Crucial Exams, Examcompass, Professor Messor, Mike Meyer exams

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

All but one of the answers below are true of domain setups. The incorrect answer refers to a workgroup setup. Identify the incorrect answer. A) All computers must be on the same network. B) A user can use their account credentials on any computer. C) Security and permissions are managed by an administrator. D) There can be thousands of computers as members.

All computers must be on the same network Domains allow for users to authenticate even if they are on different networks. Workgroups require that all users be on the same network.

Which of the following switches should a technician use with the PING command to resolve an IP address to a hostname? -a -t -f -n

-a The -a switch resolves IP addresses to hostnames. The -f switch sets the don't fragment flag on the PING packets. The -n switch enables you to set the number of PINGS to send. The -t switch runs PING until you manually stop it.

Which parameter of the Change Directory (CD) command in Windows moves the command-line prompt one folder up in the directory tree? A) \ B) / C) + D) ..

.. ".." will allow you to move one folder up in the directory tree, while the / will change the directory and drive.

Which of the following DEFRAG command parameters allows to locate and consolidate fragmented files on all volumes? /A /E /V /C

/C

Which of the following DEFRAG command parameters allows to locate and consolidate fragmented files on all volumes? /A /E /V /C

/C

Which parameter of the RD command in Windows allows for the deletion of an entire directory tree? (the specified directory and all its subdirectories, including all files) /A /S /Y /Q

/S

When you use the COPY command, what switch would you use to verify that new files are written correctly? A) /A B) /V C) /D D) /Z

/V The copy command can be used across many Operating Systems (OS). The switch /V will verify the new files are written correctly.

Which of the COPY command switches suppresses the confirmation prompt displayed when Windows is about to overwrite the contents of an existing file? /V /Y /A /-Y

/Y

Which SHUTDOWN command switch in Windows Command Prompt forces full system shutdown and restart of the Windows host? -s -r /r /s r -i

/r

Which parameter of the System File Checker utility in Microsoft Windows combines scanning the integrity of all protected system files with restoration of corrupted files? /SCANFILE /VERIFYONLY /SCANNOW /VERIFYFILE

/scannow

A technician has just upgraded RAM on a user's Windows 7 workstation from 4GB to 8GB. The technician now wants to adjust the page file size on the system to the recommended Microsoft minimum settings. Which of the following is the Microsoft minimum page file? 4096 MB 16328 MB 8192 MB 12288 MB

12288 MB 12288MB is correct. Microsoft's suggestion for the minimum page file size in Windows 7 is 1.5x your system RAM

A client's C: drive is badly fragmented and needs to be defragmented. What percentage of the drive must be free to finish the job completely? 30% 15% 2% 10%

15% A volume must have at least 15% free space for defrag to work completely and adequately. Defrag uses this space as a sorting area for file fragments. If a volume has less than 15% free space, defrag will only partially defragment it. To increase the free space on a volume, delete unneeded files or move them to another disk.Incorrect Answers:2%, 10%, and 30% are all either too little or not enough.

Which of these would not meet the minimum requirements for Windows 7 Professional x64? 16 GB free disk space 2 GHz processor Direct x 9 graphics device with WDDM 1.0 or higher driver 2 GB RAM

16 GB free disk space

What is the maximum size a partition can be using the FAT32 file system?

2048 GB or 2TB

Which of the following statements is true regarding the difference between 32-bit and 64-bit version of the Windows OS? A) 32-bit is the more modern of the two architectures B) All processors can utilize 32-bit and 64-bit Windows interchangeably C) 64-bit Windows can utilize more than 4 GB of RAM D) There are no fundamental differences between 32-bit and 64-bit Windows

64-bit Windows can utilize more than 4 GB of RAM 64-bit Windows is capable of utilizing in excess of 4 GB of RAM. While most modern processors can utilize 32-bit or 64-bit Windows, that has not always been the cas

Which of the following wildcard characters can be used as a substitute for a single character in a file or directory name? ? $ * &

?

Which of the following explains why a tablets boot more quickly than most laptops? A tablet requires less power to operate than a laptop A SATA drive loads data much faster than an IDE drive A SSD drive loads data much faster than a SATA drive A tablet has a smaller circuit board than a laptop

A SSD drive loads data much faster than a SATA drive A SSD drive loads data much faster than a SATA drive.- Since tablets use SSDs for mass storage instead of platter-based hard drives, they load the OS much more quickly

In terms of IT security, a mantrap is best described by one of the following statements. A) A mantrap is a fall-away floor with large, sharpened spikes at the bottom of a pit to prevent unauthorized access to secure rooms by both humans and bears B) A mantrap is a floor with a sticky material meant to trap would-be intruders by restricting the ability of movement, allowing for IT security staff to remove intruders at a later time and humanely dispose of or release them into the wild C) A mantrap is a spring-loaded device that it sometimes baited with fine cheeses or savory snacks, meant to ensnare and sever the spinal cord of hungry Blackhat hackers D) A mantrap is a set of doors separated by a hallway and access control devices that precludes individuals from accessing one door without access control requirements being met

A mantrap is a set of doors separated by a hallway and access control devices that precludes individuals from accessing one door without access control requirements being met A mantrap is often used to secure server rooms, distribution closets or IT resources that may be susceptible to attack by tailgaters.

In which of the following would you most commonly use cmdlets? A power shell command line during the installation of an OS a windows automated installation script managing a print queue during an application setup process

A power shell command line

NAC (Network Access Control)

A term that refers to collected protocols, policies, and hardware that govern access on devices to and from a network.

Which of the following is a new feature of iOS 5? ability to dual boot to android OS ability to run native PC applications ability to perform iTunes backups Ability to performed untethered updates

Ability to performed untethered updates iOS 5 can perform wireless (or untethered) updates. You can finally just throw your computer in the trash. iOS cannot dual boot Android or run PC applications. iOS has always been able to perform iTunes backups.

Which of the wildcard characters listed below can be used as a substitute for any string of characters in a file or directory name? $ * & ?

*

An essential Windows XP startup file containing a list of installed OSs as well as information on the location of the operating system files is called: A. BOOT.INI B. WINLOAD.EXE C. BCD (Boot Configuration Data) D. NTDETECT.COM

BOOT.INI

Startup files required to launch Windows Vista/7/8/8.1 include: (Select 3 answers) A. BOOTMGR (Windows Boot Manager) B. NTLDR C. BCD (Boot Configuration Data) D. WINLOAD.EXE E. BOOT.INI F. NTDETECT.COM

BOOTMGR BCD WINLOAD.EXE

Which of the following commands in Windows Command Prompt writes a new boot sector to the system partition? BOOTREC /FIXMBR FIXBOOT BOOTREC /FIXBOOT FIXMBR

BOOTREC /FIXBOOT

Which of the following commands in Windows Command Prompt writes a new master boot record to a disk? BOOTREC /FIXBOOT FIXBOOT BOOTREC /FIXMBR FIXBOOT

BOOTREC /FIXMBR

While trying to start their Windows machine, a user receives "Windows Boot Configuration Data file is missing required information" error message. Which of the following BOOTREC options should be used by a technician for manual CLI troubleshooting of this error? BOOTREC /ScanOs BOOTREC /RebuildBcd BOOTREC /FixMbr BOOTREC /FixBoot

BOOTREC /RebuildBcd

Which of the Windows Recovery Environment (WinRE) utilities would be used for manual troubleshooting of system startup issues? BOOTREC.EXE Startup Repair REGSVR32 Automatic Repair

BOOTREC.EXE

Windows Recovery Environment (Windows RE) offers a set of tools and utilities to troubleshoot Windows startup issues. Which of the following commands launches a tool for manual troubleshooting of problems related to master boot record (MBR), boot sector, and Boot Configuration Data (BCD) store in Windows RE Command Prompt? DISKPART BOOTREC.EXE CHKDSK FIXBOOT

BOOTREC.EXE

Examples of devices/device components regulated under special disposal procedures due to environmental/safety hazards include: (Select all that apply) PSUs Batteries CRTs Toner cartridges LCDs

Batteries CRTs Toner Cartridges

A technician is installing a webcam in a nursery for a user to monitor her baby. The user wants to ensure that the webcam is not broadcasting externally. Which of the following would the technician implement on the SOHO router to prevent the broadcast? enable static IPs Enable MAC filtering Block the outbound port change the default SSID

Block the outbound port Blocking the webcam's outbound port in the router ensures that the camera feed goes no further than the local network MAC filtering keeps unauthorized computers from joining a network. Static Ips would do nothing here. Changing the default SSID of the wireless network, while a good idea, would do nothing for this problem.

In Windows Vista and newer releases of the Microsoft operating system the BOOT.INI file is replaced by: A. NTDETECT.COM B. Boot Configuration Data (BCD) file C. NTBOOTDD.SYS D. WINLOAD.EXE E. BOOTMGR (Windows Boot Manager)

Boot Configuration Data (BCD) file

You are a network administrator for a large company. Several network users have complained that they are receiving odd emails from another user, who claims they have not sent any emails today. Which of the following will most likely stop the issue? A) Check the networks firewall for unauthorized entries B) Reinstall the user's email client C) Change the user's account password D) Install a more expensive spam filter

C Changing the account password will most likely solve the issue, but better preventatives should be put in place as soon as possible. Spam filters typically ignore local emails, which is why this is not the correct answer.

What location on your Windows 7 system will hold all the temp files left behind by applications? C:\Windows\Temp C:\Windows\System32\Temp C:\Temporary C:\Users\Temp

C:\Windows\Temp C:\Windows\Temp is the special holding area for temp files. Incorrect Answers:All of the other locations don't exist.

Which of the following commands in Windows change(s) the current directory to the root directory? (Select all that apply) CHDIR /R CD\ CHDIR\ CD.. DIR /ROOT

CD\ CHDIR\

Which of the following devices may pose a risk to electrical safety due to accumulated high voltage? (Select all that apply) CRTs Power supplies Inverters CPUs Laser printers

CRTs Power Supplies Inverters Laser Printers

What is the function of the Linux chown command? Changes the Linux command prompt Compares the contents of two files or sets of files Changes file owner and group permissions Changes file access permissions

Changes file owner and group permissions

Common troubleshooting steps related to Windows services that fail to start include: (Select 2 answers) A. Starting the service manually in Windows Device Manager (DEVMGMT.MSC) B. Checking for warnings and errors in Windows Logs and Application and Services Logs log spaces in the Event Viewer (EVENTVWR) C. Starting the service manually in the Services applet (SERVICES.MSC) D. Checking for warnings and errors in the Services applet (SERVICES.MSC)

Checking for warnings and errors in Windows Logs and Application and Services Logs log spaces in the Event Viewer (EVENTVWR) Starting the service manually in Windows Device Manager (DEVMGMT.MSC)

If an application written for an earlier version of MS Windows doesn't run correctly the operating system can emulate its own older version to allow a given program to work with newer hardware or software. The compatibility mode settings in Windows can be changed manually by right-clicking the program icon and: Choosing "Restore previous versions" option from the pop-up menu Selecting "Run program using recommended compatibility settings" option from the pop-up menu Clicking on the Properties menu item, and then applying the required settings on the Compatibility tab Selecting "Run as administrator" option from the pop-up menu

Clicking on the Properties menu item, and then applying the required settings on the Compatibility tab

Which of the answers listed below refer(s) to possible cause(s) of the "Missing operating system" error message displayed during system boot? (Select all that apply) A. Damaged hard drive B. BIOS does not detect the hard drive C. Windows starts in VGA mode D. System partition not set as active E. Kernel panic F. Corrupt Master Boot Record (MBR)

Corrupt Master Boot Record (MBR) System partition not set as active BIOS does not detect the hard drive Damaged hard drive

Which of the answers listed below refer to possible causes of the "NTLDR is missing" error message displayed during system boot? (Select 2 answers) A. Kernel panic B. Damaged hard drive C. Corrupt NTLDR file D. Improper shutdown E. The system is trying to boot from a non-bootable drive

Corrupt NTLDR file The system is trying to boot from a non-bootable drive

Which of the Windows Command Prompt commands listed below can be used to delete one or more files? (Select all that apply) EDIT TASKKILL DEL ERASE MOVE

DEL ERASE

Which of the following Windows Command Prompt commands can be used to list all directory's files and subdirectories contained in the current directory? (Select 2 answers) DIR /? DIR *.* *.* DIR /ALL

DIR DIR *.*

Which of the answers listed below refers to a collection of precompiled functions designed to be used by more than one Microsoft Windows application simultaneously in order to save system resources? A. DLL B. ISO C. EXE D. INI

DLL

A type of control access technology providing protection against copyright infringement is called: OEM EULA DRM AUP

DRM - Digital Rights Management

Which of the answers listed below refers to a diagnostic tool for detecting display, sound, and input related problems in MS Windows? DXDIAG MMC DirectX REGSVR32

DXDIAG

Examples of MS Windows system utilities that allow to pinpoint corrupt device drivers include: (Select 2 answers) A. Device Manager (DEVMGMT.MSC) B. Event Viewer (EVENTVWR) C. Computer Management (COMPMGMT.MSC) D. Performance Monitor (PERFMON) E. Task Manager (TASKMGR)

Device Manager (DEVMGMT.MSC) Event Viewer (EVENTVWR)

Where should you check for your devices after a Windows installation?

