Comptia core 2 A + Test, Comptia Core 2 practice questions
A Windows user runs the Performance Monitor tool to check disk activity. What counter is the best option the user can evaluate to understand how busy the disk is at any given time?
% disk time metric is the percentage of elapsed time that the selected disk drive is busy servicing read or write requests.
A user would like to adjust the power plan concerning what happens when closing the lid of their laptop computer. What are additional power management settings available under the advanced Power Options applet in a Microsoft Windows 2010 operating system? (Select all that apply.)
- Display brightness - Search and indexing behavior - Universal Serial Bus (USB) selective suspend
What parameter is used with the pathping command to specify the number of hops to include in the trace?
-h
Which option can be used with the "ping" command to specify the number of echo requests to send?
-n
Which option can be used with the "hostname" command to set the hostname of a computer in Windows?
-name
While implementing security on a small network, an administrator ensures that any data modification is legitimate. What security property pertains to this principle?
.Integrity
What is a shell script written for the basic Windows CMD interpreter?
.bat
A technician is working on a project that uses interactive web-based content. What type of script could the technician use to support the development of this interactive content?
.js
What starts with a shebang line designating which interpreter to use, such as Bash or Ksh?
.sh
What file extension/scripting language based on Microsoft's Visual Basic programming language predates PowerShell
.vbs Predates
What parameter is used with the robocopy command to copy only files that have changed?
/XO
What parameter is used with the format command to specify the file system?
/fs:
Which parameter is used to perform a quick format on a drive?
/q
Which option can be used with the "rmdir" command to remove a directory and its contents recursively?
/r
What parameter is used with the sfc command to scan for and repair system files without prompting for source files?
/scannow
What is the block size of the Advanced Encryption Standard (AES)?
128 bits
What is the maximum amount of partitions for a basic disk using GUID Partition Table (GPT) partition style with
128gb
What is the maximum memory supported for the base editions of Windows 8 64-bit Windows 8.1 64-bit?
128gb
What is the maximum amount of RAM that can be addressed on a system with a 32-bit version of Windows 7?
4GB
No os found
>Enter bootrec /fixboot ("NO OS found") > press START+CTRL+SHIFT+B (refresh screen)
screen keeps turning black workstation must be restarted
>Enter bootrec /rebuildbcd (since no bootconfigdata) >START+CTRL+SHIFT+B(refresh screen) > try chkdsk,sfc,updating graphics driver,or roll back graphics driver
A user experiences a blue screen of death (BSoD) while using a Windows computer. What does a support technician determine to be a good first troubleshooting step?
A Windows blue screen of death (BSoD) is often caused by hardware. A good first step is to determine what on the system has changed.
A user would like to install an updated Windows operating system (OS) on a computer. There are no files that need to be saved. What options does the user have to accomplish this? (Select all that apply.)
A clean install of an OS is an installation option where no previous operating system will be repaired. This is a good option for a new install. An in-place upgrade means running setup from an existing version of the OS so that third-party applications, user settings, and data files are kept and made available in the new version
A new support technician works on entry-level trouble tickets. Which question does the technician use as a closed type of question?
A closed question is one that can only be answered with a "Yes" or "No" or that requires some other fixed response What did the message say?
What is the main difference between a Windows domain and a Windows workgroup?
A domain allows for centralized management, while a workgroup does not.
A technician would like to set every Windows computer at an organization to have a company logo as a desktop wallpaper. What does the technician determine as the best method for deploying the setting?
A domain group policy configures computer settings and user profile settings for all computers and user accounts within a domain
How does a Windows domain differ from a Windows workgroup in terms of security?
A domain has centralized security, while a workgroup has decentralized security.
What is a Hard Token?
A physical device used to authenticate a user's identity
What is the Principle of Least Privilege?
A security principle that states that users should only have access to the minimum amount of privileges necessary to perform their job.
A computer user looks to map a network drive using the most basic scripting language possible. Which language does the user implement for a Windows system?
A shell script written for the basic Windows CMD interpreter is often described as a batch script. Batch script
What is a soft token?
A software-based authentication system
A systems administrator looks to have a daily backup of a server located across a wide area network (WAN) link. As the link is not fast, the administrator creates a backup scheme that uses little to no bandwidth and acquires an entire backup of the system. Which scheme does the administrator implement?
A synthetic backup is an option for creating full backups with lower data transfer requirements
A new help desk technician fields a support call from a user. What initial information does the technician ask the user to provide? (Select all that apply.)
A.Description of the issue B.Contact details
While the C: drive is usually the primary drive (where the Windows installation resides), what drive navigation input would get a user to a file named "audit" on a floppy disk drive of a typical PC?
A:\ audit
Which proprietary file system does a Mac workstation use?
APFS
A user works with sensitive information and has configured their computer to lock after five minutes of inactivity. However, the user also has a complex password and is tired of typing it in every time the computer locks. Where can the user configure a biometric reader to log in rather than use the password?
Account settings
system administrators to apply policies and configurations to groups of user accounts and client PCs?
Active Directory
What uses domain names of components loading on the web page against a vast blacklist?
Ad blocker
A cyber technician working on a desktop computer attempts to reach the Windows Defender Firewall in the Control Panel. What shortcut within the Control Panel contains the advanced configuration consoles?
