A2 part 2
Which of the following characters indicates that a Windows network share is intended for administrative access? # $ ? &
$
Which netstat parameter allows to display all connections and listening ports? -a -p -e -r
-a
Which of the following netstat parameters displays addresses and port numbers in numerical form? -b -n -q -r
-n
Which of the following answers lists the filename extension of a Microsoft PowerShell script files? .py .vbs .sh .ps1
.ps1
Files with this filename extension are used in a scripting language based on the Microsoft's Visual Basic programming language. .vb .sh .vbs .js
.vbs
Which shutdown command switch enables aborting a system shutdown? /a /q /e /p
/a
Which ipconfig parameter allows to view the physical address of a Network Interface Card (NIC)? -S srcaddr /all -i address eth_addr
/all
Which of the answers listed below refers to an ipconfig command parameter used for displaying the full TCP/IP configuration information for all adapters? -a /? /all /a
/all
Which shutdown command switch in Microsoft Windows Command Prompt forces full system shutdown and restart of a Windows host? -s -r /r /s r -i
/r
Which sfc switch enables a type of file check that scans integrity of all protected system files and repairs corrupted files when possible? /scannow /verifyonly /scanfile /verifyfile
/scannow
Which copy command switch verifies that the new files are written correctly? /-y /v /y /a
/v
Which of the copy command switches suppresses the confirmation prompt displayed when Windows is about to overwrite the contents of an existing file? /v /y /a /-y
/y
The GPT partition style extends the MBR's primary partition limit to:
128 partitions
Which of the following is an example of a soft token? USB token Authenticator app Smart card Key fob
Authenticator app
Which of the following statements apply to the definition of a computer virus? (Select 3 answers) A self-replicating computer program containing malicious segment Requires its host application to be run to make the virus active A standalone malicious computer program that replicates itself over a computer network Can run by itself without any interaction Attaches itself to an application program or other executable component A self-contained malicious program or code that does need a host to propagate itself
A self-replicating computer program containing malicious segment Requires its host application to be run to make the virus active Attaches itself to an application program or other executable component
Which of the following statements describing share permissions in MS Windows are true? (Select 2 answers) Apply only to network users Can be set on a file level Apply to both network and local users Can be set on a folder level
Apply only to network users Can be set on a folder level
A rule-based access control mechanism implemented on routers, switches, and firewalls is known as: ACL CSR DLP AUP
ACL
Which of the following is a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object? DLP NAT ACL DEP
ACL
Which of the following cryptographic algorithms is the least vulnerable to attacks? AES DES RC4 3DES
AES
Asymmetric algorithms
AES, 3DES, RC4, Blowfish, and Twofish
Which of the following is a package management system most often used on Debian and Debian-based Linux distributions? KDE APT Yum RPM
APT
A type of document stipulating rules of behavior to be followed by users of computers, networks, and associated resources is called: SLA EULA AUP BPA
AUP
Which of the following answers refer(s) to the Windows Remote Assistance utility? (Select all that apply) Access based on one-time password Temporal remote access Access based on local password (local user account password) The host and invited user can both see the host's screen Windows tool used for connecting remotely to the user's own computer The host and invited user share control over host's mouse and keyboard Permanent remote access Windows tool used for assisted remote troubleshooting
Access based on one-time password Temporal remote access The host and invited user can both see the host's screen The host and invited user share control over host's mouse and keyboard Windows tool used for assisted remote troubleshooting
Which of the following answers apply to Windows BitLocker? (Select 3 answers) Works only on systems equipped with a TPM microcontroller Accessed via BitLocker Drive Encryption applet in Windows Control Panel Shipped with all versions of Windows 8/8.1/10 Accessed via Security and Maintenance applet in Windows Control Panel Does not require a TPM microcontroller to work Not included in basic versions of Windows 8/8.1/10 (Windows 8/8.1 Core and Windows 10 Home)
Accessed via BitLocker Drive Encryption applet in Windows Control Panel Does not require a TPM microcontroller to work Not included in basic versions of Windows 8/8.1/10 (Windows 8/8.1 Core and Windows 10 Home)
A drive letter in Windows can be changed by: Accessing Disk Management, right-clicking on a drive and selecting Change Drive Letter and Paths from the context menu Accessing File Explorer, clicking on a drive and selecting Change Drive Letter and Paths from the Drive Tools menu Accessing Disk Management, right-clicking on a drive and selecting new drive letter on the General tab in the Properties menu Accessing File Explorer, right-clicking on a drive and selecting Change Drive Letter and Paths from the context menu
Accessing Disk Management, right-clicking on a drive and selecting Change Drive Letter and Paths from the context menu
A type of hierarchical database structure used in Windows Server environments that enables centralized management of devices and resources on a network is known as: HomeGroup Active Directory Workgroup Windows domain
Active directory
In Windows Disk Management utility, a partition's size can be extended into: (Select 2 answers) Adjacent space on the same disk Disk space formatted with any file system Any available space on any of the installed disks Unallocated space on the same disk Any available space on the same disk
Adjacent space on the same disk Unallocated space on the same disk
A shortcut icon to the Windows Memory Diagnostic tool (mdsched.exe) can be found in: Hardware and Sound menu in Control Panel Administrative Tools folder in Control Panel Performance Information and Tools menu System menu
Administrative Tools folder in Control Panel
Active Directory Users and Computers (ADUC) is a Microsoft Management Console (MMC) snap-in included in most Windows Server OSs. The Active Directory Users and Computers snap-in allows system administrators to manage resources in the Active Directory (AD) environment (e.g. to create, delete, disable, unlock accounts, or to reset account passwords). On a Windows Server OS, the Active Directory Users and Computers snap-in resides in: Local Users and Groups in Computer Management Windows Control Panel User Accounts in Windows Control Panel Administrative Tools folder in Windows Control Panel
Administrative Tools folder in Windows Control Panel
Windows Task Scheduler (taskschd.msc) is a component of Microsoft Windows that provides the capability to schedule the launch of programs or scripts at pre-defined times or after specified time intervals. Which of the following locations contains the application icon shortcut used for launching the Task Scheduler MMC snap-in? Ease of Access Center Programs and Features menu in Windows Control Panel Windows Command Prompt Administrative Tools menu in Windows Control Panel
Administrative Tools menu in Windows Control Panel
Which of the following tabs of the Windows Internet Properties applet provides an option for rolling back all the Internet Explorer web browser configuration settings to the state they were in when Internet Explorer was first installed? General Security Privacy Advanced
Advanced
Which tab of the System Properties (sysdm.cpl) applet in MS Windows provides access to system performance settings menu? Hardware System Protection Environment Variables Advanced
Advanced
Which of the following locations/steps allows to view network shares in Windows? Windows Command Prompt -> net share -> Enter (all network shares) Windows Run dialog box -> \computer name -> Enter (user shares only) Shared Folders menu in the Computer Management utility (all network shares) Windows Command Prompt -> net view \\computer name -> Enter (user shares only) Windows Command Prompt -> net view \\computer name /all -> Enter (all network shares) All of the above
All
Restoring data from an incremental backup requires: (Select 2 answers) Copy of the last incremental backup All copies of differential backups made since the last full backup Copy of the last differential backup All copies of incremental backups made since the last full backup Copy of the last full backup
All copies of incremental backups made since the last full backup Copy of the last full backup
If a recently installed app, driver, or update for Windows has a degrading effect on system performance, Windows Restore can be used to undo system changes by reverting the computer to a restore point. Methods for accessing Windows Restore include: Windows Run dialog box -> type in rstrui.exe + press Enter Windows Run dialog box -> type in sysdm.cpl + press Enter -> System Protection tab -> System Restore... Windows Control Panel -> System applet -> Advanced system settings -> System Protection tab -> System Restore... Windows Control Panel -> Recovery applet Windows Settings menu (Windows 8/8.1/10) All of the above
All of the above
The User Accounts applet in Windows allows to: Change local account name Change local account type Change local account password Manage another local account Change local User Account Control (UAC) settings All of the above None of the above
All of the above
Which of the following actions would be of help in troubleshooting the "Missing operating system" error message displayed during system boot? Run Startup Repair utility Use bootrec.exe to fix Master Boot Record (MBR) errors Verify that the drive is detected in BIOS Use diskpart utility to label the system partition as active All of the above
All of the above
Which of the following can be used by system/network administrators to restrict a user's ability to install software? AUP Group Policy Principle of least privilege MDM solutions All of the above
All of the above
Which of the following methods can be used to launch Windows Recovery Environment (WinRE) in Windows 8/8.1/10? Boot from installation media In Power menu, hold down the Shift key and select Restart Boot from Recovery Drive Perform system restart from the Settings menu All of the above
All of the above
The Devices and Printers applet in Windows: (Select 3 answers) Allows to add/remove wired and wireless devices Does not offer troubleshooting options Provides a simplified view of all connected devices Allows to restore a device driver to the previously installed version Provides a detailed view of all connected devices Allows to troubleshoot a device that isn't working properly
Allows to add/remove wired and wireless devices Provides a simplified view of all connected devices Allows to troubleshoot a device that isn't working properly
Which of the following describe(s) the function of Windows Task Manager? (Select all that apply) Provides tools for managing network traffic Allows to close a non-responsive application in Windows Displays information on programs, processes, and services that are currently running on the computer Allows to schedule the launch of programs or scripts at pre-defined times or after specified time intervals Provides real-time reports on how a computer running Windows OS is using system resources (CPU/RAM/HDD/Network usage) Allows system administrators for managing the currently logged-in users
Allows to close a non-responsive application in Windows Displays information on programs, processes, and services that are currently running on the computer Provides real-time reports on how a computer running Windows OS is using system resources (CPU/RAM/HDD/Network usage) Allows system administrators for managing the currently logged-in users
Which of the following locations in macOS provides access to application updates menu? Explorer App Store iCloud Spotlight
App Store
Which of the following locations in macOS provide access to multi-touch interface settings (a.k.a. Gestures)? (Select 2 answers) Apple menu -> System Preferences... -> Mouse Apple menu -> App Store... -> Categories -> Devices -> Trackpad Apple menu -> System Preferences... -> Devices -> Mouse Apple menu -> System Preferences... -> Trackpad Apple menu -> App Store... -> Categories -> Devices -> Mouse Apple menu -> System Preferences... -> Devices -> Trackpad
Apple menu -> System Preferences... -> Mouse Apple menu -> System Preferences... -> Trackpad
What is the name of a policy that allows employees to use private mobile devices for accessing company's restricted data and applications? COPE BYOD JBOD CYOD
BYOD
Which of the following are disk storage types used with MS Windows? Extended Basic Logical Dynamic Primary
Basic Dynamic
In MS Windows, a newly added drive is by default partitioned as a:
Basic disc
Examples of devices/device components regulated under special disposal procedures due to environmental/safety hazards include: (Select all that apply) PSUs Batteries CRTs Toner cartridges LCDs
Batteries CRTs Toner cartridges
Which of the following data encryption tools can be used to secure a Windows workstation? (Select all that apply) FileVault (file-level encryption) BitLocker (drive-level encryption) EFS (file-level encryption) FileVault (drive-level encryption) BitLocker To Go (removable media encryption)
BitLocker (drive-level encryption) EFS (file-level encryption)
A Microsoft Windows feature specifically designed to enable encryption of removable drives is known as: BitLocker Encrypting File System (EFS) BitLocker To Go Trusted Platform Module (TPM)
BitLocker To Go
Which of the configuration features listed below can be managed through the MSConfig Boot tab? (Select all that apply) Boot logging Diagnostic startup Startup items loaded during system boot Default OS to load in a multiboot environment Services loaded during system startup Amount of hardware resources to be used by the chosen OS in a multiboot environment (e.g. the maximum amount of RAM) Safe boot options
Boot logging Default OS to load in a multiboot environment Amount of hardware resources to be used by the chosen OS in a multiboot environment (e.g. the maximum amount of RAM) Safe boot options
In forensic procedures, a chronological record outlining persons in possession of an evidence is referred to as: Proxy list Order of volatility Access log Chain of custody
Chain of custody
A type of trusted third party that issues digital certificates used for creating digital signatures and public-private key pairs is known as: IKE CA PKI CSP
CA
Which of the following is a file system designed for optical media? CDFS FAT32 NTFS exFAT
CDFS
Which of the following terms refers to a group of experts that handle computer security breaches? CIRT NIST CSRF IEEE
CIRT
In which of the mobile device deployment models employees can use corporate-owned devices both for work-related tasks and personal use? BYOD COPE VDI CYOD
COPE (corporate owned, personally enabled)
Which of the following devices may pose a risk to electrical safety due to accumulated high voltage? (Select all that apply) CRTs Power Supply Units (PSUs) Inverters CPUs Laser printers
CRTs Power Supply Units (PSUs) Inverters Laser printers
In Windows Disk Management utility, a disk status set to Failed indicates that the basic or dynamic volume: (Select 3 answers) Cannot be started automatically Is damaged Experiences (I/O) errors Requires assignment of a mount point folder path Contains corrupted file system
Cannot be started automatically Is damaged Contains corrupted file system
What is the function of the Linux chmod command? Changes file access permissions Changes file owner and group permissions Compares the contents of two files or sets of files Changes the Linux command prompt
Changes file access permissions
What is the function of the Linux chown command? Changes the Linux command prompt Compares the contents of two files or sets of files Changes file owner and group permissions Changes file access permissions
Changes file owner and group permissions
In wireless networks, a situation where multiple channels share the frequency band causing interference and performance degradation for devices operating on channels that are too close to each other is known as: Cross-talk Channel overlapping Collision Channel bonding
Channel overlapping
If an application written for an earlier version of MS Windows doesn't run correctly, the operating system can emulate its own older version to allow a given program to work with newer hardware or software. The compatibility mode settings in Windows can be changed manually by right-clicking the program icon and: Choosing "Restore previous versions" option from the pop-up menu Selecting "Run program using recommended compatibility settings" option from the pop-up menu Clicking on the Properties menu item, and then applying the required settings on the Compatibility tab Selecting "Run as administrator" option from the pop-up menu
