Comptia A+ Core 2
A type of contactless smart card that can be read at a close range from a reader device is commonly referred to as:
Proximity card
In computer networking, a computer system or an application that acts as an intermediary between another computer and the Internet is commonly referred to as:
Proxy
A Windows network profile that hides a computer from other devices on the network and makes it unavailable for file and printer sharing is known as:
Public
Which network profile in Windows by default disables the network discovery feature?
Public
Which of the Windows network profiles imposes the strongest security settings?
Public
Windows network profile that hides a computer from other devices on the network and makes it unavailable for file and printer sharing
Public
Which of the following solutions is used for controlling network resources and assigning priority to different types of traffic?
Quality of Service (QoS)
Which format type in MS Windows does not erase disk data?
Quick format
Which formatting type(s) would typically be performed by a user to reinstall an OS? (Select all that apply)
Quick format Standard format High-level format
Which formatting type(s) would typically be performed by a user to reinstall an OS?
Quick format Standard format High-level format
Which of the following wireless technologies enables identification and tracking of tags attached to objects?
RFID
A type of identification badge that can be held within a certain distance of a reader device to authenticate its holder is called:
RFID badge
Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is known as:
Ransomware
Which of the following terms refers to an example of crypto-malware?
Ransomware
The share permissions on a shared Windows folder grant the user Full Control access and the local NTFS permissions grant the user Read access. Which of the following are the effective user permission levels?
Read when accessing the share remotely Read when accessing the folder locally
The share permissions on a shared Windows folder grant the user Read access and the local NTFS permissions grant the user Modify access. Which of the following are the effective user permission levels?
Read when accessing the share remotely Modify when accessing the folder locally
Which of the following answers refers to a common solution for troubleshooting user login problems on a Windows domain?
Rebuilding Windows profiles
a common solution for troubleshooting user login problems on a Windows domain
Rebuilding Windows profiles
Which of the following enables troubleshooting a malware-infected system that doesn't boot up?
Recovery console
Which of the following replaced removable media used for reformatting hard drives and restoring an operating system to the original factory condition?
Recovery partition
RISC
Reduced Instruction Set Computer
Which of the built-in options added in Windows 8 enables OS reinstallation without affecting the existing user profiles and settings?
Refresh
GDPR (General Data Protection Regulation)
Regulates personal data privacy of the European Union (EU) citizens
Which of the macOS features enables access to optical drive of another computer over a network?
Remote Disc
Provides access to Remote Assistance and Remote Desktop configuration settings in Windows
Remote settings in the System applet in Windows Control Panel
Which of the following provides access to Remote Assistance and Remote Desktop configuration settings in Windows?
Remote settings in the System applet in Windows Control Panel
Which of the following allows to erase data on a lost or stolen mobile device?
Remote wipe
VPN types is used to connect computers to a network
Remote-access Client-to-site
According to the CompTIA's best practice procedures for malware removal, scheduling scans and running updates on a Windows-based system should be performed as the next step after:
Removing malware from the system
System Protection tab of the System Properties (sysdm.cpl) utility in Windows provides options for managing:
Restore points
The System Protection tab of the System Properties (sysdm.cpl) utility in Windows provides options for managing:
Restore points
Which of the following enables decreasing partition size in Windows Disk Management utility?
Right-click on a disk and select the Shrink Volume menu option
Which of the following actions in Windows allow to invoke the User Account Security (UAC) access control feature and run an application with administrator account permissions?
Right-click on an application icon -> select Run as administrator from the pop-up menu In Windows Start menu press and hold Control + Shift keys -> Left-click on an application icon Launch Windows Run dialog box (Windows logo key + R) -> type in the application's name -> press Control + Shift + Enter
Which of the following actions in Windows allow to invoke the User Account Security (UAC) access control feature and run an application with administrator account permissions?
Right-click on an application icon -> select Run as administrator from the pop-up menu In Windows Start menu press and hold Control + Shift keys -> Left-click on an application icon Launch Windows Run dialog box (Windows logo key + R) -> type in the application's name -> press Control + Shift + Enter
A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network is known as:
Rootkit
Which of the following actions would be of help in troubleshooting the "Missing operating system" error message displayed during system boot?
Run Startup Repair utility Use bootrec.exe to fix Master Boot Record (MBR) errors Verify that the drive is detected in BIOS Use diskpart utility to label the system partition as active
Which of the following is a complimentary instruction set that extends the capabilities of a CPU?
SSE2
Which of the following answers refers to a secure replacement for Telnet?
SSH
An authentication subsystem that enables a user to access multiple, connected system components (such as separate hosts on a network) after a single login on only one of the components is known as:
SSO
According to the CompTIA's best practice procedures for malware removal, enabling System Restore and creating a restore point in Windows should be performed as the next step after:
Scheduling scans and running updates
Which of the following built-in macOS tools enables remote access to another Mac computer?
Screen Sharing
A user interface element controlling access to a mobile device after the device is powered on is called:
Screen lock
SSID
Service Set Identifier
The System Configuration utility tab containing a list of background applications that can be enabled/disabled during system startup is called:
Services
An MS Windows Administrative Tools folder applet for managing background applications is called:
Services (services.msc)
Plrovides access to print spooler settings
Services (services.msc)
Provides an interface for managing background applications
Services (services.msc)
Which of the following Windows utilities provides access to print spooler settings?
Services (services.msc)
Which of the following locations in Windows provides an interface for managing background applications?
Services (services.msc)
Provide an interface for managing applications/services that might affect the system by slowing down the boot process
Services (services.msc) Task Manager (taskmgr.exe)
Which MS Windows utilities provide an interface for managing applications/services that might affect the system by slowing down the boot process?
Services (services.msc) Task Manager (taskmgr.exe)
Which of the following locations provides access to brightness configuration options on an iOS device?
Settings -> Display & Brightness
Which of the following locations allows to configure display brightness levels on an Android device?
Settings -> Display -> Brightness level
Windows power plans manage how the computer is using power. The Balanced (recommended) power plan (used by default in certain Windows versions) scales the CPU performance based on its current utilization, which might have a degrading effect on system performance. If the system is running slow, one of the troubleshooting methods is to enable the High performance power plan or customize the current plan settings. In Windows, the power configuration settings can be found in:
Settings menu (Windows 8/8.1/10) Power Options applet in Windows Control Panel
A type of user interface that enables the execution of operating system commands is commonly referred to as:
Shell
A situation in which an unauthorized person can view someone's display or keyboard to learn their password or other confidential information is referred to as:
Shoulder surfing
Examples of hard drive destruction and disposal tools/methods include:
Shredder Drill Hammer Degaussing Incineration
Which of the following destruction tools/methods allow for secure disposal of physical documents?
Shredder Incineration
Which of the following enables partition split in Windows Disk Management utility?
Shrink a volume, then create a new simple volume from the adjacent unallocated space
Allowing "Unknown Sources" in Android security settings enables:
Sideloading
The practice of installing mobile apps from untrusted sources (i.e. websites and app stores other than the official marketplaces) is called:
Sideloading
An antivirus database entry used for identifying malicious code is known as virus:
Signature
Which of the volume types available in Windows Disk Management utility do not offer fault tolerance?
Simple volume Spanned volume Striped volume
A power management mode in Windows that draws small amount of power, saves the system state in RAM, and allows for quick resuming of full-power operation with the use of a power button or on command is known as:
Sleep/suspend Standby
A power management mode in Windows that draws small amount of power, saves the system state in RAM, and allows for quick resuming of full-power operation with the use of a power button or on command
Sleep/suspend Standby
Which of the following answers refers to an example implementation of certificate-based authentication?
Smart card
An unauthorized practice of obtaining confidential information by manipulating people into disclosing sensitive data is referred to as:
Social engineering
Which of the following macOS features allows to create switchable desktop environments?
Spaces
Phishing scams targeting a specific group of people are referred to as:
Spear phishing
An email sent from unknown source disguised as a trusted source known to the message receiver is an example of:
Spoofing Social engineering
Which of the following is a macOS system search utility?
Spotlight
Malicious software collecting information about users without their knowledge/consent is known as:
Spyware
Which formatting type in Windows 7/8/8.1/10 prevents data recovery by overwriting the contents of hard drive sectors?
Standard format
The Task Manager utility in Windows 8/8.1/10 contains a tab previously included as part of the System Configuration (MSConfig) utility. The tab allows system administrators to control user applications that should be enabled/disabled during system boot. This tab is called:
Startup
Which of the following locations in Windows 7 allows to enable/disable startup applications?
Startup tab of the System Configuration (msconfig.exe) utility
Windows 8 introduces a virtualization technology that enables organization of multiple physical disks into logical volumes in a fashion similar to RAID levels. What is the name of the Control Panel applet providing access to this functionality?
Storage Spaces
Which of the following tools enable creation of disk arrays in Windows?
Storage Spaces Disk Management
A basic data type designed to contain text information is known as:
String
Which volume type in Windows Disk Management utility uses RAID 0 setup for performance gains?
Striped volume
Which volume type in Windows Disk Management utility uses RAID 5 setup for performance gains and fault tolerance?
Striped with parity volume
Which of the following allows to determine which network segment an IP address belongs to?
Subnet mask
What are the characteristic features of a WPA/WPA2 Enterprise mode?
Suitable for large corporate networks Requires RADIUS authentication server
A device designed to protect electronic devices from large voltage fluctuations
Surge suppressor
A device designed to protect electronic devices from large voltage fluctuations is called:
Surge suppressor
A hidden file (or files) on the hard disk that Windows uses to hold parts of programs and data files that cannot be stored in RAM due to the insufficient memory space is called:
Swap file Paging file Virtual memory
A hidden file (or files) on the hard disk that Windows uses to hold parts of programs and data files that cannot be stored in RAM due to the insufficient memory space
Swap, paging file and Virtual memory
A Windows Control Panel applet used for managing local (offline) versions of files and folders stored on the network is known as:
Sync Center
Which Control Panel applet in Windows can be used to check the OS version and basic hardware statistics such as the CPU type and amount of installed RAM?
System
Which Control Panel applet in Windows provides access to computer name, domain, and workgroup settings?
System
Which Microsoft Windows tool can be used by system administrators to find and isolate problems that might prevent the OS from starting correctly?
System Configuration (msconfig.exe)
An MS Windows system utility that allows to roll back system files and settings to an earlier point in time
System Restore
Which of the following is a Windows system utility that allows to roll back system files and settings to an earlier point in time?
System Restore
Which of the following provide access to virtual memory (a.k.a. paging file) configuration options in Windows?
System applet in Control Panel -> Advanced system settings -> Performance -> Settings -> Advanced -> Virtual memory Windows Run dialog box -> type in sysdm.cpl + press Enter -> Advanced tab -> Performance -> Settings -> Advanced -> Virtual memory
Provide access to virtual memory (a.k.a. paging file) configuration options in Windows
System applet in Control Panel -> Advanced system settings -> Performance -> Settings -> Advanced -> Virtual memory Windows Run dialog box -> type in sysdm.cpl + press Enter -> Advanced tab -> Performance -> Settings -> Advanced -> Virtual memory
What is the correct sequence of steps for enabling automatic virtual memory management in MS Windows?
System applet in Control Panel -> Advanced system settings -> Performance -> Settings -> Advanced -> Virtual memory -> Change... -> enable Automatically manage paging file size for each drive Windows Run dialog box -> type in sysdm.cpl + press Enter -> Advanced tab -> Performance -> Settings -> Advanced -> Virtual memory -> Change... -> enable Automatically manage paging file size for each drive
An exact copy of the entire state of a computer system is known as:
System image
Easiest step to troubleshoot the Blue Screen of Death (BSoD) in MS Windows
System restart
Which of the following would be the easiest step to troubleshoot the Blue Screen of Death (BSoD) in MS Windows?
System restart
AFP (Apple Filing Protocol)
TCP 548
A network technician wishes to use an RDP client on their Windows OS to remotely troubleshoot a problem on another Windows machine. Which of the following ports needs to be opened for the built-in Windows RDP server to allow this type of network connection?
TCP port 3389
A security protocol designed to strengthen WEP implementations is known as:
TKIP
In Windows 8 and newer releases of the Microsoft OS, contents of the MSConfig's Startup tab can be viewed and managed via:
Task Manager
Which of the following system utilities provides access to different command-line shells in macOS?
Terminal
PHI
The US Health Insurance Portability and Accountability Act (HIPAA) provides privacy protection for:
Which of the following enable a newly added disk to show up in Windows File Explorer?
The disk needs to be initialized The disk requires a drive letter The disk can be mounted as a folder
A Windows resource with conflicting NTFS and share permissions applied to it will assume:
The most restrictive permission
OEM (Original Equipment Manufacturer)
The original manufacturer of a hardware component or sub-component.
Partitioning
The practice of dividing hard disk space into isolated logical storage units that behave like separate disk drives
order of volatility
The sequence of volatile data that must be preserved in a computer forensic investigation.
Which of the following account management security solutions provide countermeasures against brute-force attacks?
Timeout period between login attempts Failed attempts lockout
Which of the following account management security solutions provide countermeasures against brute-force attacks? (Select 2 answers)
Timeout period between login attempts Failed attempts lockout
Used to locate a cable in a cabling bundle, or to trace individual wires in a cable
Toner and probe kit
The System Configuration tab in MS Windows providing access to MMC snap-ins is called:
Tools
A common example of channel overlapping in wireless networking would be the 2.4 GHz band used in 802.11, 802.11b, 802.11g, and 802.11n networks, where the 2.401 - 2.473 GHz frequency range is used for allocating 11 channels, each taking up a 22-MHz portion of the available spectrum. Setting up a wireless network to operate on a non-overlapping channel (1, 6, and 11 in this case) allows multiple networks to coexist in the same area without causing interference.