Admin tools
The Administrative Tools shortcut, located within the Control Panel, is home to what?
Advanced Windows configuration consoles
Windows Pro edition comes with a host of management features designed to allow network administrators more control over each client device, and there is also a Pro for Workstations edition. What additional feature will it provide?
Advanced hardware support
An iOS smart device user notices that AirDrop is not working properly as files are not being received. What should the user check while troubleshooting? (Select all that apply.)
AirDrop over a Bluetooth connection the sender of a file must be listed in the recipient's contacts list, or AirDrop must be configured to receive files from everyone.
A user upgrades the memory in a Windows corporate workstation from 4 GB to 8 GB. After the upgrade, the user notices that only 4 GB is recognized by the system. What does the user conclude the problem to be?
All 32-bit Windows editions are limited to 4 GB of system memory.
A user claims that they cannot browse the local shared network by name. After evaluating the computer's IP settings and pinging the local share by IP address with no problem, what does a support technician determine as the cause?
All hosts on a network require the use of a domain name server IP address for network communications using host names.
Which of the following is true about a file when it is copied from an NTFS to a FAT32 partitions?
All of the file permissions are lost
Which of the following is a benefit of using Active Directory Security Groups?
Allows for easier management of user privileges
A user loses their company smartphone while traveling. The IT department initiates the securest measure possible to impact work-related data only. What action does the IT department take?
An enterprise wipe can be performed against the corporate/work container only. This removes any corporate accounts and files but leaves personal items on the phone
A new support technician interfaces with a user that has a computer problem. While discussing the problem, the technician gives undivided attention to the user and asks questions where the person creates their own response. When discussing the problem, what does the technician practice? (Select all that apply.)
An open-ended question Active listening
A company employee is trying to install a video editing app on the desktop by running the setup program, but the program will not install. Why is the employee having trouble with the installation?
App settings
Which of the following is the default package manager for the Ubuntu Linux distribution?
Apt
Which of the following is an example of biometric authentication?
B. Retina scan C. Fingerprint scan D. Voice recognition
What is the first step when performing an in-place upgrade of Windows on a computer?
Backup all important files and data
A company looks to dispose of old computer equipment. Which items require special care? (Select all that apply.)
Batteries Toner Motherboard
What type of authentication is used by a fingerprint scanner?
Biometric authentication
What can use a trusted platform module chip in the computer to tie the use of a fixed disk to a particular motherboard?
BitLocker
What is the name of a Microsoft Windows feature that allows for encrypting entire drives?
BitLocker
How does BitLocker differ from EFS (Encrypting File System)?
BitLocker encrypts the entire hard drive while EFS encrypts individual files
Which of the following is not a feature of Windows 10 Home edition? (Choose TWO)
Bitlocker and Hyper-V virtualization
An iOS user struggles with wirelessly connecting a set of headphones to a phone. What does the user check on the phone while troubleshooting? (Select all that apply.)
Bluetooth Pairing Mode
Occasionally voltage dips below expected levels causing issues for computing infrastructure. What term defines this situation
Brownout
What is the purpose of Temporal Key Integrity Protocol (TKIP)?
C. To provide data integrity and confidentiality
What is the command used to display all hidden files and directories in a directory, using the "dir" command in the Windows command line?
C. dir /a:h
What is used by HTTPS to verify the authenticity of the server as well as provide encryption for the HTTP protocol?
Certificate
To prove the identity of a user, computer, or service, which Microsoft Windows console provides a mechanism to authenticate users and validate whom they say they are through a third party?
Certificate Manager
When making major adjustments to a project, a security technician will have to assess the business and technical merits as well as the risks of the adjustment plan. What documentation will need to be submitted?
Change board approvals are when a serious change request is made, and approvals go to a change advisory board (CAB
A technician configures a legacy computer for a user. Which account authentication policies does the technician implement? (Select all that apply.)
Change the default admin password. Disable the guest account.
Which Windows desktop style features a start menu and a taskbar?
Classic
What default console provides an administrator the ability to schedule tasks and configure disks, services, devices, and local users and groups?
Computer Management (compmgmt.msc)
break the monitor open and electrocute themselves on the capacitors inside. What type of monitor did they disassemble?
Crt
A tech has an Android tablet that no longer receives updates due to its age. Learning that a custom firmware with new features is available, what does the tech require to install the image?
Custom firmware is essentially a new Android OS image applied to the device and requires root access to install.
A " no operating system found " message appears when the computer is rebooted after a technician installs Windows 10 on the computer with the hard drive partition style set to support Unified Extensible Firmware Interface (UEFI). Determine which of the following scenarios would generate that message.
Damaged hard drive
A user suspects that a USB drive on their system has been tampered with. The user begins using the drive by saving a few reports while waiting for an IT technician to investigate. What does the user compromise?
Data integrity
A computer security team investigates a high-level computer breach at a large company. While investigating the computer, the team learns that a USB drive is missing from the computer. A user states that the drive is now safe with the receptionist of the company. What concerns the team from this action? (Select all that apply.)
Data integrity refers to the authorized or unauthorized manipulation of data Chain of custody access to the evidence must be tightly controlled.
Which type of door lock is most secure?
Deadbolt lock
When a magnetic hard disk is used, what solution can help improve file read/write speeds?