Clicking on the Properties menu item, and then applying the required settings on the Compatibility tab
Which of the following statements describing features of Windows HomeGroups are true? (Select 3 answers) Communication between HomeGroup computers is encrypted with a pre-shared password User passwords for accessing HomeGroup are stored centrally on a Domain Controller HomeGroups are available in all versions of Windows Communication between HomeGroup computers is unencrypted An ad hoc home networking system for file and printer sharing HomeGroups are available only in Windows 7/8/8.1 and early versions of Windows 10
Communication between HomeGroup computers is encrypted with a pre-shared password An ad hoc home networking system for file and printer sharing HomeGroups are available only in Windows 7/8/8.1 and early versions of Windows 10
Which of the following is an MS Windows utility designed both for system administrators and for application developers? Component Services (dcomcnfg.exe) Microsoft Management Console (MMC) Windows PowerShell (powershell.exe) System Configuration (msconfig.exe)
Component Services (dcomcnfg.exe)
Which of the following can be used to launch the Disk Management utility in Windows? (Select 3 answers) Computer Management Disk Management shortcut icon in the Administrative Tools folder Windows Run dialog box Device Manager Storage Spaces menu item in Windows Control Panel Quick Access Menu (displayed after right-clicking on the Windows Start button)
Computer Management Windows Run dialog box Quick Access Menu (displayed after right-clicking on the Windows Start button)
Many of the utilities available in the Administrative Tools menu in Windows Control Panel are implemented as the so-called Microsoft Management Console (MMC) snap-ins. The most prominent MMC component in this menu (which contains a collection of other MMC snap-ins such as Device Manager, Disk Management, and Event Viewer) is called: Task Manager (taskmgr.exe) Performance Monitor (perfmon.exe) Computer Management (compmgmt.msc) System Configuration (msconfig.exe)
Computer Management (compmgmt.msc)
Which of the following locations provide direct access to the Device Manager applet in MS Windows? (Select 3 answers) Administrative Tools folder in Windows Control panel Computer Management utility in the Administrative Tools folder in Windows Control Panel Windows Run dialog box (after typing in devmgmt.msc and pressing Enter) Devices and Printers folder in Windows Control Panel Windows Control Panel
Computer Management utility in the Administrative Tools folder in Windows Control Panel Windows Run dialog box (after typing in devmgmt.msc and pressing Enter) Windows Control Panel
The Internet Properties applet tab containing an option for configuring VPN settings is called: General Programs Connections Privacy
Connections
Which of the Windows Internet Properties system utility tabs provides access to proxy settings? Security Privacy Advanced Connections
Connections
Which of the following provides access to the User Accounts applet in MS Windows? Computer Management Administrative Tools folder Control Panel Security and Maintenance
Control Panel
Which of the following steps provide access to Windows Reliability Monitor? (Select 2 answers) Control Panel (Icon view) -> Administrative Tools folder -> Reliability Monitor Control Panel (Category view) -> System and Security -> Security and Maintenance -> Maintenance -> View reliability history Control Panel (Icon view) -> Security and Maintenance -> Maintenance -> View reliability history Windows Settings menu -> Update & Security -> Troubleshooting -> Reliability Monitor Control Panel (Category view) -> System and Security -> System -> Advanced system settings -> Performance -> Settings... -> Advanced -> View reliability history
Control Panel (Category view) -> System and Security -> Security and Maintenance -> Maintenance -> View reliability history Control Panel (Icon view) -> Security and Maintenance -> Maintenance -> View reliability history
Which of the following locations in MS Windows provide access to an automated printer troubleshooting tool? (Select 3 answers) Control Panel (Icon view) -> Security and Maintenance -> Maintenance -> Troubleshooting -> Printer Control Panel (Category view) -> Administrative Tools -> Troubleshooting -> Printer Control Panel (Icon view) -> Troubleshooting -> Hardware and Sound -> Printer Control Panel (Category view) -> System and Security -> Troubleshoot common computer problems -> Printer Control Panel (Icon view) -> Devices and Printers -> right-click on a selected printer -> Troubleshoot
Control Panel (Category view) -> System and Security -> Troubleshoot common computer problems -> Printer Control Panel (Icon view) -> Devices and Printers -> right-click on a selected printer -> Troubleshoot
Which of the following steps in MS Windows allows to update/roll back the network adapter driver or disable/uninstall the device? (Select 2 answers) Control Panel (Icon view) -> Device Manager -> expand Network Adapters list -> right-click on the network adapter -> select Properties from the pop-up menu -> select the required action from the Driver tab Windows Run dialog box -> type in devmgmt.msc + press Enter -> expand Network Adapters list -> right-click on the network adapter -> select Properties from the pop-up menu -> select the required action from the Driver tab Control Panel (Icon view) -> Network and Sharing Center -> Change adapter settings -> right-click on the network adapter -> select Properties from the pop-up menu -> select the required action from the Driver tab Windows Settings menu -> Devices -> Network Adapters -> select the device -> select the required action from the Driver menu Control Panel (Category view) -> Network and Internet -> View network computers and devices -> right-click on the network adapter -> select Properties from the pop-up menu -> select the required action from the Driver tab
Control Panel (Icon view) -> Device Manager -> expand Network Adapters list -> right-click on the network adapter -> select Properties from the pop-up menu -> select the required action from the Driver tab Windows Run dialog box -> type in devmgmt.msc + press Enter -> expand Network Adapters list -> right-click on the network adapter -> select Properties from the pop-up menu -> select the required action from the Driver tab
Which of the following locations in MS Windows allows to print a test page? Control Panel (Icon view) -> Devices and Printers -> right-click on a selected printer -> Properties -> General tab -> Print Test Page Control Panel (Category view) -> Hardware and Sound -> Printers -> right-click on a selected printer -> Properties -> General tab -> Print Test Page Control Panel (Icon view) -> Devices and Printers -> right-click on a selected printer -> Printer Properties -> General tab -> Print Test Page Control Panel (Category view) -> System and Security -> Security and Maintenance -> Maintenance -> Hardware -> Printers -> right-click on a selected printer -> Properties -> General tab -> Print Test Page
Control Panel (Icon view) -> Devices and Printers -> right-click on a selected printer -> Printer Properties -> General tab -> Print Test Page
Which of the following answers describes the correct sequence of steps for accessing the magic packet settings of an Ethernet adapter in MS Windows? Control Panel (Icon view) -> Internet Options applet -> Connections tab -> click the "LAN settings" button -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Magic Packet settings Control Panel (Category view) -> Network and Internet -> View Network Computers and Devices -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Magic Packet settings Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Magic Packet settings Control Panel (Category view) -> View Devices and Printers -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Magic Packet settings
Control Panel (Icon view) -> Internet Options applet -> Connections tab -> click the "LAN settings" button -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Magic Packet settings
Which of the following answers describes the correct sequence of steps for accessing the Speed & Duplex settings of an Ethernet adapter in MS Windows? Control Panel (Category view) -> View Devices and Printers -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Speed & Duplex settings Control Panel (Icon view) -> Internet Options applet -> Connections tab -> click the "LAN settings" button -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Speed & Duplex settings Control Panel (Category view) -> Network and Internet -> View Network Computers and Devices -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Speed & Duplex settings Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Speed & Duplex settings
Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Speed & Duplex settings
Which Control Panel applet in Windows allows to manage usernames and passwords for websites, connected applications and networks? User Accounts Credential Manager Security and Maintenance Ease of Access Center
Credential Manager
The purpose of PCI DSS is to provide protection for: Credit cardholder data Licensed software User passwords Personal health information
Credit cardholder data
What is the correct sequence of steps for accessing the manual configuration interface for IPv4 connections in MS Windows? Control Panel (Category view) -> Network and Internet -> Internet Options -> Advanced tab -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields Control Panel (Category view) -> Network and Internet -> Network and Sharing Center applet -> Change adapter settings -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields Control Panel (Icon view) -> Internet Options applet -> Connections tab -> click the "LAN settings" button -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields
Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields
Which of the following answers describes the correct sequence of steps for accessing the manual configuration interface for IPv4 connections in MS Windows? Control Panel (Category view) -> Network and Internet -> Internet Options -> Advanced tab -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields Control Panel (Category view) -> Network and Internet -> Network and Sharing Center applet -> Change adapter settings -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields Control Panel (Icon view) -> Internet Options applet -> Connections tab -> click the "LAN settings" button -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields
Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields
Which of the following steps enable displaying protected system files in Windows 8/8.1/10? (Select 2 answers) Control Panel -> Folder Options -> General tab -> select Show hidden files, folders, and drives Control Panel -> File Explorer Options -> View tab -> Advanced settings -> select Show hidden files, folders, and drives Control Panel -> Folder Options -> General tab -> clear the checkbox next to Hide protected operating system files Control Panel -> File Explorer Options -> View tab -> Advanced settings -> clear the checkbox next to Hide protected operating system files Control Panel -> Folder Options -> View tab -> Advanced settings -> select Show hidden files, folders, and drives Control Panel -> File Explorer Options -> General tab -> select Show hidden files, folders, and drives
Control Panel -> File Explorer Options -> View tab -> Advanced settings -> select Show hidden files, folders, and drives Control Panel -> File Explorer Options -> View tab -> Advanced settings -> clear the checkbox next to Hide protected operating system files
Which of the following steps enable displaying protected system files in Windows 7? (Select 2 answers) Control Panel -> File Explorer Options -> General tab -> select Show hidden files, folders, and drives Control Panel -> Folder Options -> View tab -> Advanced settings -> clear the checkbox next to Hide protected operating system files Control Panel -> File Explorer Options -> View tab -> Advanced settings -> select Show hidden files, folders, and drives Control Panel -> Folder Options -> General tab -> select Show hidden files, folders, and drives Control Panel -> File Explorer Options -> General tab -> clear the checkbox next to Hide protected operating system files Control Panel -> Folder Options -> View tab -> Advanced settings -> select Show hidden files, folders, and drives
Control Panel -> Folder Options -> View tab -> Advanced settings -> clear the checkbox next to Hide protected operating system files Control Panel -> Folder Options -> View tab -> Advanced settings -> select Show hidden files, folders, and drives
Switching from Windows 8.1 to Windows 10 Home edition can be performed either via an upgrade or clean installation. Match each Windows 8.1 edition on the left with the correct upgrade option from the corresponding drop-down list. Windows 8.1 (Core) Windows 8.1 Professional Windows 8.1 Enterprise
Core: Upgrade Pro: Install Enterprise: Install
Which of the following are the upgrade options for switching from Windows 8.1 to Windows 10 Pro edition? (Match each Windows 8.1 edition on the left with the correct upgrade option from the corresponding drop-down list) Windows 8.1 (Core) Windows 8.1 Professional Windows 8.1 EnterpriseI
Core: Upgrade Pro: Upgrade Enterprise: Install
What are the upgrade options for switching from Windows 8.1 to Windows 10 Enterprise edition? Windows 8.1 (Core) Windows 8.1 Professional Windows 8.1 Enterprise
Core:Install Pro: Upgrade Enterprise: Upgrade
Windows Task Manager can be launched by: (Select all that apply) Ctrl+Shift+Esc key combination Double-clicking on the applet's icon shortcut in the Administrative Tools folder Pressing Ctrl+Alt+Delete and selecting the Task Manager option from the menu screen Selecting the Task Manager applet in Windows Control Panel Right-clicking on the Windows Taskbar and selecting Task Manager Typing taskmgr (or taskmgr.exe) in the Command Prompt and pressing Enter Pressing simultaneously the Windows and R keys, typing taskmgr (or taskmgr.exe) in the Run window, and pressing Enter
Ctrl+Shift+Esc key combination Pressing Ctrl+Alt+Delete and selecting the Task Manager option from the menu screen Right-clicking on the Windows Taskbar and selecting Task Manager Typing taskmgr (or taskmgr.exe) in the Command Prompt and pressing EnterPressing simultaneously the Windows and R keys, typing taskmgr (or taskmgr.exe) in the Run window, and pressing Enter
Which of the following are methods of storing and accessing data over computer network? ext3 DFS ext4 FAT32 NFS exFAT
DFS NFS
Which of the following acronyms refers to software or hardware-based security solutions designed to detect and prevent unauthorized use and transmission of confidential information outside of the corporate network? DRP DHE DLP DEP
DLP
Which of the following can be used by system administrators to selectively block access to known malware sites? DHCP settings DNS configuration Port security DLP software
DNS configuration
Which of the following answers describe(s) possible cause(s) of the "Missing operating system" error message displayed during system boot? (Select all that apply) Damaged hard drive BIOS does not detect the hard drive Windows starts in VGA mode System partition not set as active Corrupt Master Boot Record (MBR)
Damaged hard drive BIOS does not detect the hard drive System partition not set as active Corrupt Master Boot Record (MBR)
If a device in Windows fails after driver update, the driver can be restored to the previously installed version in: Device Manager Windows Update menu Programs and Features menu Task Manager
Device Manager
Which of the following Internet access types takes advantage of PSTN lines? Ethernet Mobile broadband Dial-up Optical fiber
Dial-up
Which of the following settings are used for establishing a dial-up connection in Windows? (Select 3 answers) Dial-up phone number Encryption type User name Security type Password Destination name
Dial-up phone number User name Password
According to the CompTIA's best practice procedures for malware removal, removing malicious software on a Windows-based system should be performed as the next step after: Disabling System Restore Isolating the infected system Scheduling scans and running updates Creating a restore point
Disabling System Restore
Which of the following is a macOS disk maintenance tool? defrag Disk Cleanup Disk Management chkdsk Disk Utility
Disk Utility
Which of the following macOS utilities allows to create/restore a disk image? App Store Disk Utility Time Machine System Restore
Disk Utility
Which of the following would be of help in preserving the integrity of a digital evidence? (Select 2 answers) Disk imaging Screenshots Network logs Hashing Video capturing