True
A double colon in an IPv6 address indicates that one part of the address, containing only zeros, has been compressed to make the address shorter.
True
A security rule that prevents users from accessing information and resources that lie beyond the scope of their responsibilities is known as principle of least privilege.
True
A type of critical file that a computer system depends on to operate properly is known as a system file. In Microsoft Windows, system files are hidden by default; they might also have Read-only attribute turned on to prevent accidental changes to the file contents. Windows system files can be permanently displayed in Windows Explorer (Windows 7), or File Explorer (Windows 8/8.1/10) after modifying file and folder settings in the Folder Options applet in Windows 7 Control Panel, or File Explorer Options applet in Windows 8/8.1/10 Control Panel.
True
A type of software that performs unwanted and harmful actions in disguise of a legitimate and useful program is known as a Trojan horse. This type of malware may act like a legitimate program and have all the expected functionalities, but apart from that it will also contain a portion of malicious code that the user is unaware of.
True
According to the CompTIA's best practice procedures for malware removal, user education should be the final step of the malware removal process.
True
An MS Windows feature enabling automatic execution of code contained on a mounted drive is called AutoRun. Since disabling AutoRun decreases potential security risk related to the propagation of malware, Windows 7/8/8.1/10 have AutoRun disabled by default.
True
An authenticator application is a software that generates additional authentication token (in the form of a random code) used in two-step verification process.
True
As opposed to the simple Denial of Service (DoS) attacks that usually are performed from a single system, a Distributed Denial of Service (DDoS) attack uses multiple compromised computer systems to perform the attack against its target.
True
Assigning static IP addresses on a SOHO network provides better administrative control over hosts and devices residing on the inside of the network.
True
Auto negotiation is an Ethernet procedure that allows two connected devices to exchange information about their capabilities (such as supported speed and duplex modes) and automatically configure connection parameters based on the highest performance settings supported by both devices.
True
BIOS/UEFI passwords improve the security of a workstation. These low-level passwords may, for example, prevent unauthorized users to proceed when the computer is powered on, or restrict the scope of changes a user can make in the BIOS/UEFI interface. A type of BIOS/UEFI password with the highest level of permissions is known as supervisor or administrator password; the other type of password is user password.
True
Because the Guest account in MS Windows allows a user to log on to a network, browse the Internet, and shut down the computer, it is recommended to keep it disabled when it isn't being used.
True
Because wireless routers are shipped with default credentials, the process of securing a SOHO network should include changing the default username and password on a Wireless Access Point (WAP).
True
By default, Android and iOS devices allow a limited number of failed login attempts after which the device becomes inaccessible and requires additional steps to unlock it.
True
Certificate of destruction is a document issued by companies that carry out secure device/document disposal. The certificate verifies proper asset destruction and can be used for auditing purposes. In case of device disposal, the document includes a list of all the items that have been destroyed along with their serial numbers. It may also describe the destruction method, specify location (on-site/off-site), or list the names of witnesses who oversaw the entire process.
True
Common methods of application installation and deployment include removable media (e.g. CD/USB) used locally in home networks and remote installation methods over a network popular in enterprise environments.
True
Event Viewer (eventvwr.msc) is a Windows utility for monitoring system health and troubleshooting problems with applications, operating system, and hardware. Event Viewer allows for browsing and managing event logs. The most common logs available in Event Viewer include Application, System, and Security logs. Depending on the severity of the event, Application and System logs display events that fall into three categories: Information, Warning, and Error. Information events denote normal operation of the system (such as starting and stopping of system services, or successful completion of some routine background tasks), warning events point to non-critical errors (for example when installation of a software component fails because the component is already on the system), error events point to serious issues, for example when programs stop responding and need to be closed by Windows. Security log contains events such as valid and invalid logon attempts, as well as events related to res
True
Factory recovery partition and recovery disc are two examples of storage media that can be used for rolling back an OS to its original state.
True
For a wireless client to be able to connect to a network, the security type (e.g. WEP, WPA or WPA2) and encryption type (e.g. TKIP or AES) settings on the connecting host must match the corresponding wireless security settings on a Wireless Access Point (WAP).
True
Hash functions allow for mapping large amounts of data content to a small string of characters. The result of hash function provides the exact "content in a nutshell" (in the form of a string of characters) derived from the original data content. In case there's any change to the data after the original hash was taken, the next time when hash function is applied, the resulting hash value calculated after content modification will be different from the original hash.
True
Implementing a computer screen lock is one of the account management security best practices. The screen lock can be used as a countermeasure against brute-force attacks as it can be set to block computer access after a specified number of failed login attempts.
True
Implementing full device encryption is one of the methods for securing sensitive data on a smartphone. When enabled, this type of encryption works in conjunction with the phone's screen lock, i.e. to decrypt the phone (which stays encrypted whenever the phone is locked), a user must first unlock the screen. On Android devices, the unlocking methods include entering a PIN, password, or swipe pattern. Apple devices use passcode and biometric fingerprint sensor (a.k.a. Touch ID).
True
In IT security, the term "Entry control roster" refers to a list of personnel allowed to access restricted areas.
True
In IT security, the term "User authentication" refers to the process of proving user identity to a system. Authentication process can be based on different categories of authentication factors, including unique physical traits of each individual, such as fingerprints ("something you are"), physical tokens such as smart cards ("something you have"), or usernames and passwords ("something you know"). Additional factors might include geolocation ("somewhere you are"), or user-specific activity patterns such as keyboard typing style ("something you do"). Multi-factor authentication systems require implementation of authentication factors from two or more different categories.
True
In MS Windows environments, Guest account is an account for users who do not have a permanent account on a Windows computer or domain. People using this type of account cannot install software or hardware, change settings, create passwords, or access protected files and folders. However, because the Guest account allows the user to log on to a network, browse the Internet, and shut down the computer, it is recommended to keep it disabled when it isn't being used.
True
In MS Windows, a set of troubleshooting utilities (including tools for solving network-related problems) can be found in the Troubleshooting applet located in Windows Control Panel.
True
In MS Windows, dynamic disks provide features that basic disks do not, such as the ability to create volumes that span multiple disks (spanned and striped volumes) and the ability to create fault-tolerant volumes (mirrored and RAID-5 volumes).
True
In MS Windows, the attrib command is used to display or change file attributes. Some of the available options for this command include read-only (R), archive (A), system (S), and hidden (H). With attrib, the "+" symbol sets an attribute for a file, the "-" sign removes the attribute.
True
In Microsoft Windows 7, the only two editions that include the BitLocker full drive encryption feature are Windows 7 Enterprise and Windows 7 Ultimate.
True
In NTFS, a folder or file copied or moved from one location to another on a different volume inherits permissions of its new parent folder.
True
In Windows 10, the Windows Firewall system component was renamed to Windows Defender Firewall. In similar fashion, the Windows Firewall with Advanced Security known from previous Windows versions changed its name to Windows Defender Firewall with Advanced Security.
True
In Windows 8 and newer releases of the Microsoft OS, the real-time information about resources used by user applications and system processes in Task Manager can be found grouped in one place under the Processes tab.
True
In Windows Disk Management utility, a volume status set to Failed Redundancy indicates that the data on a mirrored or RAID 5 volume is no longer fault tolerant because one of the underlying disks is not online.
True
In Windows Disk Management utility, assigning a mount point folder path to a drive enables a newly added drive to show up in File Explorer as a regular folder.
True
In Windows Disk Management utility, disk arrays can be created by right-clicking on a disk and selecting array type from the context menu.
True
In a network using subnets, the term "Default gateway" refers to a network device (e.g. router) that enables exchange of data between hosts residing in different subnets.
True
In computer security, a type of small-factor physical device used for authentication is commonly referred to as a hardware token.
True
In computer security, the term "Biometrics" refers to physical characteristics of the human body that can be used for identification and access control purposes.
True
In computer security, the term "Dumpster diving" is used to describe a practice of sifting through trash for discarded documents containing sensitive data. Found documents containing names and surnames of the employees along with the information about positions held in the company and other data can be used to facilitate social engineering attacks. Having the documents shredded or incinerated before disposal makes dumpster diving less effective and mitigates the risk of social engineering attacks.
True
In macOS, the term "local snapshot" refers to a backup copy of all personal and system files stored on the local machine instead of the preferred external drive.
True
In the context of MS Windows system management, the term "Administrative share" refers to a hidden network share on a local computer designed to be accessed remotely by network administrators.
True
Installing an app in Windows requires administrative-level access on a local machine. In cases where installation files are stored on a remote server, users may also need appropriate permissions to be able to access the installation folder/file.
True
Installing mobile apps from trusted sources (e.g. Apple's App Store for iOS devices, or Google Play for Android devices) decreases malware-related security risks.
True
Introduced in Windows Vista, Windows Firewall with Advanced Security MMC snap-in offers more detailed configuration options allowing system administrators to execute more granular control over inbound and outbound network traffic.
True
Network Access Control (NAC) defines a set of rules enforced in a network that the clients attempting to access the network must comply with. With NAC, policies can be enforced before or after end-stations gain access to the network. NAC can be implemented as pre-admission NAC where a host must, for example, be virus free or have patches applied before it can be allowed to connect to the network, and/or post-admission NAC, where a host is being granted/denied permissions based on its actions after it has been provided with the access to the network.
True
Network Address Translation (NAT) provides an IP proxy between a private LAN and a public network such as the Internet.
True
One of the measures for securing networking devices is the practice of disabling unnecessary services and unused ports.
True
One of the ways of confirming that a software application comes from a trusted source is the verification of its digital signature. A digitally signed software proves the identity of the developer and guarantees that the application code hasn't been tampered with since it was signed. The authenticity and integrity of the application's code can be verified by comparing results of a cryptographic hash function (original hash published by the application developer vs. hash obtained from a downloaded app).
True
One of the ways to prevent data recovery from a hard drive is to overwrite its contents. The data overwriting technique is used by drive wipe utilities which might employ different methods (including multiple overwriting rounds) to decrease the likelihood of data retrieval. As an example, a disk sanitization utility might overwrite the data on the drive with the value of one in the first pass, change that value to zero in the second pass, and finally perform five more passes, overwriting the contents with random characters (the Schneier method).
True
Permission propagation occurs when a folder or file created inside another folder takes on (inherits) permissions applied to that folder (permissions applied to the so-called parent folder propagate down to its child objects, i.e. folders and files created inside the parent folder).
True
Physical and logical network diagrams provide visual representation of network architecture. A physical network diagram contains information on hardware devices and physical links between them. A logical network diagram describes the actual traffic flow on a network and provides information related to IP addressing schemes, subnets, device roles, or protocols that are in use on the network.
True
Privacy filter (a.k.a. privacy screen) is a protective overlay placed on the computer screen that narrows the viewing angle, so the screen content is only visible directly in front of the monitor and cannot be seen by others nearby. Privacy filter is one of the countermeasures against shoulder surfing.
True
Program Compatibility Troubleshooter is a Windows system utility used for automatic resolution of problems with older applications failing to run on newer versions of MS Windows. Program Compatibility Troubleshooter can be accessed via the Troubleshooting applet in Windows 7/8/8.1/10 Control Panel. Selecting the "Run programs made for previous versions of Windows" option in the Troubleshooting applet launches a guided tool for fixing problems with older programs installed on the current version of Windows.
True
Rainbow tables are lookup tables used to speed up the process of password guessing.
True
Restarting a PC regularly might help in resolving slower performance issues as it shuts down all background processes and clears out the system memory.
True
Restoring the entire system from a known good backup copy is the most reliable method for effective malware removal.
True
Screensaver password requirement falls into the category of password best practices. A password-protected screensaver allows to block access of unauthorized persons to a user's workstation in situations where the user is forced to leave their desk.
True
Service Set Identifier (SSID) is another term for the name of a Wireless Local Area Network (WLAN). Wireless networks advertise their presence by regularly broadcasting the SSID in a special packet called beacon frame. In wireless networks with disabled security features, knowing the network SSID is enough to get access to the network. SSID also pinpoints the wireless router that acts as a Wireless Access Point (WAP). Wireless routers from the same manufacturer are frequently configured with default (well-known) SSID names. Since multiple devices with the same SSID displayed on the list of available networks create confusion and encourage accidental access by unauthorized users (applies to networks that lack security), changing the default SSID is a recommended practice.
True
Some of the Windows services require other background applications to run. If a service fails to start, one of the ways for troubleshooting such problem is to check whether all required components for a given service are also up and running. In MS Windows, the list of all connected services for a given service can be found by launching the Services (services.msc) utility, right-clicking on a service, selecting Properties, and checking the Dependencies tab.
True
Starting with the May 2019 OS release update, the minimum hard disk space requirement for both 32-bit (x86) and 64-bit (x64) editions of Windows 10 was increased to 32 GB.
True
The "Run as administrator" option in MS Windows allows users with lower-level permissions to perform tasks reserved for system administrators. This feature requires providing Administrator account credentials and temporarily elevates the current user's privileges to perform a given task. It also simplifies common system tasks, such as installation of new software, which would otherwise require logging out and switching to an admin account.
True
The "Run as administrator" option in MS Windows available after right-clicking on the Command Prompt application icon allows for execution of shell commands reserved for a system administrator.
True
The Security tab of the Internet Properties utility in Windows allows for imposing restrictions on web content allowed in Microsoft Internet Explorer web browser.
