Master Set #4 - Core 2
In a security awareness class, the instructor discusses malicious software that relies on other applications to execute and infect the system. Which type of malware is being discussed?
A virus
In which of the following file extension types would a user expect to see the command "net use T:\\server\files'? A. .bat B. .vbs C. .js D. .py
A. .bat
A team needs to deploy a temporary server room at a site to provide support during construction. Which of the following should they use at this site while setting up the server room? A. Air filters B. Privacy screens C. Vacuums D. ESD mats
A. Air filters
Which of the following provide the BEST security for a server room? (Select two.) A. Badge reader B. Bollard C. Biometric lock D. Cable lock E. USB token F. Privacy window shades
A. Badge reader C. Biometric lock
Which of the following devices provides protection against brownouts? A. Battery backup B. Surge suppressor C. Rack grounding D. Line conditioner
A. Battery backup
When a system is running slow, which of the following may be able to help improve its performance?
A. DEFRAG
Joe, a user, returns his computer to the technician who performed a virus removal on it the week before. Joe states that several symptoms have returned. Which of the following should the technician have covered previously as part of the original repair? A. End-user education B. Pre-installation environment cleaning C. Disabling of System Restore D. Infected system quarantine
A. End-user education
A technician is PXE booting a computer. Which of the following is the technician MOST likely performing on the computer? A. Image deployment B. Multiboot configuration C. In-place upgrade D. System repair
A. Image deployment
A technician has been asked to recommend antivirus software for a home PC, but the user does not want to pay for a license. Which of the following license type should the technician recommend? A. Open license B. Personal license C. Corporate license D. Enterprise license
A. Open license
Which of the following is considered government-regulated data? A. PII B. End-user license agreement C. Digital Millennium Copyright Act D. DRM
A. PII
Creating a Restore Point is MOST useful in which of the following cases:
A. Prior to installing new software or hardware
Which of the following is a network protocol used to prioritize certain types of traffic over others? A. Quality of Service (QoS) B. Network Interface Card (NIC) C. Roaming Aggressiveness D. Transmit Power
A. Quality of Service (QoS)
A user's computer is displaying a black screen. The technician restarts the computer, but the OS still does not load. The technician discovers the OS was patched the previous evening. Which of the following should the technician attempt NEXT? A. Reboot into safe mode and roll back the updates B. Repair the Windows Registry C. Configure boot options in the BIOS D. Disable Windows services and applications
A. Reboot into safe mode and roll back the updates
A wireless access point is going to be configured in a small office located in a crowded building. Which of the following should the installation technician perform to increase the security of the wireless network? (Select two.) A. Reduce the transmit power B. Reduce the channel availability C. Disable the DHCP server D. Enable QoS management E. Disable the SSID broadcast F. Implement WPA encryption
A. Reduce the transmit power E. Disable the SSID broadcast
In most small to midsize organizations there is no single person responsible for physical security.
A. True
counter logs
Allow you to collect statistics about resources such as memory, disk, and processor
Event Viewer
Allows monitoring of Windows logs. System, security, application, and service events are recorded in these logs
Local Security Policy
Allows you to view and edit currenty security policy
A copyright provides the creator of an original work the right to distribute, sell, or transfer the copyrighted work for a set period of time, after which the creator can release or renew the copyright.
B. False
What provides the *best* security for a server room?
Badge reader
BD-R
Blu-ray Disc recordable
Which of the Apple software utilities enables installation of an alternative OS in a multiboot environment?
Boot Camp
Which of the following Windows 10 features has a WAN bandwidth optimization technology?
BranchCachd
Which of the following is a drop in voltage which may cause electronic devices to fail or behave unpredictably?
Brownout
An attack against encrypted data that relies heavily on computing power to check all possible password combinations until the correct one is found is known as:
Brute-force attack
0
---
2
-w-
Which of the following answers lists the filename extension of a Microsoft PowerShell script files?
.ps1
A collection of computers all working together to perform malicious acts is known as:
A. Botnet
What allows the user to shut down applications that are not responding? A. Task Manager B. Service C. Default Program D. Program and Features
A. Task Manager
Which toolset lets you restore a deleted Active directory object?
Active Directory Administrative Center
BNC
Bayonet Neill-Concelman
remote settings location
Control Panel ->System -> Advanced system settings ->System Properties->Remote Settings
Which mode is used with Linux to help troubleshoot GUI issues?
D. Recovery Mode
chkdsk C: /f
Fixes file system errors on the disk drive C
GPT
GUID partition table
Which computer virus type is usually targeted at Microsoft Office documents?
Macro
RFID
Radio Frequency Identification
A keylogger is what type of a malicious risk?
Spyware
Which of the following would indicate that the user is currently in "Super User" mode on a Linux system?
C. /# apt-get update
A new technician is learning how to use the dir command on a windows system. They would like to use a command switch but can't remember which one. How can help for this command be obtained? A. /n B. /x C. /? D. /c
C. /?
Your organization is concerned with unauthorized users downloading confidential data to removable media. You decide to encrypt the confidential data using the Encrypting File System (EFS). You need to copy an EFS-encrypted file. The file will be copied to an NTFS volume that does not implement EFS. What is the state of the file?
The original version of the file remains encrypted. The new version of the file is decrypted.
TLS
Transfer Layer Security
Joe, an employee, took a company-issued Windows laptop home, but is having trouble connecting to any of the shares hosted on his home media server. Joe has verified he is connected to the Internet. Which of the following would explain why Joe cannot access his personal shares? A. An IP conflict is present B. A corporate VPN is enabled C. A firewall exception must be set D. HomeGroup must be enabled
C. A firewall exception must be set
In the context of MS Windows system management, the term "Administrative share" refers to a hidden network share on a local computer designed to be accessed remotely by network administrators. T or F
True
Permission propagation occurs when a folder or file created inside another folder takes on (inherits) permissions applied to that folder (permissions applied to the so-called parent folder propagate down to its child objects, i.e. folders and files created inside the parent folder). T or F
True
TPM
Trusted Platform Module
TN
Twisted Nematic
UDP
User Datagram Protocol
What setup configuration would you choose for a new Windows 10 computer installed on your home network which does not include a server?
Workgroup
ATA
advanced technology attachment
BYOD
bring your own device
CD
compact disc
DaaS
data as a service
HCL
hardware compatibility list
HDMI
high definition media interface
MAN
metropolitan area network
NAC
network access control
NAT
network addressed translation
Naas
network as a service
NiMH
nickel metal hydride
NVMe
non-volatile memory express
OS
operating system
4
r--
6
rw-
WLAN
wireless local area network
WMN
wireless mesh network
WPA
wireless protected access
WWAN
wireless wide area network
ZIF
zero-insertion force
ZIP
zigzag inline package
shutdown -h
Halt or power off the system
A client wants a technician to create a PC naming convention that will make the client's PCs easier to track and identify while in use. Which of the following naming convention formats should the technician follow? A. Domain name, location, IP address B. Domain name, location, asset ID C. Asset ID, MAC address D. Location, RFID
C. Asset ID, MAC address
DIN
Deutsche Industrie Norm
apple menu items
Displays, Storage, Service
format D: /fs:NTFS /x
Enables file compression using NTFS
In Linux, if you want to run a batch of commands or a script to perform a backup or other maintenance task what is the scheduling service called? A. Task scheduler B. Finder C. Cron D. Time Machine
C. Cron
Which of the following is a contractual right to use agreement for copyrighted material?
C. Licence
Which of the following are examples of instruction sets that can be for automating tasks (choose two)?
Compiled program Script
Application Log
Contains information regarding the application errors
Tailgating
Entering a secure area without authorization by following close behind the person that has been allowed to open the door or checkpoint.
When a program installed in Windows stops responding or encounters an error, logs describing the error can be examined with the use of:
Event Viewer
Which of the following is the best way to dispose of a storage device to ensure it is unusable, and data unlikely to be retrieved from it?
D. Incinerate the device
A technician has identified malware on a user's system. Which of the following should the technician do NEXT according to malware removal best practices? A. Enable System Restore and create a restore point so no data is lost B. Educate the user about how to avoid malware in the future C. Update the antivirus software and run a full system scan D. Move the infected system to a lab with no network connectivity.
D. Move the infected system to a lab with no network connectivity.
What happens when you move a file structure from the fileserver's D: drive to E:?
File attributes (including security) are inherited from the new parent directory
Fragmentation
Files written in non contiguous clusters reducing read performance
Which of the following examples of inheritance possession (something you are) to support multifactor authentication?
Fingerprint and Retinal Scanner
Which of the Windows Active Directory Group Policy settings allows network administrators to map a folder on a user's PC to a server-based location?
Folder redirection
A rule-based access control mechanism implemented on routers, switches, and firewalls is known as:
(ACL) Access Control List
What's new in HomeGroup in Windows 10?
-HomeGroups are deprecated in Windows 10 -iPhone support
You work as a PC technician in an organization. You are working on you Windows computer. Suddenly, the screen of the computer crashes and a blue screen appears. Which of the following approaches d
-Reboot the computer to see if the problem is resolved -Note the error and research in Microsoft's Knowledge base
Which of the following remote access technologies provide features of screen sharing and file tranfer?
-Telnet -SSH
FAT12
12-bit file allocation table
FAT16
16-bit file allocation table
Finder
Is the macOS equivalent of Explorer in Windows
According to the CompTIA's best practice procedures for malware removal, disabling System Restore on a malware-infected Windows-based system should be performed as the next step after:
Isolating the infected system
LC
Lucent connector
What tool would you use to make a flat file database available to an application you are developing?
ODBC Data Sources
You are an IT technician in your organization. When you log into your account, you press a button on your keychain and then type in the new set of number it displays. What digital authentication element are you using?
OTP
Which of the following answers refer to a very basic UPS type commonly used for protecting a single PC?
Offline / Standby.
chkdsk C: /i /c
On NTFS volumes only skips part of the checking process
Which type of UPS provides the best power outage protection?
Online / Double-conversion.
Which of the following is *not* a feature of the *FOR* loop?
Only one variable can be initialized at a time in the for statement
Windows key + r
Opens the Run dialog box
dir/o:d
Order by date
dir/o:s
Order by size
Which of the following examples meets the requirement of multi-factor authentication?
Password and biometric scan
Which of the following password best practices would mitigate the security risk posed by temporary workers?
Password expiration
What does PCI DSS stand for?
Payment Card Industry Data Security Standard
What is the name of a router configuration feature that allows to open an inbound port based on the outbound requests made by hosts placed inside a private network?
Port triggering
taskkill /pid
Process ID used to specify a process to kill
Which of the following tabs would you access in Internet Options in order to manage add-ons?
Programs
Which of the following Control Panel applets in Windows provides options to uninstall, change, or repair applications?
Programs and Features
msinfo32
Provides a Windows interface to some of the configuration information contained in the registry.
msinfo32
Provides information about hardware resources, components, and thesoftware environment. Also known as System Information.
A type of identification badge that can be held within a certain distance of a reader device to authenticate its holder is called:
RFID badge
RFI
Radio Frequency Interference
Which of the following terms refers to an example of crypto-malware?
Ransomware
A user believes that malware has impacted the web browser that they use. What is a common symptom that affects a web browser?
Redirection
dumpster diving
Refers to combing through an organization;s (or individual's) garbage to try to find useful documents.
ren
Renames a file or directory
Hibernate/Suspend to Disk
Saves any data in memory (open files) to disk (as hiberfil.sys in the root of the boot volume) then turns the computer off.
According to the CompTIA's best practice procedures for malware removal, enabling System Restore and creating a restore point in Windows should be performed as the next step after:
Scheduling scans and running updates
Which statement is true regarding smart cards?
Smart cards can be deactivated or replaced
boot partition
The drive containing the operating system files (the system root) is referred to as the:
boot partition
The hard drive partition where the Windows OS is stored. The system partition and the boot partition may be different partitions.
What happens when you combine both Share and NTFS permissions on a share?
They combine to give the most restrictive permission
For a wireless client to be able to connect to a network, the security type (e.g. WEP, WPA or WPA2) and encryption type (e.g. TKIP or AES) settings on the connecting host must match the corresponding wireless security settings on a Wireless Access Point (WAP). T or F
True
UPnP
Universal Plug and Play
UAC
User Account Control. Informs you when a program makes a change that requires administrator-level permission, also adjusts the permission level of your user accounts
USMT
User State Migration Tool
BOIS
basic input/output system
VM
virtual machin
Which of the following is a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object?
(ACL) Access Control List
A type of document stipulating rules of behavior to be followed by users of computers, networks, and associated resources is called:
(AUP) Acceptable Use Policy
What is the name of a policy that allows employees to use private mobile devices for accessing company's restricted data and applications?
(BYOD) Bring Your Own Device.
In which of the mobile device deployment models employees can use corporate-owned devices both for work-related tasks and personal use?