Disk imaging Hashing
Which of the locations listed below enable access to computer display configuration settings in Windows 7/8/8.1? (Select 3 answers) Programs and Features applet in Windows Control Panel Display settings pop-up menu launched after right-clicking on the Windows Desktop screen area Windows Start button -> Settings -> System -> Display -> System -> Display in Windows Start menu Appearance and Personalization menu of the Windows Control Panel (Category view) The Display applet icon in Windows Control Panel (Icons view)
Display settings pop-up menu launched after right-clicking on the Windows Desktop screen area Appearance and Personalization menu of the Windows Control Panel (Category view) The Display applet icon in Windows Control Panel (Icons view)
Premium versions of the Microsoft OS contain a built-in component that enables encryption of individual files. This feature is known as: Encrypting File System (EFS) Advanced Encryption Standard (AES) Trusted Platform Module (TPM) New Technology File System (NTFS)
Encrypting File System (EFS)
Netstat is a command-line utility used for: (Select 2 answers) Displaying active TCP/IP connections Testing the reachability of a remote host Displaying intermediary points on the packet route Viewing the TCP/IP configuration details Displaying network protocol statistics
Displaying active TCP/IP connections Displaying network protocol statistics
Windows repair installation: Modifies application configuration settings Does not affect user applications Removes user files Preserves application configuration settings Removes user applications Does not affect user files
Does not affect user applications Preserves application configuration settings Does not affect user files
What type of preventive physical access controls would provide a basic means for securing door access? (Select 3 answers) Motion detection Lighting Door lock CCTV Proximity card reader Smart card reader
Door lock proximity card reader smart card reader
The System Configuration utility in MS Windows can be launched by: (Select 3 answers) Typing msconfig.msc in the Command Prompt and pressing Enter Double-clicking on the System Configuration icon shortcut in the Administrative Tools folder Typing msconfig (or msconfig.exe) in the Command Prompt and pressing Enter Double-clicking on the System Configuration icon shortcut in Windows Control Panel folder Pressing simultaneously the Windows and R keys, typing msconfig (or msconfig.exe) in the Run window, and pressing Enter Double-clicking on the System Configuration icon shortcut in Windows Settings menu Typing sysconfig (or sysconfig.exe) in the Command Prompt and pressing Enter
Double-clicking on the System Configuration icon shortcut in the Administrative Tools folder Typing msconfig (or msconfig.exe) in the Command Prompt and pressing Enter Pressing simultaneously the Windows and R keys, typing msconfig (or msconfig.exe) in the Run window, and pressing Enter
Which of the following allows to create a backup copy of the entire contents of a disk drive (which may include a pre-configured OS installation) and replicate the drive to a new computer? Clean install In-place upgrade Repair installation Drive imaging
Drive imaging
Which of the following is an MS Windows diagnostic tool for detecting display, sound, and input related problems? DxDiag MSConfig SFC DirectX
DxDiag
Which of the following is an MS Windows component that enables encryption of individual files? EFS AES TPM SCP
EFS
Antistatic bags, antistatic wrist straps, and ground mats are all countermeasures used to protect computer and communications equipment components against: RFI ESD SVC EMI
ESD
In order to operate, an integrated component such as Network Interface Card (NIC) may need to be first: Updated with the latest driver Verified against the Hardware Compatibility List (HCL) Checked with a loopback plug Enabled in the advanced BIOS settings menu
Enabled in the advanced BIOS settings menu
What are the characteristics of TACACS+? (Select 3 answers) Encrypts only the password in the access-request packet Combines authentication and authorization Encrypts the entire payload of the access-request packet Primarily used for device administration Separates authentication and authorization Primarily used for network access
Encrypts the entire payload of the access-request packet Primarily used for device administration Separates authentication and authorization
Which of the following would be the best malware-prevention method/tool? An up-to-date antivirus application Software firewall An up-to-date anti-malware application End user education System restore from a known good backup
End user education
An antivirus software is kept up to date via: (Select 2 answers) Driver updates Application updates Engine updates OS updates Virus signature updates
Engine updates Virus signature updates
When a program installed in Windows stops responding or encounters an error, logs describing the error can be examined with the use of: Event Viewer Resource Monitor Task Manager System Information utility
Event Viewer
When a program installed in Windows stops responding or encounters an error, logs describing the error can be examined with the use of: Event Viewer System Information utility Resource Monitor System menu in Control Panel
Event Viewer
Reviewing System and Application logs on a Windows-based PC might provide useful information while troubleshooting security-related issues. System and Application logs in MS Windows can be found in: Task Manager (taskmgr.exe) Security and Maintenance (wscui.cpl) Event Viewer (eventvwr.msc) Performance Monitor (perfmon.exe)
Event Viewer (eventvwr.msc)
The practice of allowing a program through a firewall is described as creating a(n): Tunnel Static route Exception Event
Exception
What is the correct hierarchy of precedence for permissions settings in NTFS? Explicit Allow -> Inherited Allow -> Explicit Deny -> Inherited Deny Explicit Deny -> Explicit Allow -> Inherited Deny -> Inherited Allow Explicit Allow -> Explicit Deny -> Inherited Allow -> Inherited Deny Explicit Deny -> Inherited Deny -> Explicit Allow -> Inherited Allow
Explicit Deny -> Explicit Allow -> Inherited Deny -> Inherited Allow
The 4 GB maximum file size limit and 2 TB maximum volume size limit are the characteristic features of: NTFS FAT32 NFS exFAT
FAT32
If personal files, such as email, documents, or photos are lost or deleted, Windows System Restore can be used to recover such files. True False
False
In Microsoft Windows 7, the only two editions that include the BitLocker full drive encryption feature are Windows 7 Enterprise and Windows 7 Ultimate.
False
In NTFS, a folder or file copied from one location to another on the same volume retains its original permissions. True False
False
In NTFS, a folder or file moved from one location to another on the same volume inherits the permissions of its new parent folder. True False
False
In NTFS, permissions inherited from a parent object (e.g. a folder or user group) take precedence over permissions applied directly to an object (explicit permissions). True False
False
In Windows domain environment, the term "Home Folder" refers to a directory on a local PC where users can back up their data and files. True False
False
In a differential backup strategy, restoring data from backup requires only a working copy of the last full backup. True False
False
In the MBR partition style, each logical drive within the extended partition can be transformed into a bootable drive.
False
Local Users and Groups (lusrmgr.msc) is a Microsoft Management Console (MMC) snap-in included by default in all editions of MS Windows. It is used to create and manage users and groups that are stored locally on a computer. True False
False
Permission propagation occurs when a folder or file created inside another folder takes on (inherits) permissions applied to that folder (permissions applied to the so-called parent folder propagate down to its child objects, i.e. folders and files created inside the parent folder). True False
False
The "View by Category" option in Windows Control Panel allows for displaying entire contents of the Control Panel in a single window enabling quick access to each Control Panel applet. True False
False
The Local Security Policy (secpol.msc) administrative tool in home editions of MS Windows can be used by system administrators to modify account and local policies, public key policies and IP security policies for a local host. True False
False
The Security and Maintenance applet in Windows Control Panel provides access to Windows Firewall (Windows 7) / Windows Defender Firewall (Windows 8/8.1/10) configuration settings. True False
False
Windows Phone, iOS, and Android are all examples of closed-source operating systems. True False
False
Which of the following locations in Windows 8/8.1/10 allows to create a shortcut to a shared folder or computer on a network? Network and Sharing Center applet in Windows Control Panel File Explorer -> This PC -> Computer tab -> Map Network drive Windows Explorer -> Computer -> Map network drive Shared Folders menu in the Computer Management utility
File Explorer -> This PC -> Computer tab -> Map Network drive
Which of the following provides access to file/folder management settings in Windows 10? Folder Options applet in Windows Control Panel Administrative Tools in Windows Control Panel File Explorer Options applet in Windows Control Panel System Configuration applet in Windows Control Panel
File Explorer Options applet in Windows Control Panel
Which of the following adversely affect performance of a magnetic hard drive? (Select 3 answers) Disk striping File fragmentation Disk mirroring Excessive paging / disk thrashing Insufficient amount of RAM Disk duplexing
File fragmentation Excessive paging / disk thrashing Insufficient amount of RAM
Which of the following macOS utilities can be used for detecting and repairing disk-related problems? chkdsk Disk Utility Disk Management First Aid (in Disk Utility)
First Aid (in Disk Utility)
The /f switch of the chkdsk command-line utility in MS Windows: Locates bad sectors and recovers readable information Fixes errors on the disk Displays cleanup messages Displays the full path and name of every file on the disk
Fixes errors on the disk
Which of the following provides access to file/folder management settings in Windows 7? Folder Options applet in Windows Control Panel Administrative Tools in Windows Control Panel File Explorer Options applet in Windows Control Panel System Configuration applet in Windows Control Panel
Folder Options applet in Windows Control Panel
Which of the Windows Active Directory Group Policy settings allows network administrators to map a folder on a user's PC to a server-based location? Folder redirection Local Users and Groups User Account Control (UAC) Directory permissions
Folder redirection
In Windows Disk Management utility on a local computer, a dynamic disk that has been moved from another computer and found by the OS is labeled as: Offline Foreign Connected Online
Foreign
Which of the following tabs of the Windows Internet Properties applet provides an option for deleting temporary Internet files, cookies, web browsing history, Internet Explorer saved passwords, and saved data typed into web forms? General Privacy Advanced Security
General
Which of the tabs of the System Configuration utility in Windows contains the Diagnostic startup option? Tools General Services Startup Boot
General
Which tab of the MSConfig utility in Windows lists choices for startup configuration modes? Services Boot General Startup Tools
General
In Windows Active Directory environment, this feature enables centralized management and configuration of operating systems, applications, and user account settings. Local Users and Groups Resource Monitor Group Policy User Account Control (UAC)
Group policy
A type of proprietary file system used in Apple OSs is known as: DFS EFS HFS NFS
HFS
What kind of general term is used to describe the process of securing a computer system? Patching Baselining Hardening Auditing
Hardening
Which of the following firewall types would provide the best protection for an ingress/egress point of a corporate network? (Select 2 answers) Hardware firewall Network-based firewall Software firewall Host-based firewall
Hardware firewall Network-based firewall
Which of the following answers refers to the contents of a rainbow table entry? Hash/Password IP address/Domain name Username/Password Account name/Hash
Hash/Password
In MS Windows, the "$" sign appended to the end of the name of a network share indicates that the shared folder or drive is: Hidden Inaccessible Visible to any user Encrypted
Hidden
Which of the following is a common firewall type used for protecting a single computer? (Select 2 answers) Host-based firewall Software firewall Network-based firewall Hardware firewall
Host-based firewall Software firewall
A security technician was asked to configure a firewall so that the protected system would not send echo reply packets. What type of traffic should be blocked on the firewall to accomplish this task? SMTP ICMP HTTP SNMP
ICMP
What is the name of a network layer protocol that specifies the format of packets and addressing scheme in network communications? UDP IP TCP NetBIOS
IP
Which of the following answers list(s) data required for manual configuration of network adapter settings in MS Windows? (Select all that apply) IP address Subnet mask Default gateway MAC address DNS server address SSID (a.k.a. network name)
IP address Subnet mask Default gateway DNS server address
Examples of secure network protocols used for establishing VPN connections include: (Select 2 answers) IPP WEP IPsec HTTP TLS
IPSec TLS(Transport Layer Security)
According to the CompTIA's best practice procedures for malware removal, putting a malware-infected Windows-based system into a quarantine should be the next step after: Creating a restore point Identifying and researching malware symptoms Disabling System Restore Updating the anti-malware software
Identifying and researching malware symptoms
Which of the following terms is used a synonym for the bare-metal backup concept? Differential backup Image-level backup File-level backup Incremental backup
Image-level backup
Which social engineering attack relies on identity theft? Tailgating Dumpster diving Impersonation Watering hole attack
Impersonation
What is the function of archive bit? Search indexing Indicating whether a file has been modified since the last backup Setting file attribute to read-only Creating an additional copy of a file
Indicating whether a file has been modified since the last backup
In forensic analysis, taking hashes ensures that the collected digital evidence retains: Confidentiality Integrity Non-repudiation Availability
Integrity
Which of the following locations in Windows provide access to dial-up and VPN settings? (Select 3 answers) Phone and Modem System Configuration Internet Options (Connections tab) Network and Sharing Center Windows Mobility Center Settings menu
Internet Options (Connections tab) Network and Sharing Center Settings menu
Which of the following locations in MS Windows provide(s) access to the Internet Properties (inetcpl.cpl) system utility? (Select all that apply) Internet Options applet in Windows Control Panel Network and Sharing Center applet in Windows Control Panel Ease of Access applet in Windows Control Panel Internet Options menu item in Microsoft Edge Tools menu Windows Run dialog box (after typing in inetcpl.cpl and pressing Enter) Internet Options menu item in Internet Explorer's Tools menu
Internet Options applet in Windows Control Panel Network and Sharing Center applet in Windows Control Panel Windows Run dialog box (after typing in inetcpl.cpl and pressing Enter) Internet Options menu item in Internet Explorer's Tools menu
Which of the following utilities in Windows provides access to configuration options of a built-in pop-up blocker? Internet Explorer (iexplore.exe) System Configuration (msconfig.exe) Internet Properties (inetcpl.cpl) Security and Maintenance (wscui.cpl)
Internet Properties (inetcpl.cpl)
Assigning static IP addresses on a SOHO network provides better administrative control over hosts and devices residing on the inside of the network. True False
True
Which of the following settings are used for establishing a VPN connection in Windows? (Select 3 answers) Network name Internet address (domain name or IPv4/IPv6 address) Security type Destination name Encryption type Smart card (optional)
Internet address (domain name or IPv4/IPv6 address) Destination Name Smart card (optional)
According to the CompTIA's best practice procedures for malware removal, disabling System Restore on a malware-infected Windows-based system should be performed as the next step after: Isolating the infected system Removing malware from the infected system Identifying and researching malware symptoms Scheduling scans and running updates
Isolating the infected system