Device manager to check your device drivers

Which of the following sequence of steps in Windows Device Manager (DEVMGMT.MSC) allows for reverting back to the previously installed driver when a device fails after driver update? A. Right-click on the device and click the Roll Back Driver button B. Double-click the device type to view devices in that category -> Right-click on the device and click the Roll Back Driver button C. Right-click on the device and select Properties -> On the Driver tab, click the Driver Details button -> Click the Roll Back Driver button D. Double-click the device type to view devices in that category -> Right-click on the device and select Properties -> On the Driver tab, click the Roll Back Driver button

Double-click the device type to view devices in that category -> Right-click on the device and select Properties -> On the Driver tab, click the Roll Back Driver button

Which of these Windows features would be the best choice to encrypt a single folder? VPN EFS BitLocker Explicit permissions network share

EFS - encrypting file system

A type of agreement granting a user the right to use software application in a manner determined by the software vendor is known as: AUP EULA DRM RMA

EULA - End User License Agreement

Where would you most commonly find a manufacturer's description of how software can be used? PE FOSS DRM EULA AUP

EULA - end user's license agreement

Which of the following commands exit(s) the command interpreter in Windows? (Select 2 answers) TASKKILL /IM CMD.EXE CMD.EXE /S TASKKILL CMD.EXE SHUTDOWN CMD.EXE EXIT

EXIT TASKKILL /IM CMD.EXE

Establishing a theory of probable cause of the problem is a troubleshooting step that apart from conducting research based on symptoms may also involve asking for assistance of a more experienced tech. True False

False

If personal files, such as email, documents, or photos are lost or deleted, Windows System Restore can be used to recover such files. True False

False

The "help [command name]" syntax in Windows shell can be used for displaying help information related to any command-line tool available in Windows, including utilities that fall into the category of network command-line tools (e.g. PING, IPCONFIG, NETSTAT, and others). T OR F

False

What is the name of a GUI-based file and folder manager application in Mac OSX operating systems? A) Explorer B) Gnome C) Nautilus D) Finder

Finder Finder is the GUI based file and folder manager in Mac OSX. Nautilus is a file and folder management application in Linux. Explorer is for Windows.

Which of the following answers list(s) example(s) of boot loader software used in Linux operating systems? (Select all that apply) GRUB NTLDR BOOTMGR LILO

GRUB, LILO

Which tab in the Windows System Configuration utility contains the Diagnostic startup option? A) Tools B) General C) Services D) Startup

General Windows System Configuration (Msconfig) general tab has the Diagnostic startup option, used for booting only the basic services.

Which of the terms listed below refers to an environmental control system? SCADA HIPS TEMPEST HVAC

HVAC

You are assisting a user in trying to find a file in their C:\Users folder. You see that some of the folders appear differently than the others, appearing to be faded in, rather than full color. What do these icons refer to? A) Hidden Folders. B) Folders currently backing up. C) Cached folders. D) Deleted items still utilizing resources.

Hidden Folders Folders that are grey and "ghosted" are hidden folders. These typically hold back-end information or files that the user does not need to access.

Which of the actions listed below enables access to the Automatic Repair utility during next system boot in Windows 8/8.1? (Select best answer) Your answer A. Pressing the F8 key during next system boot B. Checking the Safe boot option on the Boot tab of the System Configuration (MSCONFIG) utility while in Windows C. Holding the Shift key and left-clicking on the power options button (Shut down/Restart) while in Windows D. Pressing the F8 key while holding the Shift key during next system boot E. Checking the Safe boot option on the Startup tab of the System Configuration (MSCONFIG) utility while in Windows C

Holding the Shift key and left-clicking on the power options button (Shut down/Restart) while in Windows

You are deploying a web server in a Windows environment and are tasked with ensuring that internal clients can access the resources hosted on the server via an internet browser. Firewall ports have been opened for 80, 443, 20, 21 and 23. Your server is running Windows Server 2012 R2 and it is configured with teamed NICs. Which service is most likely needed on this server? A) NLB B) VDI C) IIS D) NPS

IIS IIS or Internet Information Services is the Windows term for the Web Server role. While, you may be tempted to choose Network Load Balancing (NLB) as the correct answer, please note that teamed NICs can operate without the NLB service implemented.

A user is reporting that his Web browser is not going to the site he is attempting to access. Which of the following would best resolve this? clear all internet cache and saved passwords delete all internet cookies ensure the user is not utilizing a proxy server remove all internet shortcuts

If a computer's proxy settings are incorrect, it's likely that the computer won't be able to access the Internet. :Deleting Internet cookies, clearing the cache and passwords, or removing Internet shortcuts won't help get your Internet access back.

What is the correct sequence of steps for launching the disk defragmenter utility in MS Windows? (Select 3 answers) In Windows Vista/7: Open Windows Explorer by pressing the E key while holding the Windows Logo key -> Click on the Computer menu item list on the left to display all drives -> Right-click on the drive and select Properties from the pop-up window -> Launch the disk defragmenter utility available on the Tools tab In Windows 8/8.1: Open Windows Explorer by pressing the E key while holding the Windows Logo key -> Click on the Computer menu item list on the left to display all drives -> Right-click on the drive and select Properties from the pop-up window -> Launch the disk defragmenter utility available on the Hardware tab Press the R key while holding the Windows Logo key -> type in "cmd" (without quotation marks), and hit Enter -> Launch the disk defragmenter utility by typing in DEFRAG with the appropriate command switch In Windows Vista/7: Open File Explorer by pressing the E key while holding the Windows Logo key -> Click on the This PC menu item list on the left to display all drives -> Right-click on the drive and select Properties from the pop-up window -> Launch the disk defragmenter utility available on the Hardware tab In Windows 8/8.1: Open File Explorer by pressing the E key while holding the Windows Logo key -> Click on the This PC menu item list on the left to display all drives -> Right-click on the drive and select Properties from the pop-up window -> Launch the disk defragmenter utility available on the Tools tab Press the R key while holding the Windows Logo key -> Launch the disk defragmenter utility by typing in "DEFRAG" (without quotation marks) and pressing Enter

In Windows Vista/7: Open Windows Explorer by pressing the E key while holding the Windows Logo key -> Click on the Computer menu item list on the left to display all drives -> Right-click on the drive and select Properties from the pop-up window -> Launch the disk defragmenter utility available on the Tools tab Press the R key while holding the Windows Logo key -> type in "cmd" (without quotation marks), and hit Enter -> Launch the disk defragmenter utility by typing in DEFRAG with the appropriate command switch In Windows 8/8.1: Open File Explorer by pressing the E key while holding the Windows Logo key -> Click on the This PC menu item list on the left to display all drives -> Right-click on the drive and select Properties from the pop-up window -> Launch the disk defragmenter utility available on the Tools tab

Which of the following could cause slow performance of a hard drive? (Select 3 answers) Disk striping File fragmentation Disk mirroring Disk thrashing Insufficient amount of RAM Disk duplexing

Insufficient amount of RAM Disk thrashing File fragmentation

Where can you edit SSL certificates? Internet Options in Internet Explorer Windows Firewall Windows Security Center My Network Places Properties

Internet Options in Internet Explorer Internet Options in Internet Explorer has a number of settings, including one to clear undesired SSL certificates The other choices do not control SSL certificates.

Which of the following integrated utilities does Mac OS use for password management? LoJack Password Manager Padlock Keychain GeoFence

Keychain

Which of the following is an example of active eavesdropping? Spoofing Zero-day attack Spear phishing MITM

MITM Man in the middle. A MITM attack is a form of active interception allowing an attacker to intercept traffic and insert malicious code sent to other clients.

Automatic booting into Safe mode on a Windows-based host might be caused by: (Select 2 answers) Overheating MSCONFIG settings RAID failure Malware presence Corrupt device driver

MSCONFIG settings Corrupt device driver

A technician needs to use Remote Desktop Connection in order to get access to a remote Windows workstation. However, the Programs menu has been hidden and she only has access to the Run command utility or a command-line prompt. Which of the following utilities should the technician use to access Remote Desktop Connection? msconfig msinfo32 services.msc MSTSC

MSTSC The MSTSC utility enables you to edit Remote Desktop Connection configuration files MSINFO32.MSC displays information about the local system SERVICES.MSC enables you to start, stop, and otherwise manage the services on your local PC MSCONFIG enables you to configure which programs start up with Windows

A turnstile is an example of which of the following forms of physical security? entry control roster mantrap cipher lock biometrics

Mantrap Mantrap is correct. Mantrap, or sally port, use a mechanical device to stop access Biometrics uses a physical characteristic for identification. Two sets of interlocking doors is most common. Cipher locks are a keypad physical security system that requires a code for entry. Entry control rosters are is a physical system where one must be verified to a security roster before being permitted to enter a secure facility.

Which of these would you commonly find in the first sector of a storage device? BIOS Master boot record Registry Boot loader

Master boot record

What type of security measure is in place when a client is denied access to the network due to an outdated antivirus software? NAS DMZ NAC NAT

NAC (Network Access Control

The following Windows command-line command can be used to display a list of domains, computers, or shared resources available on a specific computer. NET VIEW REG NETSTAT VIEW

NET VIEW

A Windows command-line command for managing Active Directory domains is called: NETDOM GPRESULT NET VIEW BCDEDIT

NETDOM

A boot loader application used in Windows XP is called: A. LILO B. BOOTMGR C. GRUB D. NTLDR

NTLDR

Which of the files listed below are required to start Windows XP? (Select 3 answers) BCD (Boot Configuration Data) NTLDR NTDETECT.COM BOOTMGR (Windows Boot Manager) WINLOAD.EXE BOOT.INI

NTLDR NTDETECT.COM BOOT.INI

Which of the following would best describe a platform of components that you build to create the final product? IaaS Private cloud hybrid cloud Paas SaaS Public Cloud

PaaS

What does the term "Blackout" refer to? Power outage Electromagnetic interference Power spike Drop in voltage

Power outage

When using Internet Explorer, what is the tab where you can manage pop-ups? A) Security B) Programs C) Privacy D) General

Privacy In the Internet Options, the privacy tab has the check box to turn on/off the pop-up blocker.

A client has received a DLL not found error and has reported the issue to you. The client has also informed you that they have downloaded the the missing DLL file from the internet and believes they have resolved the issue. What is the first action should you take to regarding this situation? A) No action needed, the missing DLL has been restored B) Re-image the PC to ensure no other DLL files are missing C) Verify that the correct DLL was downloaded D) Quarantine the computer

Quarantine the computer DLL not found errors should never be remediated by downloading the missing DLL. A missing DLL can be a symptom of a greater issue, but more pressingly DLL download sites can deploy malware via the downloads or open security loopholes on your PC. You should quarantine the PC, verifying that there has been no intrusion or compromise of the system before proceeding with investigating the missing DLL's root cause.

Which of the following solutions add(s) redundancy in areas identified as single points of failure? (Select all that apply) Virtualization RAID Uninterruptible Power Supply (UPS) Backup generator

RAID UPS Backup generator

Which of the following commands allows for editing Windows registry from the Command Prompt? REGEDT32 REG CHKDSK REGEDIT

REG REGEDT32 opens the utility but does not allow you to edit it from the command prompt like REG

Which other command-line command besides REGEDIT can be used to launch registry editor in Windows? REGDT COMMAND REGEDIT32 MSTSC REGEDT32

REGEDT32

What is the name of a Windows tool that can be used for troubleshooting problems related to Dynamic-Link Libraries (DLLs) and ActiveX controls? DXDIAG REGSVR32 WINLOAD.EXE REGEDT32

REGSVR32

You are copying several very large files to a remote server that experiences intermittent connectivity issues. Choose the tool that would be best used for this task. A) Robocopy B) Copy C) Xcopy D) CD

Robocopy Robocopy is the best option for copying files in this case. Robocopy has functionality to tolerate connection failure and still resume copying.

Which of these security threats is effectively invisible to the operating system? Rootkit Ransomware Worm Malware Virus

Rootkit

The Linux operating system has many command line base functions. For instance the command "sudo" is utilized to: A) Select a directory B) Run a program in the security context of another user C) Supersede domain requirements D) Search text via regular expression

Run a program in the security context of another user Sudo, which is a portmanteau of the words "superuser" and "do", is utilized to run applications in the security context of a superuser or another user with differing security permissions.

What would be the correct syntax for setting the time-out period of 60 seconds before powering off a Windows host? POWEROFF /t 60 HALT /t 60 REBOOT /t 60 SHUTDOWN /t 60

SHUTDOWN /t 60

Which of these cloud services would best describe Google Mail SaaS Community deployment PaaS IaaS

SaaS

A technician needs to configure her neighbor's iPad. The neighbor wants to access his work e-mail. The technician requires some information from her neighbor's work IT department. Which of the following information does the technician need? server and gateway IP address and DNS Server and domain IP address and domain

Server and domain The technician needs to know the neighbor's work e-mail server and work domain name. You don't need to know IP address info, domain info, or DNS info to set this up.

Which of the following solutions would be of help in troubleshooting the "NTLDR is missing" error message displayed during system boot? (Select all that apply) Startup Repair utility Disconnecting any external drives Safe mode troubleshooting Adjusting the boot sequence in CMOS setup utility System File Checker (SFC.EXE)

Startup Repair utility Disconnecting any external drives Adjusting the boot sequence in CMOS setup utility

A device designed to protect electronic devices from large voltage fluctuations is known as: Power Supply Unit (PSU) Uninterruptible Power Supply (UPS) Surge suppressor Voltage regulator module (VRM)

Surge suppressor

The Microsoft utility commonly known as SFC is an abbreviation for the words _____________. A) System Fault Criteria B) System File Checker C) Suggested File Closure D) Southern Fried Chicken

System File Checker SFC or System File Checker is used to restore corrupted files in Microsoft Windows.