(COPE) Company-issued, Personally-Enabled
A type of trusted third party that issues digital certificates used for creating digital signatures and public-private key pairs is known as:
(CSP) Content Security Policy
A type of control access technology providing protection against copyright infringements is called:
(DRM) Digital Rights Management
Which of the following provide the BEST security for a server room? (Select two.) A. Badge reader B. Bollard C. Biometric lock D. Cable lock E. USB token F. Privacy window shades
A. Badge reader C. Biometric lock
crontab -1
Add or delete a scheduled job in cron
Which tab of the System Properties (sysdm.cpl) applet in MS Windows provides access to system performance settings menu?
Advanced
Which of the following choices would you type into the Start menu search to configure virtual memory with the least administrative effort?
Advanced System Settings
A mobile device is not able to connect to any networks. What should be checked?
Airplane mode
A technician is working on a Windows 10 PC that is running slowly. Which of the following commands should the technician use to correct the issue? (Select two.) A. dir B. chdsk C. dism D. ipconfig E. forman F. diskpart
B. chdsk C. dism
An employee reported that a suspicious individual was looking through the recycle bin. Which of the following types of social engineering threats is this? A. Phishing B. Spear phishing C. Dumpster diving D. Impersonation
C. Dumpster diving
Which of the following drive formats is used for data and audio CD-ROMs?
CDFS
Performance Monitor
Configures detailed reports on different system statistics and log performance over time(can be accessed through administrative tools, Computer Management or perfmon.exe command line)
The purpose of PCI DSS is to provide protection for:
Credit cardholder data
Which of the following tools is used to filter air, remove debris, and return fresh air to a confined space?
Enclosures
Which of the following terms refers to an environmental control system?
HVAC
When speaking with a customer, what is the best way for a technician to explain a technical issue?
In a non-technical manner that is easy to understand
What is the function of archive bit?
Indicating whether a file has been modified since the last backup
Which of the following enables installation of software that is not available through the official Apple App Store?
Jailbreaking
Computer Management
Management console with multiple snap-ins to configure local users and groups, disks, services, and devices
NFS
Network File System - used to mount storage devices into a local file system in linux
Domain users are typically limited to the changes they can make on their computer because:
Not A,B
In forensic procedures, a sequence of steps in which different types of evidence should be collected is known as:
Order of volatility
shutdown -r
Reboot after shutdown
Which of the macOS features enables access to optical drive of another computer over a network?
Remote Disc
Which one of the following terms is defined as the likelihood and impact or consequence of a threat actor exercising a weakness?
Risk
SSL
Secure Sockets Layer
Which of the following locations in Windows 7 allows to enable/disable startup applications?
Startup tab of the System Configuration (msconfig.exe) utility.
Which of the following statements regarding Android phones is INCORRECT?
The Android GPS requires the help of cell towers to obtain a location
Open Source
The programming code used to design the software is freely available.
Security Log
This log holds the audit data for the system
Zombie
Unauthorized software that directs the devices to launch a DDoS attack
UNC
Universal Naming Convention
LPL
Windows Logo'd Product List- catalog of tested devices and drivers
Scan engine/components
fixes problems and makes improvements to the scan software itself
HTPC
home theater PC
PPM
pages per minute
7
rwx
An agreement granting the right to use software application in a manner determined by the software vendor is known as:
(EULA) End User License Agreement
Which type of software enables a centralized administration of mobile devices?
(MDM) Mobile Device Manager
Which of the following attacks relies on intercepting and altering data sent between two networked hosts?
(MITM) Man In The Middle attack
Which of the following acronyms refers to any type of information pertaining to an individual that can be used to uniquely identify that person?
(PII) Personally Identifiable Information
An authentication subsystem that enables a user to access multiple, connected system components (such as separate hosts on a network) after a single login on only one of the components is known as:
(SSO) Single Sign On
Which of the following answers refers to a non-proprietary remote-access tool that enables control over another computer on the network with the use of a graphical user interface?
(VNC) Virtual Network Computing
A solution that simplifies configuration of new wireless networks by enabling non-technical users to easily set up new networks, configure network security settings, and add new devices to an existing network is known as:
(WPS) Wireless Protected Setup
You work as a support technician in an organization. You have been called to troubleshoot an issue in the customer's computer system at his place. What guidelines should you follow for providing good professional service to your customer?
-Avoid using technical jargon, acronyms, and slang -Address people appropriately -Act like you know what you're doing, even if you might have a doubt
You are providing training on security breaches regarding passwords and encryption. Which attacks often attempt this type of breach?
-Brute-force attack -Dictionary attack -Rainbow attack
There are different types of fire extinguishers on the market. Which fire extinguishing substances can be used for multiple types of fires?
-CO2 -Dry chemicals
You are aware that cell phones and tablets contain toxic materials including non-removable batteries. What will you take into considerations before disposing them off?
-Check for viability for donation to charity -Perform a factory reset -Send for recycling to device vendor
What are the layers defined in the defense in depth strategy?
-Data -Application -Host -Internal network -Physical facility
You are working as a desktop technician in an organization. Adam reports that some unauthorized users are accessing his email messages. He also reports that he received an email from an unauthorized user requesting confidential information about his bank account. What should you suggest Adam do?
-Delete the email message received from unauthorized users -Encrypt outgoing messages
Howard the maintenance supervisor has identified several devices in your company's facility that contain phosphorous. Which guidelines would you need to emphasize to his team regarding how to properly dispose of phosphorus?
-EPA guidelines -MSDS -OSHA guidelines
You are the CEO of an organization, your company is located in an area, where the air quality can impact the employees and devices. What tools will you use to protect the device and employees from airborne particles?
-Enclosures with good ventilation -Use of compressed air and mechanical blowers
You want to prevent your computer from any type of electrostatic discharge (ESD), while servicing the computer. Which actions should you NOT perform while servicing the computer?
-Ensure that the room in which computer is serviced is carpeted -Ensure that the room in which computer is serviced is cool and dry
Which of the following are the features which were once popular but have been deprecated since Windows 7?
-Gadgets -Windows Media Center -Backup and Restore
Jane is new to the PC technician world and is curious about ESD. Which steps would you tell her to use as preventative measures against static electricity?
-Have proper grounding of building and outlets -Wear anti-static bands while servicing computer components
John, a user, reports about slow system performance. What are the probable causes of this trouble?
-Heavily fragmented hard drive -Application errors that are taking over system resources
Melissa loves to listen to music while she is working out. However, every time she walks into the gym, her Bluetooth headphones stop working. What could be the problem?
-Her device is in discoverable mode -Other Bluetooth devices are trying to connect
Which of the following are examples of authentication possession (something you have) to support multifactor authentication?
-Key fob -Smart card
You launch Performance Monitor in Windows 7 Professional. Which components can you monitor using this tool?
-Memory -Processor -Disk -Network
Which two password policy settings to combine to make it impossible for users to quickly reuse their last password?
-Minimum Age -Enforce History
Which of the following are Storage Spaces configurations?
-Mirror -Simple -Parity
Which of the following record types must you add to DNS to implement DNSSEC?
-RRSIG -DNSKEY
What permissions must be assigned to the Authenticated Users group on the distribution share to ensure all users will have the application installed?
-Read -Read & Execute
Which of the following are examples of inheritance possession (something you are) to support multifactor authentication?
-Retinal scanner -Fingerprint reader
Which of the following are the causes of vertical lines on the page in the laser printing process?
-Toner on the main corona or transfer corona wire -Low resolution image -Print resolution setting is too low
You have been sent to clean up a computer that has been infected with malware. When you arrive at the computer, you identify the symptoms that are occurring, quarantine the system, and disable System Restore. Now you must remediate the computer. Which steps are parts of this process?
-Update the anti-malware software -Use scan and removal techniques to clean up the computer
You have determined that a block-level file corruption on the disk has damaged the driver files for a critical piece of hardware. Multiple reboots have failed to correct the problem. You open Device Manager. Please put the steps in the correct order to fix the error.
-Update the drivers -Uninstall the device
Which of the following actions would be appropriate responses to an "Invalid boot disk" error message in Windows?
-Verify boot order in SYSTEM BIOS -Remove USB -Remove CD/DVD
You purchased several new computers with dual physical processor configurations. The new computers have dual 1-gigahertz (GHz) processors and 2 gigabytes (GB) of RAM. Which editions of Windows 7 could you install to be able to utilize all components?
-Windows 7 Enterprise -Windows 7 Professional
You are a technician in an organization. You have been asked to perform in-place upgrades in every user's laptop. Which of the following are the valid paths which you can use during the upgrades?
-Windows 7 to Windows 8 -Windows 7 to Windows 10 -Windows 8 to Windows 8.1 -Windows 8.1 to Windows 10
You need to upgrade a computer running Windows 7 Home Premium with Service Pack 1 to Windows 8. To which editions of Windows 8 can this computer be upgraded?
-Windows 8 Basic -Windows 8 Pro
On which versions of Windows can PowerShell Core 6.0 be used?
-Windows 8.1 -Windows 10 -Windows 8
Which of the following network connections should always require data encryption?
-Wireless -VPN -WWan
Which type of script filename extension would be used to create a script file that extends the scope of interaction between a user and a web page?
.js
What is the correct order of the troubleshooting process?
1. Identify the problem 2. Establish a theory of probable cause 3. Test the theory to determine cause 4. Establish a plan of action to resolve the problem and implement the solution 5. Verify full system functionality and, if applicable, implement preventative measures 6. Document findings, actions, and outcomes
How many primary partitions are supported on GPT disks?
128
You need to install Windows 7 Professional on a user's x86 computer. Which hardware is NOT a minimum requirement?
2 gigabytes RAM
A customer contacts you with a technical issue you must research. After obtaining permission, you place the customer on hold to complete the research. What is the maximum amount of time the customer should remain on hold before receiving an update?
2 minutes
Which of the following is a requirement for Windows 10 x64?
2GB RAM
FAT32
32-bit file allocation table
You are configuring a Windows desktop to allow remote desktop sessions. For security purposes, you want to configure an alternate RDP (Remote Desktop Protocol) port. Which of the below is the default RDP port?
3389
sector
512 bytes on a disk
exFAT
64 bit Extended File Allocation Table used for large capacity removable hard drives and flash media.
Guest Account
A Microsoft Windows user account with limited capabilities, no privacy, and is disabled by default.
robocopy (robust file copy)
A Windows command that is similar to and more powerful than the xcopy command, used to copy files and folders.
diskpart
A Windows command to manage hard drives, partitions, and volumes.
A strong password that meets the password complexity requirement should contain:
A combination of characters from at least 3 character groups
tasklist
A command-line version of the Task Manager
swap partition
A disk partition disignated for swap space in linux
Remote Disc
A feature of OS X that gives other computers on the network access to the Mac's optical drive. system preferences -> Sharing
Event Viewer
A management console snap in for viewing and managing system logs (accessed through computer managment, administrative tools, or eventvwr.msc)
BranchCache
A new feature of Windows 7 that enables users to rapidly access data from remotely located file and web servers. This enables users at a small branch to cache copies of frequently accessed files from head office servers on a local computer.
Factory Recovery Partition
A partition that contains an image of the bootable partition created when the computer was built.(Restores OS to factory settings)
Spotlight Search
A search tool in the macOS
Which of the following statements apply to the definition of a computer virus?
A self-replicating computer program containing malicious segment / Requires its host application to be run to make the virus active / Attaches itself to an application program or other executable component.
Ransomware
A type of malware that tries to extort money from the victim, by appearing to lock their computer or by encrypting their files, for instance.
A user's phone contains customer's PII. The user cannot have the phone automatically wiped because the data is very valuable. Which of the following is the BEST method of securing the phone? A. Fingerprint lock B. Passcode lock C. Swipe lock D. PIN lock
A. Fingerprint lock
Which of the following security methods BEST describes when a user enters a username and password once for multiple applications? A. SSO B. Permission propagation C. Inheritance D. MFA
A. SSO
Joe, an end user, has been prompted to provide his username and password to access the payroll system. Which of the following authentication methods is being requested? A. Single-factor B. Multifactor C. RADIUS D. TACACS
A. Single-factor
A user's Windows laptop has become consistently slower over time. The technician checks the CPU utilization and see that it varies between 95% and 100%. After the technician closes some running applications, the CPU utilization drops to approximately 20%, and the laptop runs much faster. The next day the same user calls again with the same problem. Which of the following is a tool the technician can use to resolve the issue? A. Task Manager B. MSTSC C. MSConfig D. PerfMon
A. Task Manager
A MAC user's operating system became corrupted, and files were deleted after malware was downloaded. The user needs to access the data that was previously stored on the MAC. Which of the following built-in utilities should be used? A. Time Machine B. Snapshot C. System Restore D. Boot Camp
A. Time Machine
The 'Force Quit' tool is NOT used to safely save and close out of an application.
A. True
Which of the following devices are MOST likely to have a grounding wire attached to them based on the manufacturer's design? (Select two.) A. UPS B. Server rack C. PoE phone D. Desktop printer E. Modem F. Patch panel
A. UPS B. Server rack
Which of the following installation types would require the use of an answer file to install the OS? A. Unattended B. Clean C. Repair D. Upgrade
A. Unattended
A user is requesting a solution that will prevent file corruption and ensure a graceful shutdown while providing at least one hour of uptime in case of extreme weather conditions. Which of the following should a technician recommend? A. Uninterruptible power supply B. Surge protector C. Power strip D. Power distribution unit
A. Uninterruptible power supply
Which of the following is the most likely reason one would boot a system in Low-Resolution Video Mode?