Which of the following enables installation of software that is not available through the official Apple App Store? Carrier unlocking Sideloading Rooting Jailbreaking
Jailbreaking
Which of the following terms refers to removing software restrictions imposed by Apple on its iOS operating system? Sideloading Carrier unlocking Rooting Jailbreaking
Jailbreaking
Which of the following is an example of spyware? Keylogger Vulnerability scanner Computer worm Packet sniffer
Keylogger
ext3 and ext4 are examples of default file systems used by: OS X macOS Windows Server Linux distributions
Linux distributions
Which of the following Microsoft Windows components allow system administrators to enable/disable user accounts? (Select 2 answers) User Accounts in the Administrative Tools folder Local Users and Groups in Control Panel User Account Control (UAC) Local Users and Groups in Computer Management User Accounts in Control Panel
Local Users and Groups in Computer Management User Accounts in Control Panel
The /r switch of the chkdsk command-line utility in Windows: (Select 2 answers) Displays cleanup messages Locates bad sectors and recovers readable information Uses more system resource to perform a scan as fast as possible Displays the full path and name of every file on the disk Fixes errors on the disk
Locates bad sectors and recovers readable information Fixes errors on the disk
Which of the following statements apply to Windows domains? (Select 3 answers) Logging on to any computer on a Windows domain requires a single set of credentials Security policies and permissions on a Windows domain are administered centrally Windows domains are based on Peer-to-Peer (P2P) networking architecture Each computer on a Windows domain has its own security policy Windows domains are based on client-server networking architecture All members of a Windows domain must be on the same local network or subnet
Logging on to any computer on a Windows domain requires a single set of credentials Security policies and permissions on a Windows domain are administered centrally Windows domains are based on client-server networking architecture
Which of the following solutions will allow a server with a private IP address to handle requests from an outside (public) network? Port bonding Port labeling Port forwarding Port mirroring
Port forwarding
Which of the following statements apply to Windows domains? (Select 3 answers) Logging on to any computer on the Windows domain requires a single set of credentials Security policies and permissions on the Windows domain are administered centrally Windows domains are based on the Peer-to-Peer networking architecture Each computer on the Windows domain has its own security policy Windows domains are based on the Client-Server networking architecture All members of the Windows domain must be on the same local network or subnet
Logging on to any computer on the Windows domain requires a single set of credentials Security policies and permissions on the Windows domain are administered centrally Windows domains are based on the Client-Server networking architecture
Which of the following are examples of partition types? Extended Basic Logical Dynamic Primary
Logical Primary Extended
On a Windows domain, this tool can be used by system administrators to configure initial desktop environment (which may include mapping a network drive or setting up access to a shared printer) for a specific user. MDM policy Login script Group Policy Directory permissions
Login script
What is the name of a logical security access control method in which a 48-bit physical address assigned to each Network Interface Card (NIC) is used to determine access to the network? MAC address filtering Network Address Translation (NAT) Static IP addressing Network Access Control (NAC)
MAC address filtering
What is the name of a network security access control method in which a 48-bit physical address assigned to each network card is used to determine access to the network? MAC filtering Network Address Translation (NAT) Static IP addressing Network Access Control (NAC)
MAC filtering
Which of the following are examples of partition styles? ext3 MBR ext4 GPT NTFS
MBR GPT
Symetric algorithms
MD5, SHA-1, and SHA-2
Which of the following facilitates the enforcement of mobile device policies and procedures? MFA MMC MDM MFD
MDM
Which type of software enables a centralized administration of mobile devices? MFA MMC MDM MFD
MDM (mobile device management)
A type of customizable framework providing access to a collection of system tools designed to manage networks, computers, services, and other system components in Windows is known as: Control Panel PowerShell MMC Administrative Tools
MMC
Which of the following answers refers to the MS Windows client application for Remote Desktop Services (RDS)? GoToMyPC RDP TeamViewer MSTSC
MSTSC
Disabling SSID broadcast: Is one of the measures used in the process of securing wireless networks Makes a WLAN harder to discover Blocks access to a WAP Prevents wireless clients from accessing the network
Makes a WLAN harder to discover
Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as: Adware Malware Ransomware Spyware
Malware
Which of the following password policy settings prevents attackers using cracked passwords from gaining permanent access to a Windows workstation? Login time restrictions Password complexity setting Account lockout threshold setting Maximum password age setting
Maximum password age setting
Which of the answers listed below refers to an example order of volatility for a typical computer system? Memory dump, disk files, temporary files, archival media Archival media, disk files, temporary files, memory dump Memory dump, temporary files, disk files, archival media Temporary files, memory dump, archival media, disk files
Memory dump, temporary files, disk files, archival media
A macOS system feature providing single-screen thumbnail preview of all open windows and applications is known as: Spotlight Mission Control Screen Sharing Desktop Window Manager
Mission Control
What are the advantages of organizing hard drive space into multiple partitions? Multiboot environment Separated disk space used for virtual memory Preventative measure against hard drive failures Separation of user files from the operating system and application files Increased overall disk storage space available for user data
Multiboot environment Separated disk space used for virtual memory Multiboot environment Separated disk space used for virtual memory
Which of the following statements are true? (Select 2 answers) NTFS permissions apply only to local users NTFS permissions can be applied only on a folder level NTFS permissions apply to both network and local users NTFS permissions can be applied to a folder or individual file
NTFS permissions apply to both network and local users NTFS permissions can be applied to a folder or individual file
Which of the following enable installation of an OS via network interface? GPT diskpart Netboot PXE gpupdate
Netboot PXE
Which of the Control Panel applets in Windows 8/8.1/10 can be used for checking basic information about the network connection status and setting up network connections? Networking Phone and Modem Internet Options Network and Sharing Center
Network and Sharing Center
What type of configuration info is used for setting up a wireless connection in Windows? (Select all that apply) Network name Smart card (optional) Encryption type Destination name Security type Internet address (domain name or IPv4/IPv6 address) Security key
Network name Encryption type Security type Security key
Which of the following would be the most important considerations when installing computer applications? (Select 3 answers) OS compatibility Minimum amount of drive space CPU speed Graphics adapter Minimum amount of RAM
OS compatibility Minimum amount of drive space Minimum amount of RAM
Which of the following disk status options in Windows Disk Management utility indicates that a dynamic disk might be corrupted or intermittently unavailable? Foreign Unallocated Offline Disconnected
Offline
Which of the following answers refer to a very basic UPS type commonly used for protecting a single PC? (Select 2 answers) Offline Standby Line-interactive Online Double-conversion
Offline Standby
What is the correct sequence of steps required to close a non-responsive user application in Task Manager in Windows 7? On the Processes tab, right-click the program that isn't responding, click End Task button On the Applications tab, right-click the program that isn't responding, click End Task button On the Performance tab, right-click the program that isn't responding, click End Task button On the App history tab, right-click the program that isn't responding, click End Task button
On the Applications tab, right-click the program that isn't responding, click End Task button
Which of the following answers describes the correct sequence of steps required to close a non-responsive user application or process in Task Manager in Windows 8/8.1/10? On the App history tab, right-click the program/process that isn't responding, click End Task button On the Performance tab, right-click the program/process that isn't responding, click End Task button On the Processes tab, right-click the program/process that isn't responding, click End Task button On the Applications tab, right-click the program/process that isn't responding, click End Task button
On the Processes tab, right-click the program/process that isn't responding, click End Task button
In Windows Disk Management utility, a normal disk status indicating that the disk is ready for read/write operations is labeled as: Accessible Online Ready Initialized
Online
Which type of UPS provides the best power outage protection? (Select 2 answers) Online Double-conversion Standby Line-interactive Offline
Online Double-conversion
Which of the following disk status options in Windows Disk Management utility indicates Input/Output (I/O) errors on a dynamic disk/volume? (Select 2 answers) Failed Unreadable Online (Errors) Unknown Healthy (At Risk)
Online (errors) Healthy (at risk)
If a network adapter's "Speed & Duplex" property is set to Half Duplex, communication on the network will be taking place: Only in one direction at a time In both directions at half the speed In one direction at half the speed In both directions simultaneously
Only in one direction at a time
What is the name of a router configuration feature that allows to open an inbound port based on the outbound requests made by hosts placed inside a private network? Port triggering Port bonding Port forwarding Port mirroring
Port Triggering
Which of the following allows to hide extensions for known file types in Windows 8/8.1/10? Open the File Explorer Options applet in Windows Control Panel, then select Hide extensions for known file types on the General tab Open the Folder Options applet in Windows Control Panel, then select Hide extensions for known file types in the Advanced settings on the View tab Open the File Explorer Options applet in Windows Control Panel, then select Hide extensions for known file types in the Advanced settings on the View tab Open the Folder Options applet in Windows Control Panel, then select Hide extensions for known file types on the General tab
Open the File Explorer Options applet in Windows Control Panel, then select Hide extensions for known file types in the Advanced settings on the View tab
Which of the following allows to view hidden files, folders, and drives in Windows 8/8.1/10? Open the Folder Options applet in Windows Control Panel, then select Show hidden files, folders, and drives on the General tab Open the File Explorer Options applet in Windows Control Panel, then select Show hidden files, folders, and drives in the Advanced settings on the View tab Open the Folder Options applet in Windows Control Panel, then select Show hidden files, folders, and drives in the Advanced settings on the View tab Open the File Explorer Options applet in Windows Control Panel, then select Show hidden files, folders, and drives on the General tab
Open the File Explorer Options applet in Windows Control Panel, then select Show hidden files, folders, and drives in the Advanced settings on the View tab
Which of the following allows to hide extensions for known file types in Windows 7? Open the File Explorer Options applet in Windows Control Panel, then select Hide extensions for known file types on the General tab Open the Folder Options applet in Windows Control Panel, then select Hide extensions for known file types in the Advanced settings on the View tab Open the File Explorer Options applet in Windows Control Panel, then select Hide extensions for known file types in the Advanced settings on the View tab Open the Folder Options applet in Windows Control Panel, then select Hide extensions for known file types on the General tab
Open the Folder Options applet in Windows Control Panel, then select Hide extensions for known file types in the Advanced settings on the View tab
Which of the following allows to view hidden files, folders, and drives in Windows 7? Open the File Explorer Options applet in Windows Control Panel, then select Show hidden files, folders, and drives on the General tab Open the Folder Options applet in Windows Control Panel, then select Show hidden files, folders, and drives in the Advanced settings on the View tab Open the File Explorer Options applet in Windows Control Panel, then select Show hidden files, folders, and drives in the Advanced settings on the View tab Open the Folder Options applet in Windows Control Panel, then select Show hidden files, folders, and drives on the General tab
Open the Folder Options applet in Windows Control Panel, then select Show hidden files, folders, and drives in the Advanced settings on the View tab
In forensic procedures, a sequence of steps in which different types of evidence should be collected is known as: Order of volatility Layered security Chain of custody Transitive access
Order of volatility
Which of the following answers describe the available options of the Master Boot Record (MBR) partition style? Overall number of partitions limited to four Up to three primary partitions and one extended partition Multiple logical drives within each primary partition One primary partition and multiple extended partitions (up to three) Only one logical drive within extended partition Up to four primary partitions
Overall number of partitions limited to four Up to three primary partitions and one extended partition Up to four primary partitions
Which of the following answers refers to a hierarchical system for the creation, management, storage, distribution, and revocation of digital certificates? Web of trust PKI IaaS CA
PKI
Which of the Windows Task Manager tabs in Windows 8/8.1/10 includes the information about the network resources usage listed under Networking tab in previous releases of the Microsoft OS? Applications Processes Performance Services
Performance
Which of the following tools in MS Windows is used to examine (both in real time and by collecting log data for later analysis) how programs that are run affect a computer's performance? Task Manager (taskmgr.exe) Performance Monitor (perfmon.exe) System Properties (sysdm.cpl) Computer Management (compmgmt.msc) Event Viewer (eventvwr.msc)
Performance Monitor (perfmon.exe)
Which of the following tools in Windows provide access to real-time performance data on CPU, RAM, hard drive, and network interface utilization? (Select 3 answers) Performance Monitor (perfmon.exe) Device Manager (devmgmt.msc) Resource Monitor (resmon.exe) System Properties (sysdm.cpl) Task Manager (taskmgr.exe)
Performance Monitor (perfmon.exe) Resource Monitor (resmon.exe) Task Manager (taskmgr.exe)
Which of the following answers describe the features of Windows Remote Desktop tool? (Select 3 answers) Permanent remote access The host and invited user share control over host's mouse and keyboard Access based on local password (local user account password) Windows tool used for connecting remotely to the user's own computer The host and invited user can both see the host's screen Windows tool used for assisted remote troubleshooting Access based on one-time password Temporal remote access
Permanent remote access Access based on local password (local user account password) Windows tool used for connecting remotely to the user's own computer
Which user group in Windows (applies to Windows 7 and earlier versions) had rights and permissions that allowed its members to perform specific administrator-level tasks? Domain Guests Power Users Domain Users Protected Users
Power Users
Which WAP configuration setting allows for adjusting the boundary range of a wireless signal? AP WPS configuration Power level controls Maximum Transmission Unit (MTU) Quality of Service (QoS)
Power level controls
In Windows Disk Management utility, a dynamic disk status set to Offline/Missing indicates that the missing disk may be: (Select 3 answers) Powered down Unallocated Corrupted Not initialized Disconnected