Which of the answers listed below refer(s) to troubleshooting solution(s) used when a Windows-based host does not start in Normal mode, but only in Safe mode? (Select all that apply) A. System Restore B. Change in boot order C. Driver rollback D. Troubleshooting system startup files E. Malware removal F. Startup Repair utility

System Restore Driver rollback Malware removal Startup Repair utility

Which of the following solutions would be the easiest while troubleshooting a Windows blue screen? System restart Safe mode Driver rollback Fixboot

System restart

Which of these utilities allow you to "back in time" to automatically revert your computer to a previous configuration without changing any of your documents and personal files? System Information Backup and Restore Recovery console task scheduler System restore

System restore

Provided that the process ID of NOTEPAD.EXE obtained with the TASKLIST command is 1230, which of the following answers lists the correct syntax for a Windows Command Prompt TASKKILL command that would allow to close this application? TASKKILL /PID 1230 TASKKILL -IM 1230 TASKKILL /IM 1230 TASKKILL *PID 1230

TASKKILL /PID 1230

Jan, a customer, states that another technician just removed malware from her computer and now she is not able to connect to Web sites such as Windows Update, but she is able to connect to others. Which of the following is the most likely cause of the issue? not all malware has been eliminated NIC driver is corrupt The HOSTS file has been tampered with the web browser's cache is full

The HOSTS file has been tampered with Looks like the malware finished its job! The HOSTS file is a file on your computer that resolves DNS names to IP addresses. It was DNS before there was DNS! This particular malware must have tampered with Jan's HOSTS file, disabling her computer from accessing certain Web sites like Windows Update. It would be wise to find the HOSTS file on her computer and find out if any other Web sites have been affected by this hack

A user is operating a virtual machine and discovers it has been infected with malware. Which of the following applies? the host computer will quarantine the VM automatically The VM can be shut down with no harm to the host PC The host computer will automatically delete the VM The VM will crash and cause irreparable damage to the host PC

The VM can be shut down with no harm to the host PC you can shut down an infected VM without fear of it harming anything on the host PC The host PC won't automatically delete or quarantine an infected VM. An infected VM won't cause damage to a host PC.

Bob is running 32-bit Vista Home and wants to upgrade to 64-bit Vista Home, is this a clean install or an upgrade?

This is a clean install, every time you go from 32-bit to 64-bit it will be a clean install.

Jenny is running 32-bit Windows 7 home and wants to upgrade to 32-bit Windows 7 pro, is this a clean install or an upgrade

This is an upgrade, we're running from 32-bit to 32-bit and still within Windows 7 just changing editions. Although this might incur some fees for Jenny.

Thomas is running 64-bit Windows 8 Pro and wants to upgrade to 64-bit Windows 8.1 Pro, is this a clean install or an upgrade?

This is an upgrade, we're running from 64-bit to 64-bit and running from a Pro edition to another Pro edition

A package management system for Red Hat and Red Hat-based Linux distributions is known as RPM. True False

True

Automatic boot to Windows Recovery Environment (WinRE) in Windows 8/8.1 requires the system to fail the boot process three times. True False

True

SNTP is used for online clock synchronization T or F

True

anti-static mat is the best for preventing damage to new parts such as a video card T or F

True

Preboot Execution Environment (PXE) and Apple NetBoot are two examples of technologies that enable booting a computer system with the use of a network interface. A) True B) False

True These allow an administrator to remotely load an operating system on a client computer without being physically there.

Which of these are required for Windows Readyboost? intel core duo CPU USB flash drive BIOS that supports HTT 20 GB of available hard drive space Windows Domain membership

USB Flash drive ReadyBoost is a disk caching software component developed by Microsoft for Windows Vista and included in later versions of the Windows operating system. Wikipedia

You are upgrading a user from Windows XP x86 directly to Windows 7 x64. Which of these would be the best way to move the user's profile from one operating system to the other? USMT Windows in-place upgrad Windows backup and restore windows upgrade advisor

USMT The User State Migration Tool (USMT) is a Microsoft command line utility program intended to allow advanced users, comfortable with Scripting languages, to transfer files and settings between PCs. This task is also performed by Windows Easy Transfer, recommended for general users.

An operating system installation that saves all personal system settings, file locations, and applications from the older OS version is referred to as: A) Upgrade B) Forced Installation C) Image deployment D) Clean install

Upgrade An operating system (OS) upgrade will replace the product with the newer version, leaving files and applications untouched.

Which of the following best describes a statement that reflects the nature of a virtual machine? A) Virtual machines can have resources added or removed from them at any time, without requiring a reboot B) There is a limit of one virtual machine per host C) A physical machine can be virtualized, but a virtual machine cannot be converted to physical D) Virtual machines can only be created in Windows environments

Virtual machines can have resources added or removed from them at any time, without requiring a reboot Virtual machines can have resources allocated to them from the host without requiring that the virtual machine be powered down. This depends on the virtualization platform and guest OS specifically but in general you can "hot add" memory and CPU resources to virtual machines.

What is the name of the boot loader software used in Windows Vista and later releases of the Microsoft OS? A. GRUB B. NTLDR C. WINLOAD.EXE D. LILO C

WINLOAD.EXE

From Windows 7 to Windows 8 upgrade paths

Windows 7 > Windows 8 (upgrade format) Starter > Windows 8, Windows 8 Pro Home Basic > Windows 8, Windows 8 Pro Home Premium > Windows 8, Windows 8 Pro Professional > Windows 8 Pro, Windows 8 Enterprise Enterprise > Windows 8 Enterprise Ultimate > Windows 8 Pro

From Windows 7/8/8.1 to Windows 8.1 Upgrade paths

Windows 7/8/8.1 > Windows 8.1 (upgrade format) Windows 7 > Windows 8.1 Windows 8 > Windows 8.1, 8.1 Pro Windows 8 Pro > Windows 8.1 Pro, Windows 8.1 Enterprise Windows 8 pro w/ Media Center > Windows 8.1 Pro, Windows 8.1 Enterprise Windows 8 Enterprise > Windows 8.1 Pro, Windows 8.1 Enterprise Windows 8.1 > Windows 8.1 pro Windows 8.1 Pro > Windows 8.1 Enterprise

Which of the following answers refers to a Microsoft online service that allows for patching up system vulnerabilities, improving system performance, and fixing coding errors found in Windows software? Action Center Windows Update Security Center Windows Store

Windows Update

From Windows Vista to Windows 7 upgrade paths

Windows Vista > Windows 7 (upgrade format) Home Basic > Home Basic, Home Premium, Ultimate Home Premium > Home Premium, Ultimate Business > Professional, Enterprise, Ultimate Ultimate > Ultimate (notice how lower editions can go to all higher ones but higher editions cannot go to lower editions.)

Which of these operating systems can be upgraded directly to Windows 7 Professional with an in-place upgrade? Windows XP Professional Windows XP Professional (x64) Windows Vista Enterprise Windows Vista Business

Windows Vista Business Windows Vista Enterprise does not exist and both XP's can not directly upgrade to Windows 7 with an in-place upgrade.

NTBackup

Windows XP's integrated backup program.

What is the name of a Linux utility used for managing software packages on Red Hat and Red Hat-based Linux distributions? Yum APT apt-get GRUB

Yum

What security method is used to authenticate users on a Windows HomeGroup network? a single shared password for all devices in the local workgroup private and public key pair active directory credentials a local username and password for each user multi-factor authentification

a single shared password for all devices in the local workgroup

In which of these cases would you be most likely to use DISKPART? add a new partition to a drive check a drive for logical drive errors copy part of the registry from one disk to another delete duplicate files remove temporary internet files

add a new partition to a drive

When connecting a Bluetooth device to a mobile device, which of the following best describes the purpose of discovery mode? allows two bluetooth devices to connect to each other without a mobile device allows a peripheral to be contacted by the mobile device instructs the phone to seek out all nearby devices and connect to them disconnects all devices and connects to the closest powered device

allows a peripheral to be contacted by the mobile device Discovery mode enables a mobile device to "discover" a bluetooth peripheral so they can connect.

A user reports that every time he uses a search engine and clicks on a link to go to a Web, site, he is instead taken to a site blocked by his company's content filter. The user is not trying to go to the blocked site, buthe needs to be able to successfully use the search engine to complete his assignment. Which of the following tools would a technician use to best resolve this issue? system restore recovery console anti-malware software factory pre-installation

anti-malware software It sounds like the user has gotten some malware on his PC, so it's time to run an anti-malware scan. Sit back and let the software do all the work! Incorrect Answers:All the other answers involve lengthy processes that would necessitate data backups, application reinstallation, and all sorts of other hassles. Use them as last resorts!

Which of the following answers refers to an undocumented (and often legitimate) way of gaining access to a program, online service, or an entire computer system? Root access Administrative access Zero-day vulnerability Backdoor

backdoor

How does the Windows 7 Experience Index generate its base score? based on the average of your subscores based on the highest of your subscores based on the age of the computer based on the lowest of your subscores

based on the lowest of your subscores the Windows Experience Index in both Vista and 7 generates its base score from the lowest of your subscore categories Not from an average or the highest score.Basing it from age would be a really hard number to define and track. Based on the age since the last format? Since the last install? Too many variables.

The part of your hard drive that contains the MBR is called the: extended partition boot sector primary partition logical drive

boot sector The boot sector is the location on your drive that holds the partition table and your boot sector All information regarding your partitions, including where your primary partitions, extended partition, and logical drives begin and end are all listed in your partition table, which resides in the boot sector.

Which of the following terms is used to describe a collection of intermediary compromised systems under control of a hacker? Honeynet Botnet Intranet Malware

botnet

Which of the following would not be the best use of MSCONFIG? modify the Windows boot parameters determine which services load during system setup set the amount of memory used when windows starts start windows in safe mode change the order of boot devices

change the order of boot devices

You have booted your computer into Windows 7 , but now you'd like to check the revision of BIOS on your computer. Which of these methods would be the best way to determine the current BIOS version? check the System summary of the system information utility use a LiveCD utility to determine the BIOS version use the "ver" command at the Windows XP Command Prompt Use another computer to query the computer BIOS version using WMI

check the System summary of the system information utility

check the System summary of the system information utility fixmbr format defrag ntbackup chkdsk

chkdsk

Uhura has just accepted an SSL certificate, but she's not comfortable about the source and now wishes to make it "go away." What should she do? right click on the certificate in question and select "confirm" rebuild the SSL cache configure her firewall to block all incoming SSL certificates clear the SSL cache

clear the SSL cache In order to get rid of that certificate, she must clear the SSL cache. A firewall cannot be configured that way Confirming the certificate will not make it go away. There is no option to rebuild an SSL cache.

Which of the following would not be a best practice to control ESD? connect an anti-static strap to an electrical ground touch the exposed metal of the computer chassis keep all adapter cards in an anti-static bag use an anti-static pad

connect an anti-static strap to an electrical ground you want to ground the ESD strap to a non-electrical ground to prevent static shocks!

A tech needs to adjust the UAC in Windows 7. Where can he access the settings? administrative tools > computer management control panel > device manager control panel > windows firewall control panel > user accounts

control panel > user accounts You can change the User Account Congrol (UAC) settings in Windows 7 in the User Accounts applet in the Control Panel. Note that the CompTIA A+ exams might not use the full path to these tools. You need to know that User Accounts is in the Control Panel. Computer Management enables you to make changes to user accounts, devices, hard drives, and more, but it's not the place for adjusting UAC settings Device Manager enables you to change drivers and enable or disable devices, not UAC. The Windows Firewall controls programs accessing your computer over a network.

Which of the answers listed below refers to a Unix command for copying files and directories? cp copy xcopy robocopy

cp

A low-level utility that can be used for creating/restoring filesystem backup copies in Linux is called: fsutil diskpart dd format

dd

Which of these Linux utilities would be the best choice for full disk imaging? apt-get tar dd grep ps

dd dd is a command-line utility for Unix and Unix-like operating systems, the primary purpose of which is to convert and copy files

Your Windows desktop does not associate an application with .TXT files. Which of these would be the easiest way to fix this issue? install a text editor run windows repair use power shell to define an association run your text editor in compatibility mode define an association in control panel / default programs applet

define an association in control panel / default programs apple

Which of these utilities would be the best choice to help you increase the read and write time of files to a traditional hard drive? defrag fixmbr ntbackup chkdsk format

defrag

You have been tasked with determining why a service fails to start in a server test environment. There are numerous services required for the application to function, but a single service is failing to start upon boot. This service also happens to be the last service that is supposed to start. A delayed start is not required, nor is a manual start and the service is enabled. You can manually start the service and it will function normally until the next system reboot. The service is run under "System". Knowing these things you open up the "Services" application and check: A) Dependencies B) Recovery options C) Service restart timer D) Start parameters

dependencies Based on the prompt for this question, the most likely cause is a dependency missing. This most likely means that a requirement for another service being active is not set. You should attempt to ensure that all dependencies are correctly enabled.

Which of these Mac OS utilities would be the best choice for fixing a corrupted file system? check disk disk utility disk check disk manager fix disk

disk utility

What tool can you use in the Recovery Console to partition a hard drive? disk management partition fdisk diskpart

diskpart DISKPART is the Recovery Console tool that enables you to partition a hard drive Disk Management is the graphical partitioning program in Windows. It does not work in the Recovery Console FDISK was the tool used for partitioning drives in DOS and Windows 9x.PARTITION is not a valid tool.