True
The Task Manager's Users tab in MS Windows allows system administrators to disconnect a user (invoke a Windows lock screen) or to sign them off (force a user to log off).
True
The Troubleshooting Control Panel applet introduced in Microsoft Windows 7 provides access to several software tools that can automatically fix common problems related to application compatibility, hardware, sound, networking, operating system, and security.
True
The basic countermeasures against application-related security risks include avoiding applications from unknown sources and keeping the already installed apps up to date with current patches and bug fixes.
True
The category of account management security best practices includes the practice of restricting user administrative privileges to operating systems and applications based on user duties. Operating systems simplify this process by introducing the concept of user groups equipped with different types of permissions which allow system administrators to simultaneously manage permissions of multiple user accounts based on group membership.
True
The importance of changing default usernames and passwords can be illustrated on the example of certain network devices (e.g. routers) which are often shipped with default and well-known admin credentials that can be looked up on the web.
True
The intermediary systems used as a platform for a DDoS attack are often referred to as zombies, and collectively as a botnet.
True
The maximum amount of supported physical memory for all editions (Core/Professional/Enterprise) of the 32-bit (x86) Windows 8/8.1 is 4 GB.
True
The process of securing a workstation should involve keeping track of available system updates and patches. A single PC running Windows can be updated and patched via the Windows Update service. A similar type of service that enables centralized management and distribution of updates and patches to multiple Windows-based hosts in a corporate environment is known as Windows Server Update Services (WSUS).
True
The term "BranchedCache" refers to a Wide Area Network (WAN) bandwidth optimization technology implemented in some versions of MS Windows. BranchCache accelerates the process of serving network content by saving previously requested WAN resources on local servers or client computers which allows the subsequent requests to be served locally rather than from a remote server.
True
The term "Mantrap" refers to a physical security access control system used to prevent unauthorized users from gaining access to restricted areas by following another person. An example mantrap could be a two-door entrance point connected to a guard station wherein a person entering mantrap from the outside remains locked inside until he/she provides authentication token required to unlock the inner door.
True
The term "Power plan" refers to a collection of hardware and system settings that manage how a Windows-based computer uses power. Available configuration options for managing power in MS Windows 8/8.1/10 can be accessed via Power Options applet in Control Panel. Windows 10 provides additional way for managing basic power settings in the Settings menu.
True
The term "Unified Threat Management" (UTM) refers to a network security solution, commonly in the form of a dedicated device (called a UTM appliance or a web security gateway), which combines the functionality of a firewall with additional safeguards such as URL filtering, content inspection, spam filtering, gateway antivirus protection, IDS/IPS functionality, or malware inspection.
True
Transmission carried out in one direction only is described as a simplex mode. Communication that takes place only in one direction at a time is referred to as half-duplex mode. Two devices communicating with each other in both directions simultaneously are said to be in full-duplex mode. Network devices supporting autonegotiation feature automatically configure best mode supported by both devices. Duplex mismatch is the term used for a situation where two devices communicate with each other using different duplex modes.
True
USB locks are mechanical devices used for blocking a computer's USB ports from unauthorized access. USB locks can also be used to prevent the removal of an external USB device attached to the computer.
True
Used without any parameters, the help command in MS Windows displays a list of available system commands along with a brief description of each command.
True
VPN connection types are divided into remote-access VPNs (used for connecting a computer to a network), and site-to-site VPNs (used for connecting networks).
True
Virus definition database files contain detection patterns for known viruses. To be effective, an AV program needs up-to-date versions of these files which can be obtained through an AV software update feature.
True
Windows Active Directory service allows for grouping users and computers into containers known as Organizational Units (OUs). An OU is the smallest unit to which system administrators can assign Group Policy settings to manage the configuration and use of accounts and resources within a given OU.
True
Windows Memory Diagnostic Tool (mdsched.exe) cannot be run inside Windows. This utility requires a system restart and is launched during next boot before loading the operating system.
True
Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) are encryption standards designed for securing wireless networks. WEP is an older standard and due to its vulnerabilities is not recommended. WPA was designed as an interim replacement for WEP, and WPA2 was introduced as the official standard offering the strongest security of the three.
True
Which of the following ensures the privacy of a VPN connection?
Tunneling
Which of the following actions would help in resolving Windows network connectivity issues?
Turning off airplane mode if enabled Adjusting wireless signal range Checking physical cable connections Rebooting router/modem Using Windows built-in troubleshooting utilities Checking network resources permissions Temporarily turning off firewalls Temporarily turning off antivirus and anti-malware Reinstalling the network adapter driver Restarting Windows Manually updating network settings
A device designed to provide emergency power during an unexpected main power source outage is called:
UPS
A type of automated OS installation process that uses an answer file and does not require user interaction or presence
Unattended installation
The Programs and Features Windows Control Panel applet can be used for:
Uninstalling applications Conducting repair installation of a malfunctioning program Adding/removing Windows components Managing installed updates
The Programs and Features Windows Control Panel applet can be used for: (Select all that apply)
Uninstalling applications Conducting repair installation of a malfunctioning program Adding/removing Windows components Managing installed updates
ups
Uninterruptible Power Supply. A device designed to provide emergency power during an unexpected main power source outage
Which of the following actions would be of help while troubleshooting printing issues in Windows OS?
Unplug and restart the printer Check cables or wireless connection Uninstall and reinstall the printer Install the latest printer driver Clear and reset the print spooler Change printer's status to "online" Print a test page
Which of the following disk status options in Windows Disk Management utility indicates that a basic or dynamic disk is not accessible and might have experienced hardware failure, corruption, or I/O errors?
Unreadable
Which of the following actions would help in optimizing Windows for faster performance?
Updating Windows and installing the latest device drivers Closing unnecessary applications and web browser tabs Making sure the system has enough virtual memory available Checking for low disk space and freeing up space (deleting unused programs / using Disk Cleanup utility) Defragmenting installed magnetic hard drives Adjusting system visual effects, such as animations and shadow effects Disabling unnecessary startup programs Checking for and removing viruses and malware Adjusting power configuration settings Restoring the PC from a system restore point Restarting the system regularly to clear out the memory Adding more RAM
Windows Vista and newer releases of the Microsoft OS offer a security feature which limits privileges of software applications and access to administrative tasks. When a program makes a change that requires administrator-level permission or a user attempts to modify system settings that require administrative access, it triggers an on-screen prompt requiring an administrator password to proceed. This functionality is known as:
User Account Control (UAC)
Which of the following answers refers to a non-proprietary remote-access tool that enables control over another computer on the network with the use of a graphical user interface?
VNC
Which of the following is a non-proprietary RDP alternative that enables control over another computer on the network with the use of a graphical user interface?
VNC
Which of the following is a dedicated device designed to manage encrypted connections established over an untrusted network such as the Internet?
VPN concentrator
Tab of the Folder Options applet (Windows 7) / File Explorer Options applet (Windows 8/8.1/10) in MS Windows contains the Advanced settings menu for files, folders, and Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) navigation pane
View
Which tab of the Folder Options applet (Windows 7) / File Explorer Options applet (Windows 8/8.1/10) in MS Windows contains the Advanced settings menu for files, folders, and Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) navigation pane?
View
A system that uses public network (such as the Internet) as a means for creating private encrypted connections between remote locations is known as:
Virtual Private Network (VPN)
Can be used as an extension of RAM
Virtual memory Paging file Swap partition
Not part of the General tab of the Folder Options applet (Windows 7) / File Explorer Options applet (Windows 8/8.1/10) in MS Windows
Visibility of hidden files, folders, or drives
Which of the following options is not part of the General tab of the Folder Options applet (Windows 7) / File Explorer Options applet (Windows 8/8.1/10) in MS Windows?
Visibility of hidden files, folders, or drives
Which of the following would be of help in troubleshooting wireless signal loss and low wireless network signal coverage?
WAP power level controls
Which of the following wireless security protocols has been discouraged in favor of newer standards due to known vulnerabilities resulting from implementation flaws?
WEP
wireless security protocols has been discouraged in favor of newer standards due to known vulnerabilities resulting from implementation flaws
WEP
Wireless network type has a design that uses mesh topology
WMN Wireless mesh network
AES-based encryption mode is a characteristic feature of:
WPA2
Which of the following is the best method to secure a small network lacking an authentication server?
WPA2-PSK
A solution that simplifies configuration of new wireless networks by enabling non-technical users to easily set up new networks, configure network security settings, and add new devices to an existing network is known as:
WPS
Which of the following wireless technologies are deprecated and should not be used due to their known vulnerabilities?
WPS WEP
Which of the following takes advantage of cell towers that provide wireless signal coverage for mobile devices?
WWAN
A solution that allows to turn on a network host remotely by sending a broadcast frame is called:
Wake-on-LAN
An optimal Wireless Access Point (WAP) antenna placement provides a countermeasure against:
War driving
Phishing scams targeting people holding high positions in an organization or business are known as:
Whaling
Which of the following is a set of firewall entries containing information on traffic considered safe enough to pass through?
Whitelist
Which of the following tools would be of help in determining the optimal WAP placement?
Wi-Fi analyzer
Long-distance line-of-sight Internet service
WiMAX
What is the maximum amount of RAM supported by different editions of 64-bit (x64) Microsoft Windows 10?
Windows 10 Home 128 GB Windows 10 Pro 2 TB Windows 10 Education 2 TB Windows 10 Enterprise6 TB
Which of the Microsoft Windows 7 editions include the BranchCache feature?Which of the Microsoft Windows 7 editions include the BranchCache feature?
Windows 7 Enterprise Windows 7 Ultimate
Which of the following Windows 7 editions do(es) not include EFS?
Windows 7 Starter Windows 7 Home Basic Windows 7 Home Premium
Which edition(s) of Microsoft Windows 7 cannot participate in a Windows domain?
Windows 7 Starter Windows 7 Home Basic Windows 7 Home Premium
Limits on physical memory for 32-bit (x86) Microsoft Windows 7
Windows 7 Starter 2GB Windows 7 Home Basic 4 GB Windows 7 Home Premium 4 GB Windows 7 Professional 4 GB Windows 7 Enterprise 4 GB Windows 7 Ultimate 4 GB
Maximum amount of RAM supported by different editions of 64-bit (x64) Microsoft Windows 7
Windows 7 Starter NA Windows 7 Home Basic 8 GB Windows 7 Home Premium 16 GB Windows 7 Professional 192 GB Windows 7 Enterprise 192 GB Windows 7 Ultimate 192 GB
What are the limits on physical memory for 64-bit (x64) Microsoft Windows 8/8.1?
Windows 8 (Core) 128 GB Windows 8 Professional 512 GB Windows 8 Enterprise 512 GB
Which of the following locations/steps allows to view network shares in Windows?
Windows Command Prompt -> net share -> Enter (all network shares) Windows Run dialog box -> \computer name -> Enter (user shares only) Shared Folders menu in the Computer Management utility (all network shares) Windows Command Prompt -> net view \\computer name -> Enter (user shares only) Windows Command Prompt -> net view \\computer name /all -> Enter (all network shares)
In Windows 8/8.1/10, Windows Defender Firewall can be enabled/disabled in:
Windows Defender Firewall Control Panel applet Firewall & network protection menu in Windows Settings (accessed via Start menu) Windows Defender Firewall Control Panel applet -> Advanced settings -> right-click on Windows Defender Firewall with Advanced Security -> Properties
Which of the following locations provides access to Windows Defender Firewall settings in Windows 8/8.1/10?
Windows Defender Firewall applet in Control Panel Windows Start button -> Settings -> Update & Security -> Windows Security -> Firewall & network protection
Which of the following locations in Windows 8/8.1/10 provides access to configuration options that would allow to block incoming echo requests?
Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound Rules -> New Rule... -> Custom -> All programs (or a single app)
Which of the following locations in Windows 8/8.1/10 provides access to configuration options that would allow to create an exception for a TCP or UDP port?
Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound/Outbound Rules -> New Rule... -> Port
Which of the following locations in Windows 8/8.1/10 provide access to configuration options for managing apps or features allowed through Windows Defender Firewall?
Windows Defender Firewall applet in Control Panel -> Turn Windows Defender Firewall on or off menu item Windows Start button -> Settings -> Update & Security -> Windows Security -> Firewall & network protection -> Allow an app through firewall Windows Defender Firewall applet in Control Panel -> Allow an app or feature through Windows Defender Firewall
Which of the following steps provide access to the Disk Cleanup utility in MS Windows?
Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) -> right-click on a drive -> Properties -> General tab -> Disk Cleanup Windows Control Panel -> Administrative Tools folder -> Disk Cleanup shortcut icon Windows Run dialog box -> type in diskmgmt.msc + press Enter -> right-click on a drive -> Properties -> General tab -> Disk Cleanup
Which of the following steps provide access to the disk defragmenter utility in MS Windows? (Select 3 answers)
Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) -> right-click on a drive -> Properties -> Tools tab -> Optimize and defragment drive -> Optimize Windows Control Panel -> Administrative Tools folder -> Defragment and Optimize Drives shortcut icon
Which of the following steps provide access to the disk defragmenter utility in MS Windows?
Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) -> right-click on a drive -> Properties -> Tools tab -> Optimize and defragment drive -> Optimize Windows Control Panel -> Administrative Tools folder -> Defragment and Optimize Drives shortcut icon Windows Run dialog box -> type in diskmgmt.msc + press Enter -> right-click on a drive -> Properties -> Tools tab -> Optimize and defragment drive -> Optimize
Which of the following locations in Windows 7 allows to create a shortcut to a shared folder or computer on a network?