Powered down Corrupted Disconnected
In Windows Disk Management utility, initializing a disk: (Select 2 answers) Keeps data stored on disk intact Converts a basic disk to dynamic disk Prepares a newly added disk for use by Windows Changes a dynamic disk back to a basic disk Erases data on disk
Prepares a newly added disk for use by Windows Erases data on disk
What are the characteristic features of RADIUS? (Select 3 answers) Primarily used for network access Encrypts the entire payload of the access-request packet Combines authentication and authorization Encrypts only the password in the access-request packet Primarily used for device administration Separates authentication and authorization
Primarily used for network access Combines authentication and authorization Encrypts only the password in the access-request packet
Which of the following allow for administering print devices in Microsoft Windows? (Select 3 answers) Printers applet in Control Panel in Windows OSs prior to Windows 7 Print Management utility shipped by default with all editions of MS Windows Devices and Printers applet in Control Panel in Windows 7 and newer Microsoft OSs Printers applet in Windows 7 and newer Microsoft OSs Devices and Printers applet in Control Panel in Windows OSs prior to Windows 7 Print Management utility in the Administrative Tools folder (not available in home editions of MS Windows)
Printers applet in Control Panel in Windows OSs prior to Windows 7 Devices and Printers applet in Control Panel in Windows 7 and newer Microsoft OSs Print Management utility in the Administrative Tools folder (not available in home editions of MS Windows)
A Windows Internet Properties applet tab containing an option for managing pop-up windows displayed by websites is called: Security Programs Privacy General
Privacy
What is the name of a Windows Internet Properties applet tab providing access to advanced cookie management options? Programs Privacy Connections Security
Privacy
Which Microsoft Windows 10 editions include the BranchCache feature? Home Pro Pro Education Education Enterprise
Pro Education
A Windows Internet Properties system utility tab containing an option for managing Internet Explorer web browser add-ons is called: Privacy General Security Programs
Programs
Which of the following Control Panel applets in Windows provides options to uninstall, change, or repair applications? Programs and Features System Configuration Troubleshooting Security and Maintenance
Programs and Features
Telnet: (Select 3 answers) Encrypts network connection Provides username & password authentication Transmits data in an unencrypted form Does not provide authentication Enables remote login and command execution
Provides username & password authentication Transmits data in an unencrypted form Enables remote login and command execution
In computer networking, a computer system or an application that acts as an intermediary between another computer and the Internet is commonly referred to as: Bridge Active hub Server Proxy
Proxy
A Windows network profile that hides a computer from other devices on the network and makes it unavailable for file and printer sharing is known as: Home Private Work Public
Public
Which network profile in Windows by default disables the network discovery feature? Home Private Work Public
Public
Which of the Windows network profiles imposes the strongest security settings? Home Private Work Public
Public
Which of the following solutions is used for controlling network resources and assigning priority to different types of traffic? Measured service Acceptable Use Policy (AUP) Fair access policy Quality of Service (QoS)
Quality of Service (QoS)
Which format type in MS Windows does not erase disk data? Standard format Low-level-format High-level format Quick format
Quick format
Which formatting type(s) would typically be performed by a user to reinstall an OS? (Select all that apply) Quick format Low-level-format Standard format High-level formatQuick format
Quick format Standard format High-level formatQuick format
Hashing algorithms
RSA, DSA, ECC, and Diffie-Hellman
Which of the following terms refers to an example of crypto-malware? Backdoor Ransomware Keylogger Rootkit
Ransomware
The share permissions on a shared Windows folder grant the user Read access and the local NTFS permissions grant the user Modify access. Which of the following are the effective user permission levels? (Select 2 answers) Read when accessing the share remotely Modify when accessing the folder locally Read when accessing the folder locally Modify when accessing the share remotely
Read when accessing the share remotely Modify when accessing the folder locally
The share permissions on a shared Windows folder grant the user Full Control access and the local NTFS permissions grant the user Read access. Which of the following are the effective user permission levels? (Select 2 answers) Read when accessing the share remotely Full control when accessing the folder locally Read when accessing the folder locally Full Control when accessing the share remotely
Read when accessing the share remotely Read when accessing the folder locally
Which of the following answers refers to a common solution for troubleshooting user login problems on a Windows domain? Applying system updates Rebuilding Windows profiles Safe mode troubleshooting Disabling startup applications Updating network settings
Rebuilding Windows profiles
Which of the following enables troubleshooting a malware-infected system that doesn't boot up? Anti-malware application Recovery console AV software Backup/restore options
Recovery console
Which of the macOS features enables access to optical drive of another computer over a network? Remote Disk Dock Boot Camp Remote Disc
Remote Disc
Which of the following provides access to Remote Assistance and Remote Desktop configuration settings in Windows? Security and Maintenance applet in Windows Control Panel Advanced tab of the System Properties (sysdm.cpl) utility Remote settings in the System applet in Windows Control Panel Network and Sharing applet in Windows Control Panel
Remote settings in the System applet in Windows Control Panel
According to the CompTIA's best practice procedures for malware removal, scheduling scans and running updates on a Windows-based system should be performed as the next step after: Enabling System Restore Isolating the infected system Removing malware from the system Creating a restore point
Removing malware from the system
The System Protection tab of the System Properties (sysdm.cpl) utility in Windows provides options for managing: Memory usage Restore points User accounts Network security
Restore Points
Which of the following enables decreasing partition size in Windows Disk Management utility? Right-click on a disk and select the Shrink Volume menu option Right-click on a disk and set the disk space limits on the Quota tab in the Properties menu Select a disk, then choose Shrink Volume from the Disk Management Action menu Right-click on a disk and select Shrink Volume on the Tools tab in the Properties menu
Right-click on a disk and select the Shrink Volume menu option
Which of the following actions in Windows allow to invoke the User Account Security (UAC) access control feature and run an application with administrator account permissions? (Select 3 answers) Right-click on an application icon -> select Run as administrator from the pop-up menu Launch Windows Run dialog box (Windows logo key + R) -> type in the application's name -> press Enter In Windows Start menu press and hold Control + Shift keys -> Left-click on an application icon Launch Windows Run dialog box (Windows logo key + R) -> type in the application's name -> press Control + Shift + Enter In Windows Start menu press and hold Alt + Shift keys -> Left-click on an application icon
Right-click on an application icon -> select Run as administrator from the pop-up menu In Windows Start menu press and hold Control + Shift keys -> Left-click on an application icon Launch Windows Run dialog box (Windows logo key + R) -> type in the application's name -> press Control + Shift + Enter
A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network is known as: Rootkit Spyware Backdoor Trojan
Rootkit
The sfc command-line utility in MS Windows: Encrypts files and folders Scans the integrity of all protected system files and replaces incorrect versions with correct Microsoft versions Displays information about system hardware and software configuration Checks a disk and displays a status report
Scans the integrity of all protected system files and replaces incorrect versions with correct Microsoft versions
According to the CompTIA's best practice procedures for malware removal, enabling System Restore and creating a restore point in Windows should be performed as the next step after: Removing malware from the system Scheduling scans and running updates Identifying and researching malware symptoms Isolating the infected system
Scheduling scans and running updates
Which of the following built-in macOS tools enables remote access to another Mac computer? Screen Sharing Remote Desktop Protocol (RDP) GoToMyPC Remote Assistance
Screen Sharing
The System Configuration utility tab containing a list of background applications that can be enabled/disabled during system startup is called: Boot Applications Services General Tools
Services
An MS Windows Administrative Tools folder applet for managing background applications is called: Services (services.msc) Resource Monitor (resmon.exe) System Configuration (msconfig.exe) Component Services (dcomcnfg.exe)
Services (services.msc)
Which of the following Windows utilities provides access to print spooler settings? Services (services.msc) Device Manager (devmgmt.msc) Computer Management (compmgmt.msc) Programs and Features (appwiz.cpl)
Services (services.msc)
Which of the following locations in Windows provides an interface for managing background applications? Programs and Features (appwiz.cpl) Services (services.msc) Computer Management (compmgmt.msc) Device Manager (devmgmt.msc)
Services (services.msc)
Which MS Windows utilities provide an interface for managing applications/services that might affect the system by slowing down the boot process? (Select 2 answers) Services (services.msc) Task Manager (taskmgr.exe) System Properties (sysdm.cpl) Performance Monitor (perfmon.exe) System Information (msinfo32.exe)
Services (services.msc) Task Manager (taskmgr.exe)
Which of the following locations provides access to brightness configuration options on an iOS device? Settings -> Display -> Brightness level Settings -> Battery -> Display -> Brightness level Settings -> Display & Brightness Settings -> Battery & performance -> Display -> Brightness level
Settings -> Display & Brightness
Which of the following locations allows to configure display brightness levels on an Android device? Settings -> Display & Brightness Settings -> Battery & performance -> Display -> Brightness level Settings -> Display -> Brightness level Settings -> Battery -> Display -> Brightness level
Settings -> Display -> Brightness level
Windows power plans manage how the computer is using power. The Balanced (recommended) power plan (used by default in certain Windows versions) scales the CPU performance based on its current utilization, which might have a degrading effect on system performance. If the system is running slow, one of the troubleshooting methods is to enable the High performance power plan or customize the current plan settings. In Windows, the power configuration settings can be found in: (Select 2 answers) Settings menu (Windows 8/8.1/10) Power Options applet in Windows Control Panel System Configuration (msconfig.exe) utility Administrative Tools folder Security and Maintenance applet in Windows Control Panel
Settings menu (Windows 8/8.1/10) Power Options applet in Windows Control Panel
A type of user interface that enables the execution of operating system commands is commonly referred to as: GUI Shell CLI Terminal
Shell
Which of the following enables partition split in Windows Disk Management utility? Right-click on a disk and set the disk space limits on the Quota tab in the Properties menu Shrink a volume, then create a new simple volume from the adjacent unallocated space Right-click on a disk and select the Split Volume menu option Select a disk, then choose Split Volume from the Disk Management Action menu
Shrink a volume, then create a new simple volume from the adjacent unallocated space
Allowing "Unknown Sources" in Android security settings enables: Rooting Malware propagation Sideloading Jailbreaking
Sideloading
The practice of installing mobile apps from untrusted sources (i.e. websites and app stores other than the official marketplaces) is called: Jailbreaking Rooting Sideloading Carrier unlocking
Sideloading
An antivirus database entry used for identifying malicious code is known as virus: ID Record Signature Repository
Signature
Which of the volume types available in Windows Disk Management utility do not offer fault tolerance? (Select 3 answers) Simple volume Spanned volume Striped volume Mirrored volume Striped with parity volume
Simple volume Spanned volume Striped volume
A power management mode in Windows that draws small amount of power, saves the system state in RAM, and allows for quick resuming of full-power operation with the use of a power button or on command is known as: (Select 2 answers) Power saver Sleep/suspend High performance Standby Hibernation
Sleep/suspend Standby
Which of the following answers refers to an example implementation of certificate-based authentication? Smart card ID badge PIN code Biometric lock
Smart card
Which of the following macOS features allows to create switchable desktop environments? Spaces Personalization Display Aero
Spaces
Phishing scams targeting a specific group of people are referred to as: Vishing Spear phishing Spoofing Whaling
Spear phishing
Which of the following is a macOS system search utility? Explorer File explorer Spotlight Finder
Spotlight
Malicious software collecting information about users without their knowledge/consent is known as: Crypto-malware Adware Ransomware Spyware
Spyware
Which formatting type in Windows 7/8/8.1/10 prevents data recovery by overwriting the contents of hard drive sectors? Low-level format Standard format High-level format Quick format
Standard format
What are the upgrade options for switching from Windows 7 to Windows 10 Enterprise edition? Windows 7 Starter Windows 7 Home Basic Windows 7 Home Premium Windows 7 Professional Windows 7 Enterprise Windows 7 Ultimate
Starter: Install Home Basic: Install Home Premium: Install Pro: Upgrade Enterprise: Install Ultimate: Upgrade
Switching from Windows 7 to Windows 10 Home edition can be performed either via an upgrade or clean installation. Match each Windows 7 edition on the left with the correct upgrade option from the corresponding drop-down list. Windows 7 Starter Windows 7 Home Basic Windows 7 Home Premium Windows 7 Professional Windows 7 Enterprise Windows 7 Ultimate
Starter: Upgrade Home Basic: Upgrade Home Premium: Upgrade Pro: Install Enterprise: Install Ultimate: Install
Which of the following are the upgrade options for switching from Windows 7 to Windows 10 Pro edition? (Match each Windows 7 edition on the left with the correct upgrade option from the corresponding drop-down list) Windows 7 Starter Windows 7 Home Basic Windows 7 Home Premium Windows 7 Professional Windows 7 Enterprise Windows 7 Ultimate
Starter: Upgrade Home Basic: Upgrade Home Premium: Upgrade Pro: Upgrade Enterprise: Upgrade Ultimate: Install
The Task Manager utility in Windows 8/8.1/10 contains a tab previously included as part of the System Configuration (MSConfig) utility. The tab allows system administrators to control user applications that should be enabled/disabled during system boot. This tab is called: Boot Startup App history Details
Startup
Which of the following locations in Windows 7 allows to enable/disable startup applications? Startup tab of the Task Manager (taskmgr.msc) utility Windows Settings (Settings -> Apps -> Startup) Startup tab of the System Configuration (msconfig.exe) utility Programs and Features (appwiz.cpl) applet in Windows Control Panel Startup tab of the System Properties (sysdm.cpl) utility
Startup tab of the System Configuration (msconfig.exe) utility
Windows 8 introduces a virtualization technology that enables organization of multiple physical disks into logical volumes in a fashion similar to RAID levels. What is the name of the Control Panel applet providing access to this functionality? Disk Management Storage Spaces Administrative Tools Sync Center
Storage Spaces
Which of the following tools enable creation of disk arrays in Windows? (Select 2 answers) Device Manager Programs and Features Storage Spaces Disk Management Backup and Restore
Storage Spaces Disk Management
Which volume type in Windows Disk Management utility uses RAID 0 setup for performance gains? Simple volume Spanned volume Striped volume Mirrored volume Striped with parity volume