An incident response technician responds to a request for investigation about illegally obtained movies. The technician finds that a user has been violating company policy and illegally downloading movies. Which of the following would be the next BEST step for this technician to perform? delete all unauthorized materials reprimand the user, and remove violating materials document the incident, purge all policy violating materials isolate the workstation in a limited access facility

document the incident, purge all policy violating materials Document the incident and purge all materials is correct. Once complete, the violating materials should be purged, so they cannot be used by any other persons Isolate the workstation in a limited access facility is incorrect. The investigation does not require these measures. Deleting the materials is correct, but it is not the BEST answer available. Reprimand the user, and remove violating materials is incorrect. It is not the technician's responsibility to take disciplinary action on an employee.

A company is upgrading several hard drives to SSDs. The technician is to securely repurpose the old hard drives for use for other company systems. Which of the following procedures will prepare the hard drive for later use and ensure the data on the drive is not easily accessible? chkdsk drive wipe deguass quick format

drive wipe Drive wipe is the correct answer. Without wiping the drives, access to much of the data is easily recovered with free utilities found on the internet. Chkdsk only checks for bad sectors on the drive, and repairs upon request. Degauss will destroy the drives completely, and they cannot be used again. Quick format will remove the data, however, it leaves the data open to recover with tools available freely.

Which of these would be the best choice for BitLocker? encrypt everything on a storage drive encrypt all your outgoing email messages encrypt everything over a private tunnel between your laptop and your corporate office encrypt a set of private files on your SSD encrypt a set of project files on a network drive

encrypt everything on a storage drive

Which of the following symptoms is indicative of a misconfigured BOOT.INI file? error at boot: "Windows could not start" error at boot: "NTLDR is missing" Windows boots into safe mode only error at boot: " no boot device present"

error at boot: "Windows could not start" Error at boot: "Windows could not start." BOOT.INI's main job is to point to a valid copy of Windows, usually stored in a folder called \WINNT or \WINDOWS. If BOOT.INI doesn't point out a valid copy, this is the error you'll get Error at boot: "NTLDR is missing." Your Master Boot Record points to NTLDR. If there's a problem with the MBR, if it's corrupt or if the boot order is incorrect, then you'd get this error. Error at boot: "No boot device present". This happens when the BIOS is pointing to a drive that has no bootable partitions. Windows boots into Safe Mode only. While many issues may cause this to happen, if you're able to boot into Safe Mode, you have a bootable copy of Windows and your BOOT.INI is fine.

What is the name of a GUI-based file and folder manager application in Windows? EXPLORER BOOTREC IEXPLORE MSTSC

explorer

After being infected with a virus, a user's computer does not recognize the user as having local administrator rights to the computer. After troubleshooting the issue, a technician determines the computer's OS needs to be rebuilt and data needs to be restored from the user's backup. Which of the following tools would best reset the computer to how it worked when first purchased? system restore anti-malware software factory restore disc recovery console

factory restore disc A factory restore disc will revert a computer's OS back to the pristine condition in which it left the factory. It's up to you to remove all the bloatware all over again The Recovery Console will help you troubleshoot a computer that is having trouble booting, but it won't reset the computer back to its original condition Anti-malware software will help remove malware, but it won't restore your OS. Performing a System Restore takes your PC back to a previously established snapshot, but only in terms of installed programs and drivers. It won't completely restore your computer.

True or false: Backups and snapshots can be used interchangeably to ensure data redundancy. A) True B) False

false Backups and snapshots are different methods of attaining data redundancy. A snapshot is an "image" of a server at a point in time, stored locally to the virtual host. This is important to note, as a backup is stored off of the host. While they both accomplish similar tasks, snapshots are typically used to revert changes made to a virtual machine when attempting new configurations. Backups are intended to preserve information stored on a server or database for future restoration if needed.

True or false: The best tool for cleaning a dusty desktop PC case is a vacuum. A) True B) False

false You should refrain from using a vacuum for the purposes of cleaning computer components, as they can generate static electricity that can destroy sensitive electronics. Compressed air is the often used to remove dust in the place of a vacuum.

A user has downloaded some malware to a workstation. What Control Panel utility should the technician use to try to identify and remove the malware? folder options > view hidden files internet options > privacy display settings > refresh rate system > performance

folder options > view hidden files View hidden files will allow you to see the system and hidden files. A common technique in hiding malware is to place them in system folders and use a hidden or system attribute. By using this attribute, they become invisible to Windows Explorer in normal condition, as Windows defaults to not show hidden or system files. System > Performance utility will allow you to view information about the performance of your computer. Display Settings > Refresh rate utlity will allow you to adjust the refresh rate of your monitor. Internet Options > Privacy allows you to select a setting for your Internet Explorer security, turn on pop up blockers and disable toolbars.

Which of the following could be considered a best practice in IT? following up with a customer to verify satisfaction always suggesting the least expensive option offering all possible choices to a customer always suggesting the fastest route to fix the problem

following up with a customer to verify satisfaction Following up with a customer is a great way of both ensuring that the customer is satisfied (and is, therefore, more likely to be a repeat customer) and verifying that your fixes worked like you wanted them to. Suggestion the fastest route to fix the problem is a great idea, but techs are more often in a position simply to perform the fastest fix, whereas you always want to follow up. Suggesting the least expensive option seems great, but the least expensive option isn't always the best option.Because most computer problems can be fixed any number of ways, offering all possible choices to a customer may in fact be impossible. Do you suggest every single brand of RAM when a replacement becomes necessary? Do you go over the pros and cons of every single antivirus program with a customer? Using your expertise to narrow down the suggested options is part of being a tech.

What is the maximum number of partitions that you can have on a disk with the MBR partition type? four two six one eight

four

When scheduling a backup for preventative maintenance, which of the following would ensure all data was captured? differential full incremental daily

full A full backup backs up everything that is set to be backed up, whether the archive bit is on or not Differential backups save only the data that has changed since the last full backup Incremental backups save only the data that has changed since the last backup of any kind A daily backup is just a backup of any type that is preformed every day.

Which command can be run on a workstation to determine the Group Policies applied on a workstation? gpupdate gpresult tasklist extract chkdsk

gpresult Gpresult is a command line tool that will access the RSoP of a workstation connected to a network with group policy settings. Extract is not a command line command. Tasklist will show all running applications and services. Gpupdate will udate group policy settings. Chkdsk will check and repair disk problems.

Which of the following user accounts should be disabled to adhere to security best practices? guest administrator standard user power user

guest It might seem OK to leave the Guest account active, but it can give unauthorized parties access to your computer. It's a good idea to disable this account your day-to-day accounts should all be Standard User accounts.You need at least one Administrator account on the PC, but make sure that it's password-protected.A Power User account is slightly less powerful than the Administrator account, so make sure it's password-protected if you have one.

No matter what a technician is doing on a local system, if he sees the error "Access is Denied," what is the first issue he should consider? he needs to be a power user he hasn't logged in with his correct password he lacks the necessary permissions his account isn't listed on the local security policy

he lacks the necessary permissions He lacks the necessary permissions.This is a generalized question, so think broadly here. In general, "Access is Denied" means the user lacks the necessary permission to do whatever he is attempting to do. This could be accessing a folder, installing an application, or clearing a print queue (for a few quick examples). All accounts are "listed" on the Local Security Policy. Listed is a meaningless term. If this question said, "He isn't allowed to do that action per the Local Security Policy," then this answer might have some weight, but as it stands, it's incorrect Power Users do have some permissions regular users don't have, but it doesn't cover enough. If this answer said, "He needs to be a local administrator," then it might be correct. No one can even log onto a computer without using the correct password. This is a totally silly answer.

Which of the following commands in Windows can be used to display help information related to a specific command-line utility? (Select all that apply) [command name] /help man [command name] [command name] info help [command name] [command name] /?

help [command name] [command name] /?

What does Disk Cleanup do? optimizes files that have been fragmented across the hard drive helps you identify and clean up unnecessary files on a hard drive automatically cleans the surface of the hard disk(s) erases and re-formats a disk

helps you identify and clean up unnecessary files on a hard drive

Which of these are true about surge suppressor specifications? higher let-through ratings are better higher amp ratings are better Lower dB levels filter values are better lower wattage rating is better

higher amp ratings are better

Browser redirection is caused by which of the following types of viruses? trojan worm keylogger hijack

hijack A browser hijack causes a browser to go to sites that it didn't intend. A trojan is a type of malware that pretends to be a legitimate piece of software. A worm is a piece of malware that replicates through a network. A keylogger keeps track of the keys that a user presses in an attempt to steal sensitive information.

I have a bunch of files on my PC and I want to delete them. And when I say delete them, I don't even want them going to the Recycle Bin. How can I do that in Windows? pres the backspace key hold caps lock then press backspace hold shift and then press delete hold ctrl then press delete

hold shift and then press delete Hold [Shift] down, then press [Delete] on any file you want. It won't go to the Recycle Bin. It's buh-bye gone! holding [Ctrl] won't do anything. Any answer involving the [Backspace] key won't have an effect, either.

Which of the following is an example of an open-ended question? what symptoms appeared and when? is this correct? what's your employee ID how many I help you?

how many I help you? How may I help you? This is a VERY open-ended question. Open-ended questions are not looking for a particular response and solicit a broad answer. Closed-ended questions look for a specific response. What symptoms appeared and when? This question is closed-ended as it is looking for specific symptoms.

Cletus receives a computer that has a Trojan horse virus. Which of the following should you do first? run the system recovery utility establish how the virus was acquired identify the malware rollback to the system restore point

identify the malware Identify the type of malware that poor Cletus aquired. We know it's a Trojan, but exactly what kind of Trojan did he get? after he finds out what kind of Trojan it is, he'll most likely be pointed in the direction of how the PC aquired the malware. Run the System Recovery utility or System Restore after you've found out all the above information.

A user reports problems browsing the internet and that their browser has a person with a headset that keeps asking them to "click here for help." When the user has clicked on the icon to try to resolve the issue, the browser is redirected to a website to purchase software. Which of the following should be performed FIRST to resolve the issue? patch all security updates for the OS Identify the malware on the system create a restore point train the end user

identify the malware on the system

A technician has a client's laptop that is randomly shutting down. Which of the following is the first step of the troubleshooting theory that the technician should perform to resolve the laptop's issue? identify the problem establish a theory document findings, actions, and outcomes establish a plan of action to resolve the problem

identify the problem First off, you've got to identify the problem. No sense in fixing it before you understand what it is

You are working within Disk Management in Windows and notice one of your drives is listed as foreign. What must you do to use the disk? (Choose the BEST answer.) import the disk convert it to a dynamic disk convert it to a basic disk format the disk

import the disk When a disk is listed as foreign in Disk Management, it means that you have recently installed a dynamic disk into your computer and it needs to be imported. you can't convert the disk to a dynamic disk because it already is one. Converting the disk to a basic disk will destroy any data on the disk. You still have to import the disk before you format it. And if you were to format it, you would lose the data you have on the disk.

Sarah upgraded from Windows Vista to Windows 7 on her laptop. After enjoying the enhanced performance and new interface for a few days, she realized what was missing: the Windows Sidebar with its friendly clock and weather gadgets. How can she add gadgets to her Windows 7 computer? right-click the desktop, select properties > add gadget right - click on the desktop, select peronalization > aero themes > gadgets in control panel, select appearance and personalization > desktop gadgets in control panel, select appearance and personalization, windows sidebar properties

in control panel, select appearance and personalization > desktop gadgets Microsoft integrated gadgets into the desktop in Windows 7. To add gadgets, go to Control Panel, select Appearance and Personalization | Desktop Gadgets. You can also right-click the desktop and select Gadgets. Double-click a gadget to add it to your desktop

A technician is tasked with installing a legacy application on a Windows 7 computer. When the technician tries to install the legacy application, an error appears saying that the application cannot be installed because the OS is not supported. Which of the following should the technician do first to try to get the application installed in Windows 7? install windows security updates on the system install the application with compatibility mode install the application in safe mode install the lastest windows service packs and updates

install the application with compatibility mode Compatibility mode can sometimes enable support for legacy applications. It doesn't always work, but it's the first thing to try Using safe mode won't get the program to work.Updating Windows with service packs or security updates also won't work.

What is the grep command?

is a command-line utility that is used for searching text from standard input or a file for specific expressions, returning the lines where matches occur.

You are working with a customer and want to tell them all the new features of Windows 7 so they'll upgrade from Windows Vista. What is one thing you could tell them about? it comes with the all- new aero interface it has a feature called UAC it features a new task bar that enables you to pin items to it like a dock it has a side bar, which enables you to install gadgets

it features a new task bar that enables you to pin items to it like a dock That new Task Bar is totally cool, isnt' it? You can pin just about any application to it. I have 10 applications pinned to mine. It's really helped in cleaning up my desktop the UAC, Aero, and Side Bar were all features introduced in Windows Vista

How would you define an accelerometer? gives the device a longer battery life increase the speed of the CPU it measures the velocity of the device it tilts the screen when I rotate my iPad

it measures the velocity of the device :The definition of an accelerometer is a device that measures proper acceleration (speed, velocity). These devices are built-in to many of our mobile devices, including smart phones and tablets. We also see accelerometers in cars to monitor when a crash has occurred so that 911 can be called. We also see accelerometers in your Nintendo Wii controllers so you can play games! :An accelerometer will not give your device longer batter life or increase the speed of your CPU.It also does not tilt the screen on your iPad. The accelerometer measures and detects the tilt in your screen, iOS then performs a function to tilt the screen for you. Yes, it's a mean answer, but I'm looking for a definition of an accelerometer, not the effect of one.