A. When troubleshooting issues with a display
A user who is running Windows XP calls a technician to upgrade the computer to a newer Windows OS. The user states the computer has only 1GB of RAM and 16GB of hard drive space with a 1.7GHz processor. Which of the following OSs should the technician recommend to ensure the BEST performance on this computer? A. Windows 7 B. Windows 8 C. Windows 8.1 D. Windows 10
A. Windows 7
A junior Linux system administrator needs to update system software. Which of the following shell commands would allow the administrator to gain the necessary permissions to update the software? A. sudo B. chmod C. grep D. pwd
A. sudo
Which Active Directory security feature is a single sign-on system that uses the common Internet Standard SAML?
ADFS
Which of the following cryptographic algorithms is the least vulnerable to attacks?
AES
Which of the following is a package management system most often used on Debian and Debian-based Linux distributions?
APT
Which of the following Windows networking technologies pertains to the security control of authentication?
Active Directory
You need to broaden the area to which a wireless access point (AP) can transmit. What should you do?
Adjust the power level setting slightly higher
Which of the following choices would you type into the Start menu to search to configure virtual memory with the least administrative effort?
Advanced System Settings
A new Windows 10 PC is configured to obtain an IP (Internet Protocol) address using DHCP (Dynamic Host Configuration Protocol). You notice that the PC has an address of 169.254.1.20 and cannot connect to network resources. This computer is used on multiple networks and should have a static IP. What could be configured via the NIC (Network Interface Card) to remedy the PC's connectivity?
Alternate configuration
Business client
An OS designed to work as a client in a business network
Default Programs
An applet to set the programs you wish to use, or choosing which application is used to open files of a particular extension
System Information
An application used to provide detailed diagnostic information about your mac
shell
An interface between the user and computer and software
Which of the following protect you from electrostatic discharge (ESD)?
Antistatic wrist strap, Ground mat and antistatic bag
Time Machine
App facilitating backup operations in macOS.
Disk Utility
App in macOS used to verify or repair a disk or file system
Which of the following is the amount of memory a user is limited to with a 32-bit version of Windows? A. 2GB B. 4GB C. 8GB D. 16GB
B. 4GB
Which of the following is the amount of memory a user is limited to with a 32-bit version of Windows? A. 2GB B. 4GB C. 8GB D. 16GB
B. 4GB
Which of the following is the maximum RAM limit of a Windows 32-bit version? A. no limit B. 4GB C. 8GB D. 32GB
B. 4GB
Ann, a user, calls the help desk regarding an issue on her laptop. While working remotely, she appears to be connecting to WiFi but is unable to retrieve her corporate email. The wireless name is listed as "ConnectMe" and appears as unsecure. Which of the following should the help desk perform to fix the issue? A. Remote into Ann's system and restart the wireless adapted B. Ask Ann to open a browser and watch for a redirect page C. Advise Ann to plug an Ethernet cable into her laptop D. Direct Ann to run an antivirus program on her laptop
B. Ask Ann to open a browser and watch for a redirect page
What is the first step in replacing (rather than upgrading) an existing installation? A. Reinstall software applications and utilities. B. Back up data from existing target system. C. Restore data from the previous system using the backup you made. D. Install the new OS.
B. Back up data from existing target system.
A SOHO customer has recently experienced a major hurricane. The customer has no backups and has lost all data and hardware associated with the company. The customer calls a contractor to assist in the rebuilding process and needs suggestions on the best way to prevent this from happening again. Which of the following recommendations should the contractor give to the customer? (Select two.) A. Backup testing B. Cloud storage C. Local storage backups D. Data recovery E. Hot site F. Waterproof devices
B. Cloud storage E. Hot site
What network connection uses an analog modem to dial another modem on the ISP's remote access server, which then transfers the data onto the ISP's network then to and from the wider internet? A. Wireless WAN (Cellular) B. Dial Up C. Virtual Private Network (VPN) D. SOHO (small office/home office)
B. Dial Up
A company brings in contractors several times a year to perform inventory, and the contractors use company-supplied laptops. The company's security policy states that once the inventory is completed, the contractors should not be able to log in to the laptops until the next inventory. Which of the following BEST enforces this policy? A. Delete the user accounts B. Disable the user accounts C. Restrict the user accounts D. Reset the user accounts
B. Disable the user accounts
A user's mobile device appears to be losing battery life rapidly and often feels warms to the touch, even when it is put away. The device is relatively new, so the user is concerned it is defective. A technician inspects the device and sees the following: Which of the follow should be changed to resolve this issue? A. Privacy - Maps B. Display - Brightness C. Storage - Photos D. Mail - Work
B. Display - Brightness
After degaussing, a hard drive can be repurposed.
B. False
An in-place upgrade is also known as "clean install". Existing drive is reformatted and new OS installed.
B. False
Digital certificates are used to authenticate and authorize users to send encrypted information over an internet connection.
B. False
A technician uses a file level backup strategy for a user's files. Then, the technician creates a recovery image of the operating system and applications. Why did the technician create the file-level backup and the image separately? A. The user may not need the recovery image, but will need the data files B. Images take a relatively long time to create without including user files C. The partition containing the operating system cannot contain user files D. A new image needs to be made when data changes
B. Images take a relatively long time to create without including user files
If a Missing Operating System error is displayed, which of the following would be the first focus of troubleshooting?
B. Incorrect Boot sequence
An end user is browsing the Internet when multiple browser pages open by themselves. The user notices the PC is running slowly, even while not browsing the internet. Which of the following actions should the user take? A. Update antivirus definitions B. Install anti-malware software C. Enable the pop-up blocker D. Reboot the PC
B. Install anti-malware software
A department in an organization set up a proxy server to manage its Internet stage. A technician is configuring the Windows workstations to use the new proxy server. Which of the following Control Panel utilities should the technician use to configure the setting? A. Internet Options - Advanced B. Internet Options - Connections C. Internet Options - Security D. Internet Options - Content E. Internet Options - Privacy
B. Internet Options - Connections
Which of the following is a Linux command to stop a running process?
B. Kill
A technician is running updates on a Windows PC. Some of the updates install properly, while others appear as failed. While troubleshooting, the technician restarts the PC and attempts to install the failed updates again. The updates continue to fail. Which of the following is the FIRST option to check? A. Visit the Microsoft Update website to see if there is an issue with a specific update B. Look up the error number associated with the failed update C. Look at the system Event Viewer to find more information on the failure D. Download the failed update to install manually
B. Look up the error number associated with the failed update
Ann, a user, calls a technician and reports that her PC will not boot. The technician confirms the memory, power supply, and monitor are all working. The technician runs internal diagnostics on the PC, but the hard drive is not recognized. Which of the following messages will be displayed? A. NTLDR not found B. No boot device available C. Operating system not found D. BIOS ROM checksum error
B. No boot device available
A manager with a restricted user account receives the following error message: Windows Update cannot currently check for updates because the service is not running. The manager contacts the help desk to report the error. A technician remotely connects to the user's computer and identifies the problem. Which of the following should the technician do NEXT? A. Reboot the computer B. Restart the network services C. Roll back the device drivers D. Rebuild the Windows profiles
B. Restart the network services
A company has hired a new IT firm to manage its network switches and routers. The firm is geographically separated from the company and will need to able to securely access the devices. Which of the following will provide the ability to access these devices? A. Telnet B. SSH C. RDP D. VNC
B. SSH
Which of the following is a social engineering attack where the perpetrator tries to steal information by visually observing data a user is entering or viewing?
B. Shoulder surfing
Which of the following commands will shut down the system immediately and automatically reboot it?
B. Shutdown -r now
With which of the following types is a man-in-the-middle attack associated? A. Brute force B. Spoofing C. DDoS D. Zero-day
B. Spoofing
Which one of the user accounts in macOS can change their own settings, but not those of other users? A. Administrator B. Standard C. Managed with Parental Controls D. Sharing Only
B. Standard
A software end user license agreement (EULA) is an agreement between:
B. The end user and the owner of the software.
Which of the following cases is the BEST reason for a user to unhide system files or folders?
B. To locate or retrieve files infected by a virus
You would like to know the path that network traffic uses when you browse to an internal resource at work. What diagnostic tool should you use? A. Ping B. Tracert C. Arp D. Nslookup
B. Tracert
A technician setting up a SOHO wireless network for a healthcare office that does not have a server. The user requires the highest level of wireless security and various levels of desktop authentication to access cloud resources. Which of the following protocols and authentication methods should the technician implement? (Select two.) A. WPA B. WPA2 C. WEP D. TKIP E. RADIUS F. Multifactor G. TACACS H. SSO
B. WPA2 F. Multifactor
The Event Viewer displays each line or item in the source log file as an event and categorizes each event. What type of event may indicate future problems, such as when the system runs low on disk space? A. Information B. Warning C. Error D. Failure Audit
B. Warning
Which of the following is a Windows tool that collects and stores logs from system, application, and security events?
B. Windows Event Viewer
A network administrator notifies a technician that the company is experiencing a DDoS attack. Several internal Windows PCs are the source of the traffic. The network administrator gives the technician the Windows computer names and states they be scanned and cleaned immediately. With which of the following types of infections are the PCs MOST likely infected? (Select two.) A. Spyware B. Zombies C. Virus D. Ransomware E. Worm F. Botnet
B. Zombies E. Worm
A technician is working on a Windows 10 PC that is running slowly. Which of the following commands should the technician use to correct this issue? (Select two.) A. dir B. chdsk C. dism D. ipconfig E. format F. diskpart
B. chdsk C. dism
What executable launches the command line?
B. cmd.exe
Which of the following is an Apple service that allows a user to store documents, media, and other types of files, and access them using other OS X and iOS devices?
B. iCloud
BITS
Background Intelligent Transfer Service - a protocol in which the computer is enabled to browse update.microsoft.com and select updates for download and installation
Examples of devices/device components regulated under special disposal procedures due to environmental/safety hazards include:
Batteries / CRTs / Toner cartridges.
Control panel
Best place to configure your system in Windows 7
Which of the following data encryption tools can be used to secure a Windows workstation?
BitLocker (drive-level encryption) / EFS (file-level encryption)
A Microsoft Windows feature specifically designed to enable encryption of removable drives is known as:
BitLocker To Go
A technician contacts you and says that he needs to access the System Recovery Options on a Windows 7 computer. Which procedure or special key should he use?
Boot from the installation CD/DVD
Where in performance monitor can you create user-defined log files? A. Counter Logs B. Trace Logs C. Data Collector Sets D. Objects
C. Data Collector Sets
Which of the following is NOT a WiFi security mechanism?
C. Evolution Data Optimized
A technician is installing the latest OS on a user's system. The user wants all of the settings and file to remain intact during the installation. Which of the following upgrade methods should the technician use? A. Network installation B. Clean install C. In-place upgrade D. Image deployment
C. In-place upgrade
Which of the following is used to describe a fatal system error in Linux that results in a black proprietary crash screen?
C. Kernal Panic
What displays summary information about the computer, including the processor type and installed Random Access Memory (RAM), plus the Windows edition, product key, and activation status? A. Remote Settings B. System Protection C. System Properties D. System Restore
C. System Properties
Which of the following devices may pose a risk to electrical safety due to accumulated high voltage?
CRTs / Power Supply Units (PSUs) / Inverters / Laser printers.
Which of the following would you install to redress of laptops disappearing?
Cable locks
Which of the following is put in place to reduce the risk of service disruption?
Change management
What is the function of the Linux chmod command?
Changes file access permissions
chkdsk
Check Disk - checks the integrity of disks and can repair any problems detected
Which selection from the Power options navigation menu would you choose to make the Hibernate choice available in Windows 10, assuming compatible hardware?
Choose what the power buttons do
You have a script that needs to be edited with input values, but when you open the script you note there are several lines of text each preceded with "#", indicating these lines are which of the following?
Comments
System Log
Contains information about service load failures, hardware conflicts, and driver load failures
Which of the following locations in MS Windows allows to print a test page?
Control Panel (Icon view) -> Devices and Printers -> right-click on a selected printer -> Printer Properties -> General tab -> Print Test Page
Standby/Suspend to RAM
Cuts power to most devices (for example, the CPU, monitor, disk drives, and peripherals) but maintains power to the memory.
When sharing printers on a domain:
D. Access rights are determined by the administrator.
Which of the following are common issues that may cause systems of slow system performance?
D. All of the above
Which of the following is an option for upgrading in Microsoft?
D. All of the above
A user contacts a technician to troubleshoot server errors. The user explains that some files will not open on the server, the data backups are operational, and the weather has been bad. The technician notices missing time slots in the event log. Which of the following should the technician replace to prevent these issues in the future? A. System memory B. Surge protector C. Hard Drives D. Battery backup
D. Battery backup
In OS X, which Disk Utility feature helps to fix issues with file systems and partitions?