Striped Volume
Which volume type in Windows Disk Management utility uses RAID 5 setup for performance gains and fault tolerance? Simple volume Spanned volume Striped volume Mirrored volume Striped with parity volume
Striped with parity volume
Which of the following allows to determine which network segment an IP address belongs to? Physical address Dynamic Host Configuration Protocol (DHCP) Address Resolution Protocol (ARP) Subnet mask
Subnet Mask
What are the characteristic features of a WPA/WPA2 Enterprise mode? (Select 2 answers) Suitable for large corporate networks Does not require an authentication server Suitable for all types of wireless LANs Requires RADIUS authentication server
Suitable for large corporate networks Requires RADIUS authentication server
A hidden file (or files) on the hard disk that Windows uses to hold parts of programs and data files that cannot be stored in RAM due to the insufficient memory space is called: (Select 3 answers) Swap file Paging file Signature file Virtual memory Archive file
Swap file Paging file Virtual memory
A Windows Control Panel applet used for managing local (offline) versions of files and folders stored on the network is known as: Ease of Access Center Sync Center Indexing Options File Explorer Options
Sync Center
Which Control Panel applet in Windows can be used to check the OS version and basic hardware statistics such as the CPU type and amount of installed RAM? Resource Monitor System Computer Management System Configuration
System
Which Control Panel applet in Windows provides access to computer name, domain, and workgroup settings? Credential Manager System User Accounts Administrative Tools
System
Which Microsoft Windows tool can be used by system administrators to find and isolate problems that might prevent the OS from starting correctly? Task Manager (taskmgr.exe) System Information (msinfo32.exe) Computer Management (compmgmt.msc) System Configuration (msconfig.exe)
System Configuration (msconfig.exe)
Which of the following is a Windows system utility that allows to roll back system files and settings to an earlier point in time? Sync Center Windows Backup System Restore Ease of Access Center
System Restore
Which of the following provide access to virtual memory (a.k.a. paging file) configuration options in Windows? (Select 2 answers) System applet in Control Panel -> System Protection tab -> Virtual memory Administrative Tools folder in Windows Control Panel -> Windows Memory Diagnostics Windows Run dialog box -> type in sysdm.cpl + press Enter -> System Protection tab -> Virtual memory System applet in Control Panel -> Advanced system settings -> Performance -> Settings -> Advanced -> Virtual memory Windows Run dialog box -> type in sysdm.cpl + press Enter -> Advanced tab -> Performance -> Settings -> Advanced -> Virtual memory
System applet in Control Panel -> Advanced system settings -> Performance -> Settings -> Advanced -> Virtual memory Windows Run dialog box -> type in sysdm.cpl + press Enter -> Advanced tab -> Performance -> Settings -> Advanced -> Virtual memory
What is the correct sequence of steps for enabling automatic virtual memory management in MS Windows? (Select 2 answers) System applet in Control Panel -> System Protection tab -> Virtual memory -> Change... -> enable Automatically manage paging file size for each drive Administrative Tools folder in Windows Control Panel -> Windows Memory Diagnostics -> Change... -> enable Automatically manage paging file size for each drive Windows Run dialog box -> type in sysdm.cpl + press Enter -> System Protection tab -> Virtual memory -> Change... -> enable Automatically manage paging file size for each drive System applet in Control Panel -> Advanced system settings -> Performance -> Settings -> Advanced -> Virtual memory -> Change... -> enable Automatically manage paging file size for each drive Windows Run dialog box -> type in sysdm.cpl + press Enter -> Advanced tab -> Performance -> Settings -> Advanced -> Virtual memory -> Change... -> enable Automatically manage paging file size for each drive
System applet in Control Panel -> Advanced system settings -> Performance -> Settings -> Advanced -> Virtual memory -> Change... -> enable Automatically manage paging file size for each drive Windows Run dialog box -> type in sysdm.cpl + press Enter -> Advanced tab -> Performance -> Settings -> Advanced -> Virtual memory -> Change... -> enable Automatically manage paging file size for each drive
Which of the following would be the easiest step to troubleshoot the Blue Screen of Death (BSoD) in MS Windows? System restart Recovery Console Safe Mode troubleshooting Driver rollback
System restart
A network technician wishes to use an RDP client on their Windows OS to remotely troubleshoot a problem on another Windows machine. Which of the following ports needs to be opened for the built-in Windows RDP server to allow this type of network connection? TCP port 1720 TCP port 636 TCP port 3389 TCP port 445
TCP port 3389
A security protocol designed to strengthen WEP implementations is known as: PEAP TKIP CCMP WPA2
TKIP
In Windows 8 and newer releases of the Microsoft OS, contents of the MSConfig's Startup tab can be viewed and managed via: Task Manager Performance Monitor Programs and Features applet Device Manager
Task Manager
Which of the following system utilities provides access to different command-line shells in macOS? cmd.exe PowerShell command.com Terminal
Terminal
Which of the following enable a newly added disk to show up in Windows File Explorer? (Select 3 answers) The disk needs to be initialized The disk needs to be converted to a dynamic volume The disk requires a drive letter The disk needs to be converted to a dynamic disk The disk can be mounted as a folder
The disk needs to be initialized The disk requires a drive letter The disk can be mounted as a folder
Auto negotiation is an Ethernet procedure that allows two connected devices to exchange information about their capabilities (such as supported speed and duplex modes) and automatically configure connection parameters based on the highest performance settings supported by both devices. True False
True
A Windows resource with conflicting NTFS and share permissions applied to it will assume: The least restrictive permission NTFS permissions The most restrictive permission Share permissions
The most restrictive permission
The System Configuration tab in MS Windows providing access to MMC snap-ins is called: Services Tools Applications Programs
Tools
A type of critical file that a computer system depends on to operate properly is known as a system file. In Microsoft Windows, system files are hidden by default; they might also have Read-only attribute turned on to prevent accidental changes to the file contents. Windows system files can be permanently displayed in Windows Explorer (Windows 7), or File Explorer (Windows 8/8.1/10) after modifying file and folder settings in the Folder Options applet in Windows 7 Control Panel, or File Explorer Options applet in Windows 8/8.1/10 Control Panel. True False
True
According to the CompTIA's best practice procedures for malware removal, user education should be the final step of the malware removal process. True False
True
Common methods of application installation and deployment include removable media (e.g. CD/USB) used locally in home networks and remote installation methods over a network popular in enterprise environments. True False
True
Event Viewer (eventvwr.msc) is a Windows utility for monitoring system health and troubleshooting problems with applications, operating system, and hardware. Event Viewer allows for browsing and managing event logs. The most common logs available in Event Viewer include Application, System, and Security logs. Depending on the severity of the event, Application and System logs display events that fall into three categories: Information, Warning, and Error. Information events denote normal operation of the system (such as starting and stopping of system services, or successful completion of some routine background tasks), warning events point to non-critical errors (for example when installation of a software component fails because the component is already on the system), error events point to serious issues, for example when programs stop responding and need to be closed by Windows. Security log contains events such as valid and invalid logon attempts, as well as events related to res True False
True
Implementing a computer screen lock is one of the account management security best practices. The screen lock can be used as a countermeasure against brute-force attacks as it can be set to block computer access after a specified number of failed login attempts. True False
True
In IT security, the term "Entry control roster" refers to a list of personnel allowed to access restricted areas. True False
True
In MS Windows, a set of troubleshooting utilities (including tools for solving network-related problems) can be found in the Troubleshooting applet located in Windows Control Panel. True False
True
In MS Windows, the attrib command is used to display or change file attributes. Some of the available options for this command include read-only (R), archive (A), system (S), and hidden (H). With attrib, the "+" symbol sets an attribute for a file, the "-" sign removes the attribute. True False
True
In NTFS, a folder or file copied or moved from one location to another on a different volume inherits permissions of its new parent folder. True False
True
In Windows 10, the Windows Firewall system component was renamed to Windows Defender Firewall. In similar fashion, the Windows Firewall with Advanced Security known from previous Windows versions changed its name to Windows Defender Firewall with Advanced Security. True
True
In Windows 8 and newer releases of the Microsoft OS, the real-time information about resources used by user applications and system processes in Task Manager can be found grouped in one place under the Processes tab. True False
True
In Windows Disk Management utility, a volume status set to Failed Redundancy indicates that the data on a mirrored or RAID 5 volume is no longer fault tolerant because one of the underlying disks is not online. True False
True
In Windows Disk Management utility, assigning a mount point folder path to a drive enables a newly added drive to show up in File Explorer as a regular folder. True False
True
In Windows Disk Management utility, disk arrays can be created by right-clicking on a disk and selecting array type from the context menu. True False
True
In computer security, a type of small-factor physical device used for authentication is commonly referred to as a hardware token. True False
True
In macOS, the term "local snapshot" refers to a backup copy of all personal and system files stored on the local machine instead of the preferred external drive. True False
True
In the context of MS Windows system management, the term "Administrative share" refers to a hidden network share on a local computer designed to be accessed remotely by network administrators. True False
True
Installing an app in Windows requires administrative-level access on a local machine. In cases where installation files are stored on a remote server, users may also need appropriate permissions to be able to access the installation folder/file. True False
True
Introduced in Windows Vista, Windows Firewall with Advanced Security MMC snap-in offers more detailed configuration options allowing system administrators to execute more granular control over inbound and outbound network traffic. True False
True
Network Access Control (NAC) defines a set of rules enforced in a network that the clients attempting to access the network must comply with. With NAC, policies can be enforced before or after end-stations gain access to the network. NAC can be implemented as pre-admission NAC where a host must, for example, be virus free or have patches applied before it can be allowed to connect to the network, and/or post-admission NAC, where a host is being granted/denied permissions based on its actions after it has been provided with the access to the network. True False
True
One of the ways of confirming that a software application comes from a trusted source is the verification of its digital signature. A digitally signed software proves the identity of the developer and guarantees that the application code hasn't been tampered with since it was signed. The authenticity and integrity of the application's code can be verified by comparing results of a cryptographic hash function (original hash published by the application developer vs. hash obtained from a downloaded app). True False
True
An optimal Wireless Access Point (WAP) antenna placement provides a countermeasure against: War chalking Spoofing War driving Insider threat
War driving
Prior to Windows 8, the MSConfig Startup tab contained a list of user applications that could be enabled/disabled during system boot. The contents of this tab are not available in the MSConfig utility shipped with Windows 8/8.1/10. True False
True
Program Compatibility Troubleshooter is a Windows system utility used for automatic resolution of problems with older applications failing to run on newer versions of MS Windows. Program Compatibility Troubleshooter can be accessed via the Troubleshooting applet in Windows 7/8/8.1/10 Control Panel. Selecting the "Run programs made for previous versions of Windows" option in the Troubleshooting applet launches a guided tool for fixing problems with older programs installed on the current version of Windows. True False
True
Rainbow tables are lookup tables used to speed up the process of password guessing. True False
True
Some of the Windows services require other background applications to run. If a service fails to start, one of the ways for troubleshooting such problem is to check whether all required components for a given service are also up and running. In MS Windows, the list of all connected services for a given service can be found by launching the Services (services.msc) utility, right-clicking on a service, selecting Properties, and checking the Dependencies tab. True False
True
The -b netstat parameter in Microsoft Windows allows to display the name of an application involved in creating each connection or listening port. True False
True
The Task Manager's Users tab in MS Windows allows system administrators to disconnect a user (invoke a Windows lock screen) or to sign them off (force a user to log off). True False
True
The Troubleshooting Control Panel applet introduced in Microsoft Windows 7 provides access to several software tools that can automatically fix common problems related to application compatibility, hardware, sound, networking, operating system, and security. True False
True
The basic countermeasures against application-related security risks include avoiding applications from unknown sources and keeping the already installed apps up to date with current patches and bug fixes. True False
True
The function of the ODBC Data Sources (odbcad32.exe) configuration utility in Windows is to facilitate communication between applications and varying types of databases. True False
True
The process of securing a workstation should involve keeping track of available system updates and patches. A single PC running Windows can be updated and patched via the Windows Update service. A similar type of service that enables centralized management and distribution of updates and patches to multiple Windows-based hosts in a corporate environment is known as Windows Server Update Services (WSUS). True False
True
The term "Power plan" refers to a collection of hardware and system settings that manage how a Windows-based computer uses power. Available configuration options for managing power in MS Windows 8/8.1/10 can be accessed via Power Options applet in Control Panel. Windows 10 provides additional way for managing basic power settings in the Settings menu. True False
True
Transmission carried out in one direction only is described as a simplex mode. Communication that takes place only in one direction at a time is referred to as half-duplex mode. Two devices communicating with each other in both directions simultaneously are said to be in full-duplex mode. Network devices supporting autonegotiation feature automatically configure best mode supported by both devices. Duplex mismatch is the term used for a situation where two devices communicate with each other using different duplex modes. True False
True
USB locks are mechanical devices used for blocking a computer's USB ports from unauthorized access. USB locks can also be used to prevent the removal of an external USB device attached to the computer. True False
True
VPN connection types are divided into remote-access VPNs (used for connecting a computer to a network), and site-to-site VPNs (used for connecting networks). True False
True