Windows Explorer -> Computer -> Map network drive
Which of the following is a Windows built-in software component that monitors network traffic and depending on the configuration settings applied to each data packet either blocks it or allows it to pass through?
Windows Firewall
Which of the following Control Panel applets provides access to the Windows Firewall with Advanced Security tool?
Windows Firewall (Advanced settings)
In Windows 7, Windows Firewall can be enabled/disabled in:
Windows Firewall Control Panel applet Windows Firewall Control Panel applet -> Advanced settings -> right-click on Windows Firewall with Advanced Security -> Properties
Which of the following locations provides access to Windows Firewall settings in Windows 7?
Windows Firewall applet in Control Panel
If a recently installed app, driver, or update for Windows has a degrading effect on system performance, Windows Restore can be used to undo system changes by reverting the computer to a restore point. Methods for accessing Windows Restore include:
Windows Run dialog box -> type in rstrui.exe + press Enter Windows Run dialog box -> type in sysdm.cpl + press Enter -> System Protection tab -> System Restore... Windows Control Panel -> System applet -> Advanced system settings -> System Protection tab -> System Restore... Windows Control Panel -> Recovery applet Windows Settings menu (Windows 8/8.1/10)
Which of the following steps provide access to configuration settings for Windows system visual effects, such as animations and shadow effects?
Windows Run dialog box -> type in sysdm.cpl + press Enter -> Advanced tab -> Performance -> Settings... -> Visual Effects Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) -> right-click on the Computer icon (Windows 7) / This PC icon (Windows 8/8.1/10) -> Properties -> Advanced system settings -> Advanced tab -> Performance -> Settings... -> Visual Effects Control Panel -> System applet -> Advanced system settings -> Advanced tab -> Performance -> Settings... -> Visual Effects
locations in MS Windows provide access to an interface containing options for configuring restore settings, managing disk space, and deleting restore points
Windows Run dialog box -> type in sysdm.cpl + press Enter -> System Protection -> Configure... Control Panel (Icon view) -> Recovery -> Configure System Restore -> Configure...
Which of the following locations in MS Windows provide access to an interface containing options for configuring restore settings, managing disk space, and deleting restore points?
Windows Run dialog box -> type in sysdm.cpl + press Enter -> System Protection -> Configure... Control Panel (Icon view) -> Recovery -> Configure System Restore -> Configure...
Which of the following locations in Windows 8/8.1/10 provide access to an interface for managing startup applications?
Windows Settings (Settings -> Apps -> Startup) Startup tab of the Task Manager utility
Which of the following locations provide access to proxy settings in Windows?
Windows Settings menu -> Network & Internet -> Proxy Windows Control Panel -> Internet Options -> Connections tab -> LAN settings -> Proxy server
Which of the following locations in Windows 10 provide access to configuration options for connecting a network printer to a PC (network printer mapping)?
Windows Start button -> Settings -> Devices -> Printers & scanners -> Add printers & scanners -> Add a printer or scanner -> select a printer -> Add Device Control Panel -> Devices and Printers applet -> Add a printer
Which of the following locations in Windows 10 provide access to configuration options that allow to share a local printer with other PCs on a network?
Windows Start button -> Settings -> Devices -> Printers & scanners -> select a printer -> Manage -> Printer Properties -> Sharing tab Control Panel -> Devices and Printers applet -> right-click on a selected printer -> Printer Properties -> Sharing tab
Which of the following locations provide access to display settings in Windows 10?
Windows Start button -> Settings -> System -> Display Display settings pop-up menu launched after right-clicking on the Windows Desktop screen area
Which of the following locations enable adjustments to the volume of sound in Windows 8/8.1/10?
Windows Taskbar notification area Sound applet in Control Panel
Which of the following locations enable adjustments to the volume of sound in Windows 8/8.1/10
Windows Taskbar notification area Sound applet in Control Panel
A Microsoft online service used for patching up system vulnerabilities, improving system performance, and fixing coding errors found in Windows software is known as:
Windows Update
Which of the following terms describes a large network of Windows-based PCs under single administration?
Windows domain
Which of the following key combinations can be used to launch Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) in MS Windows?
Windows logo key + E
used to launch Windows Explorer (Windows 7) / File Explorer (Windows 8/8.1/10) in MS Windows
Windows logo key + E
Which of the following statements describing different methods for organizing Windows-based computers in networks are true?
Windows-based computers on a network must be part of a workgroup or a domain Windows-based computers on workplace networks are usually part of a domain Windows-based computers on home networks are usually part of a workgroup
The process of planning and designing new WLANs for optimal performance, security and compliance typically involves:
Wireless site survey
Uses cell towers that provide wireless signal coverage for mobile devices
Wireless wide area network (WWAN)
Which of the statements listed below apply to Windows workgroups?
Workgroups typically consist of no more than twenty computers Logging on to any computer in the workgroup requires an account on that computer Each computer in the workgroup has its own security policy
What is the name of a standalone malicious computer program that typically propagates itself over a computer network to adversely affect system resources and network bandwidth?
Worm
A type of attack aimed at exploiting vulnerability that is present in already released software but unknown to the software developer is called:
Zero-day attack
Chain of custody
a chronological record outlining persons in possession of an evidence.
Physical Address Extension (PAE)
a memory management feature that allows 32-bit CPUs to use more than 4 GB of physical memory on capable versions of Microsoft Windows operating systems
VNC (Virtual Network Computing)
a non-proprietary remote-access tool that enables control over another computer on the network with the use of a graphical user interface
Public Key Infrastructure (PKI)
a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption. Hierarchical system for the creation, management, storage, distribution, and revocation of digital certificates?
CSP (Content Security Policy)
an added layer of security that helps to detect and mitigate certain types of attacks, including Cross-Site Scripting (XSS) and data injection attacks. These attacks are used for everything from data theft to site defacement to distribute malware.
What is the name of a software tool used for finding and installing software packages on Debian and Debian-based Linux distributions?
apt-get
Which of the following answers lists the correct syntax for applying the read-only attribute to a file?
attrib +R [drive:] [path] [filename]
Which type of script file would be used to store a series of commands designed to automate tasks in DOS, OS/2 and Microsoft Windows?
bat
While trying to start their Windows machine, a user receives "Windows Boot Configuration Data file is missing required information" error message. Which of the following bootrec options should be used by a technician for manual CLI troubleshooting of this error?
bootrec /rebuildbcd
CL: Used for directory traversal
cd
Which of the following Linux command-line commands enables directory traversal?
cd
CL: Moves the command-line prompt one folder up in the directory tree (sets the prompt at the parent folder of the current folder)
cd ..
CL: Changes the current directory to the root directory
cd \
CL: used for checking the file system and status of the system's hard drives
chkdsk
Which of the following commands launches a command interpreter utility in Windows?
cmd
CL: used to copy one or more files from one location to another.
copy
Which Linux command enables copying files and directories?
cp
A low-level utility that can be used for creating/restoring filesystem backup copies in Linux is called:
dd
An MS Windows system utility designed to improve file access speed by rearranging data stored on a disk or drive is called:
defrag
Which of the following launches the Device Manager tool in Microsoft Windows?
devmgmt.msc
CL: Used to list all directory's files and subdirectories contained in the current directory
dir dir *.*
Which of the following launches a GUI system utility for managing HDDs in Windows?
diskmgmt.msc
CL: launches a text-based command-line partitioning utility
diskpart
CL: Used for preparing and modifying contents of Windows images
dism
EIDE
enhanced integrated drive electronics
CL: allows to configure it with a file system so that Windows can store information on the disk.
format
CL: displays Group Policy information for a machine or user
gpresult
CL: allows for updating multiple Group Policy settings in MS Windows
gpupdate
A Linux command-line command that enables searching files for lines containing a match to a given text pattern is called:
grep
CL: used to display help information related to a specific command-line utility
help [command name] [command name] /?
A service that enables storage of data on Apple cloud servers is called:
iCloud
Which of the following Apple services enables remote mobile device backups?
iCloud
A Linux command-line utility used for displaying and modifying network interface configuration settings is called:
ifconfig
CL: Used to display TCP/IP configuration settings
ipconfig
Which of the following Windows command-line utilities can be used to renew an IP address?
ipconfig
CL: Used for resetting the DHCP configuration settings for all adapters
ipconfig /release ipconfig /renew
Which of the following is a Linux command-line command used for configuring network interface parameters specific to the wireless communication?
iwconfig
Which of the Linux command-line commands allows to terminate a running process?
kill
Which of the following addresses can be pinged to test the functionality of a Network Interface Card (NIC)?
localhost ::1 127.0.0.1
Which of the following addresses can be pinged to test the functionality of a Network Interface Card (NIC)
localhost ::1 127.0.0.1
Which of the following Linux commands is used to display information about files and directories contained within the current working directory?
ls
Time Machine is a built-in backup utility for:
macOS
A Microsoft Windows application utility that displays details about computer's hardware configuration, computer components, software, and device drivers is known as:
msinfo32.exe
What is the name of the Linux command used for renaming files and directories?
mv
Which of the following is a Linux command for transferring files/directories to a different directory?
mv
CL: used for listing a computer's connections to shared resources
net use
Command prompt command used for listing a computer's connections to shared resources
net use
CL: lists the user accounts for the computer
net user
Command-line commands lists the user accounts for the computer
net user
Which of the following CLI tools can be used for troubleshooting DNS-related problems?
nslookup
A Linux command-line command allowing a user to change his/her own password is known as:
passwd
CL: Used for checking the reachability of a remote network host
ping
Which of the following are examples of administrative share names in Windows?
print$ IPC$
PCI DSS
provide protection for Credit cardholder data
What is the name of a Linux command-line utility used for displaying statistics of running processes?
ps
Which of the following answers lists the filename extension of a Microsoft PowerShell script files?
ps1
A Linux command displaying an absolute path to (i.e. full filename of) the current working directory is called:
pwd
Which of the following system utilities in MS Windows provides access to a database containing system configuration information?
regedit
Which other command-line command besides regedit can be used to launch registry editor in Windows?
regedt32
A command-line command in Linux used for deleting files and directories is known as:
rm
Which of the following system utilities in Windows enables managing background applications?
services.msc
CL: Scans the integrity of all protected system files and replaces incorrect versions with correct Microsoft versions
sfc
Which of the following answers refers to a script file type designed to be run in Unix command line?
sh
CL: Can be used to shut down or restart a local or remote host running MS Windows.
shutdown
The following command can be used for turning off or restarting a Linux host.
shutdown
CL: enables a full system shutdown and restart of an MS Windows host after a time-out period of two minutes
shutdown /r /t 120
CL: command for setting the time-out period of 60 seconds before powering off a Windows host
shutdown /s /t 60
Which of the following is a Linux command that allows to assume the identity of a different system user and execute commands with security privileges of that user account?
su
A Linux command that temporarily modifies security privileges to allow an execution of a single command that requires root access permissions is called:
sudo
Correct syntax for a Windows Command Prompt taskkill command that would allow to close notepad.exe by providing its imagename
taskkill /im notepad.exe
Provided that the process ID of notepad.exe obtained with the tasklist command is 1230, which of the following answers lists the correct syntax for a Windows Command Prompt taskkill command that would allow to close this application?
taskkill /pid 1230
CL: displays a list of currently running processes on a local or remote host
tasklist
CL: Tracks and displays the route taken by IPv4 packets on their way to another host
tracert
Which of the following commands is used for invoking a text editor in Unix-like operating systems?
vi
CL: allow for copying multiple files or entire directory trees from one directory to another and for copying files across a network
xcopy robocopy
Which of the following characters indicates that a Windows network share is intended for administrative access?
$
Netstat Parameters
-a Displays all connections and listening ports -e Displays Ethernet statistics -n Displays addresses and port numbers in numerical form instead of using friendly names -s Displays statistics categorized by protocol -p protocol Shows connections for the specified protocol, either TCP or UDP -r Displays the contents of the routing table interval Displays selected statistics, pausing interval seconds between each display; press [Ctrl]C to stop displaying statistics
Which type of script filename extension would be used to create a script file that extends the scope of interaction between a user and a web page?
.js
Which of the following answers refers to an example of filename extension used in a cross-platform, general-purpose programming language?
.py
Files with this filename extension are used in a scripting language based on the Microsoft's Visual Basic programming language.
.vbs
CL: enables aborting a system shutdown
/a
CL: Allows to view the physical address of a Network Interface Card (NIC)
/all
CL: Refers to an ipconfig command parameter used for displaying the full TCP/IP configuration information for all adapters
/all
CL: forces full system shutdown and restart of a Windows host
/r
CL: sfc switch enables a type of file check that scans integrity of all protected system files and repairs corrupted files when possible
/scannow
CL: copy command switch verifies that the new files are written correctly
/v
CL: suppresses the confirmation prompt displayed when Windows is about to overwrite the contents of an existing file
/y
What are the minimum system requirements for 64-bit (x64) version of Microsoft Windows 7?
1 GHz CPU 2 GB of system RAM DirectX 9 graphics device with WDDM 1.0 or higher driver 20 GB of free hard disk space
What are the minimum system requirements for 32-bit (x86) version of Microsoft Windows 10?
1 GHz CPU with support for PAE, NX, and SSE2 1 GB of system RAM Microsoft DirectX 9 graphics device with WDDM 1.0 or higher driver 16 GB of free hard disk space
What are the minimum system requirements for 32-bit (x86) version of Microsoft Windows 8/8.1?