D. First Aid
A desktop technician is attempting to upgrade several machines to Windows 10. After realizing there is only one disc for the installation, the technician decides to upgrade over the network. Which of the follow boot methods initiates such an upgrade? A. SSD B. Optical Drive C. Flash Drive D. PXE
D. PXE
What is the practice of monitoring, obtaining, evaluating, testing and deploying fixes and updates? A. OS Updates B. Disk Defragmenter C. Check Disk D. Patch Management
D. Patch Management
A technician is installing a private PC in a public workspace. Which of the following password practices should the technician implement on the PC to secure network access? A. Remove the guest account from the administrators group B. Disable single sign-on C. Issue a default strong password for all users D. Require authentication on wake-up
D. Require authentication on wake-up
Which of the following is a Windows tool that can be used to locate system files that are missing or damaged, and attempt to repair them?
D. SFC
Joe, a systems administrator, is setting up a risk management plan for the IT department. Part of the plan is to take daily backups of all servers. The server backups will be saved locally to NAS. Which of the following can Joe do to ensure the backups will work if needed? A. Frequently restore the servers from backup files and test them B. Configure the backups to restore to virtual machines for quick recovery C. Set up scripts that automatically rerun failed backup jobs D. Set up alerts to let administrators knows when backups fail E. Store copies of the backups off-side in a secure datacenter
D. Set up alerts to let administrators knows when backups fail
What is the most common marketplace to host malware?
D. Third Party Stores
A technician arrives on site to find that two users who have the same model on Android smartphone are having the same issue with a specific application. Whenever they attempt to launch the application, it fails and gives an error message. Which of the following should the technician do FIRST? A. Reinstall the application B. Roll back the application to the earlier version C. Clear the application cache D. Update the OS of the smartphones
D. Update the OS of the smartphones
An Internet browser redirecting a user to a website other than intended indicates a security issue related to:
DNS
A Windows 10 PC on the network is only able to connect to other resources, both public and private, by using IP addresses. What setting needs to be checked via the NIC (Network Interface Card) properties?
DNS (Domain Name System) address
Which of the following can be used by system administrators to selectively block access to known malware sites?
DNS configuration
Which of the following record types must you add to DNS to implement DNSSEC?
DNSKEY and RRSIG
chkdsk C: /x
Dismounts volume C:
Which configuration setup would you choose when implementing BranchCache in a remote office with no onsite server?
Distributed
Full Control
Do anything with the object, including change its permissions and its owner
Modify
Do most things with an object but not to change its permissions or owner
What is the last step in troubleshooting theory?
Document findings, actions and outcomes
Which Firewall network profile is automatically enforced with no user intervention?
Domain
A user believes there is a virus on a laptop. The user installs additional real-time protection antivirus software but is now experiencing extremely slow performance on this laptop. Which of the following should a technician do to resolve the issue and avoid recurrence? A. Activate real-time protection on both antivirus software programs B. Uninstall one antivirus software program and install a different one C. Run OS updates D. Enable the quarantine feature on both antivirus software programs E. Remove the user-installed antivirus software
E. Remove the user-installed antivirus software
Which of the following actions would you take to make drivers available to an automated installation of Windows 10?
Edit the unattend.xml file
man/ --help
Either parameter will generate a detailed explanation of the command
Reviewing System and Application logs on a Windows-based PC might provide useful information while troubleshooting security-related issues. System and Application logs in MS Windows can be found in:
Event Viewer (eventvwr.msc)
What is the correct hierarchy of precedence for permissions settings in NTFS?
Explicit Deny -> Explicit Allow -> Inherited Deny -> Inherited Allow
A macOS file manager application is known as:
Finder
Your company has several security measures that they have implemented on all mobile devices. Which of the following is NOT a security measure for mobile devices?
Geotracking
popular linux GUIs
Gnome, KDE, Cinnamon, Xfce
In Windows Active Directory environment, this feature enables centralized management and configuration of operating systems, applications, and user account settings.
Group Policy
David works in the IT department and is training his team on how to look for certain attacks. He is discussing a type of attack that is used by an attacker to persuade the Internet browser to connect to a fake server that appears as a valid session. Which type of attack is he discussing?
Hyperlink spoofing
According to the CompTIA's best practice procedures for malware removal, putting a malware-infected Windows-based system into a quarantine should be the next step after:
Identifying and researching malware symptoms
Which of the following terms is used a synonym for the bare-metal backup concept?
Image-level backup
You are instructing a new IT technician on securing networks and using permissions. What would you tell Graham that the default permission position should be?
Implicit deny
A user requests that his Windows 7 computer display dates using the yyyy-mm-dd format. Where should you go to make this change using the least administrative effort?
In Control Panel Category View, click Clock, Language, and Region. Select Region and Language
Screen Sharing
In OS X, a utility to remotely view and control a Mac and is similar to Remote Assistance in Windows.
What should you do if you discover inappropriate material on a company-owned computer but no specific company computer-use policy exists?
Inform your supervisor of the inappropriate material
Windows Settings
Interface for managing a Windows 10 computer
Boot Camp
Is a utility supplied with macOS that allows a full Windows installation to be made on a Mac.
PII
Is data that can be used to identify, contact, or locate and individual or, in case of theft, to impersonate them.
A customer has contacted you and expressed anger about the service provided by your company. During the call, you discover that another technician responded to the customer's original issue. In spite of the customer's tone, you remain calm. What should you do next?
Listen to the entire complaint
What is the role of *Winload.exe* in the Windows boot process?
Loads the hardware abstraction layer, the Registry, and boot device drivers into memory
Which of the following answers refers to a basic programming construct that repeats a sequence of instructions until a specified condition is reached?
Loop
A technician is recycling PCs to be used by a middle school. Which of the following methods is *most* appropriate for ensuring that data has been removed from the PCs?
Low-level format
Which of the following terms is used to describe initial hard drive formatting typically performed at the factory by the drive manufacturer?
Low-level format
Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as:
Malware
Which of the following correctly identifies a document describes procedures for safe handling, use, storage, and disposal of potentially hazardous materials?
Material safety data sheet (MSDS)
Which of the following correctly identifies a document describing procedures for safe handling, use, storage and disposal of potentially hazardous materials?
Material safety data sheet (MSDS)
Which of the following password policy settings prevents attackers using cracked passwords from gaining permanent access to a Windows workstation?
Maximum password age setting
You have several old computers that you need to dispose of. By following best security practices, you employ remnant removal. Which of the following are you NOT concerned with?
Memory
Which of the answers listed below refers to an example order of volatility for a typical computer system?
Memory dump, temporary files, disk files, archival media
domain
Microsoft client/server network model that groups computers together for security and to centralize administration
In which of the following Mac OS X versions does the dark mode to reduce eyestrain has been introduced?
Mojave
A user has a Windows 7 computer with 512 MB of RAM and two hard drives, named drive C and drive D. the paging file is located on drive C. The user complains that his computer does not perform well after running for a couple of hours. What should you tell the user to do?
Move the paging file to drive D.
What types of operating systems (OSs) are designed to run on servers in a business network?
Network Operating System (NOS)
NOS
Network Operating System - an OS designed to run on servers in business networks
When is an operating system compatability error likely to occur?
Not B
A user who receives an email believing it was sent from their bank and, in turn, clicks in a link contained within the email causing a download to initiate, might be what type of attack?
Not C,D
Before a technician physically takes a system or device from a user to troubleshoot, what should the technician request the user do before turning over that system or device?
Not D
Which of the following password policy settings determines the number of unique new passwords that must be associated with a user account before an old password can be reused?
Password history setting
A user is having problems with a PC after clicking an attachment in an email message. Which of the below would categorize unexpected or threatening messages appearing on the screen?
Performance Symptoms
You have two wireless networks in your buidling. The wireless networks do not overlap. Both of them use Wi-Fi Protected Access (WPA). You want to ensure that no unauthorized wireless access points are established. What should you do?
Periodically complete a site survey
Which is primarily used to segregate network traffic, optimize network speed, and to permanently assign a network path for a specific protocol or network service?
Port forwarding
Which of the following solutions will allow a server with a private IP address to handle requests from an outside (public) network?
Port forwarding
Which of the following is sued to restrict devices which connect to the notwork or to detect and block some attacks using spoofed MAC addresses?
Port security
POST
Power On Self Test
What are the characteristic features of RADIUS?
Primarily used for network access / Combines authentication and authorization / Encrypts only the password in the access-request packet.
Which of the following can restrict the use of a mobile device camera to certain areas within an organization's facilities?
Profile of security requirements
Windows Registry
Provides remotely accessible database for storing, operating system, device, and software application configuration information
Operating System (OS)
Provides the interface between the hardware, application programs, and the user.
A type of contactless smart card that can be read at a close range from a reader device is commonly referred to as:
Proximity card
You have arrived 30 minutes late at a customer site to address a technical issue. Which area of customer service has been impacted the most?
Punctuality
Which format type in MS Windows does not erase disk data?
Quick format
file attributes
R - read only H - hidden S - system, can not be deleted A - archive, modified since last backup
Which of the following authentication systems is used as the authentication back end for Wi-Fi networks using WPA Enterprise security?
RADIUS
Which of the following should you install to support wireless authentication and network access?
RADIUS server
Write
Read a file and change it, or create a file within a folder, but not to delete it
Which of the following enables troubleshooting a malware-infected system that doesn't boot up?
Recovery console
You would like to give a user the ability to request help and allow a connection from the support team to a Windows computer. Which setting do you configure?
Remote Assistance
You are implementing mobile security in the workplace. To help protect devices in the event they are lost or stolen, which policies do you propose (choose two)?
Remote wipe Device lockout
Which of the following would let you change the screen resolution with least administrative effort?
Right -click desktop --> display settings
Which of the following malwares fakes system problems or virus detection in order to make you buy paid security scanners?
Rogue antivirus
You need to run Disk Defragmenter, but several other applications are running. Why should you shut down all running applications first?
Running other applications may result in disk operations forcing Disk Defragmenter to restart continually
Which of the following is a US federal law designed to prevent fraudulent accounting practices?
SOX
Which of the following Windows utilities provides access to print spooler settings?
Services (services.msc)
SPDIF
Sony-Philips digital interface format
What term best describes an attack that involves sending an email addressed to everyone in your company, that appears to come from an internal address and requires your network credentials in order to open an attachment, all in an attempt to steal the credentials?
Spear phishing
Which MAC OS feature allows you to search all kinds of files, including documents, music, photos, emails, and contacts?
Spotlight
Services
Start, stop, and pause services
Which one of the following is a vulnerability concern with physical security?
Tailgating
A 64-bit application is causing problems on a Windows 10 computer. You are following a support document while troubleshooting the application. In which of the following areas does an application typically NOT install during installation?
The C:\windows\system32 folder
You manage a network installed with multiple Windows 8.1 workstations. One of the users reports that his computer does not boot to Windows. You notice that the computer generates the following message during boot up: "Windows 8.1 could not start because the following file is missing or corrupt: \WINDOWS\SYSTEM32\CONFIG\SYSTEM
The registry is corrupt
Remote Desktop
The remote user can initiate a connection at any time. The remote user needs to sign on the local machine using an authorized account.
Which of the following account management security solutions provide countermeasures against brute-force attacks?
Timeout period between login attempts / Failed attempts lockout.
Which of the following best describes the function of organizational units?
To organize like managed objects in the directory
Which mode of Bitlocker authentication allows the user to start up the computer and log into Windows as normal?
Transparent operation
Which layer is *not* defined in the defense in depth strategy?
Transport
UDF
Universal Disk Format - updated file system for optical media with support for multi-session writing
USB
Universal Serial Bus
UTP
Unshielded Twisted Pair
What *applet in Settings* will let you recover a failed installation?
Update & Security
Isaac purchased a refurbished iPhone and installed the latest version of iOS. However, his iPhone, will not hold a charge for very long. What will you recommend him to alleviate extremely short battery life?
Use the Low Power Mode setting
When explaining new equipment features to a customer, all of the following are acceptable practices, EXCEPT:
Use the correct acronyms with the customer
Which of the following is a set of firewall entries containing information on traffic considered safe enough to pass through?
Whitelist
Which of the following tools would be of help in determining the optimal WAP placement?
Wi-Fi analyzer
Which tool would you use to boot Windows following a stop error from which the machine is unable to restart?
WinPE
Which edition of Windows 10 is designed for small and medium-sized businesses and comes with networking and management features designed to allow network administrators more control over each client device?
Windows 10 Pro
Which version of Windows introduced Bitlocker in the *Professional* edition?
Windows 8
Which of the following steps provide access to the Disk Cleanup utility in MS Windows?
Windows Explorer (Windows 7) File Explorer (Windows 8/8.1/10) -> right-click on a drive -> Properties -> General tab -> Disk Cleanup / Windows Control Panel -> Administrative Tools folder -> Disk Cleanup shortcut icon / Windows Run dialog box -> type in diskmgmt.msc + press Enter -> right-click on a drive -> Properties -> General tab -> Disk Cleanup
Which of the following steps provide access to the disk defragmenter utility in MS Windows?