Windows Active Directory service allows for grouping users and computers into containers known as Organizational Units (OUs). An OU is the smallest unit to which system administrators can assign Group Policy settings to manage the configuration and use of accounts and resources within a given OU. True False
True
Windows Memory Diagnostic Tool (mdsched.exe) cannot be run inside Windows. This utility requires a system restart and is launched during next boot before loading the operating system. True False
True
The Programs and Features Windows Control Panel applet can be used for: (Select all that apply) Uninstalling applications Conducting repair installation of a malfunctioning program Adding/removing Windows components Creating/deleting system restore points Managing installed updates
Uninstalling applications Conducting repair installation of a malfunctioning program Adding/removing Windows components Managing installed updates
Phishing scams targeting people holding high positions in an organization or business are known as: Vishing Bluesnarfing Whaling Bluejacking Pharming
Whaling
Which of the following disk status options in Windows Disk Management utility indicates that a basic or dynamic disk is not accessible and might have experienced hardware failure, corruption, or I/O errors? Foreign Unreadable Offline Initializing
Unreadable
Windows Vista and newer releases of the Microsoft OS offer a security feature which limits privileges of software applications and access to administrative tasks. When a program makes a change that requires administrator-level permission or a user attempts to modify system settings that require administrative access, it triggers an on-screen prompt requiring an administrator password to proceed. This functionality is known as: User Account Control (UAC) Windows Defender real-time protection Trusted Platform Module (TPM) Windows Defender Firewall with Advanced Security
User Account Control (UAC)
Which of the following answers refers to a non-proprietary remote-access tool that enables control over another computer on the network with the use of a graphical user interface? SSH RDP Telnet VNC
VNC
Which of the following is a non-proprietary RDP alternative that enables control over another computer on the network with the use of a graphical user interface? VTP VRF VTC VNC
VNC
Which of the following is a dedicated device designed to manage encrypted connections established over an untrusted network such as the Internet? VPN concentrator Proxy server Distributed switch UTM appliance
VPN concentrator
Which tab of the Folder Options applet (Windows 7) / File Explorer Options applet (Windows 8/8.1/10) in MS Windows contains the Advanced settings menu for files, folders, and Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) navigation pane? Settings View Search General
View
Which of the following can be used as an extension of RAM? (Select 3 answers) Virtual memory Paging file Extended partition Disk thrashing Swap partition
Virtual memory Paging file Swap partition
Which of the following options is not part of the General tab of the Folder Options applet (Windows 7) / File Explorer Options applet (Windows 8/8.1/10) in MS Windows? Windows Explorer / File Explorer default starting folder Visibility of hidden files, folders, or drives Opening items (single-click vs. double-click on an item) Windows Explorer / File Explorer browsing history options (Privacy)
Visibility of hidden files, folders, or drives
Which of the following would be of help in troubleshooting wireless signal loss and low wireless network signal coverage? Protocol analyzer WAP power level controls Logical network diagram Network mapper
WAP power level controls
AES-based encryption mode is a characteristic feature of: WEP WPA2 PAP WPA
WPA2
A solution that simplifies configuration of new wireless networks by enabling non-technical users to easily set up new networks, configure network security settings, and add new devices to an existing network is known as: WPA WPS WEP WAP
WPS
Which of the following wireless technologies are deprecated and should not be used due to their known vulnerabilities? (Select 2 answers) WPS WAP WPA2 WMN WEP
WPS WEP
Which of the following takes advantage of cell towers that provide wireless signal coverage for mobile devices? WPAN WWAN Satellite WLAN
WWAN
A solution that allows to turn on a network host remotely by sending a broadcast frame is called: Remote access Jumbo frame Backdoor access Wake-on-LAN
Wake-on-LAN
Which of the following tools would be of help in determining the optimal WAP placement? War driving Optical power meter Network mapper Wi-Fi analyzer
Wi-Fi analyzer
What is the maximum amount of RAM supported by different editions of 64-bit (x64) Microsoft Windows 10? Windows 10 Home Windows 10 Pro Windows 10 Education Windows 10 Enterprise
Windows 10 Home 128GB Windows 10 Pro 2TB Windows 10 Education 2TB Windows 10 Enterprise 6TB
Which of the Microsoft Windows 7 editions include the BranchCache feature? Windows 7 Starter Windows 7 Home Basic Windows 7 Home Premium Windows 7 Professional Windows 7 Enterprise Windows 7 Ultimate
Windows 7 Enterprise Windows 7 Ultimate
Which of the following Windows 7 editions do(es) not include EFS? Windows 7 Starter Windows 7 Home Basic Windows 7 Home Premium Windows 7 Professional Windows 7 Enterprise Windows 7 Ultimate
Windows 7 Starter Windows 7 Home Basic Windows 7 Home Premium
What are the limits on physical memory for 32-bit (x86) Microsoft Windows 7? Windows 7 Starter Windows 7 Home Basic Windows 7 Home Premium Windows 7 Professional Windows 7 Enterprise Windows 7 Ultimate
Windows 7 Starter 2GB Windows 7 Home Basic 4GB Windows 7 Home Premium 4GB Windows 7 Professional 4GB Windows 7 Enterprise 4GB Windows 7 Ultimate 4GB
What is the maximum amount of RAM supported by different editions of 64-bit (x64) Microsoft Windows 7? Windows 7 Starter Windows 7 Home Basic Windows 7 Home Premium Windows 7 Professional Windows 7 Enterprise Windows 7 Ultimate
Windows 7 Ultimate 192 GB Windows 7 Enterprise 192 GB Windows 7 Professional 192 GB Windows 7 Home Premium 16 GB Windows 7 Home Basic 8 GB Windows 7 Starter N/A
Which of the following are the limits on physical memory for 64-bit (x64) Microsoft Windows 8/8.1? Windows 8 (Core) Windows 8 Professional Windows 8 Enterprise
Windows 8 (Core) 128GB Windows 8 Professional 512GB Windows 8 Enterprise 512GB
In Windows 8/8.1/10, Windows Defender Firewall can be enabled/disabled in: (Select all that apply) Network and Sharing Center Control Panel applet Windows Defender Firewall Control Panel applet Security and Maintenance Control Panel applet Firewall & network protection menu in Windows Settings (accessed via Start menu) Windows Defender Firewall Control Panel applet -> Advanced settings -> right-click on Windows Defender Firewall with Advanced Security -> Properties Programs and Features Control Panel applet
Windows Defender Firewall Control Panel applet Firewall & network protection menu in Windows Settings (accessed via Start menu) Windows Defender Firewall Control Panel applet -> Advanced settings -> right-click on Windows Defender Firewall with Advanced Security -> Properties
A Microsoft online service used for patching up system vulnerabilities, improving system performance, and fixing coding errors found in Windows software is known as: Action Center Windows Update Security Center Windows Store
Windows Update
For a newly added hard drive, this command allows to configure it with a file system so that Windows can store information on the disk. mstsc defrag nbtstat format
format
Which of the following locations provides access to Windows Defender Firewall settings in Windows 8/8.1/10? (Select 2 answers) Windows Defender Firewall applet in Control Panel Internet Options (Security tab) Windows Start button -> Settings -> Update & Security -> Windows Security -> Firewall & network protection Internet Options (Advanced tab) Network and Sharing Center applet in Control Panel
Windows Defender Firewall applet in Control Panel Windows Start button -> Settings -> Update & Security -> Windows Security -> Firewall & network protection
Which of the following locations in Windows 8/8.1/10 provides access to configuration options that would allow to block incoming echo requests? Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Outbound Rules -> New Rule... -> Network protocols Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound Rules -> New Rule... -> Custom -> All programs (or a single app) Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Outbound Rules -> New Rule... -> Custom -> All programs (or a single app) Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound Rules -> New Rule... -> Network protocols
Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound Rules -> New Rule... -> Custom -> All programs (or a single app)
Which of the following locations in Windows 8/8.1/10 provides access to configuration options that would allow to create an exception for a TCP or UDP port? Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound/Outbound Rules -> New Rule... -> Port Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound/Outbound Rules -> New Rule... -> Custom Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound/Outbound Rules -> New Rule... -> Network protocols Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound/Outbound Rules -> New Rule... -> All programs (or a single app)
Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound/Outbound Rules -> New Rule... -> Port
Which of the following locations in Windows 8/8.1/10 provide access to configuration options for managing apps or features allowed through Windows Defender Firewall? (Select 3 answers) Network and Sharing Center applet in Control Panel -> Allow an app or feature through Windows Defender Firewall Windows Defender Firewall applet in Control Panel -> Turn Windows Defender Firewall on or off menu item Security and Maintenance applet in Control Panel -> Allow an app or feature through Windows Defender Firewall Windows Start button -> Settings -> Update & Security -> Windows Security -> Firewall & network protection -> Allow an app through firewall Windows Defender Firewall applet in Control Panel -> Allow an app or feature through Windows Defender Firewall
Windows Defender Firewall applet in Control Panel -> Turn Windows Defender Firewall on or off menu item Windows Start button -> Settings -> Update & Security -> Windows Security -> Firewall & network protection -> Allow an app through firewall Windows Defender Firewall applet in Control Panel -> Allow an app or feature through Windows Defender Firewall
Which of the following steps provide access to the Disk Cleanup utility in MS Windows? (Select 3 answers) Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) -> right-click on a drive -> Properties -> General tab -> Disk Cleanup Windows Run dialog box -> type in diskmgmt.msc + press Enter -> right-click on a drive -> Properties -> Tools tab -> Disk Cleanup Windows Control Panel -> Administrative Tools folder -> Disk Cleanup shortcut icon Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) -> right-click on a drive -> Properties -> Tools tab -> Disk Cleanup Windows Run dialog box -> type in diskmgmt.msc + press Enter -> right-click on a drive -> Properties -> General tab -> Disk Cleanup
Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) -> right-click on a drive -> Properties -> General tab -> Disk Cleanup Windows Run dialog box -> type in diskmgmt.msc + press Enter -> right-click on a drive -> Properties -> General tab -> Disk Cleanup
Which of the following steps provide access to the disk defragmenter utility in MS Windows? (Select 3 answers) Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) -> right-click on a drive -> Properties -> Tools tab -> Optimize and defragment drive -> Optimize Windows Control Panel -> Administrative Tools folder -> Defragment and Optimize Drives shortcut icon Windows Run dialog box -> type in diskmgmt.msc + press Enter -> right-click on a drive -> Properties -> Tools tab -> Optimize and defragment drive -> Optimize Windows Control Panel -> Administrative Tools folder -> Disk Management utility shortcut icon -> right-click on a drive -> Properties -> Tools tab -> Optimize and defragment drive -> Optimize Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) -> right-click on a drive -> Properties -> General tab -> Optimize and defragment drive -> Optimize
Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) -> right-click on a drive -> Properties -> Tools tab -> Optimize and defragment drive -> Optimize Windows Control Panel -> Administrative Tools folder -> Defragment and Optimize Drives shortcut icon Windows Run dialog box -> type in diskmgmt.msc + press Enter -> right-click on a drive -> Properties -> Tools tab -> Optimize and defragment drive -> Optimize
Which of the following locations in Windows 7 allows to create a shortcut to a shared folder or computer on a network? Windows Explorer -> Computer -> Map network drive Shared Folders menu in the Computer Management utility Network and Sharing Center applet in Windows Control Panel File Explorer -> This PC -> Computer tab -> Map Network drive
Windows Explorer -> Computer -> Map network drive
Which of the following is a Windows built-in software component that monitors network traffic and depending on the configuration settings applied to each data packet either blocks it or allows it to pass through? Security Center Windows Firewall Action Center Windows Defender
Windows Firewall
Which of the following Control Panel applets provides access to the Windows Firewall with Advanced Security tool? Internet Options (Security tab) Windows Firewall (Advanced settings) Network and Sharing Center Internet Options (Advanced tab)
Windows Firewall (Advanced settings)
In Windows 7, Windows Firewall can be enabled/disabled in: (Select all that apply) Programs and Features Control Panel applet Security and Maintenance Control Panel applet Firewall & network protection menu in Windows Settings (accessed via Start menu) Windows Firewall Control Panel applet Network and Sharing Center Control Panel applet Windows Firewall Control Panel applet -> Advanced settings -> right-click on Windows Firewall with Advanced Security -> Properties
Windows Firewall Control Panel applet Windows Firewall Control Panel applet -> Advanced settings -> right-click on Windows Firewall with Advanced Security -> Properties
Which of the following locations provides access to Windows Firewall settings in Windows 7? Network and Sharing Center applet in Control Panel Windows Firewall applet in Control Panel Windows Start button -> Settings -> Update & Security -> Windows Security -> Firewall & network protection Internet Options (Security tab)
Windows Firewall applet in Control Panel
Which of the following steps provide access to configuration settings for Windows system visual effects, such as animations and shadow effects? (Select 3 answers) Control Panel -> Programs and Features -> Optimize visual display -> Personalize appearance and sound effects -> Visual Effects Windows Run dialog box -> type in sysdm.cpl + press Enter -> Advanced tab -> Performance -> Settings... -> Visual Effects Control Panel -> Power Options -> select a power plan -> Change plan settings -> Change advanced power settings -> Desktop background settings -> Visual Effects Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) -> right-click on the Computer icon (Windows 7) / This PC icon (Windows 8/8.1/10) -> Properties -> Advanced system settings -> Advanced tab -> Performance -> Settings... -> Visual Effects Control Panel -> System applet -> Advanced system settings -> Advanced tab -> Performance -> Settings... -> Visual Effects
Windows Run dialog box -> type in sysdm.cpl + press Enter -> Advanced tab -> Performance -> Settings... -> Visual Effects Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) -> right-click on the Computer icon (Windows 7) / This PC icon (Windows 8/8.1/10) -> Properties -> Advanced system settings -> Advanced tab -> Performance -> Settings... -> Visual Effects Control Panel -> System applet -> Advanced system settings -> Advanced tab -> Performance -> Settings... -> Visual Effects
Which of the following locations in MS Windows provide access to an interface containing options for configuring restore settings, managing disk space, and deleting restore points? (Select 2 answers) Control Panel (Icon view) -> Security and Maintenance -> Change Security and Maintenance Settings -> System Protection -> Configure... Windows Run dialog box -> type in sysdm.cpl + press Enter -> System Protection -> Configure... Control Panel (Icon view) -> Recovery -> Configure System Restore -> Configure... Windows Run dialog box -> type in wscui.cpl + press Enter -> Change Security and Maintenance Settings -> System Protection -> Configure... Control Panel (Category view) -> System and Security -> Configure System Restore -> Configure...
Windows Run dialog box -> type in sysdm.cpl + press Enter -> System Protection -> Configure... Control Panel (Icon view) -> Recovery -> Configure System Restore -> Configure...