Defragmentation
How much RAM can a system with a 64-bit processor support?
Depends on the specific system 128GB or more
After a recent driver update on a Windows system, the display adapter does not function properly. A technician tries to roll back the driver by using which management console?
Device Manager (devmgmt.msc) console allows administrators to view, edit, and troubleshoot the properties of installed hardware, update drivers, and remove or disable devices.
A technician configures a backup routine on an important workstation. Which type does the routine use when only backing changes since the last full backup?
Differential
A systems engineer would like to keep a company's wireless network a secret. How can the engineer accomplish this?
Disabling broadcast of the service set ID (SSID) prevents clients from seeing the network
The Microsoft Management Console (MMC) provides an interface for managing multiple snap-ins to adjust and modify advanced Windows settings. What snap-ins are managed by the computer management console? (Select all that apply.)
Disk Cleanup Event viewer Disk defragmenter
Windows 11 comes with a refreshed desktop-style/user interface that can upgrade from Windows 10 with the in-place upgrade feature. What additional feature would an expanding business user gain when upgrading from Windows 10 Home to Windows 11 Pro for Workstations?
Domain access/Centralized management
Which of the following attributes of an app would likely disqualify as trustworthy?
Duplicates the function of core OS apps.
A company implements several types of security mechanisms around a high-risk data center. One of the mechanisms allows for a panic button to be pressed. Which security type does this button represent?
Duress
A problematic Windows system with multiple operating systems installed does not boot properly. A support technician tries to diagnose by outlining the boot process. The technician determines that the system uses an Extensible Firmware Interface (EFI) system partition. Which file does the technician inspect for problems related to a specific operating system boot problem?
Each Windows installation has a subfolder under \EFI\Microsoft\ that contains a BCD and BOOTMGFW.EFI.
Which of the following methods can be used to secure RDP connections?
Enabling Network Level Authentication (NLA)
When onboarding or offboarding an employee, a company generates a list of steps that must be followed to ensure that all processing for that employee is complete. Which of the following are the correct lists that are generated? (Select all that apply.)
End-user termination checklist New-user setup
The company is one the largest in the world but for compliance reasons does not use any cloud products. Which Microsoft Office license would be best for this scenario?
Enterprise
Which edition of Windows 10 allows for the use of DirectAccess, a feature that allows for secure and seamless remote access to corporate resources?
Enterprise
Which edition of Windows 10 is recommended for LARGE businesses and organizations?
Enterprise
The 4 GB maximum file size limit and 2 TB maximum partition size limit are the characteristic features of
FAT32
Which of the following are supported by Linux? (Select all that apply.)
FAT32 ext4
BranchCache is a feature available to Windows operating systems that allows reading and writing to cached files in the event connectivity is lost to the file server.
False
What is the main purpose of BitLocker in Windows?
File encryption
The security team wants to implement an equivalent to Bitlocker. Which of the following should the administrator enable and configure?
FileVault
Which of the following is likely the result of malware-induced changes to system files? (Select all that apply.)
Files with date stamps and file sizes that are different from known-good versions Files that are missing or renamed
What type of technology is used to store data on a Smart card?
Flash memory
A systems administrator looks to implement a server backup plan. Which two factors govern backup operations? (Select all that apply.)
Frequency Retention
A user has called in a helpdesk ticket to adjust the mouse clicks required for opening items and shortcuts. Currently set to a single-click, the user has requested the double-click style. What tab would the help desk technician find this setting under the File Explorer Options?
General
What Active Directory feature can be used to apply default user account permissions?
Group Policy
What Microsoft Windows tool provides a more robust means of configuring hundreds of networked Windows computer settings, and is a much more efficient way of implementing settings across a domain than manually configuring each networked client?
Group Policy Editor (gpedit.msc)
What type of data breach can be associated with a specific person or use an anonymized or de-identified data set for analysis and research?
Healthcare data
You see that some of the folders appear differently than the others, appearing to be faded in, rather than full color. What do these icons refer to?
Hidden folders
A user boots and installs a legacy Windows operating system on a computer. The user notices that after installation, the system requires many drivers and updates to bring it to a healthy and up-to-date state. The user finds that it is not possible to add updates to which installation media type?
Historically, most attended installations and upgrades were run by booting from optical media Non-Writeable Optical Disk CD-ROM or DVD). As updates for the operating system and drivers become available, optical media will become quickly dated.
An engineer configures numerous firewall rules on a system. The system processes the rules in order and then reaches the last default rule which blocks access. Which security principle is in place?
Implicit deny means that unless there is a rule specifying that access should be granted, any request for access is denied.
Which type of backup has a low backup time but a high recovery complexity?
Incremental
One option for creating restore points is to use Task Scheduler. What other actions will create a restore point? (Select all that apply.)
Installing a program Updating an application
A user modifies a Windows 10 computer's ease of access settings. Which settings group configures Keyboard usability?
Interaction
What is the advantage of using an in-place upgrade of Windows rather than a clean installation?
It preserves the current installed software, settings, and files
once users are authenticated, they are trusted by the system. What is this method?
Kerberos facilitates single sign-on (SSO).
A user installs an application on a Linux system by using which method in the operating system?
Linux uses DEB packages with the APT package manager or RPM for YUM.