Windows Explorer (Windows 7) File Explorer (Windows 8/8.1/10) -> right-click on a drive -> Properties -> Tools tab -> Optimize and defragment drive -> Optimize / Windows Control Panel -> Administrative Tools folder -> Defragment and Optimize Drives shortcut icon / Windows Run dialog box -> type in diskmgmt.msc + press Enter -> right-click on a drive -> Properties -> Tools tab -> Optimize and defragment drive -> Optimize
Mission Control
a feature of macOS that enables a user to set up one more desktops with different sets of apps and backgrounds
Bitlocker
a microsoft utility to encrypt a drive
AUPacceptable use policy
acceptable use policy
ACL
access control list: with respect to a computer file system, is a list of permissions attached to an object.
AP
access point
WOW64
acts as the emulator for allowing 32-bit applications to run seamlessly on a Windows 64-bit OS
ARP
address resolution protocol
ACPI
advanced configuration power interface
AES
advanced encryption standard
AHCI
advanced host controller interface
APM
advanced power management
ATAPI
advanced technology attachment packet interface
ATX
advanced technology extended
AC
alternating current: voltage or current that changes; polarity changes; electrons move in different direction
Option
apple equivalent of Alt
Command
apple equivalent of Ctrl button
What is the name of a software tool used for finding and installing software packages on Debian and Debian-based Linux distributions?
apt-get
ADSL
asymmetrical digital subscriber line
ATM
asynchronous transfer mode
Which of the following answers lists the correct syntax for applying the read-only attribute to a file?
attrib +R [drive:] [path] [filename]
A/V
audio video
ASR
automated system recovery
ADF
automatic document feeder
APIPA
automatic private internet protocol addressing
Which type of script file would be used to store a series of commands designed to automate tasks in DOS, OS/2 and Microsoft Windows?
bat
hive
binary files that store the registry database
BSOD
blue screen of death
A technician contacts you that he cannot locate the NTLDR file on a Windows 7 computer. You explain that his file was replaced. Which file replaced it?
bootmgr
While trying to start their Windows machine, a user receives "Windows Boot Configuration Data file is missing required information" error message. Which of the following bootrec options should be used by a technician for manual CLI troubleshooting of this error?
bootrec /rebuildbcd
ext3 vs ext4
both 64 bit file systems that suppor journaling but ext 4 delivers better performance
VFAT
bvirtual file allocation table
dd
can be used to specify that date within the month(0-31) in cron
trace logs
can collect statistics about services, providing detailed reports about about resource behavior
CRT
cathode-ray tube
Which of the following Linux command-line commands enables directory traversal?
cd
You are browsing a user folder while using the command prompt window in Windows 10. The current directory is c:\users\david. You would like to navigate to the documents subdirectory. Which of the following two commands could you use?
cd c:\users\david\documents cd documents
CFS
central file system, common file system, or command file system
CPU
central processing unit
Which command is used for changing the owner or the group of a file or directory?
chown
CIDR
classless inter-domain routing
cls
clears the command prompt screen
CIFS
common internet file system
COMx
communication port (x=port number)
CNR
communications and networking riser
CDFS
compact disc file system - legacy file system used for optical disc media
CD-ROM
compact disc-read-only memory
DoS
denial of serbice
DLP
digital light processing or data loss prevention
DC
direct current
dir *.*
displays all files and directories in the current directory
dir let *.doc
displays all files with the DOC extension that start with the letters LET
dir let *.doc /s
displays all files with the DOC extension that start with the letters LET and searches for subdirectories
dir *.
displays all files without an extension.
DFS
distributed file system
DNS
domain name service or domain name server
DDR
double data rate
DDR RAM
double data rate random access memory
DIMM
dual inline memory module
DHCP
dynamic host configuration protocol
DRAM
dynamic random access memory
EEPROM
electrically erasable programmable read-only memory
EMI
electromagnetic interference
EMP
electromagnetic pulse
ESD
electrostatic discharge
ERD
emergency repair disk
A Linux command-line command that enables searching files for lines containing a match to a given text pattern is called:
grep
linux user commands
groupadd, groupmod, groupdel
taskkill /t /pid processid
halts any child processes
HDD
hard disk drive
HPFS
high performance file system
HDCP
high-bandwidth digital content protectioin
HIPS
host intrusion prevention system
HTML
hypertext markup language
HTTP
hypertext transfer protocol
HTTPS
hypertext transfer protocol secure
Force Quit
in Apple menu or press command+option+esc
IrDA
infrared data association
IaaS
infrastructure as a service
I/O
input/output
apt-get install (package name)
install new application
clean install
installing an new OS that completely replaces the old one
in-place upgrade
installing on top of an existing version of OS
IEEE
institute of electrical and electronics engineers
IDE
integrated drive electronics
IIS
internet information services
IMAP
internet mail access protocol
IPP
internet printing protocol
IP
internet protocol
IPConfig
internet protocol configuration
IPSec
internet protocol security
ISP
internet service provider
IRQ
interrupt request
IDS
intrusion detection system
IPS
intrusion prevention system
A Windows 10 PC was not resolving local server names correctly. You discovered that the network card properties on the PC had an incorrect DNS (Domain Name Server) address specified. You have corrected the address and would now like to clear the DNS cache. Which command do you use to do so?
ipconfig
Which ipconfig switch and arguments forces a Dynamic Host Configuration (DHCP) client to renew the lease it has for an Internet Protocol (IP) address? A. ipconfig /all B. ipconfig /release AdapterName C. ipconfig /renew AdapterName D. ipconfig /displaydns
ipconfig /renew AdapterName
Which of the following is a Linux command-line command used for configuring network interface parameters specific to the wireless communication?
iwconfig
JBOD
just a bunch of disks
Which of the Linux command-line commands allows to terminate a running process?
kill
KB
knowledge base
LED
light emitting diode
LDAP
lightweight directory access protocol
LPD/LPR
line printer daemon / line printer remote
LPT
line printer terminal
dd
linux command that makes a copy of an input file to an output file
swapon
linux command used to activate the partition swap space
grep
linux command used to search and filter contents of files displaying the lines that match the search string
fdisk
linux command-line program used to create and manage partitions on a hard disk
mkfs
linux command-line program used to format a partition
mkswap
linux command-line program used to format a swap partition
ext
linux file system
cron
linux task scheduler
LCD
liquid crystal display
dir/t:c
list by date created
dir/o:e
list by extension
LBA
logical block addressing
LVD
low voltage differential
MFA
multifactor authentication
devmgmt.msc
opens device manager from runline
diskmgmt.msc
opens disk management console from runline
format D: /fs:EXFAT /q
performs a quick format that doesn't scan for boot sectors
PCI
peripheral component interconnect payment card industry
PCIe
peripheral component interconnect express
PCIX
peripheral component interconnect extended
PAN
personal area network
PC
personal computer
PCMCIA
personal computer memory card international association
PIN
personal identification number
PII
personally identifiable infromation
PAL
phase alternation line
PGA
pin grid array
PGA2
pin grid array 2
PaaS
platform as a service
PnP
plug and play
PPP
point-to-point protocol
PPTP
point-to-point tunneling protocol
PoS
poitn of sale
PAT
port address translation
POP3
post office protocol 3
PoE
power over ethernet
PSU
power supply unit
PXE
preboot execution evirnonement
PE
preinstallation environment
PGP
pretty god protection
PRI
primary rate interface
Which of the following are examples of administrative share names in Windows?
print$ / IPC$
PCL
printer control language
virtual memory
process of optimizing RAM storage by borrowing hard drive space
PROM
programmable read-only memory
What is the name of a Linux command-line utility used for displaying statistics of running processes?
ps
PKI
public key infrastructure
command
the command or script to run along with the full path to the file
MITM
The attacker sits between two communicating hosts and transparently monitors, captures, and relays all communication between them.
Which of the following best describes the kind of malware that infected the CFO's laptop after he downloaded and installed a popular file sharing app?
Trojan
Which of the following best describes the kind of malware that infected the users laptop after downloading and installing a popular file sharing app?
Trojan
A common example of channel overlapping in wireless networking would be the 2.4 GHz band used in 802.11, 802.11b, 802.11g, and 802.11n networks, where the 2.401 - 2.473 GHz frequency range is used for allocating 11 channels, each taking up a 22-MHz portion of the available spectrum. Setting up a wireless network to operate on a non-overlapping channel (1, 6, and 11 in this case) allows multiple networks to coexist in the same area without causing interference. T or F
True
HAL
hardware abstraction layer
HAV
hardware assisted virtualization
SaaS
software as a service
Freeware
software that is available free of charge
SSD
solid state drive
Time Machine
Apple equivalent of system restore
CD-RW
compact desc-rewritable
CDFS
compact disc file system
CMOS
complementary metal-oxide semiconductor
CERT
computer emergency response team
CGA
computer graphics and application
CAD
computer-aided design
dir *.doc
displays all files with the DOC extension in the current directory
ps
displays linux processes that are currently running
to adjust settings of an apple track pad
System Preferences -> Trackpad
adding a new account in MacOS
System Preferences ->users and groups
Data Sources
control connection to databases set up on the local computer
GPS
global positioning system
GSM
global system for mobile communications
GUID
globally unique identifier
GUI
graphical user interface
GDI
graphics device interface
GDDR
graphics double data rate
GPU
graphics processing unit
workgroup
Microsoft peer to peer network model in which computers are grouped together with access to shared resources
SMB
Server Message Block
AES-based encryption mode is a characteristic feature of:
WPA2
Which of the following is a characteristic of Easy Transfer?
Not D,E
FQDN
fully qualified domain name
ugo
user group others
WAN
wide area network
Where are the log files stored?
%SystemRoot%\System32\Winevt\Logs folder
Which of the following terms refers to a group of experts that handle computer security breaches?
(CIRT) Cyber Incident Response Team.
Which of the following acronyms refers to software or hardware-based security solutions designed to detect and prevent unauthorized use and transmission of confidential information outside of the corporate network?
(DLP) Data Loss Prevention
Which of the following regulates personal data privacy of the European Union (EU) citizens?
(GDPR) General Data Protection Regulation
The US Health Insurance Portability and Accountability Act (HIPAA) provides privacy protection for:
(PHI) Protected Health Information
Which of the following answers refers to a hierarchical system for the creation, management, storage, distribution, and revocation of digital certificates?
(PKI) Public Key Infrastructure
1
--x
Alan of NOrthern Company is traveling to several conferences in various states to present his new product line to consumers. He usually uses a Slimport to project his Android screen but accidentally left his cables at the last site where he was. His next presentation is in four hours. What can he request from the hotel technical team to keep the show rolling for Alan?
-A Miracast or Chromecast -A Micro HDMI cable
Wendy has decided to implement an uninterruptible power supply for several servers. Which functions can it provide her?
-A warning when the power source fails -Short-term battery backup -Surge protection
Which of the following can restrict the risk of unauthorized login?
-Access control -Strong password
Daniel is new to your department and is asking about wireless networks. What would you tell him are three conditions that affect the external vulnerabilities of wireless networks?
-Access point power -Antenna placement -Antenna selection
You want to ensure that a particular application can always connect to the client in order to push update the latest application data regardless of the network the client is connected to. What do you do?
-Create an inbound Firewall Rule -Enable for All Profiles
Which of the following actions are you most likely to take in the vent your mobile device has suffered unauthorized access via malware?
-Hard reset -Restore from Cloud backup
Alen, a security administrator, is configuring SOHO network, this network does not provide most of the security zones and subnets. To keep then network devices secure, what points will you consider?
-Harden network devices like switches, routers and firewalls by disabling unnecessary services -Disable remote management of routers and other network devices
Which of the following statements are true about the homegroup sharing model?
-Homegroups are created by one user and can be joined by anyone with a shared password -Computers in domains can join homegroups, but not create them -Home and business editions of Windows can join homegroups
Which factors generate and promote the transmission of electrostatic discharge (ESD) to devices?
-Humidity less than 40 percent -Improper grounding -Moving machines -Moving people
You are instructing your company's IT technicians on how to calibrate the screen of a touch screen device. The technician will need to perform this step only in certain conditions. Which conditions will require this?
-Nothing happens when touching an application -Incorrect application opens
Stephen, a server administrator, is assigned the task to securely overwrite an entire hard drive, for that he requires formatting utilities. So, which utilities will he apply?
-Perform a full format -Implement data destruction utilities -Perform a low-level format
Susan is constantly shutting down her laptop improperly due to moving from meeting to meeting. Which file is in jeopardy of being affected the most?
-Registry
Several users will be using a new Windows 7 computer. You have been asked to configure the accounts in the appropriate manner to maximize security. Which procedures should you implement?
-Rename the Administrator account -Rename the Guest account -Disable the Guest account
A user has recently upgraded the video adapter drivers on a Windows 7 computer. Since that time, the computer has been continuously restarting. You tried rebooting the computer using the Last Known Good Configuration, but it does not affect the problem. What should you do to fix the problem using the least administrative effort?