1 GHz CPU with support for PAE, NX, and SSE2 1 GB of system RAM Microsoft DirectX 9 graphics device with WDDM 1.0 or higher driver 16 GB of free hard disk space
An IPv6 address consists of:
128 bits
An IPv4 address consists of:
32 bits
Net use
A Windows TCP/IP command that connects or disconnects a computer from a shared resource or can display information about connections.
A strong password that meets the password complexity requirement should contain:
A combination of characters from at least 3 character groups
A strong password that meets the password complexity requirement should contain: (Select the best answer)
A combination of characters from at least 3 character groups
archive bit
A flag that is set on a file after it has been created or altered. Some backup methods reset the flag to indicate that it has been backed up.
MBR (Master Boot Record)
A program that reads the partition table to find the primary partition used to boot the system.
Internet Key Exchange (IKE)
A protocol that provides the authentication material used to create the keys exchanged by ISAKMP during peer authentication in IPsec. Also sometimes referred to as IPsec Key Exchange.
FTP (File Transfer Protocol)
A protocol used to move files and folders over a network or the Internet. TCP 20 enables FTP's Data Connection to send file data TCP 21 FTP's Control Connection for administering a session
Which of the following statements apply to the definition of a computer virus? (Select 3 answers)
A self-replicating computer program containing malicious segment Requires its host application to be run to make the virus active Attaches itself to an application program or other executable componen
Which of the following statements apply to the definition of a computer virus?
A self-replicating computer program containing malicious segment Requires its host application to be run to make the virus active Attaches itself to an application program or other executable component
Main Distribution Frame (MDF)
A signal distribution frame for connecting equipment to cables and subscriber carrier equipment.
Patch panel
A simple device consisting of multiple connector blocks and ports used for cable management
Data Loss Prevention (DLP)
A system that can identify critical data, monitor how it is being accessed, and protect it from unauthorized users.
Digital Rights Management (DRM)
A type of control access technology providing protection against copyright infringements
AUP (Acceptable Use Policy)
A type of document stipulating rules of behavior to be followed by users of computers, networks, and associated resources
What is the application of No-eXecute bit (NX bit)?
A type of feature used by CPUs for isolating areas of memory to prevent the execution of code from non-executable memory location. AKA Malware protection
Certificate Authority (CA)
A type of trusted third party that issues digital certificates used for creating digital signatures and public-private key pairs
A rule-based access control mechanism implemented on routers, switches, and firewalls is known as:
ACL
Which of the following is a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object?
ACL
Most common type of DSL Internet access
ADSL
Which of the following cryptographic algorithms is the least vulnerable to attacks?
AES
Which of the following is a package management system most often used on Debian and Debian-based Linux distributions?
APT
A type of document stipulating rules of behavior to be followed by users of computers, networks, and associated resources is called:
AUP
Which of the following can be used by system/network administrators to restrict a user's ability to install software?
AUP Group Policy Principle of least privilege MDM solutionsAUP Group Policy Principle of least privilege MDM solutions
Which of the following answers refer(s) to the Windows Remote Assistance utility?
Access based on one-time password ( Missed) Temporal remote access The host and invited user can both see the host's screen The host and invited user share control over host's mouse and keyboard Windows tool used for assisted remote troubleshooting
What is the function of a laptop's smart card reader?
Access control
Which of the following answers apply to Windows BitLocker?
Accessed via BitLocker Drive Encryption applet in Windows Control Panel Does not require a TPM microcontroller to work Not included in basic versions of Windows 8/8.1/10 (Windows 8/8.1 Core and Windows 10 Home)
A drive letter in Windows can be changed by:
Accessing Disk Management, right-clicking on a drive and selecting Change Drive Letter and Paths from the context menu
A type of hierarchical database structure used in Windows Server environments that enables centralized management of devices and resources on a network is known as:
Active Directory
Which of the following would resolve problems related to excessive paging and disk thrashing?
Adding more RAM
In Windows Disk Management utility, a partition's size can be extended into:
Adjacent space on the same disk Unallocated space on the same disk
A shortcut icon to the Windows Memory Diagnostic tool (mdsched.exe) can be found in:
Administrative Tools folder in Control Panel
Active Directory Users and Computers (ADUC) is a Microsoft Management Console (MMC) snap-in included in most Windows Server OSs. The Active Directory Users and Computers snap-in allows system administrators to manage resources in the Active Directory (AD) environment (e.g. to create, delete, disable, unlock accounts, or to reset account passwords). On a Windows Server OS, the Active Directory Users and Computers snap-in resides in:
Administrative Tools folder in Windows Control Panel
Location that contains the application icon shortcut used for launching the Task Scheduler MMC snap-in
Administrative Tools menu in Windows Control Panel
Windows Task Scheduler (taskschd.msc) is a component of Microsoft Windows that provides the capability to schedule the launch of programs or scripts at pre-defined times or after specified time intervals. Which of the following locations contains the application icon shortcut used for launching the Task Scheduler MMC snap-in?
Administrative Tools menu in Windows Control Panel
Which of the following answers refers to a built-in MS Windows account with complete and unrestricted system access?
Administrator
Which of the following tabs of the Windows Internet Properties applet provides an option for rolling back all the Internet Explorer web browser configuration settings to the state they were in when Internet Explorer was first installed?
Advanced
Which tab of the System Properties (sysdm.cpl) applet in MS Windows provides access to system performance settings menu?
Advanced
Restoring data from an incremental backup requires:
All copies of incremental backups made since the last full backup Copy of the last full backup
Restoring data from an incremental backup requires:
All copies of incremental backups made since the last full backup. Copy of the last full backup
Which of the following actions may help when troubleshooting a non-responsive touchscreen on a mobile device?
All of the above
The Devices and Printers applet in Windows:
Allows to add/remove wired and wireless devices Provides a simplified view of all connected devices Allows to troubleshoot a device that isn't working properly
Which of the following describe(s) the function of Windows Task Manager?
Allows to close a non-responsive application in Windows Displays information on programs, processes, and services that are currently running on the computer Provides real-time reports on how a computer running Windows OS is using system resources (CPU/RAM/HDD/Network usage) Allows system administrators for managing the currently logged-in users
EULA (End User License Agreement)
An agreement granting the right to use software application in a manner determined by the software vendor
Transitive access
An attack involving using a third party to gain access rights.
System image
An exact copy of the entire state of a computer system
Which of the following locations in macOS provides access to application updates menu?
App Store
Which of the following locations in macOS provide access to multi-touch interface settings (a.k.a. Gestures)?
Apple menu -> System Preferences... -> Mouse Apple menu -> System Preferences... -> Trackpad
Which of the following statements describing share permissions in MS Windows are true?
Apply only to network users Can be set on a folder level
Which of the following statements describing NTFS permissions in MS Windows are true?
Apply to both network and local users Can be applied to a folder or individual file
Which of the following statements describing NTFS permissions in MS Windows are true? (Select 2 answers)
Apply to both network and local users Can be applied to a folder or individual file
Which of the following answers refers to an example of appropriate handling of customer's confidential data in a situation where troubleshooting requires user's password?
Ask user to type in the password themselves
Which of the following would be the best recommendation for a minimum password length?
At least 8 characters
Which of the following answers describe the characteristics of a non-persistent VDI?
At the end of a session, user desktop reverts to its original state Virtual desktop is shared among multiple users
Which of the following is one of the functions provided by RADIUS and TACACS servers?
Authentication
Which of the following is an example of a soft token?
Authenticator app
Unattended installation
Automated OS installation process that uses an answer file and does not require user interaction or presence
What is the name of a policy that allows employees to use private mobile devices for accessing company's restricted data and applications?
BYOD
Differential backup strategy
Backs up files and folders that have changed since the last full backup, on a daily basis. They are much quicker than full backups since less data is being backed up.
In MS Windows, a newly added drive is by default partitioned as a:
Basic disk
Examples of devices/device components regulated under special disposal procedures due to environmental/safety hazards include:
Batteries CRTs Toner cartridges
What is the name of a Microsoft Windows feature that allows for encrypting entire drives?
BitLocker
Which of the following data encryption tools can be used to secure a Windows workstation?
BitLocker (drive-level encryption) EFS (file-level encryption)
Which of the following data encryption tools can be used to secure a Windows workstation? (Select all that apply)
BitLocker (drive-level encryption) EFS (file-level encryption)
A Microsoft Windows feature specifically designed to enable encryption of removable drives is known as:
BitLocker To Go
Tethering methods used in mobile Internet connection sharing
Bluetooth Wi-fi USB cable
Which of the Apple software utilities enables installation of an alternative OS in a multiboot environment?
Boot Camp
Which of the following methods can be used to launch Windows Recovery Environment (WinRE) in Windows 8/8.1/10?
Boot from installation media In Power menu, hold down the Shift key and select Restart Boot from Recovery Drive Perform system restart from the Settings menu
Which of the configuration features listed below can be managed through the MSConfig Boot tab?
Boot logging Default OS to load in a multiboot environment Amount of hardware resources to be used by the chosen OS in a multiboot environment (e.g. the maximum amount of RAM) Safe boot options
A malware-infected networked host under remote control of a hacker is commonly referred to as a:
Bot
Which of the following terms is used to describe a collection of intermediary compromised systems that are used as a platform for a DDoS attack?
Botnet
An attack against encrypted data that relies heavily on computing power to check all possible password combinations until the correct one is found is known as:
Brute-force attack
A type of trusted third party that issues digital certificates used for creating digital signatures and public-private key pairs is known as:
CA
Which of the following terms refers to a group of experts that handle computer security breaches?
CIRT
In which of the mobile device deployment models employees can use corporate-owned devices both for work-related tasks and personal use?
COPE
Which of the following devices may pose a risk to electrical safety due to accumulated high voltage?
CRTs ( Missed) Power Supply Units (PSUs) Inverters Laser printers
Which of the following provides physical security measure against laptop theft?
Cable lock
In Windows Disk Management utility, a disk status set to Failed indicates that the basic or dynamic volume:
Cannot be started automatically Is damaged Contains corrupted file system
In forensic procedures, a chronological record outlining persons in possession of an evidence is referred to as:
Chain of custody
The User Accounts applet in Windows allows to:
Change local account name Change local account type Change local account password Manage another local account Change local User Account Control (UAC) settings
What is the function of the Linux chmod command?
Changes file access permissions
What is the function of the Linux chown command?
Changes file owner and group permissions
Which of the following actions allow(s) to improve the security of a SOHO router?
Changing default admin credentials Implementing MAC address filtering Blocking unwanted traffic via firewall settings Disabling unused physical ports Implementing content filtering Performing firmware updates Implementing physical security controls (e.g. a door lock)
A situation where multiple channels share the frequency band causing interference and performance degradation for devices operating on channels that are too close to each other
Channel overlapping
In wireless networks, a situation where multiple channels share the frequency band causing interference and performance degradation for devices operating on channels that are too close to each other is known as:
Channel overlapping
Examples of proper communication and professional skills while dealing with difficult customer include:
Clarifying customer statements by asking open ended questions to narrow the scope of the problem Restating the issue to verify understanding
A type of Windows installation that erases the contents of target partition
Clean install
If an application written for an earlier version of MS Windows doesn't run correctly, the operating system can emulate its own older version to allow a given program to work with newer hardware or software. The compatibility mode settings in Windows can be changed manually by right-clicking the program icon and:
Clicking on the Properties menu item, and then applying the required settings on the Compatibility tab
Which of the following statements describing features of Windows HomeGroups are true?
Communication between HomeGroup computers is encrypted with a pre-shared password An ad hoc home networking system for file and printer sharing HomeGroups are available only in Windows 7/8/8.1 and early versions of Windows 10
Which of the following statements describing features of Windows HomeGroups are true
Communication between HomeGroup computers is encrypted with a pre-shared password An ad hoc home networking system for file and printer sharing HomeGroups are available only in Windows 7/8/8.1 and early versions of Windows 10
MS Windows utility designed both for system administrators and for application developer
Component Services (dcomcnfg.exe)
Which of the following is an MS Windows utility designed both for system administrators and for application developers?
Component Services (dcomcnfg.exe)
CIRT
Computer Incident Response Team. A group of experts that respond to security incidents. Also known as CERT, SIRT, or IRT.
The most prominent MMC component in Administrative Tools
Computer Management
Which of the following can be used to launch the Disk Management utility in Windows?
Computer Management Windows Run dialog box Quick Access Menu (displayed after right-clicking on the Windows Start button)
Many of the utilities available in the Administrative Tools folder in Windows Control Panel are implemented as the so-called Microsoft Management Console (MMC) snap-ins. The most prominent MMC component in this folder (which contains a collection of other MMC snap-ins such as Device Manager, Disk Management, and Event Viewer) is called:
Computer Management (compmgmt.msc)
Which of the following locations provide direct access to the Device Manager applet in MS Windows?
Computer Management utility in the Administrative Tools folder in Windows Control Panel Windows Run dialog box (after typing in devmgmt.msc and pressing Enter) Windows Control Panel
The Internet Properties applet tab containing an option for configuring VPN settings is called:
Connections
Which of the Windows Internet Properties system utility tabs provides access to proxy settings?
Connections
Which of the following is an application software that selectively blocks access to websites?
Content filter
Which of the following provides access to the User Accounts applet in MS Windows?
Control Panel
Which of the following steps provide access to Windows Reliability Monitor?