A technician is reconfiguring a mobile e-mail client for offline mode. Which of the following describes the expected time it will take to synchronize the account with the e-mail server? there is no offline mode for e-mail it will depend on the time when the account was last synchronized it will depend on the SMTP settings of the e-mail server it will depend on the POP settings of the e-mail server

it will depend on the time when the account was last synchronized if it's been a while since the last sync, it will take longer to download the increased amount of e-mail.

In which of these situations would you make use of UAC? force periodic updates to a windows domain password prevent write access to a network share covert IP addressing from a public address to private addresses limit applications from making changes to network settings

limit applications from making changes to network settings

A technician is tasked with changing the account lockout threshold to 30 minutes in Windows 7. Which of the following should the technician use to accomplish this task? local security policy user account control users and groups windows security center

local security policy The Local Security Policy tool enables you to configure many different secuirty features for a local machine, one of which is the account lockout threshold User Access Control is a feature introduced in Vista that attempts to prevent malicious software from installing itself or anything else. The Windows Security Center is a centralized location where you can check the status of your anti-malware software, Windows Firewall, and Windows Update. Users and Groups is where you control user permissions in Windows.

A user regularly has to walk away from her computer and is worried someone may access her workstation. Which of the following would best prevent this? lock the workstation set the screensaver password logon using the uprivledged guest account shutdown the computer

lock the workstation Locking your workstation is the simplest and most effective way to keep others from accessing your computer. Shutting down the computer takes a while and won't actually prevent anything if you don't have a password set.Logging on to a guest account is still giving others access. Less access, but still access. setting a screensaver password is a great idea, but what if someone gets to your computer before the screensaver activates?

An administrator disables a user's email account due to high volumes of emails being sent in a few hours. Which of the following types of attack has the user experienced? phishing attack malware infection virus infection man-in-the-middle attack

malware infection Malware infection is a generic term used for intrusive software Virus is incorrect. A virus tends to corrupt or destroy data, not send e-mail. Phishing attacks are designed to collect data, not send e-mail.

Which of these Linux commands would you use to rename a file? ren rm mv rename cp

mv mv is a Unix command that moves one or more files or directories from one place to another. If both filenames are on the same filesystem, this results in a simple file rename;

Which of the following resources is most important for accessing remote virtual environments on a client machine? network speed high-speed memory CPU speed drive space

network speed Network speed is critical for accessing anything remotely. The faster the network, the faster the access the other answers would be great for locally hosted virtual environments, but not for remotely hosted ones.

A simple Windows text-editing utility that can be launched from any place in the Command Prompt without the need for specifying path to the application's file location is called: WORDPAD EXPLORER NOTEPAD MSWORD

notepad

William's system is locking up during Windows boot. He reboots and presses F8 to bring up the boot menu and then selects "enable boot logging" In what file will the results be stored? ntblog.txt winlog.txt logfile.txt winntlog.txt

ntblog.txt Windows writes the results of boot logging into the ntbtlog.txt file. You usually have to boot into safe mode to read the file (since you're probably still having boot problems). The other three file names do not exist in Windows.

MSTSC

opens a Remote Desktop connection

A client has asked a technician about drive sanitation and wants to know the difference between overwriting a drive and quick formatting a drive. Which of the following would be the best response from the technician? overwriting writes 1s and 0s to a hard drive, replacing all the data. A quick format only clears the references to the data, so the data is only overwritten as new data and is saved to the drive overwriting replaces all the data with a single file that fills the hard drive, destroying the data. quick formatting erases all the data. nothing is different, they destroy the data so no one can recover it.

overwriting writes 1s and 0s to a hard drive, replacing all the data. A quick format only clears the references to the data, so the data is only overwritten as new data and is saved to the drive Overwritten data cannot be recovered, but a quick format only deletes a drive's master file table without actually deleting any data, so the data on the drive can be recovered

When a technician runs the defrag utility, what types of files would be excluded from the process? document files System32 files Music files paging files

paging files The paging files are pretty much always being used by the system, so the defrag utility will never defragment them. Other files would be both Master File Tables, the one at the beginning of the disk and the one in the middle Documents, Music, and any cool utilities in the System32 folder will all get the same treatment under defrag.

Which of the following types of screen locks is the MOST secure way to secure your mobile device? passcode lock swipe lock face lock fingerprint lock

passcode lock The passcode lock is the most secure screen lock. On current Apple products, a forgotten passocde could potentially disable your device Fingerprint security can be easily tricked, and compromises your biometric information.Swipe lock does not provide any security for your device.Face lock can be fooled with a good quality picture of you!

A social engineering technique whereby attackers under disguise of legitimate request attempt to gain access to confidential information they shouldn't have access to is commonly referred to as: Phishing Privilege escalation Backdoor access Shoulder surfing

phishing

Which of the following Control Panel utilities would be best to use to uninstall a Windows 7 application? add/remove programs folder options administrative tools programs and features

programs and features The Programs and Features applet is used to uninstall applications in Windows 7 and Vista The Folder Options window is used to change the way Windows displays folders. Add/Remove Programs controls uninstalling applications in Windows XP. Administrative Tools is a collection of utilities for maintaining and configuring Windows.

In which of these cases would you use EFS? protect files stored on a hard drive transfer files to a windows service increase read and write access to the hard drive maximize memory throughput

protect files stored on a hard drive

A corporate user is unable to connect to the internet on their workstation. A technician finds the computer has a valid IP address, can connect to corporate network shares, and can view local intranet pages on the workstation's web browser. The administrator tries to navigate to a public internet page, the web browser times out. Which of the following should the technician review? IPv6 settings DHCP server performance settings proxy settings

proxy settings Proxy servers are often used in corporate settings to log and filter network traffic. It allows companies to prevent users from accessing certain content on the web. A user's system must use specific proxy server settings in order to be able to gain access to the internet. the problem has nothing to do with performance or IP settings. DHCP server is working or they couldn't connect to the corporate network shares.

A customer reports that after a technician cleaned up a rogue anti-virus program, the customer cannot browse the Web. Which of the following should the technician check to resolve the situation? Proxy settings user privileges browsing history firewall settings

proxy settings Some viruses change a computer's proxy settings to use a proxy server controlled by the virus' creator A computer's browsing history won't have any affect on the ability to browse the Web. It's unlikely that a virus would change a computer's firewall settings to be more restrictive. If anything, you would expect a virus to turn off the firewall. Changed user privileges wouldn't prevent Web browsing.

What is the name of a Linux command-line utility used for reporting statistics on running processes? ps tasklist nbtstat id

ps

A user gets an error message that the trust relationship to the domain has been broken. Which of the following can be done to resolve this from the client desktop? re-join the computer to the domain run chkdsk reboot the PC as the domain will automatically rebuild the relationship update the BIOS using the latest version

re-join the computer to the domain Re-joining the computer to the domain will rebuild the trust relationship None of the other options will rebuild the trust relationship.

Your Mac OS workstation has experienced a kernel panic. Which of these would be the best next step? disconnect all external storage devices reboot the computer and check the system logs update the OS to the latest version backup your data and reload the OS run a hardware diagnostic

reboot the computer and check the system logs

Which of the following would be the most likely reason to run SFC? upgrade the OS install security patches scheduling a recurring task recover from a malware infection repair boot sector

recover from a malware infection

A user wants to completely re-install Windows 7 on their laptop, but it did not come with any operating sytem discs. How can this be accomplished? primary partition system restore secondary partition recovery partition

recovery partition Recovery partition is correct. Modern manufacturers usually do not include backup media for OEM systems. They utilize a hidden partition on the hard drive to create a recovery partition. Primary partition is incorrect. Primary partitions contain your file system. System restore is incorrect. It will only restore your system back to a previous stored point, it will not re-install Windows. Secondary partition is incorrect. Secondary partition is a defined storage space on a hard drive that will hold its own logical drive name.

Which of the following system utilities in Windows provides access to a database containing system configuration information? NBTSTAT MSCONFIG REGEDIT MSINFO32

regedit

When replacing a power supply, what should you do first? read MSDS documentation check for environmental concerns review local regulations for disposal procedures remove watch and all jewelry

remove all watch and all jewelry Remove all metal from your person when working with electricity. This means jewelry and watches should be set aside until the job is done. Environmental concerns are good to know about, but they're secondary to personal safety. You'll want to check into disposal procedures when the new power supply is installed and working, but that's not your first order of business. The MSDS will tell you lots about safety procedures, but removing your watch and jewelry is just common sense.

When working on a user's computer, Jamie the tech notices that the user has created a bunch of desktop shortcuts to inappropriate Web sites. What should Jamie do? track the evidence document all changes to the computer report through proper channels preserve the data and device

report through proper channels Jamie should report the infraction to his supervisor, who will then ensure that the appropriate action is taken. Unless the Web sites host illegal content, the user's computer couldn't be considered evidence. Jamie should be documenting changes while working on the computer, but that's not part of dealing with the shortcut issue. Jamie should preserve the data and device in any case, not specifically for this issue.

In cases where users are found in violation of policies related to prohibited content or activity, the elements of first response should include: (Select all that apply) Consulting co-workers Reporting through proper channels Multi-factor authentication Problem identification Data/device preservation

reporting through proper channels problem identification data/device preservation

When booting to Windows, a user receives several messages referring to a .dll file that cannot be found. Which of the following would be the BEST course of action for the technician? copy the .dll file from another PC run the defrag utility to correct any file damage research the file to identify the application which uses the .dll run the windows update utility to replace the DLL file

research the file to identify the application which uses the .dll Dynamic link library files allow applications to share code to perform functions. These files are often used by malware to alter your system and allow intruders to gain remote access to your system. Always verify the program for which a .dll file is used. Do not copy a .dll file to your system until you know that it is not malware. The Windows Update will only provide update to Windows components. It does not review all .dll files. Defrag is a hard drive utility process to reduce fragmentation.

After updating the device drivers for a video adapter, a user reports she is only able to view a portion of the screen and the text is very large. Which of the following is most likely the cause? refresh rate set too high resolution set too low refresh rate set too low resolution set too high

resolution set too low This sounds like a symptom of a low resolution. Set the user's screen resolution higher and her problems should all go away.

A user has not received any new e-mails on his smartphone in the last two days. The user is able to access the Internet without any problems. Which of the following should the user do first? reconfigure the smartphone's e-mail account restart the smartphone resychronize the smart phone update the OS

restart the smartphone Have you tried turning it off and on again?" Sometimes restarting a device can solve unexpected problems. If the problem persists after a restart, you might try to reset the e-mail settings. Syncing the phone probably won't solve the problem .An OS update would be the last resort, especially since phone OS updates are pretty rare, so your phone probably doesn't have one available.

A technician is called onsite to solve a network connection error. Upon arrival, the technician observes a message on the screen stating there is no boot drive found. Which of the following steps should the technician take next? repair the boot sector using recovery console restart the system, booting from a system recovery disc inform the customer the hard drive crashed and replace the drive restart the system to verify the proper boot sequence

restart the system to verify the proper boot sequence The first thing to do after a boot error is to make sure the boot sequence is correct. You can use the recovery console to repair the boot sector on a drive, but if the drive isn't showing up at all, the recovery console won't help much. A system recovery disc won't help a boot device show up. Don't just replace the drive straight away. There may still be hope!

In which of these would you be most likely to use a host-based firewall? block a known operating system vulnerability stop viruses before they execute in RAM Prevent browsing to specific URLs restrict inbound application use block pop-up windows

restrict inbound application use

A collection of software tools used by a hacker in order to mask intrusion and obtain administrator-level access to a computer or computer network is known as: Trojan Rootkit Armored virus Backdoor

rootkit

Which of the following would be the best choice for real-time Linux-based backups? tbackup chmod dd rsync grep

rsync a utility for efficiently transferring and synchronizing files across computer systems, by checking the timestamp and size of files.

When you turn on your computer, Windows starts in Safe Mode. Which of these would be the best next step? run BOOTREC /Fixboot reset your file associations run startup repair reinstall the OS upgrade your BIOS

run startup repair

With which of these would you use Windows PE? (pre-installation environment) encrypt file connect to a network printer run system restore view the properties of a folder restart a remote computer

run system restore

Which of the following security methods is best used to track access to a server room? key lock mantrap sign-in log biometric lock

sign-in log A sign-in log keeps track of every one who goes into a server room. A biometric lock is a lock that uses some physical attribute (for example, a fingerprint) to control access to a secure area. A mantrap is a way to keep attempted intruders from escaping. A key lock is just an ordinary lock that uses a key.

An email sent from unknown source disguised as a source known to the message receiver is an example of: (Select 2 answers) Spoofing Dictionary attack Trojan horse Brute-force attack Social engineering Tailgating

spoofing, social engineering

A technician needs to rebuild a computer that had a virus. Which of the following data destruction methods should be used to ensure the virus has been successfully erased before reinstalling the operating system, programs, and all user data? shredder low-level format degaussing tool standard format

standard format A standard format will erase the drive so that it can be cleanly overwritten. A low-level format formats the disk at the surface level, and is a bit overkill for simply reinstalling a hard drive. A disk shredder completely destroys a hard drive. You're not installing anything on a shredded drive A degaussing tool will permanently ruin a hard drive.