-Restart the computer in Safe Mode -Roll back the video adapter drivers
Smith, a system administrator in an organization, is working on computer equipments and peripheral devices, and he needs to keep himself safe from any kind of injury. What personal safety guidelines should Smith follow?
-Secure loose cables out of the way -Disconnect the power before repairing a computer or other device -Use proper lifting techniques when moving heavy equipment -Remove loose items such as jewellery, scarves, or ties that could get caught on components -Be prepared for electrical fires and have a Class C fire extinguisher handy
You are researching the biometrics for identification and verification of employees in an organization. Which attributes or details of an employee can be used by biometric devices?
-Signature -Fingerprints -Hand geometry -Face -Iris -Voice -Retina
Which of the following tools are used to protect against problems with the power supply?
-Surge protector -Electrical generator
Your company's network contains workstations that run Windows 8, Windows 8.1, Windows 10 Professional, and Windows 7 Ultimate. You need to install the Multilingual User Interface (MUI) on all the workstations. Which operating systems will provide multilungual support for both the operating systems and applications?
-Windows 7 Ultimate -Windows 8 -Windows 8.1 -Windows 10 Professional
3
-wx
Which of the following answers refers to an example of filename extension used in a cross-platform, general-purpose programming language?
.py
Files with this filename extension are used in a scripting language based on the Microsoft's Visual Basic programming language.
.vbs
Which of the following file extension of a script runs through the Windows Scripting Host instead of command shell?
.vbs
What is the correct order for remediating a malware infected system?
1. Identify and research malware symptoms 2. Quarantine the infected systems 3. Disable System Restore (in Windows) 4. Remediate the infected systems 5. Schedule scans and run updates 6. Enable System Restore and create a restore point (Windows)
In which of the following Mac OS X versions does the dark mode to reduce eyestrain has been introduced?
10.14 Mojave
You have configured a new Windows 10 PC, and for some reason it will not communicate properly on the network. You decide to ping the loopback address to test the PC's TCP/IP (Transmission Control Protocol/Internet Protocol) settings. Which of the below is the loopback address?
127.0.0.1
You want to install Windows 7 Professional 64-bit edition on a new computer. Which hardware is NOT a minimum requirement?
16 GB available hard drive space
You are configuring a wireless access point for the office you work in. You are configuring both 2.4GHz (Gigahertz) and 5GHz for users. Which wireless standard will only use the 5GHz spectrum?
802.11ac
service
A Windows process that does not require any sort of user interaction and so runs in the background
Boot Camp
A utility on macOS that allows a full windows installation to be made on a Mac. Applications ->Utilities folder
A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LAN do not exhibit this symptom. Which of the following needs to be adjusted on the workstation to fix the issue? A. Date and time B. UEFI boot mode C. Logon times D. User access control
A. Date and time
A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LAN do not exhibit this symptom. Which of the following needs to be adjusted on the workstation to fix the issue? A. Date and time B. UEFI boot mode C. Logon times D. User access control
A. Date and time
A security team is auditing a company's network logs and notices that a USB drive was previously inserted into several of the servers. Many login attempts were then successfully performed using common login information. Which of the following actions should be taken to close the vulnerability? (Select two.) A. Disable guest account B. Remove admin permissions C. Modify AutoRun settings D. Change default credentials E. Run OS security updates F. Install a software firewall
A. Disable guest account C. Modify AutoRun settings
What app can be used to verify or repair a disk or file system in macOS? A. Disk utility B. Patch Management C. Windows Update D. Package Manager
A. Disk utility
Which of the following features has undergone the most significant changes from Windows 7 to Windows 10 and greatly simplified the operation system installation process? A. Driver detection B. Metro interface C. Account control D. PXE installation
A. Driver detection
Which of the following is a Linux tool that can be used for troubleshooting Failure to Boot issues?
A. Grub
A Windows user is attempting to install a local printer and is unsuccessful on permissions. Which of the following user types BEST describes this user? A. Guest B. Power User C. Administrator D. Standard User
A. Guest
A technician is setting up a kiosk. The technician needs to ensure the kiosk is secure and users will have access to only the application needed for customer interaction. The technician must also ensure that whenever the computer is rebooted or powered on it logs on automatically with a password. Which of the following account types would the technician MOST likely set up on this kiosk machine? A. Guest B. Administrator C. Power User D. Remote Desktop User
A. Guest
On a Linux system, which of the following commands would dsiplay all the file details such as permissions, owner, size and date within the present working directory?
A. Is -l
An end user's PC is taking a long time to boot. Which of the following operations would be the BEST to resolve the issue with minimal expense? (Select two.) A. Remove applications from startup B. Defragment the hard drive C. Install additional RAM D. Install a faster hard drive E. End the processes in Task Manager F. Run the Disk Cleanup utility
A. Remove applications from startup B. Defragment the hard drive
Which of the following is not a method of testing a backup? A. Restoring a file to the production environment B. Restoring a file to a test directory C. Verifying that the backup contains the correct number of files D. Verifying that all backup devices and media are working
A. Restoring a file to the production environment
A user calls the help desk regarding a new Windows issue that started in the morning. The user can no longer use any locally attached devices, such as a mouse or a printer, and a reboot did not fix the problem. Which of the following would MOST likely fix the issue? A. Roll back updates B. Disable the Windows Update service C. Check for updates D. Restore hidden updates
A. Roll back updates
A technician is working on a user's workstation and notices a lot of unknown processes running in the background. The user informs the technician than an application was recently downloaded from the internet. Which of the following types of infection does the user MOST likely have? A. Rootkit B. Keylogger C. Trojan D. Ransomware
A. Rootkit
Ann, a user, has purchased a new Android phone and is attempting to access a public hotspot. When she gets a message indicating the page cannot be displayed. She notices there is a "?" in the radio icon in the toolbar. She has verified Bluetooth is active, airplane mode is off, and tethering is turned on. She uses the cell phone to call a technician for assistance. Which of the following is the MOST likely issue Ann is experiencing? A. There is unauthenticated wireless connectivity B. She has exceeded the data allowance C. The phone is only 3G capable D. It is an unrooted phone E. The SIM card was not activated F. A data plan was not purchased
A. There is unauthenticated wireless connectivity
A computer becomes infected with malware, which manages to steal all credentials stored on the PC. The malware then uses elevated credentials to infect all other PCs at the site. Management asks the IT staff to take action to prevent this from reoccurring. Which of the following would BEST accomplish this goal? A. Use an antivirus capable of performing heuristic analysis B. Use a host-based intrusion detection system on each computer C. Disallow the password caching of accounts in the administrators group D. Install a UTM in between PC endpoints to monitor for suspicious traffic E. Log all failed login attempts to the PCs and report them to a central server
A. Use an antivirus product capable of performing heuristic analysis
Which of the following is protected by a password at initial creation that is required by each subsequent computer in order to join?
A. Workgroup
After a virus has been spread unknowingly via USB removable hard drives, a technician is tasked with limiting removable hard drive access to certain network users. USB ports are used for many devices, including scanners, printers, and signature pads, so a policy is created to deny access to removable hard drives only. When testing the policy, a removable drive is plugged in but can still be accessed. Which of the following command-line tools should the technician use to apply the new policy? A. grupdate B. diskpart C. gpresult D. net use
A. grupdate
A type of hierarchical database structure used in Windows Server environments that enables centralized management of devices and resources on a network is known as:
Active Directory
Windows networking supports two types of accounts. Local accounts are used for the local system and domain accounts are used for access to Windows servers. Where are domain accounts stored?
Active Directory (AD)
Active Directory Users and Computers (ADUC) is a Microsoft Management Console (MMC) snap-in included in most Windows Server OSs. The Active Directory Users and Computers snap-in allows system administrators to manage resources in the Active Directory (AD) environment (e.g. to create, delete, disable, unlock accounts, or to reset account passwords). On a Windows Server OS, the Active Directory Users and Computers snap-in resides in:
Administrative Tools folder in Windows Control Panel
Restoring data from an incremental backup requires:
All copies of incremental backups made since the last full backup / Copy of the last full backup.
Home Client
An OS designed to work on standalone or workgroup PCs in a home or small office
Which of the following locations in macOS provide access to multi-touch interface settings (a.k.a. Gestures)?
Apple menu -> System Preferences... -> Mouse / Apple menu -> System Preferences... -> Trackpad.
Activity Monitor
Apple verstion of performance monitor
Which of the following statements describing share permissions in MS Windows are true?
Apply only to network users / Can be set on a folder level.
Which of the following statements describing NTFS permissions in MS Windows are true?
Apply to both network and local users / Can be applied to a folder or individual file.
Worms
Are memory-resident malware that replicate over network resources.
MT-RJ
mechanical transfer registered jack
MAC
media access control / mandatory access control
MAU
media access unit / media attachment unit
You are at a customer's site. The customer reports problems staying connected to the Internet, but does not provide any specific information. What should you do to gather more information on the problem?
Ask the customer to demonstrate the problem
Which of these options if the most appropriate handling of a customers password when troubleshooting requires it?
Ask user to type in the pw themselves
Which of the following is one of the functions provided by RADIUS and TACACS servers?
Authentication
Which of the following best describes the Principle of Least Privilege?
Assign users the least permission level required to do their jobs
RPO
recovery point objective
What is a remote tool that allows a user to ask for help from a technician or co-worker? A. Remote Desktop B. Remote Assistance C. Remote Credential Guard D. Telnet
B. Remote Assistance
CAPTCHA
Completely Automated Public Turing Test To Tell Computers and Humans Apart
RTO
recovery time objective
You are using remote desktop to troubleshoot a Windows 10 system. You would like to restart the computer with a command line. Which command would you use? A. Net use B. Taskkill C. Sfc D. Shutdown
D. Shutdown
If intending to reuse a storage device, transferring to a different user, which of the following processes would be best to perform?
Not E
Control
Not the apple equivalent of the Ctrl button
Which of the following threats uses personalized information in an attempt at obtaining information? A. Whaling B. Impersonation C. Spoofing D. Spear phishing
D. Spear phishing
RGB
red green blue
Which of the following threats uses personalized information in an attempt at obtaining information? A. Whaling B. Impersonation C. Spoofing D. Spear phishing
D. Spear phishing
popular linux distros
redhat/CentOS, SUSE, Debian/Ubuntu, Knoppix
A company has hired a new IT firm to manage its network switches and routers. The firm is geographically separated from the company and will need to able securely access the devices. Which of the following will provide the ability to access these devices? A. Telnet B. SSH C. RDP D. VNC
B. SSH
RISC
reduced instruction set computer
Which of the following is a utility used to back up OS X systems?
B. Time Machine
The following command can be used for turning off or restarting a Linux host.
shutdown
shutdown -h 17:30
shutdown at 5:30
shutdown -t 30
shuts the computer down in 30 seconds
Windows Desktop Gadgets were introduced in what system?
D. Windows Vista
SEC
single edge connector
SIMM
single in-line memory module
SSO
single sign-on
SCSI
small computer system interface
SCSI ID
small computer system interface identifier
SFF
small forma factor
Which firewall network profile is automatically enforced with no user intervention?
Domain
SOHO
small office/home office
SoDIMM
small outline dual inline memory module
Which of the following is required for membership in a Windows Active Directory (AD) domain (choose two)?
Computer account User account
UPS
uninterruptible power supply
What is the name of a Microsoft Windows feature that allows for encrypting entire drives?
BitLocker
BD-RE
Blu-Ray Disc rewritable
You run the *systeminfo* command on a Windows 7 computer. What will NOT be displayed?
Boot options
Which of the following do you make available first so that your network-based automated deployment can proceed with exclusive access to the installation volume?
Boot.wim
Which Linux command is used to change the ownership of a file or directory?
D. Chown
For a file-level backup, which of the following would be the best backup strategy? A. Daily full backups B. Daily full backups, weekly differential backups C. Weekly incremental backups D. Daily incremental backups, weekly full backups
D. Daily incremental backups, weekly full backups
A user is having issues using a new wireless mouse. The anti-malware program has identified the mouse driver as malware and prevents it from installing. Which Safe Mode option will help the user troubleshoot this issue?
D. Disable early launch anti-malware protection
An actor might sift through garbage, recycled material, and other items thrown out of an organization in an effort to find relevant information about the organization. What is this activity called?
D. Dumpster Diving
When cleaning a computer with compressed air to remove dust from the components, which protective gear item should computer technicians wear? A. Anti-static wristband B. Eye protection C. Gloves D. Dust Mask
D. Dust Mask
An employee is unable to view in-office network folders while working at home. Which of the following is the MOST likely cause of the problem? A. Untrusted software B. Outdated antivirus C. MDM policies D. Inactive VPN
D. Inactive VPN
Remote Assistance
The local user sends a request to another user on a remote computer inviting them to view or control their desktop.
Which of the following technologies is used by malicious employees to obtain user passwords? A. Man-in-the-middle B. Phishing C. Tailgating D. Shoulder surfing
D. Shoulder surfing
When configuring a system backup, it is recommended to store the backup on an internal storage device. This ensures the backup data does not get lost.