Control Panel (Category view) -> System and Security -> Security and Maintenance -> Maintenance -> View reliability history Control Panel (Icon view) -> Security and Maintenance -> Maintenance -> View reliability history
Provide access to Windows Reliability Monitor
Control Panel (Category view) -> System and Security -> Security and Maintenance -> Maintenance -> View reliability history Control Panel (Icon view) -> Security and Maintenance -> Maintenance -> View reliability history
Which of the following steps in MS Windows allows to update/roll back the network adapter driver or disable/uninstall the device?
Control Panel (Icon view) -> Device Manager -> expand Network Adapters list -> right-click on the network adapter -> select Properties from the pop-up menu -> select the required action from the Driver tab ( Windows Run dialog box -> type in devmgmt.msc + press Enter -> expand Network Adapters list -> right-click on the network adapter -> select Properties from the pop-up menu -> select the required action from the Driver tab
Which of the following locations in MS Windows allows to print a test page?
Control Panel (Icon view) -> Devices and Printers -> right-click on a selected printer -> Printer Properties -> General tab -> Print Test Page
Which of the following answers describes the correct sequence of steps for accessing the magic packet settings of an Ethernet adapter in MS Windows?
Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Magic Packet settings
Which of the following answers describes the correct sequence of steps for accessing the Speed & Duplex settings of an Ethernet adapter in MS Windows?
Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Speed & Duplex settings
What is the correct sequence of steps for accessing the manual configuration interface for IPv4 connections in MS Windows?
Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields
Which of the following answers describes the correct sequence of steps for accessing the manual configuration interface for IPv4 connections in MS Windows?
Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields
Which of the following locations in MS Windows provide access to an automated printer troubleshooting tool?
Control Panel (Icon view) -> Troubleshooting -> Hardware and Sound -> Printer Control Panel (Category view) -> System and Security -> Troubleshoot common computer problems -> Printer Control Panel (Icon view) -> Devices and Printers -> right-click on a selected printer -> Troubleshoot
Locations in MS Windows provide access to an automated printer troubleshooting tool
Control Panel (Icon view) -> Troubleshooting -> Hardware and Sound -> Printer Control Panel (Category view) -> System and Security -> Troubleshoot common computer problems -> Printer Control Panel (Icon view) -> Devices and Printers -> right-click on a selected printer -> Troubleshoot
Which of the following steps enable displaying protected system files in Windows 8/8.1/10?
Control Panel -> File Explorer Options -> View tab -> Advanced settings -> select Show hidden files, folders, and drives Control Panel -> File Explorer Options -> View tab -> Advanced settings -> clear the checkbox next to Hide protected operating system files
Which of the following steps enable displaying protected system files in Windows 8/8.1/10? (Select 2 answers)
Control Panel -> File Explorer Options -> View tab -> Advanced settings -> select Show hidden files, folders, and drives Control Panel -> File Explorer Options -> View tab -> Advanced settings -> clear the checkbox next to Hide protected operating system files
Which of the following steps enable displaying protected system files in Windows 7?
Control Panel -> Folder Options -> View tab -> Advanced settings -> clear the checkbox next to Hide protected operating system files Control Panel -> Folder Options -> View tab -> Advanced settings -> select Show hidden files, folders, and drives
Which of the following steps enable displaying protected system files in Windows 7
Control Panel -> Folder Options -> View tab -> Advanced settings -> clear the checkbox next to Hide protected operating system files Control Panel -> Folder Options -> View tab -> Advanced settings -> select Show hidden files, folders, and drives
Control Panel applet in Windows can be used to check the OS version and basic hardware statistics such as the CPU type and amount of installed RAMControl Panel applet in Windows can be used to check the OS version and basic hardware statistics such as the CPU type and amount of installed RAM
Control Panel applet in Windows can be used to check the OS version and basic hardware statistics such as the CPU type and amount of installed RAM
Which of the following can be the source of RFI and cause disruptions in wireless network connectivity?
Cordless phones Car alarms Baby monitors Microwave ovens Bluetooth devices
Which edition of Microsoft Windows 8/8.1 cannot participate in a Windows domain?
Core
Which of the Microsoft Windows 8/8.1 editions does not include the BranchCache feature?
Core
Which of the following Windows 8/8.1 editions does not include the Bitlocker full drive encryption and Encrypting File System (EFS) features?
Core
Layered security
Creating multiple layers of security defenses through which an attacker must penetrate; also called defense-in-depth.
Control Panel applet in Windows allows to manage usernames and passwords for websites, connected applications and networks
Credential Manager
Which Control Panel applet in Windows allows to manage usernames and passwords for websites, connected applications and networks?
Credential Manager
The purpose of PCI DSS is to provide protection for:
Credit cardholder data
CSRF
Cross-Site Request Forgery--Third-party redirect of static content within the security context of a trusted site.
Windows Task Manager can be launched by:
Ctrl+Shift+Esc key combination Pressing Ctrl+Alt+Delete and selecting the Task Manager option from the list menu Right-clicking on the Windows Taskbar and selecting Task Manager Typing taskmgr (or taskmgr.exe) in the Command Prompt and pressing Enter Pressing simultaneously the Windows and R keys, typing taskmgr (or taskmgr.exe) in the Run window, and pressing Enter
A network protocol providing an alternative solution to the manual allocation of IP addresses is known as:
DHCP
Automatic Private IP Addressing (APIPA) addresses are valid only for communications within a network segment that a given host is connected to. A host with APIPA-assigned address (i.e. an IP address in the range between 169.254.0.1 and 169.254.255.254) cannot connect to the Internet. The assignment of APIPA address typically indicates a problem related to:
DHCP
Which of the following acronyms refers to software or hardware-based security solutions designed to detect and prevent unauthorized use and transmission of confidential information outside of the corporate network?
DLP
An Internet browser redirecting a user to a website other than intended indicates a security issue related to:
DNS
Which of the following answers refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses?
DNS
Which of the following can be used by system administrators to selectively block access to known malware sites?
DNS configuration
In order to connect to a website and display its contents, a URL entered in the web browser address bar needs to be translated into an IP address. Which of the servers listed below is used to handle this type of request?
DNS server
A type of control access technology providing protection against copyright infringements is called:
DRM
Which of the following answers describe(s) possible cause(s) of the "Missing operating system" error message displayed during system boot?
Damaged hard drive BIOS does not detect the hard drive System partition not set as active Corrupt Master Boot Record (MBR)
Characteristics of DSL modems
Dedicated bandwidth Twisted-pair copper cabling Telephone lines
Injector
Dedicated device designed to supply power to PoE equipment
Which of the following methods provides the most effective way for permanent removal of data stored on a magnetic drive?
Degaussing
Error-Correcting Code (ECC)
Detects and corrects error in a single bit Application: ECC makes 64-bit DIMM a 72-bit module
Time Domain Reflectometer (TDR)
Detects the location of a fault in a copper cable by sending an electric signal down the copper cable and measuring the time required for the signal to bounce back from the cable fault. A TDM can then mathematically calculate the location of the fault.
If a device in Windows fails after driver update, the driver can be restored to the previously installed version in:
Device Manager
Uses traditional analog telephone lines
Dial-up
Which of the following Internet access types takes advantage of PSTN lines
Dial-up
Which of the following Internet access types takes advantage of PSTN lines?
Dial-up
Which of the following settings are used for establishing a dial-up connection in Windows?
Dial-up phone number User name Password
Which password attack takes advantage of a predefined list of words?
Dictionary attack
According to the CompTIA's best practice procedures for malware removal, removing malicious software on a Windows-based system should be performed as the next step after:
Disabling System Restore
Which of the following could be of help in troubleshooting a system that attempts to boot to incorrect device?
Disconnecting any removable drives Updating boot order in BIOS
Help in preserving the integrity of a digital evidence
Disk Imaging and Hashing
Which of the following is a macOS disk maintenance tool?
Disk Utility
Which of the following macOS utilities allows to create/restore a disk image?
Disk Utility
Which of the following would be of help in preserving the integrity of a digital evidence?
Disk imaging Hashing
Advantages of the New Technology File System (NTFS) over FAT32 file system
Disk quotas Compression Object permissions Encryption
Which of the locations listed below enable access to computer display configuration settings in Windows 7/8/8.1?
Display settings pop-up menu launched after right-clicking on the Windows Desktop screen area Appearance and Personalization menu of the Windows Control Panel (Category view) The Display applet icon in Windows Control Panel (Icons view)
Netstat is a command-line utility used for:
Displaying active TCP/IP connections Displaying network protocol statistics
Net Session
Displays information about all sessions with the local computer.
An attempt to flood the bandwidth or resources of a targeted system so that it becomes overwhelmed with false requests and in result doesn't have time or resources to handle legitimate requests is called:
DoS attack
What is the name of a macOS equivalent of Windows Taskbar?
Dock
Windows repair installation:
Does not affect user applications Preserves application configuration settings Does not affect user files
Windows repair installation
Does not affect user applications Preserves application configuration settings Does not affect user files
What type of preventive physical access controls would provide a basic means for securing door access?
Door lock Proximity card reader Smart card reader
Which type of UPS provides the best power outage protection?
Double-conversion Online
Which of the following allows to create a backup copy of the entire contents of a disk drive (which may include a pre-configured OS installation) and replicate the drive to a new computer?
Drive imaging
The term "Brownout" refers to what kind of situation?
Drop in voltage
Which of the following is an MS Windows diagnostic tool for detecting display, sound, and input related problems?
DxDiag
Antistatic bags, antistatic wrist straps, and ground mats are all countermeasures used to protect computer and communications equipment components against:
ESD
An agreement granting the right to use software application in a manner determined by the software vendor is known as:
EULA
In a persistent VDI:
Each user runs their own copy of virtual desktop At the end of a session, user data and personal settings are saved
Which Microsoft Windows 10 editions include the BranchCache feature?Which Microsoft Windows 10 editions include the BranchCache feature?Which Microsoft Windows 10 editions include the BranchCache feature?
Education Enterprise
Which of the following logical security controls provides a countermeasure against unsolicited electronic messages (a.k.a. spam)?
Email filtering
Which of the following logical security controls provides a countermeasure against unsolicited electronic messages (a.k.a. spam)?Which of the following logical security controls provides a countermeasure against unsolicited electronic messages (a.k.a. spam)?
Email filtering
In order to operate, an integrated component such as Network Interface Card (NIC) may need to be first:
Enabled in the advanced BIOS settings menu
Premium versions of the Microsoft OS contain a built-in component that enables encryption of individual files. This feature is known as:
Encrypting File System (EFS)
What are the characteristics of TACACS+?
Encrypts the entire payload of the access-request packet Primarily used for device administration Separates authentication and authorization
Which of the following would be the best malware-prevention method/tool?
End user education
An antivirus software is kept up to date via:
Engine updates Virus signature updates
Which of the following terms describes the most common type of wired connections used in modern networks?
Ethernet
When a program installed in Windows stops responding or encounters an error, logs describing the error can be examined with the use of
Event Viewer
When a program installed in Windows stops responding or encounters an error, logs describing the error can be examined with the use of:
Event Viewer
Reviewing System and Application logs on a Windows-based PC might provide useful information while troubleshooting security-related issues. System and Application logs in MS Windows can be found in:
Event Viewer (eventvwr.msc)
System and Application logs in MS Windows can be found in
Event Viewer (eventvwr.msc)
What is the correct hierarchy of precedence for permissions settings in NTFS?
Explicit Deny -> Explicit Allow -> Inherited Deny -> Inherited Allow
4 GB maximum file size limit and 2 TB maximum volume size limit
FAT32
IPv6 link-local address
FE80::/10
Which of the following enable(s) biometric authentication on a mobile device?
Face, Fingerprint lock
An SSL VPN connection typically requires a dedicated VPN client application.
False
If personal files, such as email, documents, or photos are lost or deleted, Windows System Restore can be used to recover such files.
False
In NTFS, a folder or file copied from one location to another on the same volume retains its original permissions.
False
In NTFS, a folder or file moved from one location to another on the same volume inherits the permissions of its new parent folder.
False
In NTFS, permissions inherited from a parent object (e.g. a folder or user group) take precedence over permissions applied directly to an object (explicit permissions).
False
In Windows domain environment, the term "Home Folder" refers to a directory on a local PC where users can back up their data and files.
False
In a differential backup strategy, restoring data from backup requires only a working copy of the last full backup.
False
In the MBR partition style, each logical drive within the extended partition can be transformed into a bootable drive.
False
Local Users and Groups (lusrmgr.msc) is a Microsoft Management Console (MMC) snap-in included by default in all editions of MS Windows. It is used to create and manage users and groups that are stored locally on a computer.
False
On a 64-bit MS Windows OS, both 32-bit and 64-bit applications are stored in the Program Files folder.
False
Solid-State Drives (SSDs) require periodic defragmentation to improve system performance.
False
The "View by Category" option in Windows Control Panel allows for displaying entire contents of the Control Panel in a single window enabling quick access to each Control Panel applet.
False
The Local Security Policy (secpol.msc) administrative tool in home editions of MS Windows can be used by system administrators to modify account and local policies, public key policies and IP security policies for a local host.
False
The Security and Maintenance applet in Windows Control Panel provides access to Windows Firewall (Windows 7) / Windows Defender Firewall (Windows 8/8.1/10) configuration settings.
False
The maximum amount of supported physical memory for all editions (Home/Pro/Education/Enterprise) of the 32-bit (x86) Windows 10 is 8 GB.
False
Windows Phone, iOS, and Android are all examples of closed-source operating systems.
False
What is the name of a GUI-based file and folder manager application in Windows 10?
File Explorer
Which of the following locations in Windows 8/8.1/10 allows to create a shortcut to a shared folder or computer on a network?
