102.1
Which of the following environment variables is used to access the absolute file path of the Windows system folder
%SystemRoot%
You have created a script file that runs in the Windows Command Prompt environment (CMD.EXE) or in its DOS-based predecessors. What is the extension of this script file
.bat (batch file)
Which of the following gpupdate tool options reapplies all policies, even those which haven't been changed?
/force
is an interface to manage built-in utilities to secure and protect the computer
Action Center
In which of the following attacks does an attacker intercept and relay communications between two points and impersonate each party in the eyes of the other
Man-in-the-middle
Startup tab
Manage which programs start with a Windows login Has moved to the Task Manager in Windows 8/8.1 is used to enable or disable startup programs, which can help to troubleshoot a computer that's slow to start
Which of the following NTFS permissions gives the read and write permissions to a user and allows the user to delete the folder?
Modify
When you log into your account, you press a button on your keychain and then type in the new set of numbers it displays. What digital authentication element are you using
OTP (one time password)
common system requirements to install and run an application on a computer
Operating system Drive space CPU RAM Network Graphics Other hardware Services
Which user group exists on Windows but has no special privileges and can be customized to make a general set of "privileged user" permissions?
Power Users
Which of the following installation types is used to install an operating system from an image on a network server using PXE or NetBoot
Remote network
is used to display information about all the Windows services that are installed on the computer. Windows services control all aspects of the operating system's interaction with the computer and the network
Services administrative tool
Which of the following can hold digital certificates, store temporary data, or even perform cryptographic processing functions to keep its data secure
Smart card
Remote Authentication Dial-In User Service (RADIUS)
a protocol that enables a server to provide standardized, centralized authentication for remote users
Active Directory Certificate Services (AD CS)
allows the Active Directory network to maintain a public key infrastructure. It creates, validates, and revokes digital certificates wherever they might be needed on the network to identify users or computers, encrypt files or email, or establish secure VPN connections
KVM over IP
allows users to access servers located at remote locations through the Internet using IP addresses of servers
The Backup Operators
can back up and restore files from anywhere on the computer, regardless of individual file and folder permissions. While the Backup Operator privilege overrides any normal file system permissions, members of this group have no special power to change security settings
botnet
can be used to perform distributed denial-of-service attack, steal data, send spam, and allows the attacker to access the device and its connection
The Users
can perform common tasks and run most applications. They can't share folders, install printers, or generally change any system-wide settings that can affect other users or put system security at risk
Event Viewer
checked to troubleshoot spontaneous shutdown and restart
Make Directory (md)
command creates a folder with the specified name
Remove Director (rd)
command deletes the specified folder and its contents
Change Directory (cd)
command moves the command prompt to the specified folder
IPCONFIG
displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings
Which of the following Linux commands helps the users to find files with specific words or phrases
grep
Guest User
have much more limited permissions and can't customize settings, install software, or even change their own passwords. Guest accounts aren't protected by passwords and use a temporary profile that's deleted at logoff. Windows versions that include a Guest account generally disable it by default
Spoofing
human-based or software-based attack where the goal is to pretend to be someone else for the purpose of identity concealment
Preboot Execution Environment (PXE)
is a booting or installation technique in which a computer loads the operating system from a connected network rather than from a boot device
System Restore
is a feature that automatically saves configuration settings periodically or before system changes
Windows Resource Protection
is a feature that runs in the background to protect critical system files, folders, and registry keys from unplanned alterations
Digital certificate
is a file created and signed using special cryptographic algorithms
Service Level Agreement (SLA)
is a legally binding service contract between a service provider and the end-user
Adware
is a malware that delivers advertisements to the infected system, either as pop-ups or within browser or other application windows
Extensible Authentication Protocol (EAP)
is a protocol that enables systems to use hardware-based identifiers, such as fingerprint scanners or smart card readers, for authentication
Active Directory Federation Services (ADFS)
is a single sign-on system that uses the common Internet standard SAML instead of LDAP. It is intended for use over the Internet, and for integrating services with other organizations
Mobile Device Management (MDM)
is a software designed to centrally administer devices in order to assign device permissions, verify security compliance, apply updates, and even monitor activity
Microsoft Management Console (MMC)
is a tool that is used to manage a Windows operating system and the computer on which it is running, as well as the network and other computers and services on the network
Magnetic stripe card
is a traditional machine-readable card, such as a bank or transit card, with a magnetic stripe to store user data
Distributed denial of service (DDoS)
is a type of DoS where a single target is flooded by traffic from many individual computers, often spread across the Internet
entry control roster
is a type of register which maintains the record of the persons who are allowed into high security areas
Local Policy Editor
is a utility which allows you to edit group policies for the entire computer
DNS hijacking
is an attack in which an attacker giving false replies to DNS requests sent by a host, in order to redirect traffic to a malicious or fraudulent site
Shoulder surfing
is an attack which is used to obtain information such as personal identification numbers, passwords, and other confidential data by looking over the victim's shoulder
Active Directory Rights Management Services (AD RMS)
is an information rights management service that can encrypt and limit access to specific types of information on the domain, such as emails, Word documents, webpages, and so on. It can be used to centrally secure access to sensitive information wherever it is stored on the domain
Action Center
is an interface to manage built-in utilities to secure and protect the computer
Network and Sharing Center
is an interface to manage the computer's network controllers and connections
Lightweight Directory Access Protocol (LDAP)
is an open, vendor-neutral, industry-standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network
%TEMP%
is the environment variable which is used to access a folder where programs can safely store temporary files
%CD%
is the environment variable which is used to access the current folder
%APPDATA%
is the environment variable which is used to access the current user's application data folder
MSCONFIG
is used to troubleshoot a system that boots into safe mode
spyware
malware specifically designed to gather information about user and computer activities to send to other parties, often through a backdoor
Rootkit
malware that compromises boot systems and core operating system functions in order to hide from most detection methods
Tailgating
physical security breach in which an unauthorized person follows an authorized individual to enter a secured premise
Active Directory Lightweight Directory Services (AD LDS)
provides directory services independent of the Windows domain model. You might find it used in networks which need authentication for distributed applications, or when it's useful to install a directory on a computer that isn't a domain controller
.ps1
script designed to run in the Windows PowerShell enviroment
Service Tab
settings is used to enable or disable Windows services on the computer to troubleshoot system problems
.sh
shell script that designed to run in a Unix style command shell such as bash or csh
short battery life
symptom of mobile system and app issues is caused by brightness settings set too high, or too many applications and services running at one time.