A user enables privacy settings on a Windows 10 computer. Which settings pertain to app permissions? (Select all that apply.)
Location service Camera and microphone
A Windows computer user requires help from the IT department. A technician instructs the user to create an invitation file. What type of Windows help session does the user create?
Microsoft Remote Assistance (MSRA) allows a user to ask for help from a technician or co-worker via an invitation file protected by a passcode.
A systems administrator configures a new Windows workstation. The system uses the New Technology File System (NTFS). The system requires interaction with a Linux system and supports case sensitive file naming by utilizing which feature?
Microsoft engineered NTFS to support case-sensitive naming, hard links, and other key features. This is known as Portable Operating System Interface (POSIX) compliance.
A user wishes to enable multiple desktops within macOS for different work environments. What feature makes this possible?
Mission Control feature is used for window management and enables the user to set up multiple desktops
How might a mobile-device management suite of software detect that a user has rooted an Android device?
Mobile-device management (MDM) suites have routines to detect a "rooted" (associated with Android) or "jailbroken" (associated with Apple) device or custom firmware with no valid developer code signature.
What type of authentication is used by Authenticator applications?
Multi-factor authentication
A user looks to reconfigure an IP address for a network adapter. Which Control Panel applet is the most direct?
Network Connections (ncpa.cpl) is a Control Panel applet for managing adapter devices, including IP address information.
A user needs to manually connect to a wireless network that does not broadcast its Service Set Identifier. Where will the user go to set up this connection?
Network and Sharing Center
A Windows user runs the Defragment and Optimize Drives tool (dfrgui.exe) on a solid state disk (SSD). What action will the tool take on the drive? (Select all that apply.)
On a solid state disk (SSD), data is stored in units called blocks that are not directly managed by the OS. The tool runs a trim process that identifies data that the OS has marked as deletable. When the tool initiates a trim, data that is marked as deletable ultimately has its occupied blocks tagged as writable.
A curious user looks through their local logs and sees errors in region-coding copy-protection mechanisms. What type of device is generating these logs?
Optical media
Which of the following technologies allows a PC to boot an operating system from a separate network location?
PXE
Your boss has requested that you image a large number of Windows PC's for a new office. The image is standard for all PC's. You know that _________ is the best choice for imaging many clients at once.
PXE
What type of biometric authentication device uses the unique pattern of ridges and valleys on the surface of a person's palm?
Palmprint scanner
What command can you use in Windows Command Prompt to show the routing path and network latency for a specific destination?
Pathping
A user finds their Android smartphone to be unresponsive when trying to use an app. How might the user resolve the problem so that they may use the phone?
Perform a soft reset.
A user opens a help desk ticket stating that web content embedded within a particular webpage is not displaying as it should. What does a support technician conclude to be the most likely issue?
Plugins play or show some sort of content embedded in a web page,
What might a security engineer suggest as a solution to deter lunchtime attacks?
Policies
.ps1
Powershell script contains command lets executed in Windows PowerShell. uses dynamic type checking which means each cmdlet is checked by the PowerShell
An organization executes a project to replace all of its servers. A change that is requested by management goes through a risk analysis exercise before moving to approval. What will a qualitative approach use for metrics? (Select all that apply.)
Previous experience Opinions Qualitative analysis is key word
A novice user wants to use a setting where they do not have to manually clear their cache after conducting browsing activity. Which feature fulfills this need?
Private/incognito browsing mode disables the caching features of the browser so that no cookies, browsing history, form fields, passwords, or temp files will be stored when the session is closed.
The manager also wants to be sure that they are not underpowered either. What can the manager use to determine CPU optimization?
Privileged time
Which edition of Windows 10 allows for the use of SMB Direct, a high-speed network protocol for faster file transfer between workstations?
Pro for Workstations
Which edition of Windows 10 includes the feature of ReFS (Resilient File System) for improved data integrity and fault tolerance?
Pro for Workstations
Which edition of Windows 10 is designed for high-end workstations and servers that require high performance and scalability?
Pro for Workstations
What phase of the procurement life cycle includes the documentation of an asset, such as warranty and licensing details?
Procurement
What type of physical security device is a badge reader?
Proximity card reader
Which of the following is the only service available for the Home edition?
RDP
A user at an organization calls the IT help desk in a panic. The user exclaims that according to a message on the computer, someone is trying to extort them. What type of malware does the user experience?
Ransomware
A user needs to restore a problematic Windows system to its original factory state. What approach does the user utilize to achieve the restoration?
Recovery partition is a tool used by the original equipment manufacturers (OEMs) to restore the OS environment to its ship state. The recovery partition is created on the internal fixed drive.
A user contacts an IT help desk to report that when trying to browse a web page for office supplies, a completely unrelated webpage about gambling is presented. What does the help desk determine the causes could be? (Select all that apply.)
Redirection is where a user tries to open one page but gets sent to another. (DNS) spoofing is a method where a fraudulent DNS address may be used to direct users to fraudulent websites.
What remotely accessible database stores operating system, device, and software application configuration information in a Microsoft Windows environment and allows manual edits to the Windows configuration?
Registry
What task can be completed with PowerShell using the New-PSDrive cmdlet?
Remapping a network drive
An engineer configures an Authentication, Authorization, and Accounting (AAA) server to authenticate credentials for remote users. Credentials are forwarded to the AAA server from a firewall. Which AAA method does the engineer utilize?