File Explorer -> This PC -> Computer tab -> Map Network drive
Provides access to file/folder management settings in Windows 10
File Explorer Options applet in Windows Control Panel
Which of the following provides access to file/folder management settings in Windows 10?
File Explorer Options applet in Windows Control Panel
Which of the following adversely affect performance of a magnetic hard drive?
File fragmentation Excessive paging / disk thrashing Insufficient amount of RAM
A macOS file manager application is known as:
Finder
Which of the following answers refers to (a) screen lock type(s) used for securing access to a mobile device?
Fingerprint lock Face lock Swipe lock Passcode lock
Which of the following examples meets the requirement of multi-factor authentication on a mobile device?
Fingerprint scan and password ( Missed)
Which of the following macOS utilities can be used for detecting and repairing disk-related problems?
First Aid (in Disk Utility)
The /f switch of the chkdsk command-line utility in MS Windows:
Fixes errors on the disk
Which of the following provides access to file/folder management settings in Windows 7?
Folder Options applet in Windows Control Panel
Which of the Windows Active Directory Group Policy settings allows network administrators to map a folder on a user's PC to a server-based location?
Folder redirection
An unresponsive application/process in macOS can be terminated with the use of:
Force Quit
In Windows Disk Management utility on a local computer, a dynamic disk that has been moved from another computer and found by the OS is labeled as:
Foreign
This command allows to configure it with a file system so that Windows can store information on the disk.
Format
A type of transmission that takes place in two directions simultaneously is known as:
Full duplex
Which of the following regulates personal data privacy of the European Union (EU) citizens?
GDPR
A mobile device's built-in functionality enabling the usage of locator applications is known as:
GPS
What is tailgating?
Gaining unauthorized access to restricted areas by following another person
Tab of the MSConfig utility in Windows lists choices for startup configuration modes
General
Tab of the System Configuration utility in Windows contains the Diagnostic startup option
General
Which of the following tabs of the Windows Internet Properties applet provides an option for deleting temporary Internet files, cookies, web browsing history, Internet Explorer saved passwords, and saved data typed into web forms?
General
Which of the tabs of the System Configuration utility in Windows contains the Diagnostic startup option?
General
Which tab of the MSConfig utility in Windows lists choices for startup configuration modes?
General
In Windows Active Directory environment, this feature enables centralized management and configuration of operating systems, applications, and user account settings.
Group Policy
Which of the following default local groups in Microsoft Windows has the least amount of system access privileges?
Guests
A type of proprietary file system used in Apple OSs is known as:
HFS
Which of the following terms refers to an environmental control system?
HVAC
What kind of general term is used to describe the process of securing a computer system?
Hardening
Which of the following firewall types would provide the best protection for an ingress/egress point of a corporate network?
Hardware firewall Network-based firewall
Which of the following answers refers to the contents of a rainbow table entry?
Hash/Password
IPv6 addresses are expressed by using:
Hexadecimal numbers
Which of the power-saving states in MS Windows uses the least amount of power
Hibernation
Which of the power-saving states in MS Windows uses the least amount of power?
Hibernation
In MS Windows, the "$" sign appended to the end of the name of a network share indicates that the shared folder or drive is:
Hidden
Which edition of Microsoft Windows 10 cannot participate in a Windows domain?
Home
Which of the following Windows 10 editions does not include the Bitlocker full drive encryption and Encrypting File System (EFS) features?
Home
Which of the following is a common firewall type used for protecting a single computer?
Host-based firewall Software firewall
Which of the following is a common firewall type used for protecting a single computer? (Select 2 answers)
Host-based firewall Software firewall
What is the name of a network layer protocol that specifies the format of packets and addressing scheme in network communications?
IP
A type of logical numeric identifier assigned to every single computer host or other device on a TCP/IP-based network is known as:
IP address
Which of the following answers list(s) data required for manual configuration of network adapter settings in MS Windows?
IP address Subnet mask Default gateway DNS server address
Examples of secure network protocols used for establishing VPN connections include:
IPsec TLS
CompTIA's best practice procedures for malware removal
Identify and research malware symptoms. ... Quarantine the infected systems. ... Disable System Restore (in Windows). ... Remediate the infected systems. ... Schedule scans and run updates. ... Enable System Restore and create a restore point (in Windows). ... Educate the end user.
According to the CompTIA's best practice procedures for malware removal, putting a malware-infected Windows-based system into a quarantine should be the next step after:
Identifying and researching malware symptoms
Provides a simpler and less costly alternative to manual OS installation in an environment consisting of multiple hosts requiring the same configuration settings
Image deployment
Which of the following terms is used a synonym for the bare-metal backup concept?
Image-level backup
synonym for the bare-metal backup concept
Image-level backup
Characteristics of fiber-optic network cabling
Immunity to electromagnetic interference More suitable for carrying digital information than copper cabling Used for network backbone cabling
Which social engineering attack relies on identity theft?
Impersonation
operating system installation type that preserves system settings, personal files, and applications from the older OS version
In-place upgrade
Which of the following destruction tools/methods allow for secure disposal of physical documents
Incineration Shredder
Which of the following actions would be of help while troubleshooting a mobile device's intermittent wireless connectivity problems?
Increase the signal strength (adjust power level controls on a WAP, or move closer to a WAP) Switch to a different WAP Check for interference from wireless devices operating in the 2.4 GHz frequency band (e.g. cordless phones, Bluetooth devices, or microwave ovens) Reduce the number of wireless devices using up available bandwidth on the network Configure a WAP to operate on a different wireless channel Switch to the 5 GHz frequency band
What is the function of archive bit?
Indicating whether a file has been modified since the last backup
Multiboot
Install more than one operating system and then choose which OS to use during each startup.
IEEE
Institute of Electrical and Electronic Engineers. International organization with a focus on electrical, electronics, and information technology topics. IEEE standards are well respected and followed by vendors around the world.
Which of the following is a basic variable type designed to store whole numbers?
Integer
Enables simultaneous digital transmission of voice, video, data, and other network services over a PSTN
Integrated Services Digital Network (ISDN)
In forensic analysis, taking hashes ensures that the collected digital evidence retains:
Integrity
Which of the following locations in Windows provide access to dial-up and VPN settings?
Internet Options (Connections tab) Network and Sharing Center Settings menu
Which of the following locations in MS Windows provide(s) access to the Internet Properties (inetcpl.cpl) system utility?
Internet Options applet in Windows Control Panel Network and Sharing Center applet in Windows Control Panel Windows Run dialog box (after typing in inetcpl.cpl and pressing Enter) Internet Options menu item in Internet Explorer's Tools menu
Which of the following utilities in Windows provides access to configuration options of a built-in pop-up blocker?
Internet Properties (inetcpl.cpl)
utilities in Windows provides access to configuration options of a built-in pop-up blocker
Internet Properties (inetcpl.cpl)
SNMP
Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behavior. An SNMP Agent receives requests on UDP port: 161 An SNMP management station receives SNMP notifications on 162
Which of the following settings are used for establishing a VPN connection in Windows?
Internet address (domain name or IPv4/IPv6 address) Destination name Smart card (optional)
Which of the following settings are used for establishing a VPN connection in Windows? (Select 3 answers)
Internet address (domain name or IPv4/IPv6 address) Destination name Smart card (optional)
According to the CompTIA's best practice procedures for malware removal, disabling System Restore on a malware-infected Windows-based system should be performed as the next step after:
Isolating the infected system
Which of the following authentication protocols can be used to enable SSO in Windows-based network environments?
Kerberos
Which of the following are examples of hardware tokens?
Key fob RFID badge Smart card
A password management system in macOS is known as:
Keychain
Which of the following is an example of spyware?
Keylogger
ext3 and ext4 are examples of default file systems used by:
Linux distributions
Which of the following is an example of good communication skills when dealing with a customer?
Listening to the customer and avoiding interruptions until he or she has finished describing the problem
Which of the following Microsoft Windows components allow system administrators to enable/disable user accounts?
Local Users and Groups in Computer Management User Accounts in Control Panel
The /r switch of the chkdsk command-line utility in Windows:
Locates bad sectors and recovers readable information Fixes errors on the disk
Which of the following statements apply to Windows domains?
Logging on to any computer on a Windows domain requires a single set of credentials Security policies and permissions on a Windows domain are administered centrally Windows domains are based on client-server networking architecture
On a Windows domain, this tool can be used by system administrators to configure initial desktop environment (which may include mapping a network drive or setting up access to a shared printer) for a specific user.
Login script
Which of the following account management security measures narrows down a user's computer access to specified hours?
Login time restrictions
Which of the following answers refers to a basic programming construct that repeats a sequence of instructions until a specified condition is reached?
Loop
Which of the following terms is used to describe initial hard drive formatting typically performed at the factory by the drive manufacturer?
Low-level format
What is the name of a logical security access control method in which a 48-bit physical address assigned to each Network Interface Card (NIC) is used to determine access to the network?
MAC address filtering
What is the name of a network security access control method in which a 48-bit physical address assigned to each network card is used to determine access to the network?
MAC filtering
Which of the following facilitates the enforcement of mobile device policies and procedures?
MDM
Which type of software enables a centralized administration of mobile devices?
MDM
Relies on intercepting and altering data sent between two networked hosts?
MITM attack
Which of the following attacks relies on intercepting and altering data sent between two networked hosts?
MITM attack
A type of customizable framework providing access to a collection of system tools designed to manage networks, computers, services, and other system components in Windows is known as:
MMC
System Restore
MS Windows system utility that allows to roll back system files and settings to an earlier point in time
A document describing procedures for safe handling, use, storage and disposal of potentially hazardous materials is called:
MSDS
Which of the following answers refers to the MS Windows client application for Remote Desktop Services (RDS)?
MSTSC
Disabling SSID broadcast:
Makes a WLAN harder to discover
Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as:
Malware
Partition Styles:
Master Boot Record (MBR) GUID Partition Table (GPT)
Which of the following password policy settings prevents attackers using cracked passwords from gaining permanent access to a Windows workstation?
Maximum password age setting
Which of the following is a Microsoft Windows home theater software included in MS Windows versions prior to Windows 10?
Media Center
Order of volatility for a typical computer system
Memory dump, temporary files, disk files, archival media
Which of the answers listed below refers to an example order of volatility for a typical computer system?
Memory dump, temporary files, disk files, archival media
Network topology provides the most redundancy
Mesh
Which password policy setting prevents users from repeatedly changing their passwords to bypass the password history policy setting and get back to their original/preferred password?
Minimum password age setting
A macOS system feature providing single-screen thumbnail preview of all open windows and applications is known as:
Mission Control
Common causes for a black/blank PC screen include:
Monitor connectivity issues Video adapter driver updates Recent updates or installations
If a computer's hard disk has an adequate free disk space, it is possible to install more than one operating system and then choose which OS to use during each startup.
Multiboot
Advantages of organizing hard drive space into multiple partitions
Multiboot environment Separated disk space used for virtual memory Separation of user files from the operating system and application files
Methods of storing and accessing data over computer network
NFS(Network File System) and DFS(Distributed File System)
Which of the following statements are true?
NTFS permissions apply to both network and local users NTFS permissions can be applied to a folder or individual file
NIST
National Institute of Standards and Technology. NIST is a part of the U.S. Department of Commerce, and it includes an Information Technology Laboratory (ITL). The ITL publishes special publications related to security that are freely available for download here: http:// csrc.nist.gov/ publications/ PubsSPs.html.
Which of the following enable installation of an OS via network interface?
Netboot PXE
Installation of an OS via network interface
Netboot and PXE
Which of the Control Panel applets in Windows 8/8.1/10 can be used for checking basic information about the network connection status and setting up network connections?
Network and Sharing Center
What type of configuration info is used for setting up a wireless connection in Windows?
Network name Encryption type Security type Security key
IPv4 link-local addresses
Non-routable IP address APIPA address 169.254.0.0/16
What is the theoretical limit of addressable RAM for a 64-bit CPU?
None of the above
A simple Windows text-editing utility that can be launched from any place in the Command Prompt without the need for specifying path to the application's executable file location is called:
Notepad
Which of the following would be the most important considerations when installing computer applications?
OS compatibility Minimum amount of drive space Minimum amount of RAM
Which of the following disk status options in Windows Disk Management utility indicates that a dynamic disk might be corrupted or intermittently unavailable?
Offline
Which of the following answers refer to a very basic UPS type commonly used for protecting a single PC?
Offline Standby
Which of the following answers refer to a very basic UPS type commonly used for protecting a single PC?
Offline Standby
Very basic UPS type commonly used for protecting a single PC
Offline Standby
What is the correct sequence of steps required to close a non-responsive user application in Task Manager in Windows 7?
On the Applications tab, right-click the program that isn't responding, click End Task button
Which of the following answers describes the correct sequence of steps required to close a non-responsive user application or process in Task Manager in Windows 8/8.1/10?
On the Processes tab, right-click the program/process that isn't responding, click End Task button
GUID Partition Table (GPT)
One of two methods used to organize partitions on a hard drive. A GPT partitioning system installed on a hard drive can support 128 partitions and is recommended for drives larger than 2 TB. Compare with Master Boot Record (MBR).
In Windows Disk Management utility, a normal disk status indicating that the disk is ready for read/write operations is labeled as:
Online
Which type of UPS provides the best power outage protection?
Online Double-conversion
Which of the following disk status options in Windows Disk Management utility indicates Input/Output (I/O) errors on a dynamic disk/volume?