FALSE
When disposing of hardware storage devices, which of the following may you be required to obtain to ensure regulatory compliance for data security?
Certification of destruction
An incident has happened with a user's workstation. Several technicians have been investigating the problem and have used the system and tampered with possible evidence. Nothing has been documented. What has been compromised?
Chain of Custody
Following a network compromise, which of these terms describes your record of who was in possession of evidence at a particular time?
Chain of custody
In forensic procedures, a chronological record outlining persons in possession of an evidence is referred to as:
Chain of custody
In wireless networks, a situation where multiple channels share the frequency band causing interference and performance degradation for devices operating on channels that are too close to each other is known as:
Channel overlapping
Which of the following would be the best recommendation for a minimum password length?
At least 8 characters
APFS
Apple File System - used in macOS High Sierra or later which supports native file encryption
Finder
Apple equivalent of file explorer in Windows
You need to troubleshoot a driver issue. When windows 7 is booting, you press F8 to enter the Advanced Boot Options menu. Which option is *NOT* an option listed in the menu?
Automated system recovery
A technician is working at a help-desk form and receives a call from a user who has experienced repeated BSODs. The technician is scheduled to take a break just after the call comes in. Which of the following is the BEST choice for the technician to make? A. Politely ask the user to call back B. Ask another technician to take the call C. Troubleshoot the issue for the user D. Input the issue as a ticket and escalate to Tier 2 E. Put the user on hold and troubleshoot after the scheduled break
B. Ask another technician to take the call
A user's smartphone is making the camera shutter noise even when the user is not taking pictures. When the user opens the photo album, there are no new pictures. Which of the following steps should be taken FIRST to determine the cause of the issue? A. Uninstall the camera application B. Check the application permissions C. Reset the phone to factory settings D. Update all of the applications on the phone E. Run any pending OS updates
B. Check the application permissions
Your organization is updating the backup procedures to include an off-site backup location, in addition to the on-site backup. Which of the following is an example of an off-site backup location? A. A fireproof safe located away from the server room B. Cloud storage as a service C. A backup on a Network Attached Storage (NAS) server in the server room D. A tape backup in the vault in the server room
B. Cloud storage as a service
A network administrator wants to plan a major OS upgrade of the router, which acts as a default gateway in an organization. The administrator has documented the purpose of the change, scoped the change, and completed a comprehensive risk analysis. Which of the following is an important part of the change request process for which the administrator still must plan? A. inform management regarding the anticipated amount of downtime B. Document a backout plan to roll back changes to the router C. Configure a redundant data path to eliminate downtime D. Make the downtime window larger than actually anticipated
B. Document a backout plan to roll back changes to the router
Freeware is software permited to use at no cost. As such, license agreements are not applicable.
B. False
If copyrighted material is freely available for download, there will not be distribution or licensing terms for use of the material.
B. False
In order for a computer to be part of a domain, it must also be part of a workgroup.
B. False
Windows 7 Professional does not support domains, EFS, or offline files.
B. False
A department in an organization set up a proxy server to manage its Internet stage. A technician is configuring the Windows workstations to use the new proxy server. Which of the following Control Panel utilities should the technician use to configure the setting? A. Internet Options - Advanced B. Internet Options - Connections C. Internet Options - Security D. Internet Options - Content E. Internet Options - Privacy
B. Internet Options - Connections
A small business has an open WiFi network for employees but does not want customers to connect to the access point. A technician has been dispatched to address the business's concerns. Which of the following configuration settings should the technician change to satisfy the requirements of the business? (Select two.) A. Default SSID B. MAC filtering C. NAT D. QoS E. Signal strength F. Encryption
B. MAC filtering E. Signal strength
A SOHO technician recently moved some data from one server to another to increase storage capacity. Several users are now reporting they cannot access certain shares on the network. When the users attempt to access the shares, they get the following error: Access Denied. The technician confirms the users are all in the proper security groups and have the proper access, but they are still unable to access the shares. Which of the following are the MOST likely reasons for these issues? (Select two.) A. Administrative share permissions B. Mapped drives C. Group Policy hours restriction D. Denied write/delete permissions E. Disabled proxy settings
B. Mapped drives D. Denied write/delete permissions
Which of the following is an example of software that is distributed for anyone to use or alter?
B. Open-source software
Which task management tool do you select to view resource usage? A. Networking B. Performance C. Users D. Processes
B. Performance
A network administrator has given a technician documentation detailing the switchports the technician will need to patch in for a network upgrade. Which of the following documents did the network administrator MOST likely give to the technician? A. Process diagram B. Physical network diagram C. Fiber backbone diagram D. Logical topology diagram
B. Physical network diagram
Which of the following is described as a window that opens without user prompting and is intended to advertise a service, but may also deliver a malicious link.
B. Pop up
A SOHO user reports desktop applications are performing slowly, and no emails have been received all morning. A technician remotes in and determines Internet pages' load slowly or not at all, CPU performance is normal, and the local router can successfully ping. The remote connection drops periodically. Which of the following steps should the technician take NEXT to resolve the problem? A. Reboot into safe mode, uninstall the latest OS updates, and run a repair on the OS B. Update the antivirus software, run an antivirus scan, verify the browser settings, and check all email settings C. Reboot to BIOS setup, verify the TPM is enabled, and start a System Restore from safe mode D. Send a test email, open a command prompt to check the file system, and empty the browser cache
B. Update the antivirus software, run an antivirus scan, verify the browser settings, and check all email settings
You decide to edit the boot order for your Windows 8 computer using the *MSCONFIG* utility. To which file is this edit saved?
BCD
A technician has just finished installing a secondary OS on a workstation. After rebooting the computer, the technician receives the follow error: No OS found. The technician confirms the boot.ini file is correct. Which of the following is MOST likely causing this error? A. The computer has GRUB Legacy installed B. Windows Startup services are not running C. An incompatible partition is marked as active D. An unsupported version of Windows is installed
C. An incompatible partition is marked as active.
What piece of equipment protects connected devices from brownouts and also powers the device for a short time during blackouts? A. Generator B. A surge protector C. An uninterruptible power supply (UPS) D. A voltmeter
C. An uninterruptible power supply (UPS)
Joe, a customer, has informed a Tier 2 help desk technician that a computer will not boot up. After about ten minutes of troubleshooting, Joe is increasingly concerned and claims that the technician is wasting his time because he has already tried everything that has been suggested. Which of the following should the technician do? A. Since Joe is concerned about time, suggest calling back later when Joe has more time to troubleshoot B. Record the call and send it to the local intranet for future technicians to learn how to deal with calls like this one C. Ask more open-ended questions to see if the issue can be narrowed down in order to properly identify the issue and save time D. Inform the customer that there is a troubleshooting script that must be followed to get the issue resolved
C. Ask more open-ended questions to see if the issue can be narrowed down in order to properly identify the issue and save time
A client wants a technician to create a PC naming convention that will make the client's PCs easier to track and identify while in use. Which of the following naming convention formats should the technician follow? A. Domain name, location, IP address B. Domain name, location, asset ID C. Asset ID, MAC address D. Location, RFID
C. Asset ID, MAC address
A project team is organized to implement a new wireless solution for a school. The team has already done the network diagrams and knows the locations that will need to be addressed in the project. The team is in the process of creating a SOW for the project as a whole and needs to add the critical pieces to the SOW to complete it and move to the next stage. Which of the following would the project team MOST likely add to the SOW? A. Risk analysis B. Plan to change C. Backout plan D. Change board approvals
C. Backout plan
Ann, an employee at a company, calls the help desk to report issues logging on to a vendor's website. Joe, the technician, is able to log in successfully with his credentials before going to Ann's office. However, when he attempts to log in from Ann's office, Joe experiences the same issue. Ann asks Joe questions about the new software installed on the laptop from the pop-up notification. Which of the following are the NEXT steps Joe should take to resolve the issue? (Select two.) A. Ask Ann for her credentials to verify and log on to the vendor's website from Ann's laptop B. Verify Ann's laptop has the correct browser settings C. Check all browser cached files on Ann's laptop and log on to another vendor's website D. Attempt to log on to another vendor's website from Ann's laptop E. Ask Ann about the notification and review the installed programs F. Reinstall the browser, reboot the laptop, and check the vendor's website again.
C. Check all browser cached files on Ann's laptop and log on to another vendor's website E. Ask Ann about the notification and review the installed programs
A small office's wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network. Which of the following configurations MOST likely allowed the attack to take place? (Select two.) A. Guest network B. TKIP C. Default login D. Outdated firmware E. WPS F. WEP
C. Default login F. WEP
A small office's wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network. Which of the following configurations MOST likely allowed the attack to take place? (Select two.) A. Guest network B. TKIP C. Default login D. Outdated firmware E. WPS F. WEP
C. Default login F. WEP
Which of the following steps should a technician take FIRST to prevent an electrical hazard when repairing a PC? A. Put on an ESD strap B. Place components on an ESD mat C. Disconnect the power before servicing the PC D. Place the PC on a grounded work bench
C. Disconnect the power before servicing the PC
A manager requests remote access to a server after hours and on weekends to check data. The manager insists on using the server. Before granting the access, which of the following is the MOST important step a technician can take to protect against possible infection? A. Create a policy to remove Internet access from the server during off hours B. Set the local antivirus software on the server to update and scan daily C. Ensure the server is patched with the latest security updates D. Educate the manager on safe Internet browsing practices
C. Ensure the server is patched with the latest security updates
A technician needs to edit a protected .dll file but cannot find the file in the System32 directory. Which of the following Control Panel utilities should the technician use? A. System B. Display C. Folder Options D. Indexing Options
C. Folder Options
A technician is installing Windows 7 64-bit OS on a VM but keeps getting errors. The specifications for the malware are: . Two 1 GHz CPUs . 2GB of memory . 15GB hard drive . 800x600 screen resolution Which of the following should the technician do to resolve the problem? A. Increase the number of CPUs B. Increase the amount of memory C. Increase the amount of hard drive space D. Increase the screen resolution
C. Increase the amount of hard drive space
A technician is recycling PCs to be reused by a middle school. Which of the following methods is MOST appropriate for ensuring data has been removed from the PCs? A. Standard formatting B. HD drilling C. Low-level formatting D. HD partitioning
C. Low-level formatting
Ann, a user, is attempting to log in to her email service from a third-party email client on her phone. When Ann enters her usual username and password, she receives an error message saying the credentials are invalid. Ann then decides to reset her email password, but after the reset, the new credentials still do not work in the third-party email client. Which of the following settings or features is responsible for the problems Ann is experiencing? A. Full device encryption B. Account lock C. Multifactor authentication D. Strong password requirements
C. Multifactor authentication
A small business has an open wireless network so vendors can connect to the network without logging in. The business owners are concerned that a nearby company is connecting and using the wireless connection without permission. If the small business requires that the network remain open, which of the following configuration settings should be changed to address these concerns? A. Default SSID B. MAC filtering C. Power levels D. Content filtering E. Firewall
C. Power levels
An administrator is setting up a Windows terminal server. Which of the following settings should the administrator modify to increase server security? (Select two.) A. Change the default access port B. Enforce password complexity C. Put the terminal server into the router's DMZ D. Disable logon time restrictions E. Block all unused ports on the LAN smart switch F. Use the local client certificate for server authentication
C. Put the terminal server into the router's DMZ E. Block all unused ports on the LAN smart switch
An administrator is setting up a Windows terminal server. Which of the following settings should the administrator modify to increase server security? (Select two.) A. Change the default access port B. Enforce password complexity C. Put the terminal server into the router's DMZ D. Disable logon time restrictions E. Block all unused ports on the LAN smart switch F. Use the local client certificate for server authentication
C. Put the terminal server into the router's DMZ E. Block all unused ports on the LAN smart switch
Which of the following is a commonly exploited vulnerability to infect systems with malware?
C. Systems and antivirus software not updated regularly
What type of malicious code sneaks past security measures by masquerading itself as non-threatening?
C. Trojan Horse
You are navigating through directories pm a Windows computer using the command line. You would like to move to a different directory. Which command do you use? A. dir B. ren C. cd D. md
C. cd
Your computer is not resolving network computer names correctly. You need to clear the cache to remedy the problem and decide to use the command line to do so. Which command do you use? A. ipconfig /renew B. ipconfig /release C. ipconfig /flushdns D. ipconfig /all
C. ipconfig /flushdns
Security guards
Can be placed in front of and around a location to protect it.
An electrical fire has started in your server room. Which type of fire extinguisher should you use?
Class C
Stark, a user, is configuring screen lock in iOS as he is anxious about the security of the system, he wants to change his passcode for which he tapped *Turn Passcode On*, then he tapped *Passcode Options* as he wants to have a passcode of eight digits. Which of the following steps should he take *next* to further complete the process?