Which of the following locations in Windows 8/8.1/10 provide access to an interface for managing startup applications? (Select 2 answers) Startup tab of the System Properties (sysdm.cpl) utility Programs and Features applet in Windows Control Panel Startup tab of the System Configuration (msconfig.exe) utility Windows Settings (Settings -> Apps -> Startup) Startup tab of the Task Manager utility
Windows Settings (Settings -> Apps -> Startup) Startup tab of the Task Manager utility
Which of the following locations provide access to proxy settings in Windows? (Select 2 answers) Windows Settings menu -> System -> Network & Internet -> Proxy Windows Control Panel -> Internet Options -> Privacy tab -> Advanced -> Proxy server Windows Settings menu -> Network & Internet -> Proxy Windows Control Panel -> Internet Options -> Connections tab -> LAN settings -> Proxy server Windows Settings menu -> Update & Security -> Proxy Windows Control Panel -> Network and Sharing Center -> Change adapter settings -> Proxy server
Windows Settings menu -> Network & Internet -> Proxy Windows Control Panel -> Internet Options -> Connections tab -> LAN settings -> Proxy server
Which of the following locations in Windows 10 provide access to configuration options for connecting a network printer to a PC (network printer mapping)? (Select 2 answers) Control Panel -> Devices and Printers applet -> right-click on a selected printer -> Printer Properties -> Sharing tab Windows Start button -> Settings -> Devices -> Printers & scanners -> Add printers & scanners -> Add a printer or scanner -> select a printer -> Add Device Control Panel -> Devices and Printers applet -> Add a printer Windows Start button -> Settings -> Devices -> Printers & scanners -> select a printer -> Manage -> Printer Properties -> Sharing tab
Windows Start button -> Settings -> Devices -> Printers & scanners -> Add printers & scanners -> Add a printer or scanner -> select a printer -> Add Device Control Panel -> Devices and Printers applet -> Add a printer
Which of the following locations in Windows 10 provide access to configuration options that allow to share a local printer with other PCs on a network? (Select 2 answers) Control Panel -> Devices and Printers applet -> Add a printer Windows Start button -> Settings -> Devices -> Printers & scanners -> select a printer -> Manage -> Printer Properties -> Sharing tab Control Panel -> Devices and Printers applet -> right-click on a selected printer -> Printer Properties -> Sharing tab Windows Start button -> Settings -> Devices -> Printers & scanners -> Add printers & scanners -> Add a printer or scanner -> select a printer -> Add Device
Windows Start button -> Settings -> Devices -> Printers & scanners -> select a printer -> Manage -> Printer Properties -> Sharing tab Control Panel -> Devices and Printers applet -> right-click on a selected printer -> Printer Properties -> Sharing tab
Which of the following locations provide access to display settings in Windows 10? (Select 2 answers) Display applet in Windows Control Panel (Icons view) Appearance and Personalization menu of the Windows Control Panel (Category view) Windows Start button -> Settings -> System -> Display Programs and Features applet in Windows Control Panel Display settings pop-up menu launched after right-clicking on the Windows Desktop screen area
Windows Start button -> Settings -> System -> Display Display settings pop-up menu launched after right-clicking on the Windows Desktop screen area
Which of the following locations enable adjustments to the volume of sound in Windows 8/8.1/10? (Select 2 answers) System applet in Control Panel Windows Taskbar notification area Sounds and Audio Devices applet in Control Panel AutoPlay applet in Control Panel Sound applet in Control Panel
Windows Taskbar notification area Sound applet in Control Panel
Which of the following sources allow for obtaining, installing, and updating device drivers used by Microsoft Windows OSs? (Select 2 answers) Windows Update Computer Management Device manufacturer Task Manager System Configuration
Windows Update Device manufacturer
Which of the following key combinations can be used to launch Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) in MS Windows? Windows logo key + E Ctrl + Shift + Esc Windows logo key + F Ctrl + Alt + Delete
Windows logo key + E
Which of the following statements describing different methods for organizing Windows-based computers in networks are true? (Select 3 answers) Windows-based computers on home networks must be part of a HomeGroup Windows-based computers on a network must be part of a workgroup or a domain Windows-based computers on workplace networks are usually part of a domain Windows-based computers on workplace networks are usually part of a workgroup Windows-based computers on home networks are usually part of a workgroup Windows-based computers on home networks are usually part of a domain
Windows-based computers on a network must be part of a workgroup or a domain Windows-based computers on workplace networks are usually part of a domain Windows-based computers on home networks are usually part of a workgroup
Which of the following statements describing different methods for organizing Windows-based computers in networks are true? (Select 3 answers) Windows-based computers on home networks must be part of a HomeGroup Windows-based computers on a network must be part of a workgroup or a domain Windows-based computers on workplace networks are usually part of a domain Windows-based computers on workplace networks are usually part of a workgroup Windows-based computers on home networks are usually part of a workgroup Windows-based computers on home networks are usually part of a domain
Windows-based computers on a network must be part of a workgroup or a domain Windows-based computers on workplace networks are usually part of a domain Windows-based computers on home networks are usually part of a workgroup
The process of planning and designing new WLANs for optimal performance, security and compliance typically involves: Penetration testing Wireless site survey Network segmentation Vulnerability scanning
Wireless site survey
Which of the statements listed below apply to Windows workgroups? (Select 3 answers) Security policies and permissions in workgroups are administered centrally Logging on to any computer on the workgroup requires a single account Workgroups typically consist of no more than twenty computers There is no limit on the number of hosts that can become a part of a single workgroup Logging on to any computer in the workgroup requires an account on that computer Each computer in the workgroup has its own security policy
Workgroups typically consist of no more than twenty computers Logging on to any computer in the workgroup requires an account on that computer Each computer in the workgroup has its own security policy
Which of the statements listed below apply to Windows workgroups? (Select 3 answers) Security policies and permissions in workgroups are administered centrally Logging on to any computer on the workgroup requires a single account Workgroups typically consist of no more than twenty computers There is no limit on the number of hosts that can become a part of a single workgroup Logging on to any computer in the workgroup requires an account on that computer Each computer in the workgroup has its own security policy
Workgroups typically consist of no more than twenty computers Logging on to any computer in the workgroup requires an account on that computer Each computer in the workgroup has its own security policy
What is the name of a software tool used for finding and installing software packages on Debian and Debian-based Linux distributions? RPM apt-rpm Yum apt-get
apt-get
Which of the following answers lists the correct syntax for applying the read-only attribute to a file? attrib +R [drive:] [path] [filename] attrib [drive:] [path] [filename] /read-only attrib /R [drive:] [path] [filename] attrib [drive:] [path] [filename] +R
attrib +R [drive:] [path] [filename]
While trying to start their Windows machine, a user receives "Windows Boot Configuration Data file is missing required information" error message. Which of the following bootrec options should be used by a technician for manual CLI troubleshooting of this error? bootrec /scanos bootrec /rebuildbcd bootrec /fixmbr bootrec /fixboot
bootrec /rebuildbcd
A malware-infected networked host under remote control of a hacker is commonly referred to as a: Trojan Worm Bot Honeypot
bot
Which of the following terms is used to describe a collection of intermediary compromised systems that are used as a platform for a DDoS attack? Honeynet Botnet Quarantine network Malware
botnet
Which of the command-line commands listed below is used for directory traversal? cd dir ps dig
cd
Which of the following Linux command-line commands enables directory traversal? cd dir ps dig
cd
Which parameter of the cd command in Windows moves the command-line prompt one folder up in the directory tree (sets the prompt at the parent folder of the current folder)? cd \ cd /up cd + cd ..
cd ..
Which of the following commands in Windows Command Prompt changes the current directory to the root directory? cd \ dir /root cd .. chdir /r
cd \
Which of the following is a Windows, OS/2 and DOS command-line tool used for checking the file system and status of the system's hard drives? grep chkdsk sfc dism
chkdsk
The following command-line command can be used to copy one or more files from one location to another. sfc copy move pushd
copy
Which Linux command enables copying files and directories? cp copy xcopy robocopy
cp
A low-level utility that can be used for creating/restoring filesystem backup copies in Linux is called: fsutil diskpart dd format
dd
Which of the following launches the Device Manager tool in Microsoft Windows? msconfig.exe devmgmt.msc appwiz.cpl compmgmt.msc
devmgmt.msc
Which of the following Windows Command Prompt commands can be used to list all directory's files and subdirectories contained in the current directory? (Select 2 answers) dir dir /? dir *.* dir /all dir /list
dir dir *.*
Which of the following launches a GUI system utility for managing HDDs in Windows? diskpart.exe control.exe diskmgmt.msc compmgmt.msc devmgmt.msc
diskmgmt.msc
Which of the following commands in Windows Command Prompt launches a text-based command-line partitioning utility? format chkdsk defrag diskpart
diskpart
A Windows command-line tool used for preparing and modifying contents of Windows images is known as: format robocopy dism gpupdate
dism
A Microsoft-proprietary file system optimized for flash drives is known as:
exFAT
A command-line command in MS Windows that displays Group Policy information for a machine or user is known as: nbtstat gpresult verify gpupdate
gpresult
Which of the command-line commands listed below allows for updating multiple Group Policy settings in MS Windows? convert gpupdate bcdedit gpresult
gpupdate
A Linux command-line command that enables searching files for lines containing a match to a given text pattern is called: rm chmod find grep
grep
Which of the following commands in Windows can be used to display help information related to a specific command-line utility? (Select 2 answers) [command name] help man [command name] [command name] info help [command name] [command name] /?
help [command name] [command name] /?
A Linux command-line utility used for displaying and modifying network interface configuration settings is called: ifconfig net config ipconfig networksetup
ifconfig
Which of the following Windows command-line utilities can be used to renew an IP address? ifconfig net config iwconfig ipconfig
ipconfig
Which of the following command-line commands in MS Windows are used for resetting the DHCP configuration settings for all adapters? (Select 2 answers) ipconfig /down ipconfig /release ipconfig /up ipconfig /renew
ipconfig /release ipconfig /renew
Which of the following is a Linux command-line command used for configuring network interface parameters specific to the wireless communication? net config ifconfig networksetup iwconfig
iwconfig
Which of the Linux command-line commands allows to terminate a running process? taskkill exit shutdown kill
kill
Which of the following addresses can be pinged to test the functionality of a Network Interface Card (NIC)? (Select 3 answers) localhost ::1 FE80::/10 169.254/16 127.0.0.1
localhost ::1 127.0.0.1
Which of the following Linux commands is used to display information about files and directories contained within the current working directory? pwd ls grep ps
ls
A Microsoft Windows application utility that displays details about computer's hardware configuration, computer components, software, and device drivers is known as: msconfig.exe winver.exe msinfo32.exe control.exe
msinfo32.exe
What is the name of the Linux command used for renaming files and directories? rm ps mv ls
mv
Which of the following is a Linux command for transferring files/directories to a different directory? replace export move mv
mv
Which of the following Command Prompt commands in Windows is used for listing a computer's connections to shared resources? net share net use net session net config
net use
Which of the MS Windows command-line commands lists the user accounts for the computer? net view net session net user net accounts
net user
Which of the following CLI tools can be used for troubleshooting DNS-related problems? arp nslookup tracert pathping
nslookup
A Linux command-line command allowing a user to change his/her own password is known as: pwd pass passwd password
passwd
Which of the following are examples of administrative share names in Windows? (Select 2 answers) print$ Windows (C:) IPC$ C:/Windows/System32 $ADMIN
print$ IPC$
What is the name of a Linux command-line utility used for displaying statistics of running processes? ps tasklist nbtstat id
ps
A Linux command displaying an absolute path to (i.e. full filename of) the current working directory is called: mv pwd rm dir
pwd (print working directory)
Which of the following system utilities in MS Windows provides access to a database containing system configuration information? winver msconfig regedit msinfo32
regedit
Which other command-line command besides regedit can be used to launch registry editor in Windows? regdt regedit32 msconfig regedt32
regedt32
A command-line command in Linux used for deleting files and directories is known as: erase rm del edit
rm
Which of the following system utilities in Windows enables managing background applications? msconfig appwiz.cpl mstsc services.msc
services.msc
Which of the following answers refers to a script file type designed to be run in Unix command line? bat ps1 vbs sh
sh
The following command can be used for turning off or restarting a Linux host. reboot shutdown exit taskkill
shutdown
The following command can be used to shut down or restart a local or remote host running MS Windows. exit shutdown reboot taskkill
shutdown
Which of the following command-line commands enables a full system shutdown and restart of an MS Windows host after a time-out period of two minutes? shutdown /s /120 shutdown /r /t 120 shutdown /r /120 shutdown /s /t 120
shutdown /r /t 120
Which of the following is the correct command for setting the time-out period of 60 seconds before powering off a Windows host? shutdown /r /t 60 shutdown /s /60 shutdown /s /t 60 shutdown /r /60
shutdown /s /t 60
Which of the following is a Linux command that allows to assume the identity of a different system user and execute commands with security privileges of that user account? sync id usermod su
su
A Linux command that temporarily modifies security privileges to allow an execution of a single command that requires root access permissions is called: id sudo usermod su
sudo
Which of the answers listed below refers to the correct syntax for a Windows Command Prompt taskkill command that would allow to close notepad.exe by providing its imagename? taskkill /pid notepad taskkill /im notepad.exe taskkill /id notepad.exe taskkill /img notepad
taskkill /im notepad.exe
Provided that the process ID of notepad.exe obtained with the tasklist command is 1230, which of the following answers lists the correct syntax for a Windows Command Prompt taskkill command that would allow to close this application? taskkill /id 1230 taskkill --im 1230 taskkill /pid 1230 taskkill --id 1230
taskkill /pid 1230
Which of the following command-line commands in Windows displays a list of currently running processes on a local or remote host? iexplore tasklist services.msc netstat
tasklist
Which of the following commands is used for invoking a text editor in Unix-like operating systems? edit notepad vi bcdedit
vi
What is the name of a standalone malicious computer program that typically propagates itself over a computer network to adversely affect system resources and network bandwidth? Spyware Worm Trojan Spam
worm
Which of the Microsoft Windows command-line commands allow for copying multiple files or entire directory trees from one directory to another and for copying files across a network? (Select 2 answers) xcopy pushd shift robocopy
xcopy robocopy