Remote Authentication Dial-in User Service (RADIUS) The firewall is configured as a client of the RADIUS server.
A systems administrator configures a hardware firewall to allow remote desktop connections to various Windows computers. This involves port forwarding. Which port will the administrator need to change so that each system uses a unique port?
Remote Desktop Protocol on a Windows workstation or server runs on TCP port 3389 by default but can be changed to another port.
What tool will distinguish client accounts and provide support for recording and reporting billable support activity?
Remote Monitoring and Management (RMM) tools are principally designed for use by managed service providers (MSPs).
Which of the following is a feature of Mobile Device Management (MDM)?
Remote wipe
Which of the following alternatives can a customer select from when an issue cannot be resolved remotely? (Select all that apply.)
Replace Repair
What technology should the administrator start using which will replace the New Technology File System (NTFS)?
Resilient File System (ReFS)
A user inspects and learns about the electrical components on the inside of a computer. What is measured in ohms?
Resistance is the degree of opposition to the current caused by characteristics of the conductor and is measured in ohms.
An administrator reviews an audit log and notices strange logins when the business is closed. Which policy does the administrator use to deter this activity?
Restrict login times
What type of biometric authentication device uses a digital camera to capture an image of the user's eye?
Retina scanner
What method gets a system back up and running before the recommended amount of time elapses?
Rollback plan
A cyber architect analyzes a computer returned for application and performance issues. As part of their analysis, the architect uses a utility that has a manual interface to review system files and restores stored files if found to be corrupt or damaged. What is the architect using to test files?
SFC
An organization looks to make a server available to internet traffic without bringing harm to its private network. An onsite engineer configures a separate network for the server. Which approach does the engineer utilize?
Screened subnet
A system administrator needs to change a process currently set to start at startup, to "stop" for a stand-alone computer. What console tool allows an administrator to start, stop, and pause processes?
Services Console
A helpdesk technician identified sluggish performance on a Windows desktop client after a user reported system slowdown. While sitting at the desktop client and logged in, what built-in tools will provide the technician some insight into the system's performance? (Select all that apply.)
Services Console(services.msc) Task Manager Resource Monitor (resmon.exe)
A server administrator receives a report that the company's external-facing web server is unresponsive. Rebooting the server would take too long, and they are not even completely certain the server would come back up. What utility should the administrator use to restart the website?
Services console (services.msc) starts, stops, and pauses processes running in the background
Rebooting the server would take too long, and they are not even completely certain the server would come back up. What utility should the administrator use to restart the website?
Services. Msc
A user installs an app on a smart device. The device's official app store does not list the app as it is a proprietary app for an organization. What type of installation does the user complete?
Sideloading .untrusted apps can be downloaded from a website and installed using the .APK file format
A tech firm deploys wireless installations at client sites. As the firm uses Wi-Fi Protected Access (WPA) version 3, which security technology does the deployment utilize? (Select all that apply.)
Simultaneous Authentication of Equals (SAE) in WPA3 Stronger AES Galois Counter Mode Protocol (GCMP)
An IT administrator creates a repository for standard operating procedures (SOPs). What documents does the administrator upload to the repository? (Select all that apply.)
Software installation instructions New-user setup checklist Server decommissioning checklist **IT admin making a file explaing for other Admins
A company uses an element that reminds users when logging in to the company's device of the current software version. What is this called?
Splash screen
Windows allows for several types of installable software. Which type may be transferred between computers when a user utilizes a Microsoft account?
Store apps are installed via the Microsoft Store. Store apps can be transferred between any Windows device where the user signs in with that Microsoft account.
An organization has tasked a system administrator to procure a workstation with the same capabilities or more already in use by the engineering department for a Windows-based computer-aided drafting (CAD) program. What built-in Windows tool provides a comprehensive inventory that the administrator could utilize to ensure a comparable or better workstation that the organization can purchase?
System Information
A hardware technician requires a comprehensive report about a PC's hardware and software components for troubleshooting. What tool will produce the needed inventory of available resources, firmware, OS versions, driver file locations, environment variables, and network status?
System Information msinfo32.exe
A company tightens system security in several ways. One approach implements on-access scanning of files for malware. Shortly after implementation, users complain to the help desk. What is the complaint?
Systems are slow. on-access scan means that any time a file is accessed by a user or an application, it is scanned by antivirus/antimalware software. This can cause system overhead.
Which port should be open on a firewall to allow RDP traffic to pass through?
TCP Port 3389
Which of the following is a requirement for BitLocker to function on a computer?
TPM (Trusted Platform Module) chip
running Windows 11, to stop a single process from the command line?
Taskkill
An engineer surveys a computer room for environmental impacts. What does the engineer focus on? (Select all that apply.)
Temperature Humidity Ventilation
In a Microsoft Windows environment, a system administrator has identified a client PC on the domain with an optical drive that has stopped working after a driver update. What Windows console tool aids in the troubleshooting of the optical drive and its associated driver?
The Device Manager console
What does the * * * in the output of tracert indicate?
The packet timed out
A Windows user needs to transfer and retain an entire directory structure from one disk to another. There is also a need to retain New Technology File System (NTFS) attributes. Which command does the user determine will fulfill the need?
