

wifi protected access 2

WPS

wifi protected setup

WINS

windows internet name service

WEP

wired equivalent privacy

WAP

wireless access protocol/wireless access point

WIFI

wireless fidelity


Ensembles d'études connexes

SCM 421 Exam 2 UTK Buckley Topic 7

View Set

ATI Historical Influences on Community and Public Health Nursing Assessment

View Set

再要你命3000 详细释义 List 11 to 20

View Set

Intro to Molecular Bio Connect 20.1

View Set

Wandering Jew or Tradescantia pallida.

View Set