Which of the answers listed below refers to a Linux command that allows for assuming the identity of a different system user and executing commands with security privileges of that user account? sync id usermod su

su

A Linux command that allows for modifying security privileges in order to be able to execute a single command that requires root access permissions is called: id sudo usermod su

sudo

Which of the Event Viewer sections records failed hardware events? system antivirus security application

system The System section records all problems, like hardware failures, that relate to the system. Application and Security do not record hardware failures.There is no Antivirus section in Event Viewer.

When working on a Windows 7 computer, which option will be available to you when you are presented with the Recovery Environment dialog box? system restore system information utility performance monitor services

system restore You will get the choice of entering System Restore, along with Command Prompt, Windows Memory Diagnostic Tool, System Image Recovery, and Startup Repair. The following can be found in the Adminstrative Tools section in Control Panel... System Information utility, Performance Monitor, and Services.

John worked on his PowerPoint presentation yesterday, but today the program won't run. What Windows tool or option should he try to get PowerPoint working again? system restore safe mode last known good configuration safe mode with networking

system restore the key fact here is that the application worked in the past but doesn't work now. Given the choices you have it's safe to assume that John possibly installed another program that created a problem with PowerPoint and that his best fix to this problem would be to restore the system to a time that PowerPoint was working

The term "Brownout" refers to what kind of situation? Power spike Electromagnetic interference Temporary drop in voltage Power outage

temporary drop in voltage

Judy launches a new app she just recently downloaded on her Android tablet. When she turns the tablet to landscape, her new app doesn't automatically adjust. What could be causing this issue? Judy forgot to enable landscape mode in the app auto-adjust is disabled by default on android tablets the tablet is conserving power and disabled landscape the app she downloaded was not designed to react to the gyroscope

the app she downloaded was not designed to react to the gyroscope Whatever app Judy downloaded, it wasn't developed to react to the gyroscope. Many games have a difficult time displaying in portrait mode. Auto-adjust is enabled by default on Android- and iOS-based tablets. Tablets don't conserve power by disabling the rotation capabilities. She didn't forget to enable landscape mode, because the app no doubt doesn't have the ability to.

A user reports that her desktop PC shuts down 10 minutes after turning it on in the morning. When the technician moves the PC, it sounds like there are loose parts sliding around in the case. Which of the following is the most likely explanation for the PC shutting down? a memory module has become unseated the CMOS battery is bad the hard drive cable has become unseated the heat sink retaining clip has broken loose

the heat sink retaining clip has broken loose If the heat sink has come loose, the CPU will gradually build up heat until the it overheats and shuts off. You'd also hear the heatsink clunking around inside the case, letting you know that something's loose in there! A bad CMOS battery would just result in the CMOS settings resetting to their default values whenever the PC was restarted. An unseated memory module wouldn't cause a PC to randomly shut down. A PC with a disconnected hard drive wouldn't shut down; you just wouldn't be able to access the hard drive in Windows.

A user is trying to print, but receives the message "Access Denied." Which of these would be the most likely cause of this issue? the print server permissions aren't allowed with the user's credentials the printer is in a locked room the printer is not compatible with the user's OS each user must login to the printer before printing the printer is not part of the windows domain

the print server permissions aren't allowed with the user's credentials

You are working on your very first Windows 7 computer. You click the Start button and you notice there is no "run" command. Why can't you see the "run" command? the computer is infected with malware the rune command is no longer featured in Windows 7 the user you are logged in as doesn't have the privileges the run command is not displayed by default in Windows 7

the run command is not displayed by default in Windows 7 The run command is not displayed by default in Windows Vista and in Windows 7. You simply start typing and your program or file will be found and ready for you to run. Having the appropriate permissions or privledges has nothing to do with the run command being visible. While malware infecting your computer can cause the run command to not work correctly at times, it won't make it disappear. It is still very much a feature in Windows 7, if you miss it badly enough, you have the option of re-enabling it.

What is purpose of a dollar sign appended to the end of a Windows share name? The share is an administrative share the share is read only the share is invisible the share will not be backed up the share is for local use only

the share is invisible

When issues are reported, what is the best method or technology to track them? A) E-mail B) Ticketing system C) Post-it notes D) Phone calls

ticketing system The best method for tracking issues and maintaining a central repository that can be used for incident monitoring, knowledge-basing and reporting is a ticketing system.

A nework administrator needs to set some immediate policies on several systems. Upon completion of an update from the command line of the first system, what is the next step that should be completed before moving to a new system? (Select TWO). type exit at the command prompt and press enter view the cmd process in task manager select switch user on the PC minimize the CMD box to the taskbar click the "x" in the top right of the CMD window

type exit at the command prompt and press enter click the "x" in the top right of the CMD window the command line prompt should be closed, not minimized, upon completion of update command. MD will only open a DOS window, it does not set policy.Minimizing the CMD box does not complete the task, and leave the program open.Switching the user does not close the CMD box, and complete the task.

Which of the following might be the cause of slow computer system performance? (Select all that apply) A. Unpatched OS B. Disk mirroring C. Malware presence D. OS power management options E. Disk striping F. File fragmentation G. Disk thrashing

unpatched OS Malware presence OS power management options File fragmentation Disk thrashing

Which of these would be the best choice for migrating from one operating system to another from the command line? user state migration tool windows easy transfer deployment image servicing and management windows migration services windows upgrade advisor

user state migration tool

Which of the following BEST represents a security vulnerability of mobile devices? (Select TWO.) viruses improper file permissions theft unauthorized downloads phishing

viruses, theft Mobile devices these days are incresingly targeted by viruses, and phone theft is a constant threat. Phishing is the act of using e-mail to pretend to be a trusted authority in order to obtain sensitive information.Unauthorized downloads and improper file permissions are just made-up answers.

According to the CompTIA A+ troubleshooting methodology, at what point during the troubleshooting process should you back up the computer? when testing the theory to determine cause when establishing a theory of probably cause when establishing a plan of action to resole the problem and implement the solution when identifying the problem

when identifying the problem When identifying the problem is the best time to do some back ups. Before making any changes to the system, you should always back it up When you establishing a theory, testing your theory, or implementing a plan of action, you are more likely to be doing some significant changes to their computer. Back up before any of that!

A computer that has been compromised by a virus or Trojan horse that puts it under the remote control of an online hijacker is called: Honeypot Zombie Logic bomb Proxy

zombie

You have an iOS device that you just recently purchased. Select two ways that you can syncronize your device with your computer. (Select two.) ieee-1394 USB WiFi RS-232

USB, WiFi USB and Wi-Fi are the only methods to connect your iOS phone, music player, or tablet to your PC.

You are getting some pressure from upper management about saving energy. The company wants to reduce power consumption on a wide scale. Which technology would help in accomplishing this? Virtual Servers WPA2 Wi-Fi Emulation

Virtual Servers Creating virtual servers on one physical server will enable you to house all three servers on separate virtual machines while still being on the same physical box. This will dramatically save the company energy by not having as much hardware Emulation isn't the same as virtualization. With emulation, you are running an operating system on top of an environment that it wasn't natively designed for, such as running a Nintendo 64 on a PC. With virtualization, the operating system works directly with the host machine's hardware, such as running Ubuntu in a virtual machine while running Windows 7 on a host PC

Which of the following operating systems can fully support 8 GB of DDR3 RAM? Windows 7 professional x86 Windows 7 Home Premium x64 Windows Vista Home Premium x86 Windows XP Professional

Windows 7 Home Premium x64 Any OS that is 64 bit can handle over 4 GB of RAM. 32-bit OS' can only handle up to 4 GB of rRAM

Which Microsoft Windows version supports the use of the task bar on multiple monitors without the use of additional programs? A) Windows XP B) Windows Vista C) Windows 7 D) Windows 8/8.1

Windows 8/8.1 Windows 8 and later Windows 10 both come with multi-monitor task-bar support in the OS. The task bar in Windows is the GUI component typically at the bottom of the screen that shows the Windows start menu button, shortcuts, open programs & system tray.

What version of Microsoft Windows Vista does not have the Windows Aero as a default? A) Windows Vista Home Basic B) Windows Vista Home Premium C) Windows Vista Business D) Windows Vista Enterprise

Windows Vista Home Basic Windows Vista Home Basic does not have Windows Aero. This is the base operating system with the fewest features.

An employee has contacted the IT Support call center where you work. They are complaining that they are unable to access any web pages other than the internal intranet site. Which option is the least likely to cause this issue? A) DNS B) Firewall C) Wireless connectivity D) Proxy server

Wireless connectivity Remember the question says LEAST LIKELY. The questions states that internal web servers work but external ones do not. If wireless were the issue nothing would work at all. The issue is more likely to be related to external DNS, a firewall or an issue with the proxy used to connect outside the local network.

A technician would like to map a network drive. Which of the following indicates the correct path for mapping a network drive using the UNC? \\share\servername \\servername\share \\username\servername \\password\share

\\servername\share Always starts with the name of the server hosting the share and then the name of the share. The correct syntax for the Universal Naming Convention (UNC) is \\servername\share. Simply map to that UNC and you will be able to access the folder "share" on the computer "servername" any time

Which of the following allows a user to reset their password with a series of security questions that only the user should know? administration verification permission propagation authentication

authentication Security questions help to authenticate a user by making sure that they are who they say they are. Permission propagation has to do with what happens to permissions when you move or copy a protected item Administration is the act of managing a system's resources. Verification is a synonym for authentication, but it's not the word that techs actually used.

A user is attempting to access a business resource through Internet Explorer and are unable to load the page correctly. The page is loading oddly with assets in places from previous versions. You have checked with other users of the resource and they are not experiencing an issue. You should: A) Clear the browser cache. B) Report it as a bug to the developer. C) Clear browser cookies. D) Update the browser.

clear browser cache Clearing the browser cache will remove assets that may have been in place and are cached from previous versions. This is the best first step.

Jamie has just finished cleaning up a virus infection on a customer's computer. Which of the following should Jamie do last? enable system restore and create restore point update the definitions on antivirus software educate the end user schedule regular virus scans and updates

educate the end user the very last thing Jamie should do is educate the user so that the virus infection hopefully never happens again. All of the other answers are great things for Jamie to do during the cleaning and removal of the virus. They just aren't very good last steps to perform.

Which of the following mobile phone features redirects the screen orientation as the user turns their phone? locator application gyroscope geotracking GPS

gyroscope Gyroscope - A gyroscope keeps track of a phone's orientation in space Geotracking is a treasure-hunting game using a phone's GPS. A GPS is used to keep track of a phone's location A locator application is an app that uses the GPS to find a lost or stolen phone.

You have just turned on your Windows 7 computer and you decided to do a bit of Internet surfing. While cruising the Internet, you download a ZIP file. How would you go about opening the ZIP file? just double click it downlaod a 3rd part application like 7zip use regedit

just double click it

Mike installed a new external DVD drive. The installation program required a reboot. As the system rebooted, Mike got a Blue Screen of Death (BSOD) error before Windows fully rebooted. He shut off the system and disconnected the external DVD drive. What should he try next? recovery console last known good configuration safe mode repair install

last known good configuration Last Known Good Configuration holds all the critical information from the last successful boot. If Mike tries this FIRST, there's a good chance the system will return to its exact state before he installed the DVD drive. If he already rebooted successfully and THEN has the BSOD, the Last Known Good Configuration would not be useful The Recovery Console works as a command-line utility that is best at fixing the MBR, reinstalling the boot files and rebuilding BOOT.ini. Because the issue occurred after installing a new DVD drive, using the Recovery Console would not be the most likely solution.

Which of the following can enable a technician to remove a virus that prevents users from updating their anti-virus software? safe mode recovery console regedit MSCONFIG

safe mode Starting the computer in Safe Mode may enable you to update your anti-virus software, since the virus' background process won't be running The Recovery Console is a troubleshooting tool for fixing Windows installs that are having boot problems or other serious issues Regedit is the tool for editing the Windows Registry MSCONFIG is for controlling what programs and services start up with Windows.

Turnstiles and other mantraps will prevent which of the following security threats? rootkits viruses tailgating shoulder surfing

tail gaiting An attacker can't follow victims through turnstiles as easily as through a door, and a mantrap enables a building's security staff to prevent a suspected attacker from leaving .A rootkit is a type of malware that hides itself on a system and grants an attacker remote access to the system A virus is a type of malware that replicates within a system by making copies of itself.

Chain of custody needs to be kept intact for which of the following reasons? to ensure evidence is admissible in legal proceeding to ensure evidence is returned to the proper owner to ensure data preservation during evidence inspection to ensure that the evidence is not left at the scene

to ensure evidence is admissible in legal proceeding If there's any possibility that evidence was handled incorrectly, it can be disallowed in court. Chain of custody ensures that all evidence can be used in court.Incorrect Answers:The other answers don't have anything to do with the chain of custody.