The robocopy command (or "robust copy") is a Windows file copy utility. This utility is designed to work better with long file names and NTFS attributes.
A hardware break/fix technician replacing a failed hard drive on a MacBook computer has installed the operating system on the new drive. However, what accounts could the technician expect a desktop support specialist to have created and enabled when installing the macOS while setting up the operating system? (Select all that apply.)
The user accounts applet cannot be used to add new accounts. The user accounts applet can be used to change the UAC settings.
A user with tech knowledge is browsing the network to identify any available shares on all servers. While browsing, the user found a share known to contain payroll information. However, the user is unable to access the information within the share. Assuming that the user is not authorized to access the payroll information, what is the most likely reason why the user cannot view the information within the share?
The user does not have permissions to access the share.
What is the maximum number of computers that can be in a Windows workgroup?
There is no maximum number of computers for a Windows workgroup.
A recent software installation on a Windows desktop fails. Which internal log file does a technician review to see what may have gone wrong?
Third-party application installers write events to the application log.
An attacker uses a script to create fileless malware that requires no compilation. What scripting environment does the attacker utilize?
Threat actors use environments such as PowerShell to craft fileless malware.
What is the purpose of Access Control Lists (ACLs)?
To control access to resources on a network
What is the purpose of Group Policy in Active Directory?
To control the configuration of computers in a domain
What is the primary purpose of physical security guards?
To detect and deter criminal activit
What is the primary purpose of video surveillance in physical security?
To deter crime
What is the purpose of the gpedit.msc tool in Windows?
To manage Group Policy settings for a computer or domain
What is the purpose of a Magnetometer?
To measure the magnetic field of an object
What is the primary purpose of Multifactor Authentication (MFA)?
To protect user accounts from unauthorized access.
What is the purpose of an Organizational Unit (OU) in Active Directory?
To provide a hierarchical structure for organizing objects
What is the purpose of bollards in physical security?
To provide a physical barrier to prevent unauthorized access
What is the purpose of an access control vestibule?
To provide a secure area for visitors to wait before entering the building
What is the primary purpose of RADIUS authentication?
To provide a secure authentication system for users.
What is the purpose of a key fob?
To provide physical access to a secure area
What is the primary purpose of Active Directory Domain?
To provide secure access to network resources
What is the purpose of Active Directory Folder Redirection?
To provide users with access to their files from any location
A user with a problematic Windows system tries to use a previously created system image. How does the user access the image? (Select all that apply.)
To restore a system with an image created in Backup and Restore, a repair disk can be used .Advanced Boot Option or the System Image Recovery option off a repair disk or recovery environment.
To protect user accounts from unauthorized access.
To send and receive emails
What is the purpose of an Active Directory Home folder?
To store user documents
A user wishes to use an iOS smartphone with a carrier other than the one the phone was originally meant for. What requirement does the user complete to accomplish this?
To use a phone on another carrier than where it was bought, it must be SIM unlocked, by an IMEI whitelist.
Due to a recent breach, a cyber architect is tasked with drafting a company-wide memorandum on social engineering attacks and how they can be mitigated. Which statement does NOT support the organization in defeating social engineering attacks?
Train employees to release information based on personally-preferred procedures.
A network engineer implements a proxy at a small company. The configuration does not require settings on every client machine. What type of proxy does the engineer deploy? (Select all that apply.)
Transparent: does not require any client configuration as the server handles the appropriate settings Intercepting
A user performs a technique that allows them to connect their PlayStation to their network. What is this technique?
UPnP
Motion sensors are used in physical security to detect what type of activity?
Unauthorized movement
A user is working on an important project using specialized software loaded directly onto the computer. What setting can the user visit to ensure that no changes occur to the operating system, drivers, or anything else that could cause problems with normal computer operation until after the project is complete?
Update and security
In the past, automatic driver updates on the computer have caused a user to have issues with the display. Where can the user go to ensure that these types of optional updates do not install unless the user chooses them?
Update and security
Which of the following uses a security shield icon for tasks that are protected under them?
User account control (UAC) is a Windows security feature
When a user is logging into a computer they first see a screen that requires them to accept the conditions of using that computer. Which two items does this screen represent? (Select all that apply.)
User agreement Splash screen
Microsoft introduced a center-aligned taskbar in all Windows 11, from the Home to Enterprise editions, better spacing for touch control, and rounded corners when refreshing what component?
User interface
A system administrator establishes Windows domain user accounts in a Windows-only environment. After working through the administrative tools and adding the appropriate snap-ins for the Computer Management Console (MMC), what security groups could the sysadmin expect to maintain? (Select all that apply.)
Users Administrators Guest
In the Windows File Explorer Options applet, which tab allows administrators to configure settings, such as hiding extensions, hiding protected operating system files, and managing hidden fields and folders?
VIEW
A user looks to implement Virtual Network Computing (VNC) access to a Windows computer while traveling. Which port does the user open on a hardware firewall to allow access?
Virtual Network Computing (VNC) is a freeware product with similar functionality to the Remote Desktop Protocol (RDP). It works over TCP port 5900.
What licensing options are available for Microsoft Windows Enterprise editions?
Volume Licensing
What is the latest version of the Wi-Fi Protected Access (WPA) protocol?