overheating
symptom of mobile system and app issues is caused by improper ventilation, excessive processor use, or too many applications and services running at one time
system lockout
symptom of mobile system and app issues is caused by security response to failed logon attempts
Digital Rights Management (DRM)
technologies that let copyright owners control the level of access or use allowed for a copyrighted work, such as limiting the number of times a song can be copied
Virtual Network Computing (VNC)
uses the Remote Frame Buffer (RFB) protocol, which allows the client and server to determine the best version of RFB they can support during a session
dir
using a Windows 8 computer and wants to display a list of files and folders within a directory. Which of the following commands will he use to complete the task
Voice over IP (VoIP)
voice over data implementation in which voice signals are transmitted over IP networks
Remote Desktop
wants to log into a user's computer to fix the user's corrupt local profile. Which of the following will allow him to connect to the user's computer
Use REGSVR32
working on a Windows computer and get to know that some necessary DLL files are missing. Which of the following will you do to troubleshoot the missing DLL files
net command
Which of the following commands can be used to manage network shares, network print jobs, and network users
Event Viewer
Which utility shows a log of application and system messages, including errors, information messages, and warnings
Windows 7 upgrade
Windows 10
Windows 8.1 upgrade?
Windows 10
Windows 7 upgrade?
Windows 8.1
Windows 8 upgrade?
Windows 8.1
In which of the following Mac OS X versions was dark mode introduced to reduce eye strain
10.14 Mojave
Which is a system utility that is specifically used to troubleshoot issues that can arise during system startup
MSConfig
Boot tab
Control the boot location Advanced options - Number of processors, maximum memory, etc. Boot options - Safe boot, GUI, create a log file, base video is used to see all the copies of Windows installed, set a default operating system, and delete an operating system
Software token
Is a stored file used to describe temporary authentication and authorization data stored on and exchanged between computers in single sign-on environments
Which of the following types of malware silently tracks and records all user input to gather information about the user and send to other parties?
Keylogger
Frozen System
Which of the following symptoms of mobile system and app issues is caused by lack of sufficient storage, too many applications running at one time, or low battery?
To troubleshoot application crashes or compatibility errors in a Windows computer, you should take the following steps
Apply application updates. Perform a repair install of the application from Control Panel or Settings. Change the operating mode of the application on the Compatibility tab of the application's Properties dialog box
to install Windows on his Mac system by repartitioning the hard drive. Which of the following Mac OS features will you use in this situation
Boot Camp
Which of the following administrative tools is used to configure object sharing between applications
Component Services
is used to access a variety of management and troubleshooting tools in one place
Computer Management administrative tool
RDP (Remote Desktop Protocol)
Which provides remote display and input capabilities over network connections for Windows-based applications running on a server
the probable causes of the occurrence of the Blue Screen of Death (BSOD) error are
Device drivers Memory Malware infection
keeps a log of all recorded system and application events. This includes sign-on attempts, shutdown signals, system crashes, device driver errors, and many more scenarios that can help identify where problems exist
Event Viewer
Which format is used to check for bad sectors on the physical disk before installing the file system structure
Full
Which of the following can be used with disks of any size and allows an almost unlimited number of partitions
GPT (GUID Partition table)
hich of the following tabs of the system configuration settings is used to choose the type of startup for the next time the computer boots, to troubleshoot system startup problems
General
statements are true about the homegroup sharing model
Homegroups are created by one user and can be joined by anyone with a shared password. Computers already in workgroups can create or join homegroups. Computers in domains can join homegroups, but not create them. Home and business editions of Windows can join homegroups, but Windows Server editions might not be able to. Computers on a homegroup continue to use their local or domain accounts. Each user on the homegroup can choose whether to share any of a list of commonly shared items. Unlike workgroups and domains, homegroups don't have unique names
is an enhanced security feature of Windows that prevents unauthorized changes to the computer, either by prompting for permission or requiring the administrator password
User Account Control (UAC)
SMTP (Simple Mail Transfer Protocol)
Which is an application layer protocol that enables the transmission and delivery of email over the Internet
Which is an attack in which the attacker sends unsolicited emails or other electronic messages with undesired or malicious content?
Spam
Which of the following is a complete application installer which requires a network connection to download the applications but once downloaded, the user has all the files that are needed
Standalone
is used to schedule administrative tasks using an executable program
Task Scheduler administrative tool
main page of the System settings
The Windows edition you have installed, and any service packs that have been applied. Basic information about the processor, memory, and system type, either 32-bit or 64-bit. The computer name and its membership in a workgroup or domain. Windows' activation status
Which of the following Mac OS tools creates an incremental backup of files that can be restored at a later date
Time Machine
Why does the commercially distributed software and media make use of digital rights management (DRM)
To enforce copyright restrictions
The following are the troubleshooting steps which can be performed to correct problems with a slow Windows startup
Use MSCONFIG to disable unnecessary startup applications and services. Enable Fast Startup from the Power Options. Update drivers. Perform a refresh or factory reset of your computer, after backing up data