Online (Errors) Healthy (At Risk)
If a network adapter's "Speed & Duplex" property is set to Half Duplex, communication on the network will be taking place:
Only in one direction at a time
What type of software licensing model grants free access to the application code as well as permission to modify and redistribute the application?
Open source
Hide extensions for known file types in Windows 8/8.1/10
Open the File Explorer Options applet in Windows Control Panel, then select Hide extensions for known file types in the Advanced settings on the View tab
Which of the following allows to hide extensions for known file types in Windows 8/8.1/10?
Open the File Explorer Options applet in Windows Control Panel, then select Hide extensions for known file types in the Advanced settings on the View tab
View hidden files, folders, and drives in Windows 8/8.1/10
Open the File Explorer Options applet in Windows Control Panel, then select Show hidden files, folders, and drives in the Advanced settings on the View tab
Which of the following allows to view hidden files, folders, and drives in Windows 8/8.1/10?
Open the File Explorer Options applet in Windows Control Panel, then select Show hidden files, folders, and drives in the Advanced settings on the View tab
Hide extensions for known file types in Windows 7
Open the Folder Options applet in Windows Control Panel, then select Hide extensions for known file types in the Advanced settings on the View tab
Which of the following allows to hide extensions for known file types in Windows 7?
Open the Folder Options applet in Windows Control Panel, then select Hide extensions for known file types in the Advanced settings on the View tab
View hidden files, folders, and drives in Windows 7
Open the Folder Options applet in Windows Control Panel, then select Show hidden files, folders, and drives in the Advanced settings on the View tab
Which of the following allows to view hidden files, folders, and drives in Windows 7?
Open the Folder Options applet in Windows Control Panel, then select Show hidden files, folders, and drives in the Advanced settings on the View tab
In-place upgrade
Operating system installation type that preserves system settings, personal files, and applications from the older OS version
In forensic procedures, a sequence of steps in which different types of evidence should be collected is known as:
Order of volatility
Available options of the Master Boot Record (MBR) partition style
Overall number of partitions limited to four Up to three primary partitions and one extended partition Up to four primary partitions
The US Health Insurance Portability and Accountability Act (HIPAA) provides privacy protection for:
PHI
Which of the following acronyms refers to any type of information pertaining to an individual that can be used to uniquely identify that person?
PII
Which of the following answers refers to a hierarchical system for the creation, management, storage, distribution, and revocation of digital certificates?
PKI
Which of the following are common applications of barcode scanners?
POS Inventory management
Which of the following answers refers to an example of content filtering configuration setting on a SOHO router?
Parental controls
Which of the following examples meets the requirement of multi-factor authentication?
Password and biometric scan
Which of the following password best practices would mitigate the security risk posed by temporary workers?
Password expiration
Which of the following password policy settings determines the number of unique new passwords that must be associated with a user account before an old password can be reused?
Password history setting
The two factors that are considered important for creating strong passwords are:
Password length Password complexity
Which of the Windows Task Manager tabs in Windows 8/8.1/10 includes the information about the network resources usage listed under Networking tab in previous releases of the Microsoft OS?
Performance
Tool in MS Windows is used to examine (both in real time and by collecting log data for later analysis) how programs that are run affect a computer's performance
Performance Monitor (perfmon.exe)
Used to examine (both in real time and by collecting log data for later analysis) how programs that are run affect a computer's performance
Performance Monitor (perfmon.exe)
Which of the following tools in Windows provide access to real-time performance data on CPU, RAM, hard drive, and network interface utilization?
Performance Monitor (perfmon.exe) Resource Monitor (resmon.exe) Task Manager (taskmgr.exe)
Which of the following answers describe the features of Windows Remote Desktop tool?
Permanent remote access Access based on local password (local user account password) Windows tool used for connecting remotely to the user's own computer
A social engineering technique whereby attackers under disguise of a legitimate request attempt to gain access to confidential information is known as:
Phishing
A fraudulent email requesting its recipient to reveal sensitive information (e.g. username and password) used later by an attacker for the purpose of identity theft is an example of: (Select 2 answers)
Phishing Social engineering
Protection provided by security guards is an example of:
Physical security control
Which of the following solutions will allow a server with a private IP address to handle requests from an outside (public) network?
Port forwarding
What is the name of a router configuration feature that allows to open an inbound port based on the outbound requests made by hosts placed inside a private network?
Port triggering
Which user group in Windows (applies to Windows 7 and earlier versions) had rights and permissions that allowed its members to perform specific administrator-level tasks?
Power Users
Which WAP configuration setting allows for adjusting the boundary range of a wireless signal?
Power level controls
What does the term "Blackout" refer to?
Power outage
PoE
Power over Ethernet. Using a single twisted-pair Ethernet cable to carry both data and electrical power
In Windows Disk Management utility, a dynamic disk status set to Offline/Missing indicates that the missing disk may be:
Powered down Corrupted Disconnected
In Windows Disk Management utility, initializing a disk:
Prepares a newly added disk for use by Windows Erases data on disk
Which of the following actions would be of help while troubleshooting a black/blank screen on a Windows-based PC?
Press Windows logo key + Ctrl + Shift + B to wake the screen Press Ctrl + Alt + Delete and try logging in Check the video output connection / Reconnect the monitor Remove third-party antivirus software (safe mode) Roll back the video adapter driver (safe mode) Check video adapter's compatibility (HCL)
What are the characteristic features of RADIUS
Primarily used for network access Combines authentication and authorization Encrypts only the password in the access-request packet
What are the characteristic features of RADIUS?
Primarily used for network access Combines authentication and authorization Encrypts only the password in the access-request packet
allow for administering print devices in Microsoft Windows
Printers applet in Control Panel in Windows OSs prior to Windows 7 Devices and Printers applet in Control Panel in Windows 7 and newer Microsoft OSs Print Management utility in the Administrative Tools folder (not available in home editions of MS Windows)
Allow for administering print devices in Microsoft Windows
Printers applet in Control Panel in Windows OSs prior to Windows 7 Devices and Printers applet in Control Panel in Windows 7 and newer Microsoft OSs Print Management utility in the Administrative Tools folder (not available in home editions of MS Windows)
A Windows Internet Properties applet tab containing an option for managing pop-up windows displayed by websites is called:
Privacy
What is the name of a Windows Internet Properties applet tab providing access to advanced cookie management options?
Privacy
PLC
Programmable logic controller-A type of technology that enables sending data over wiring used for transmission of electrical power
A Windows Internet Properties system utility tab containing an option for managing Internet Explorer web browser add-ons is called:
Programs
Which of the following Control Panel applets in Windows provides options to uninstall, change, or repair applications?
Programs and Features
Control Panel applets in Windows provides options to uninstall, change, or repair application.
Programs and features
Telnet
Provides username & password authentication Transmits data in an unencrypted form Enables remote login and command execution
If a device in Windows fails after driver update, the driver can be restored to the previously installed version in
Device Manager
net view
Displays a list of domains, computers, or resources that are being shared by the specified computer.
net share
Displays local shares, including administrative and hidden. Displays information about all of the resources that are shared on the local computer.
Physical Address Extension (PAE), No-eXecute bit (NX bit), and Streaming SIMD Extensions 2 (SSE2) are mandatory CPU requirements for Microsoft Windows 7/8/8.1/10, therefore Windows 7/8/8.1/10 cannot be installed on computer systems that lack support for these features.
False
The function of the NetBT protocol is to allow NetBIOS services to be used over TCP/IP networks.
True
The function of the ODBC Data Sources (odbcad32.exe) configuration utility in Windows is to facilitate communication between applications and varying types of databases.
True
Windows command-line commands allow for copying multiple files or entire directory trees from one directory to another and for copying files across a network
xcopy robocopy
A 32-bit system typically provides support for up to:
4 GB of RAM
SLP (Service Location Protocol)
427 allows computers and other devices to find services in a local area network without prior configuration.
CIFS (Common Internet File System)
445 A file access protocol. CIFS runs over TCP/IP and is the cross-platform version of SMB used between Windows, UNIX, and other operating systems.
SMB (Server Message Block)
445 A protocol that works on the Application layer and is used to share files, serial ports, printers, and communications devices, including mail slots and named pipes, between computers.
EPP/ECP
(Enhanced Parallel Port/Enhanced Capability Port) a standard signaling method for bi-directional parallel communication between a computer and peripheral devices that offers the potential for much higher rates of data transfer than the original parallel signaling methods. EPP is for non-printer peripherals. ECP is for printers and scanners.
What are the minimum system requirements for 32-bit (x86) version of Microsoft Windows 7?
1 GB of system RAM DirectX 9 graphics device with WDDM 1.0 or higher driver 16 GB of free hard disk space 1 GHz CPU
What are the minimum system requirements for 64-bit (x64) version of Microsoft Windows 10?
1 GHz CPU with support for PAE, NX, and SSE2 2 GB of system RAM Microsoft DirectX 9 graphics device with WDDM 1.0 or higher driver 20 GB of free hard disk space
Partition types
1. Primary 2. Logical 3. Extended Primary partition is a bootable partition and it contains the operating system/s of the computer, while logical partition is a partition that is not bootable. Multiple logical partitions allow storing data in an organized manner. An extended partition is a partition that can be divided into additional logical drives. Unlike a primary partition, you don't need to assign it a drive letter and install a file system. Instead, you can use the operating system to create an additional number of logical drives within the extended partition.
The GPT partition style extends the MBR's primary partition limit to
128 primary partitions
NetBIOS (Network Basic Input/Output System)
137-139 Protocol that operates at the Session layer of the OSI seven-layer model. This protocol creates and manages connections based on the names of the computers involved. Used when a WINS server tries to resolve a host name into an IP address on a Windows-based LAN
What are the minimum system requirements for 64-bit (x64) version of Microsoft Windows 8/8.1?
2 GB of system RAM Microsoft DirectX 9 graphics device with WDDM 1.0 or higher driver 20 GB of free hard disk space 1 GHz CPU with support for PAE, NX, and SSE2
Disk storage types used with MS Windows
Basic & Dynamic: Dynamic disks provide features that basic disks do not, such as the ability to create volumes that span multiple disks (spanned and striped volumes) and the ability to create fault-tolerant volumes (mirrored and RAID-5 volumes). A newly added drive is by default partitioned as a basic disk.
Configuration features listed below that can be managed through the MSConfig Boot tab
Boot logging Default OS to load in a multiboot environment Amount of hardware resources to be used by the chosen OS in a multiboot environment (e.g. the maximum amount of RAM) Safe boot options
Refresh
Built-in options added in Windows 8 enables OS reinstallation without affecting the existing user profiles and settings
A file system designed for optical media
CDFS (Compact Disc File system)
Network connections implemented with the use of a cable modem take advantage of:
Cabling that carries TV signals Coaxial cabling Shared bandwidth
The System Configuration utility in MS Windows can be launched by:
Double-clicking on the System Configuration icon shortcut in the Administrative Tools folder Typing msconfig (or msconfig.exe) in the Command Prompt and pressing Enter Pressing simultaneously the Windows and R keys, typing msconfig (or msconfig.exe) in the Run window, and pressing Enter
DHCP
Dynamic Host Configuration Protocol network management protocol used on Internet Protocol networks for automatically assigning IP addresses and other communication parameters to devices connected to the network using a client-server architecture. Runs on UDP Port 67, 68
Characteristic traits of a network switch
Forwarding decisions made in hardware (ASIC) Typically capable of connecting more network segments than bridge (more physical ports) Sometimes referred to as multiport bridge Newer and more effective type of network device in comparison to network bridge
Features of a network bridge
Forwarding decisions made in software Typically capable of connecting fewer network segments than switch (fewer physical ports) Older and less effective type of network device in comparison to network switch
Demarcation point
In telephony, the demarcation point is the point at which the public switched telephone network ends and connects with the customer's on-premises wiring.
LDAP
Lightweight Directory Access Protocol 389
Microsoft Windows components that allow system administrators to enable/disable user accounts
Local Users and Groups in Computer Management User Accounts in Control Panel
Recovery partition
Replaced removable media used for reformatting hard drives and restoring an operating system to the original factory condition
A permanent IP address assignment from a DHCP server
Reservation
A device designed to filter and transfer IP packets between dissimilar types of computer networks
Router
System Configuration utility tab containing a list of background applications that can be enabled/disabled during system startup
Services
MS Windows Administrative Tools folder applet for managing background applications
Services (services.msc)
image deployment
Simpler and less costly alternative to manual OS installation in an environment consisting of multiple hosts requiring the same configuration settings
type of VPN enables connectivity between two networks
Site-to-site
Improves network performance by dividing a given network segment into separate collision domains
Switch
Prior to Windows 8, the MSConfig Startup tab contained a list of user applications that could be enabled/disabled during system boot. The contents of this tab are not available in the MSConfig utility shipped with Windows 8/8.1/10.
True
Dynamic Host Configuration Protocol (DHCP) allows for static allocation of an IP address based on an IP-to-MAC address mapping.
True
Networked clients not residing on the same subnet as a DHCP server can still obtain an IP address from the server through a DHCP relay agent
True
Physical Address Extension (PAE) is a memory management feature that allows 32-bit CPUs to use more than 4 GB of physical memory.
True
Net accounts
Updates the user accounts database and modifies password and logon requirements for all accounts. Used to set the policy settings on local computer, such as Account policies and password policies.
Clean install
Windows installation that erases the contents of target partition
IPv4 addresses are expressed by using:
decimal numbers
Microsoft-proprietary file system optimized for flash drives
exFAT
Command used to display help information related to a specific command-line utility
help [command name] [command name] /?