WPA3
simultaneous authentication of equals (SAE) instead of the 4-way handshake. What is this method?
WPA3
A Windows user is not able to resolve server names on a local network. After updating the system's hosts file, which command does the user issue?
Whether a server or a hosts file is used, the ipconfig /flushdns command clears a system's DNS cache.
Which editions of Windows 10 allows for the use of Hyper-V virtualization?(Select TWO)
Windows 10 Pro and Enterprise
A company has several offices within the United States. Engineers look to configure Microsoft DirectAccess virtual private networking technology for remote connections. Engineers instruct IT to deploy which operating system to Windows desktops?
Windows Enterprise edition has several features that are not available in the Pro edition, such as support for Microsoft's DirectAccess virtual private networking technology.
Which Windows operating system version first introduced Remote Desktop Protocol (RDP)?
Windows XP
What type of adapter will the company need to send the statistics back to their cloud network?
Wireless Wide Area Network (WWAN)
Which type of malware replicates between processes rather than infecting a file?
Worm
A user interacts with a Linux distribution that has no desktop graphical user interface (GUI). As the user types, which stream handles the interaction?
a terminal interface is used. The default shell command interpreter uses the stream stdin (0) for the user's keyboard input.
An IPv6 address is made up of bits that identify the network and host of a system. How many bits long is an IPv6 address in total, and how many bits identify the host portion? (Select all that apply.)
address is 128 bits long and the network prefixes are used to identify logical networks within the first 64 bits
A user on a Linux system would like to run all commands at an administrative level while maintaining a login in their own account. What command does the user issue to accomplish this?
allows any account listed in the /etc/sudoers file user to run specified commands with superuser privilege level
A user attempts to authenticate from one Windows system to another in a domain but fails with no error message. The user verifies the username and password as correct. What does the user determine the issue to be?
authentication and backup depend on the time reported by the local PC being closely synchronized to the time kept by a server
Which of the following methods can be used to perform an in-place upgrade of Windows on a computer?
booting the computer from the Windows installation media and following the prompts to upgrade the existing installation.
"OS not found" issue on a company computer and wants to repair the boot sector. What recovery mode command prompt can the engineer use to accomplish this troubleshooting task?
bootrec/fixboot bootrec/fixmbr attempts repair of the master boot record (MBR). If the disk uses GUID partition table (GPT) partitioning, do not use this option.
A cyber architect troubleshoots a computer with the message that reflects "OS not found." What recovery mode command prompts repair of the master boot record (MBR)?
bootrec/fixmbr
What describes a tenet of installing applications?
can be executed in silent mode by using the command switches for its installer. It is one of the primary use cases for scripting.
What is one way that the technician could unintentionally expose the environment to malware risks?
can occur when an interpreter is not a default feature.
A technician troubleshoots a Windows system by using the command prompt. If the technician is currently in the directory named C:\Backup and wishes to enter the directory C:\Backup\02102022, what command does the technician use?
cd 02102022
What is the command used to change the current directory to a specific folder in the Windows command line?
cd folder
What is the command used to move up one directory level in the Windows command line?
cd..
What Windows command utility scans the file system for faults and can attempt to repair them?
chkdsk
What command can you use in the command line to check a disk for errors in Windows?
chkdsk
Which option can be used with the "chkdsk" command to automatically fix any errors that are found?
chkdsk /f
A company establishes a mobile device deployment model. The policy states that a corporate-owned phone may be used for personal reasons. Which deployment is in use? A.
corporate-owned, personally enabled (COPE) program
A user contacts an IT helpdesk. The complaint is that the computer is very sluggish. Support personnel notices high graphics processing unit (GPU) use. What does the helpdesk determine to be the issue?
cryptominer hijacks the resources of the host to perform cryptocurrency mining. This is also referred to as cryptojacking. A graphics processing unit (GPU) is used in cryptomining
A user builds a new computer for gaming purposes. The ability to upgrade the performance graphics processing unit (GPU) over time is desired. What GPU type does the user invest in?
dedicated graphics card will have its own random access memory (RAM). This allows the card to focus on rendering graphics without using system RAM.
A company disposes of old computer systems. While doing so, all hard drives are removed and scheduled for physical destruction. Which method will NOT work with a solid state disk drive (SSD)?
degaussing, a hard disk is exposed to a powerful electromagnet that disrupts the magnetic pattern that stores the data on the disk surface. Degaussing does not work with SSDs or optical media.
What is the command used to display the contents of a directory in the Windows command line?
dir
What is the command used to display the attributes of files in a directory, using the "dir" command in the Windows command line?
dir /a
An organization has tasked a system administrator to provide a summary of the fixed and removable hard drives, solid-state drives, and optical drives on a Microsoft Windows 10 client. What Windows utility will display the needed summary?
diskmgmt.msc
What command can you use in Windows Command Prompt to manage disks, partitions, and volumes?
diskpart
Which command is used to format a disk in Windows Command Prompt?
format
What is the command to open the Local Group Policy Editor on a Windows 10 computer?
gpedit.msc
What command can you use to refresh the Group Policy settings on a Windows computer?
gpupdate
What is the parameter used with the gpupdate command to immediately reboot the computer after the update?
gpupdate /boot
What parameter is used with the gpupdate command to update the computer policy only?
gpupdate /target:computer
What command can you use in Windows Command Prompt to display help information about a command?
help
What command can you use to display a list of all the commands that are available in Windows Command Prompt?
help
A helpdesk technician receiving a support request can ask the client to use what command at the command prompt to identify the local machine requiring support?
hostname
What command can you use in the command line to display the hostname of a computer in Windows?
hostname
Windows Update can provide feature updates. Feature updates periodically introduce changes to OS features and tools and can also perform what other function?
in place upgrade feature updates
What type of backup occurs daily using the Grandfather-Father-Son (GFS) scheme?
incremental
Which root-level file allows for the automatic execution of commands in a legacy version of Windows?
inserted disk (USB or optical) would automatically run commands defined in an autorun.inf file stored in the root of the drive.