You want to install Windows 7 32-bit onto your computer. What is the bare minimum amount of hard drive space required to do this? 12 GB 8 GB 16 GB 20 GB

16 GB 16 GB of hard drive space is needed for Windows 7 32-bit 20 GB of hard drive space is needed for Windows 7 64-bit

You need to download and install a package using the apt-get command on an Ubuntu environment. After running the command you receive an error stating you do not have permissions to perform this action. What should you do next? A) Right click the terminal and select Run as Administrator B) Prepend sudo to your command C) Fast swap to root D) Switch to the administrative user account

B Placing sudo (SuperUser Do) in front of a command in some Linux environments will run the command with the security privileges of the root account. Once the command finishes the privileges will be removed and are not applied to any further commands or applications. (unless they are also run with sudo)

Which of the command-line commands in Microsoft Windows launches the Device Manager tool? A) MSCONFIG.EXE B) DEVMGMT.MSC C) COMPMGMT.MSC D) APPWIZ.CPL

DEVMGMT.MSC This command will run the Device Manager, which allows the administrator to view and manage hardware on the system

Where would you navigate to revert to a known working driver, after the updated driver has failed? A) Device Manager B) Windows Update menu C) Programs and Features menu D) Task Manager

Device manager In the Device Manager, right click on the affected device, and navigate to "roll back driver".

In Windows Disk Management utility on a local computer, a dynamic disk that has been moved from another computer and found by the local computer is labeled as what? A) Offline B) Foreign C) Disconnected D) Online

Foreign Windows Disk Management (WDM) will flag the new disk as foreign. This helps to recognize when new disks are added to a system.

The Microsoft Windows command-line commands used for creating a directory or subdirectory include: A) RMDIR B) RD C) MKDIR D) CD

MKDIR

Which Windows 7 tool will allow a system administrator to change the default install folder for applications? A) REGSRV32 B) REGEDIT C) REGEX D) MSCONFIG

REGEDIT REGEDIT is a Windows tool that allows administrators to change in-depth configuration options found in the Windows Registry. REGSRV32 is used for registering DLLs and ActiveX controls

Which DISKPART.EXE command can be used for managing the size of a disk volume? A) ADD B) CONVERT C) SHRINK D) COMPACT

SHRINK Shrink command will reduce the size of the volume by the amount the administrator specifies.

Which of the following paths will open Event Viewer? Start > Control Panel > Event Viewer Start > Programs > Administrative Tools > Event Viewer Start > Control Panel > Accessories > Event Viewer Start > Control Panel > Administrative Tools > Event Viewer

Start > Control Panel > Administrative Tools > Event Viewer

ICMP is part of the TCP/IP suite and is generally used for transmitting error messages. T or F

True

A user complains that her mobile device starts to exhibit slow performance after a couple of hours in the work day. As the day progresses, the problem worsens. If the user restarts the devices, it helps the performance, however, the device starts to run slow after several hours. Which of the following is the BEST action to troubleshoot this problem? Turn off Cloud synchronization for calendar reset table to factory default close applications that are unused get a new battery for the device

close applications that are unused Many people do not realize that the applications remain open until the user closes the application. Your processor and memory still hold the information from open applications, and some continue to get information through your internet connection. If you have performance issues, try to close unused applications Cloud synchronization for the calendar may cause momentary delay, but would not cause a regular problem with performance

Which of the following will allow a Windows OS to boot with only the essentials like basic drivers, required programs and default settings? A) Safe Mode B) Standby Mode C) System Restore Mode D) Guest Mode

A Safe Mode, as it's name implies, can allow a Windows OS to safely BOOT even when a malicious software, invalid driver, or other issue is causing a system failure.

Which Windows tool can prevent programs from automatically opening upon start up on the Windows 7 Operating System? A) MSCONFIG B) CHKDSK C) DXDIAG D) DEVMGMT.MSC

A The MSCONFIG tool, officially called the System Configuration tool has several features for troubleshooting and modifying the start up process.

You have just configured permissions for a set of folders on an NTFS disk, the folders also have another set of share permissions. When a user connects to one of these folders through a network share, which of the following is true? A) The most restrictive permissions from both NTFS and Share will apply B) The least restrictive permissions from both NTFS and Share will apply C) Only Share permissions will apply when accessing through a share folder D) Only NTFS permissions will apply when accessing through a shared NTFS folder

A When accessing through a network share both NTFS and share permissions will apply. When accessing a file or folder directly only NTFS permissions will apply. In either case the principle of least privilege will apply and the most restrictive permissions will always take priority.

An office purchases a new color laser network printer that is only for hign-end graphic printing. The technician needs to limit users, although the printer is located centrally within an office environment. Which of the following would be the BEST to utilize to achieve this goal? Remote Desktop protocol Access Control List (ACL) User Account Control Virtual Private Networking

Access Control List ( ACL) Access Control List tool determines the access rights for a specific user to an object Virtual private networking (VPN) is a protocol for remote access to a network Remote desktop protocol designed to allow access to another computer's desktop. User account control utility allows you to set access on an individual system for an individual user.

What is the name of a system component designed for monitoring security and maintenance related items in Windows 7/8/8.1? A) Action Center B) Windows Update C) Windows Security Center D) Security and Maintenance

Action Center In Windows 7, 8 and 8.1 it is called Action Center In Windows 10 it was renamed Security and Maintenance. In Windows Vista it is Security Center

You are using Windows Vista, but you miss the good ol' days of Windows 2000's Start Menu. How would you go about changing your Start Menu to a more "classic" style? Alt. Click on the start menu > Properties > start menu tab start > control panel > ease of access alt. click on the desktop > Personalize > start menu start > control panel > system and maintenance

Alt. Click on the start menu > Properties > start menu tab Alt. click on the Start Menu > Properties > Start Menu tab. After that, you'll have all kinds of choices as to how your Start Menu works.Note: This option is not present in Windows 7 The Ease of Access applet, along with System and Maintenance, will not have this option available.It is also not present in the Personalization applet.

After installing Windows 10 on a Laptop PC alongside an existing Red Hat Linux installation you receive a message stating that the GRUB file is missing when you try to boot the PC. Which of the following is the best option? A) Ignore the error and boot into Windows 10 for the first time B) Rebuild the GRUB using a Red Hat Disc C) Upgrade to GRUB for Windows to allow both Windows and Linux to operate D) Reinstall Windows 10, selecting allow multiboot under advanced installation options

B GRUB (GRand Unified Bootloader) is an open source technology commonly used to allow multiple operating systems to boot on a single machine. GRUB is commonly used as the default boot loader for Linux, but it is compatible with Windows also. When Windows 10 was installed the GRUB was replaced or corrupted and using the Linux installation CD to restore it is your best option.

Mike installed a new external DVD drive. The installation program required a reboot. As the system rebooted, Mike got a Blue Screen of Death error before Windows fully rebooted. He shut off the system and disconnected the external DVD drive. What should he try next? a. Safe Mode b. Last Known Good Configuration c. Recovery Console d. Repair Install

B Last Known Good Configuration holds all the critical information from the last successful boot. If Mike tries this FIRST, there's a good chance the system will return to its exact state before he installed the DVD drive. If he already rebooted successfully and THEN has the BSOD, the Last Known Good Configuration would not be useful.Incorrect:Safe Mode loads generic drivers for mouse, keyboard, mass storage, and system services. Because the issue occurred before Windows fully rebooted, switching to Safe Mode would have little impact.The Recovery Console works as a command-line utility that is best at fixing the MBR, reinstalling the boot files and rebuilding BOOT.ini. Because the issue occurred after installing a new DVD drive, using the Recovery Console would not be the most likely solution.Repair Install is a function of Windows installations and has nothing to do with installing DVD drives.

Which of the following is the default package manager for the Ubuntu Linux distribution? A) Yum B) Apt C) Wget D) Gzip

B) Apt APT (Advanced Packaging Tool) is the default package manager for the Ubuntu Linux distribution. A package manager is a system used to download, install, update and remove software applications.

Which of the following command-line utilities is designed to edit the BOOT.INI file? Cacls Sigverif Bootcfg Regedit

Bootcfg Bootcfg is designed to let you edit the BOOT.INI file from the command prompt. Regedit enables you to manually edit the Registry Cacls is designed to view/edit NTFS permissions from the command prompt Sigverif works from the command prompt to inspect all the device drivers and verify which drivers are signed and unsigned.

A technician is accessing a Windows PC via SSH. Which command can the technician use to create a new directory on the PC? A) New B) PUSHD C) MD D) CD

C MD (same as MKDIR) is a command used to create a new folder or directory in a Windows environment

Which of the following would be the best format for optical media? EXT3 NTFS CDFS FAT32

CDFS CDFS is a file system for compact discs that enables them to play music in CD players FAT32 is an older file system for hard drives EXT3 is a popular Linux file system. NTFS is a file system for Windows PCs

What is the type of installation on a Windows system that will wipe all the contents of that partition? A) Quick format B) Clean installation C) Remote network installation D) Repair installation

Clean installation

Which tool is best suited to run a script every Sunday at 3 am on a CentOS Linux operating system? A) Cron B) Service C) Task scheduler D) Daemon

Cron Cron is a time-based scheduling service on Linux operating systems. The Windows equivalent is task scheduler. A service and a daemon could also achieve this but will require an entire application to be developed, compiled and installed onto the host OS.

You are a desktop technician for a public school district. Your supervisor has asked you to write a script that will configure the wireless adapters on student's Linux based laptops to connect only to authorized access point. Assuming the access point's MAC Address is 00:0D:9D:C6:38:2D, which command will help you achieve this? A) Ethtools -lock 00:0D:9D:C6:38:2D B) Ifconfig eth0:0 00:0D:9D:C6:38:2D C) Iptables /netfilter auth-only 00:0D:9D:C6:38:2D D) Iwconfig ap 00:0D:9D:C6:38:2D

D IWCONFIG is a Linux command line tool for configuring wireless settings. IWCONFIG can be used to change settings like authorized access points, signal strength, wireless channel, and what SSID to connect to. IP Address, subnet mask and DNS servers are still configured via IFCONFIG.

You are installing Windows Server 2008 R2 onto a new company file server that uses a RAID card. You have verified that all cabling is correctly seated, but Windows is not recognizing any storage mediums for installation. Which of the following will most likely correct the issue? A) Ensure the Windows server supports PXE Boot/Installation B) Wait a few moments, then press refresh to force Windows to detect drives C) Enable PATA in the BIOS D) Use the correct RAID driver

D Many RAID cards require a vendor specific driver to function with Windows. In order to install Windows, you first need to provide it with the proper RAID driver.

You have been instructed to configure a database server running Windows Server 2008 to alert technicians when the server's processor or memory is running above 75% capacity. Which of the following technologies will help you achieve this? A) System Configuration B) Task Scheduler C) Task Manager D) Performance Monitor

D Performance monitor is a Windows tool that can be used to monitor and log a system's health and status in real time. Task Manager can display similar information but does not log and should only be used as a quick reference.

Amanda, a user, has a laptop running Windows 7 Ultimate. She has asked the IT Department to update her laptop to run Windows 10 Pro. Which of the following should be done first? A) Run the Windows 10 Update Software B) Purchase a valid Windows 10 Pro License C) Reformat the laptop with NTFS10 D) Verify the laptop can support Windows 10 Pro requirements

D Windows 10 and Windows 7 were released 6 years apart. It is possible her laptop does not meet the minimum requirements for Windows 10 and the laptop's specs should be verified first.

You can use the Windows Task Scheduler to schedule updates while everyone is out of the office, or during the weekend. Where would you navigate to find the Windows Task Scheduler? A) Ease of Access Center B) Programs and Features menu in Windows Control Panel C) Windows Command Prompt D) Administrative Tools menu in Windows Control Panel

D You would navigate to start > control panel > administrative tools > Task Scheduler, or simply search for task scheduler in the search bar.

You are installing Windows Server 2008 R2 onto a new company file server that uses a RAID card. You have verified that all cabling is correctly seated, but Windows is not recognizing any storage mediums for installation. Which of the following will most likely correct the issue? A) Ensure the Windows server supports PXE Boot/Installation B) Wait a few moments, then press refresh to force Windows to detect drives C) Enable PATA in the BIOS D) Use the correct RAID driver

D) Use the correct RAID driver Many RAID cards require a vendor specific driver to function with Windows. In order to install Windows, you first need to provide it with the proper RAID driver.

You have been placed in charge of client patch management for your organization. I am so, so sorry for you. As part of your new responsibility you have been charged with developing a new patching process. Assume that patching has been best effort in the past and that any existing processes will be discarded. Automatic Windows Update patching is enabled in your office. Choose the best first step to developing a patching process: A) Identify hardware commonalities for all systems. B) Disable automatic Windows Update. C) Select a group of clients that will receive patches before the rest of the organization. D) Begin a test round of patching.

Disable automatic Windows Update. All of your best laid efforts in controlling the patching process will be for naught if you leave automatic Windows Update on! Disabling this will allow for you to control when patches are released to clients and enable you to test patches in your representative sample of clients in the organization prior to overall roll-out.

Local users on a server or desktop computer, in a domain environment, should be: A) Disabled whenever possible. B) Granted additional rights. C) Used exclusively. D) Updated often.

Disabled whenever possible. Local users should not be utilized whenever possible. Domain environments should authenticate users via the domain controller whenever possible. This eliminates numerous security vulnerabilities, such as controlling access to the PC if it is stolen and ensuring deactivated users cannot access a PC with non-domain credentials.

You work for an IT Help Desk call center and a customer has contacted you complaining that their text and icons seem very big leaving little space for anything else on the screen. What setting can you instruct the user to change? A) Display Settings > Resolution B) Display Settings > Color depth C) Folder Options > View options D) System > Display Size

Display Settings > Resolution The user is complaining that their screen resolution is too low. To increase this you should select Display Settings then resolution.