From a Windows 10 command prompt, what command would display a network adapter's configuration and aid in troubleshooting the network adapter?
ipconfig
What Windows command can you use in the command line to display the IP configuration of your network adapter?
ipconfig
What command can you use to display the DHCP server providing IP addresses for a computer?
ipconfig /all
What command can you use to display the physical address (MAC address) of your network adapter?
ipconfig /all
Which options can be used with the "ipconfig" command to release and renew DHCP-assigned IP addresses?(Choose TWO)
ipconfig /release ipconfig /renew
Your supervisor has asked you to write a script that will configure the wireless adapters on student's Linux based laptops to connect only to authorized access point. Assuming the access point's MAC Address is 00:0D:9D:C6:38:2D, which command will help you achieve this?
iwconfig ap 00:0D:9D:C6:38:2D
What command can you use within the diskpart utility to display the status of all the disks in the system?
list disk
A user installs an application on a macOS device. The user determines that installation will require running an additional service. What installer format does the application use?
macOS pkg format
What is the command used to create a new directory in the Windows command line?
md
What is the command used to create multiple directories at the same time in the Windows command line?
md folder1 folder2 folder3
What is the command used to create a new directory in the current directory, in the Windows command line?
md newfolder
What command can you use in the command line to display the list of network shares (drives) and their status in Windows?
net share
What command is a Windows utility that can allow administrators to view shared resources and configure them on a Windows network?
net use
What command can you use to delete an existing network connection?
net use /delete
A user would like to delete a mapped drive labeled as "X" on a Windows system. Which command will the user issue at the command prompt?
net use X: /delete
What Windows command, requiring an administrative command prompt, enables administrators to manage, add, and force password changes to individual accounts, NOT policies from the command line?
net user
What command can you use in the command line to display active network connections and their statistics in Windows?
netstat
Which option can be used with the "netstat" command to display the process ID (PID) of the program that is using a specific network connection?
netstat -b
What command can you use in the command line to resolve domain names to IP addresses in Windows?
nslookup
Which option can be used with the "nslookup" command to specify the DNS server to query?
nslookup -server
What command can you use to test the connectivity between two devices on a network by sending an ICMP echo request and receiving an ICMP echo reply?
ping
What command can you use to resolve the hostname to an IP address using the ping command?
ping -a
A security engineer suggests the use of proximity technology to track the movement of portable equipment. What solution does the engineer recommend?
proximity sensors, radio frequency ID (RFID) tags and readers can be used to track the movement of tagged objects within an area
Determine which ones could conceivably fix the blank screen from the available solutions. (Select all that apply.)
repair windows update the graphics adapter driver
What command can you use to remove an empty directory in the command line?
rmdir
What command can you use to display a message before deleting a directory and prompt for confirmation?
rmdir /p
A system administrator will need to copy files on a Windows 11 client to a domain server and has concerns about long file names. What file copy utility does Microsoft recommend using in this instance?
robocopy
What command can you use to copy files and directories, including subdirectories recursively, in Windows Command Prompt with advanced options?
robocopy
Malware infects a user's computer. A support technician determines that the malware is executed without requiring any authorization using system privileges. What type of malware currently infects the system?
running with this level of privilege is referred to as a rootkit
What command can you use in Windows Command Prompt to scan for and repair missing or corrupted system files?
sfc
The administrator types shutdown /? to get a list of shutdown options from the command help page. What command, when typed, would close all programs and power off the computer?
shutdown /s
A security administrator for Linux systems in their demilitarized zone wants to ensure only some administrators can perform certain commands. Which of the following is best used to lock down certain commands?
sudo
The manager wants to test various boot settings before applying them to the environment. Which tool can the manager use to accomplish this best?
system Configuration Utility (msconfig.exe)
What command can you use to track the route of a packet on a network?
tracert
What parameter is used to specify the maximum number of hops for tracert to search for the destination?
tracert -h [max_hops] [destination_address]
A user experiences difficulty paying a retailer with a touchless near-field supported phone. What does the user check while troubleshooting?
verify that airplane mode is not active.
Enter local group policy in the taskbar search box and press ENTER. Navigate to Computer Configuration > Administrative Templates > Windows Components > Windows Defender Antivirus.
windows Defender An
A user requiring support will need to provide the operating system (OS) build number information of the Windows client that requires support. What command would provide the required information quickly from the command prompt?
winver
What is the Windows command used to display the version of Windows currently running on a computer?
winver
What command can you use to copy files and directories, including subdirectories recursively, in Windows Command Prompt?
xcopy