Which of the following are the default libraries in Windows 7-based systems? Documents, Music, Pictures, and Videos Music, Pictures, Movies, Documents Pictures, Music, Photo, Videos Pictures, Music, Media, Videos

Documents, Music, Pictures, and Videos Movies, Photos, and Media libraries don't exist by default. But that doesn't mean you can't make them yourself.

A user installed a net SOHO router and new wireless NICs to increase his network's transmission speed from 802.11b to 802.11g. He didn't change the router from the manufacturer's default settings. The user lives in an apartment building and is still experiencing a slow Internet connection after the installations. Which of the following is the most secure option that a technician could implement to resolve this issue? Enable MAC filtering Assign static IP addresses Hide the SSID Disable WAN port

Enable MAC filtering The user is most likely having their bandwidth stolen by neighbords, it is best to enable MAC filtering for his devices in order to only allows his devices on his Network. Hiding SSID is good so other neighbors won't see the Network but tech savvy neighbors can still get around this. Disabling the WAN port will not allow the user to get Internet at all. Static IP addresses won't help at all.

If you had a Windows system, what command prompt would you use to decompress update files? A) REPLACE B) EXPAND C) CONVERT D) RECOVER

Expand to decompress update and other files, you would use the EXPAND command prompt.

What is FC?

FC stands for File Compare. What this utility will do is go line by line and compare each file against each other to find any differences between them.

True or False: Administrators should have administrative rights granted to their user account. A) True B) False

False The Principle of Least Privilege states that users should have no more access than necessary to do their job. Administrators should have their administrative rights segregated from their user accounts by implementing a separate account for administrative actions.

Your employer is concerned about zero-day attacks to obtain their intellectual property, what security feature helps mitigate such an attack. A) Anti-virus B) Windows Update C) Strong BIOS/UEFI Passwords D) Firewalls

Firewalls Zero-day exploits (ZDE) are very difficult to defend against since they exploit unpatched vulnerabilities. Firewalls (port blocking, and ACLs) do not typically rely on vulnerability patching to enhance security posture, thus it is the correct answer. Experienced hackers work around anti-virus software making them ineffective against defending zero-day attacks. BIOS/UEFI passwords do not really impact ZDEs.

The accelerometer in a mobile device makes which of the following possible? (Select two.) Game controller input protection of device when dropped high speed communication faster download speeds automatic rotation of the screen when it's flipped

Game controller input automatic rotation of the screen when it's flipped The accelerometer enables software (like games) to use the orientation of the device as input, like a steering wheel or game controller. It is also what tells the device that the user has rotated the orientation from portrait to landscape, causing the device to rotate the screen correctly.Incorrect Answers:The accelerometer has nothing to do with downloads or communication with other devices. Many hard drives may contain an accelerometer that will protect it in the event of being dropped, but the mobile devices discussed have no hard drives.

What is the name of a Windows account that enables users to have temporary access to a computer without the capability to install software or hardware, or change settings called? A) Guest account B) Temporary account C) Standard account D) Managed user account

Guest Account key word temporary! A user account that lacks permissions, and is temporary is typically a guest account. These accounts have minimal access.

Which of the following Windows options will use the least amount of power? A) Standby B) Sleep C) Hibernation D) Suspend

Hibernation Hibernation mode will save the contents of the RAM to non-volatile memory for the duration of the powered down state. Sleep mode however, draws minimal power to keep the RAM from clearing.

Which of the following options will easily enable you to enable File and Print sharing on a network of three workstations running Windows 7 Home Edition x64? Domain Setup Workgroup Homegroup active directory

HomeGroup Setting up a HomeGroup enables you to turn on File and Print sharing with very little difficulty A domain is typically seen in larger companies, as it requires a server to act as a domain controller. A Workgroup is Microsoft's earlier, less easy attempt at creating a simple SOHO network system Active directory is used for authentication and authorization in Windows Domain networks.

CompTIA troubleshooting theory

Identify the problem establish a theory of probable cause test the theory establish or implement a plan of action verify functionality document findings

A technician would like to limit computer access for certain users. Which of the following should be configured? Boot.ini file advanced security system configuration Local security Policy

Local Security Policy Local Security Policy enables you to limit the access that local users have to a system Advanced Security is part of the Windows Firewall in Windows 7 and Vista. It's mostly a marketing term The boot.ini file is a list of all the operating systems installed on a system and the order in which they boot. System Configuration, more popularly known as MSCONFIG, enables you to select which programs and services start up with Windows.

A new application is installed which adds three new services to a customer's PC. The customer asks for help, because the new application will not start. A technician investigates and finds that one of the services has failed to start. They attempt to manually start the service, but it fails. Where should the technician look next for more information? (Select two.) Log Files for the new application Task Manager System Registry Event Viewer %SystemDir%\system32\Drivers

Log Files for the new application Event Viewer Event Viewer will show you any Windows errors that might have sprung up as a result of installing the program, and the application itself might be keeping some log files for just this sort of troubleshooting.

A framework providing access to a collection of tools that can be used by administrators and advanced users to manage networks, computers, services, and other system components in Windows is known as: A) CMD B) MSCONFIG C) MMC D) MSTSC

MMC - Microsoft Management Console Microsoft Management Console (MMC) is where you can manage all aspects of a computer network, including monitoring tools and driver checks.

You are having trouble with several drivers on your system and want to uninstall them, but can't do it while Windows 8 is running normally. What tool will allow you to boot into Safe Mode? A) MSCONFIG B) GRUB C) REGEDIT D) BIOS/UEFI

MSCONFIG MSCONFIG allows you to safe boot or boot into Safe Mode GRUB is a utility usually associated with booting into Linux systems. BIOS/UEFI is used for managing hardware configurations.

An online Microsoft software distribution platform for games and apps is known as A) Windows Store B) Microsoft Store C) App Store D) Windows Marketplace

Microsoft Store

Which of the following commands would at technician use to map a network share? NET COPY NSLOOKUP IPCONFIG

NET The NET SHARE command enables you to work with network shares NSLOOKUP helps resolve IP addresses to DNS names The COPY command, you guessed it, copies files.

What is the best method for ensuring the destruction of sensitive data on a HDD that is issued to employees on an as-needed basis? A) Standard format B) Overwrite C) DEFRAG D) Disk recovery

Overwrite When data is deleted or a disk is formatted the location of the data is tagged as empty and available for use but is not actually physically removed from the disk. This means after deleting it is still possible to read the data. Overwriting is a method that deletes the data and overwrites the physical location with random information to ensure it can never be recovered.

Your boss has requested that you image a large number of Windows PC's for a new office. The image is standard for all PC's. You know that _________ is the best choice for imaging many clients at once. A) USB B) DVD C) PXE D) Floppy Disk

PXE Preboot Execution Environment, or PXE, allows you to image PC's from a central server containing a client image.

Which of the following would be a digital security prevention method? Mantrap ID badge Biometrics Load balancer RFID badge

RFID badge RFID badges or tags carry a HF or UHF frequency, and are widely used for identification. The tag can be tracked by RFID readers, a form of digital security. Mantrap is a device to catch people or control access. A load balancer is a device that helps distribute network traffic. The other two are obvious physical security devices.

You receive an email from an outside party stating that clients on your network have been encrypted and the only way to decrypt them is to send Bitcoins to a man named "The Jackal". Your company has fallen victim to a/an: A) Man-in-the-Middle attack. B) Rootkit attack. C) Phishing attack. D) Ransomware attack.

Ransomware attack A ransomware attack involves encrypting user's data and witholding the encryption key until a ransom is paid. Darn it, Jackal!

You are working on a PC that will be deployed in the office. You've forgotten to ground yourself by utilizing an ESD strap, an ESD mat or by touching bare metal on the PC case. While installing a RAM module you feel a static shock and a pop in the case. What is the best course of action to proceed? A) Swap the PC with the one on the new guy's desk. B) Utilize a new RAM module. C) Run a memory testing application to ensure that the module works. D) Replace the motherboard and RAM module before deployment.

Replace the motherboard and RAM module before deployment. In a business environment the safest course of action is to replace the motherboard and RAM module. This reduces the risk that a user will experience a client failure due to damaged hardware.

A technician is creating an image that will be used to deploy Windows 7 to 100 PCs. Which of the following tools should be used to accomplish this? SYSPREP Windows 7 Advisor DISKPART CHKDSK

SYSPREP SYSPREP can be used to prepare duplicate images of a Windows installation when dealing with a mass deployment. The Windows 7 Upgrade Advisor is used to see if a computer can potentially be upgraded to Windows 7 CHKDSK scans a hard drive's file system for errors and fixes any that it finds.DISKPART is used to partition hard drives

A consultant is looking to consolidate six company servers into one physical system. Which of the following requirements is most important on the new setup to ensure stable functionality of the virtual environment? Network resources Server hardware resources server software security requirements client hardware requirements

Server hardware resources Using a powerful system as the virtualization server will ensure that the virtual environments all run smoothly and without problems. Client machines need relatively little hardware resources; that's one of the benefits of virtualization servers. The server should undoubtedly be secure, but that's less important initially than making sure the hardware is up to snuff. No one's going to hack a server that's always crashing Having a fast enough network to host the virtual environments is also important, but, again, a super fast network won't help an under-powered server.

Which of the following services allows you to perform a backup while a system is running? Xcopy Robocopy Shadow copy Copy

Shadow Copy Shadow copy will allow a file to be copied, if it is currently in use. Robocopy replaced Xcopy as a robust copy utility that copied more than just files, but will not copy files in use. The copy command copies files from one directory to another, and will not copy files in use

The folder "Documents" is shared. The user sharing the folder can create and delete documents when on the local PC, but can only read documents when accessing them remotely from a different PC. Which of the following should be adjusted? Share permissions read only attribute NTFS permissions Firewall settings

Share permissions Changing the folder's share permissions would enable the user to do more than just read shared documents Setting a file to read only makes it impossible any users on the PC to make changes to the file. Changing firewall settings wouldn't help with this issue. Changing NTFS permissions would only affect users on the local machine.

In conjunction with a password, all of the below are examples of multifactor authentication except for which? A) Fingerprint. B) Hardware Token. C) Shared secret. D) Mobile Phone.

Shared secret While all answers are methods of authentication, a shared secret would not count in this instance. This is due to the fact that the knowledge portion of multifactor authentication is already covered by the use of a password and would not count towards being an MFA mechanism. MFA is requires at least two of the following: something you know, something you have or something you are.

A user's computer keeps producing a "low virtual memory" alert, after which the speed of the system degrades. Which of the following Control Panel applets can provide information to review and correct this issue? System > Restore System > remote System > Advanced System > Hardware

System > Advanced Going to System > Advanced enables you to change settings like the amount of virtual memory your computer uses

Which tab of the System Properties Windows applet provides access to the System Restore settings? A) Advanced B) Performance C) System Protection D) Environment Variables

System protection System Restore settings are found in the System Protection tab of the System Properties applet window. System Restore can be used to undo system changes by reverting a computer to a previous restore point. This is helpful if a newly installed application is causing issues (e.g. a buggy driver) or unwanted system configuration changes have been made (e.g. incorrect Windows Registry changes).

What tool can be used to check if anyone else is logged into a Windows-based computer? A) Task Manager B) Type "who" into the CLI/command prompt C) MSINFO32 D) Local Users and Group

Task Manager The Users tab in Task Manager will show you the logged in users. The "who" command is for Linux, not Windows. MSINFO32 provides system information Local Users and Groups shows user accounts on the system - not ones in use.

A user reports that a file she shared on her computer for another network user is not accessible to the third party. The user insists they specifically gave this third party Allow rights for Read and Write access. Which of the following could explain the problem at hand? The parent folder has explicit deny rights set for this user the parent folder has explicit allow rights set for this user the parent folder likely has the "archive" attribute enabled the user forgot to share the parent folder and only shared the specific file

The parent folder has explicit deny rights set for this user Deny rights override Allow rights, so if there are Deny rights set for the third party on the parent folder, they won't be able to access the file Allow rights don't work if there are Deny rights set, too.You can't share files in Windows; only folders.Having the archive bit set lets backup programs know that the file is in need of backup.

Local Security Policy enables you to control many aspects of local computer use, including who has shutdown privileges for the local PC T or F

True

Preboot Execution Environment (PXD) is an industry standard client/server interface. It allows a workstation to be remotely configured by an administrator T or F

True

The important Security Accounts Manager (SAM) registry file can be found in the: C:\WINDOWS\SYSTEM32\CONFIG in all modern versions of Windows, both 32-bit and 64-bit varieties T or F

True

True or false: Brownouts are less dangerous to systems and hardware than blackouts. A) True B) False

True Brownouts, or temporary power drops in voltage, are as dangerous to systems as blackouts. Any interruption of voltage to a computer can cause damage or loss of data.

The Security tab in Microsoft Internet Explorer allows the user to impose restrictions on web content allowed in the IE web browser. A) True B) False

True The Security tab in Internet Options allows you to set trusted sites and restricted sites.

Windows Memory Diagnostic Tool cannot be run inside Windows and requires computer restart (the utility is launched during reboot before loading the operating system). A) True B) False

True Windows Memory Diagnostic Tool helps identify and fix memory problems on your PC.


संबंधित स्टडी सेट्स

Chapter 8 Principles of Information Security

View Set

Chapter 15 - Speaking to InformAssignment

View Set

UNIT 2: BANKING SERVICES CAREERS

View Set

History of Economic Thought FINAL

View Set

BUS 140 | Chapter 8 & 9 | Exam (82/90)

View Set

A+P 1: Study Guide Book Questions

View Set