Click Change Passcode
If an application written for an earlier version of MS Windows doesn't run correctly, the operating system can emulate its own older version to allow a given program to work with newer hardware or software. The compatibility mode settings in Windows can be changed manually by right-clicking the program icon and:
Clicking on the Properties menu item, and then applying the required settings on the Compatibility tab
You are thinking about configuring a Data Loss Prevention (DLP) solution at work. This will help to prevent sensitive files from being distributed outside of the workplace. Which of the following is NOT a component of Data Loss Prevention (DLP)?
Client access license
Which of the following steps provide access to Windows Reliability Monitor?
Control Panel (Category view) -> System and Security -> Security and Maintenance -> Maintenance -> View reliability history / Control Panel (Icon view) -> Security and Maintenance -> Maintenance -> View reliability history
Which of the following steps in MS Windows allows to update/roll back the network adapter driver or disable/uninstall the device?
Control Panel (Icon view) -> Device Manager -> expand Network Adapters list -> right-click on the network adapter -> select Properties from the pop-up menu -> select the required action from the Driver tab / Windows Run dialog box -> type in devmgmt.msc + press Enter -> expand Network Adapters list -> right-click on the network adapter -> select Properties from the pop-up menu -> select the required action from the Driver tab.
What is the correct sequence of steps for accessing the manual configuration interface for IPv4 connections in MS Windows?
Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields.
Which of the following locations in MS Windows provide access to an automated printer troubleshooting tool?
Control Panel (Icon view) -> Troubleshooting -> Hardware and Sound -> Printer / Control Panel (Category view) -> System and Security -> Troubleshoot common computer problems -> Printer / Control Panel (Icon view) -> Devices and Printers -> right-click on a selected printer -> Troubleshoot.
Which of the following steps enable displaying protected system files in Windows 8/8.1/10?
Control Panel -> File Explorer Options -> View tab -> Advanced settings -> select Show hidden files, folders, and drives / Control Panel -> File Explorer Options -> View tab -> Advanced settings -> clear the checkbox next to Hide protected operating system files.
Which of the following steps enable displaying protected system files in Windows 7?
Control Panel -> Folder Options -> View tab -> Advanced settings -> clear the checkbox next to Hide protected operating system files / Control Panel -> Folder Options -> View tab -> Advanced settings -> select Show hidden files, folders, and drives
You need to locally install Windows 7 Ultimate on a new computer. Which installation method will you most likely use?
DVD
Which of the following answers describe(s) possible cause(s) of the "Missing operating system" error message displayed during system boot?
Damaged hard drive / BIOS does not detect the hard drive / System partition not set as active / Corrupt Master Boot Record (MBR).
Mobile device security has two principal challenges: portability and capacity. What does capacity refer to in this context?
Data storage
You work as a security administrator in an organization. You have saved some secret details of the organization on a magnetic hard drive. You want to destroy the drive to secure the details from getting leaked to any unauthorized person. Which of the following should you use to destroy the details in this situation?
Degaussers
The NIST (National Institute of Standards and Technology) Computer Security Incident Handling Guide identifies stages in an incident response lifecycle. Which of the below is concerned with reporting the incident to stakeholders?
Detection and Analysis
After determining the scope of a user's job, what is the next step in implementing the principle of least principle?
Determine the minimum set of privileges needed to perform the user's job
A user's Windows 10 PC is experiencing problems with a video card. The user states that it was working fine until a recent driver update. Which Control Panel applet would you use to roll back the video card driver?
Device Manager
You need to perform a backup on a Windows computer. You only want to back up those files that have changed or have not been previously backed up. You also do not want them to be marked as backed up. Which type of backup would you choose?
Differential
A user needs to download a file from a website. The site displays as unsecure in the web browser. Which of the following may be the problem?
Digital certificate Certificate Authority (CA)
According to the CompTIA's best practice procedures for malware removal, removing malicious software on a Windows-based system should be performed as the next step after:
Disabling System Restore
Which of the following would be of help in preserving the integrity of a digital evidence?
Disk imaging / Hashing.
Reliability Monitor
Displays a log of "system reliability" events
EFS
Encrypting File System - a windows feature that can encrpyt a folder or a file
What are the characteristics of TACACS+?
Encrypts the entire payload of the access-request packet / Primarily used for device administration / Separates authentication and authorization.
Which of the following would be the best malware-prevention method/tool?
End user education
An antivirus software is kept up to date via:
Engine updates / Virus signature updates
HFS Plus
Extended Hierarchical File System - the file system older macOS uses
If personal files, such as email, documents, or photos are lost or deleted, Windows System Restore can be used to recover such files. T or F
False
In NTFS, a folder or file moved from one location to another on the same volume inherits the permissions of its new parent folder. T or F
False
In NTFS, permissions inherited from a parent object (e.g. a folder or user group) take precedence over permissions applied directly to an object (explicit permissions). T or F
False
In Windows domain environment, the term "Home Folder" refers to a directory on a local PC where users can back up their data and files. T or F
False
In a differential backup strategy, restoring data from backup requires only a working copy of the last full backup. T or F
False
A user is trying a biometric device to gain access to a computer. The system is denying access. What is occurring?
False negative
Encrypting File System (EFS)
Feature of NTFS supports file and folder encryption.
Which of the following adversely affect performance of a magnetic hard drive?
File fragmentation / Excessive paging & disk thrashing / Insufficient amount of RAM.
Ten computers in your department need the BIOS updated, and it needs to be completed within a two-hour timeframe. What is the fastest way to accomplish the task?
Flash the BIOS
Martha, a Mac OS user, faced an issue, which required her to close an unresponsive app, which tool will you use to troubleshoot the issue?
Force Quit
You are accessing the Tools tab of the hard drive's properties dialog box on a Windows 7 computer. Which of the following is NOT a disk maintenance utility found there?
Format
You have a 3-TB drive on which you want to install Windows. How must you format the drive to have the operating system recognize the entire drive?
GPT
GPT
GUID Partition Table, part of EUFI, successor to MBR. Windows allows up to 128 partitions at 2TB each. It also has a back up copy for parition entries
Which of the following tabs of the system configuration settings is used to choose the type of startup for the next time the computer boots to troubleshoot system startup problems?
General
Which of the following tabs would you select in File Explorer -> Options to disable Quick Access?
General
Which of the following tabs would you select in File Explorer -> options to disable Quick Access?
General
Which of the following is considered to be a security concern when using a mobile device?
Geotagged images
GPO
Group Policy Objects - a windows policy in which a computer remotely installs an application from a network folder without any administrator intervention
Which of the following registry subtrees contains all the file association information to determine which application Windows should open whenever you double-click a file with a specific extension?
HKEY_CLASSES_ROOT
You have been troubleshooting a user's smartphone. Due to numerous applications freezing during use, you decide to restore the phone to factory defaults. What action will you be performing?
Hard resetting the device
What kind of general term is used to describe the process of securing a computer system?
Hardening
Which of the following is responsible for ensuring the integrity of the data (arrives unchanged) as it traverses the public Internet?
Hash algorithm
Which of the following is responsible for ensuring the integrity of the data (arrives unchanged) as it traverses the public internet?
Hash algorithm
Which of the following answers refers to the contents of a rainbow table entry?
Hash/Password
Examples of secure network protocols used for establishing VPN connections include:
IPsec / TLS
What includes the practices and procedures that govern how an organization will respond to an incident in progress?
Incident Management
You are implementing a disaster recovery plan. The plan includes backing up mission critical servers. Which of the following backup types will require the longest time to restore?
Incremental
You need to upgrade a Windows 7 Home Premium computer to Windows 8 Home Premium. What should you do prior to the upgrade?
Install the latest service pack
Which of the following is a basic variable type designed to store whole numbers?
Integer
You are modifying a script that automates a task on a computer. Which of the following basic data types is used for whole numbers?
Integers
Which of the following utilities in Windows provides access to configuration options of a built-in pop-up blocker?
Internet Properties (inetcpl.cpl)
Trojan Horse
Is a program (usually harmful) that is packaged as something else, function as backdoor applications.
User Account Control (UAC)
Is a solution to the problem of elevated privileges. In order to change important settings on the computer, such as installing drivers or software, administrative privileges are required.
mantrap
Is two sets of interlocking doors inside a small space, where the first set of doors must close before the second set opens.
An IT technician reports that he ran the *sfc* utility on a user's computer. Why would this utility be used?
It repopulates the dllcache folder when contents are corrupted
Which of the following terms refers to removing software restrictions imposed by Apple on its iOS operating system?
Jailbreaking
Which of the following authentication protocols can be used to enable SSO in Windows-based network environments?
Kerberos
Which of the following are examples of authentication possession (something you have) to support multifactor authentication?
Key fob and Smart card
Which of the following is an example of spyware?
Keylogger
Administrative Tools
Located in Control Panel in Windows 7, is a collection of predefined Microsoft Management Consoles
On a Windows domain, this tool can be used by system administrators to configure initial desktop environment (which may include mapping a network drive or setting up access to a shared printer) for a specific user.
Login script
Which of the following account management security measures narrows down a user's computer access to specified hours?
Login time restrictions
In order to ensure maximum security for your corporate owned mobile devices, which of the following should you make certain the device supports before you make your buying decisions?
MDM policy, Remote wipe and lockout policies
You suspect that a Windows 7 computer has been infected with a Trojan horse. You need to determine if any Trojan horses are loading at system startup and remove them. Which tool should you use to find out if any Trojan horses are being loaded at startup?
MSCONFIG
Which is a system utility that is specifically used to troubleshoot issues that can arise during system startup?
MSConfig
What utility is used to troubleshoot system problems ranging from hardware failures to problems with software and device drivers?
MSINFO32
MBSA
Microsoft baseline security analyzer
MSConfig
Microsoft configuration
MMC
Microsoft management console
DISM
Microsoft's Deployment Image Servicing and Management - a tool that reads the contents of a drive and writes the output to a .WIM format file.
Sysprep
Microsoft's System Perperation Tool - a utility to be run before imaging a disk to solve possible configuration problems
Which two password policy settings combine to make it impossible for users to quickly reuse their last password?
Minimum age and Enforce history
Which password policy setting prevents users from repeatedly changing their passwords to bypass the password history policy setting and get back to their original/preferred password?
Minimum password age setting
Which part of RADIUS is the device that users directly connect to that also relays all communication between users and the RADIUS server?
NAS (Network Access Server)
A user has connected to a second monitor to his Windows 7 Ultimate computer. The new monitor is detected. However, the dual-monitor configuration is not configured as he wants it. What should the user do to change the dual-monitor configuration of the monitors?
Navigate to Control Panel\Appearance and Personalization\Display\Adjust Resolution
What is the name of a Microsoft Windows feature that allows for user-based file level encryption?
New Technology File System (NTFS)
NTFS
New Technology File System - proprietary file system used exclusively with Windows
Which of the following is the correct PowerShell cmdlet to create a user object in Active Directory
New-AdUser
Michael runs a mobile devices repair business and is responsible for keeping up to date with all mobile devices. What is one of the top common software issues he can expect to see on a regular basis?
No Bluetooth connectivity
Which of the following is the system firmware responsible for hardware intitialization during the boot process?
Not A,D
What OS X tool is used to download new applications and fetch system updates and security patches?
Not B
What type of attack is described as targeting new vulnerabilities in an application, or making changes to an existing exploit which creates a new, unexpected signature?
Not B
Why is running a system in Safe Mode used as a troubleshooting malware remediation technique?
Not C
Security center bundles the controls for which of the following?
Not D
Windows 7 has a number of versions including:
Not D
You are a support specialist in an organization. As some problems persisted, you are performing the change management process. You are in the last step of the process in which you have to finalize the changes. You have tested the results of the change and enabled the necessary services. Which of the following will be your next step in this process?
Notify users and administrators
Sam is delighted with his new Android phone. However, one of the apps causes performance issues with the other apps almost every time he launches the app. What does he need to do with this app when this happens?
Perform a force stop
Which of the following actions should you take before repurposing a hard disk?
Perform low level format
Which of the following tools in Windows provide access to real-time performance data on CPU, RAM, hard drive, and network interface utilization?
Performance Monitor (perfmon.exe) / Resource Monitor (resmon.exe) / Task Manager (taskmgr.exe).
64 bit application files location
Program Files
32 bit application files location
Program Files(x86)
You need to view system log files on an Android device. How can this be accomplished?
Put the device in developer mode.
Which formatting type(s) would typically be performed by a user to reinstall an OS?
Quick format / Standard format / High-level format
While configuring a Windows 10 workstation for a new high priority project, you decide to mirror the operating system disk drive for redundancy. Which type of RAID (Redundant Array of Independent Disks) will you be configuring in Windows disk management?
RAID 1
Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is known as:
Ransomware
The share permissions on a shared Windows folder grant the user Read access and the local NTFS permissions grant the user Modify access. Which of the following are the effective user permission levels?
Read when accessing the share remotely / Modify when accessing the folder locally.
The share permissions on a shared Windows folder grant the user Full Control access and the local NTFS permissions grant the user Read access. Which of the following are the effective user permission levels?
Read when accessing the share remotely / Read when accessing the folder locally.
Which of the following answers refers to a common solution for troubleshooting user login problems on a Windows domain?
Rebuilding Windows profiles
Setup
Records events generated during installation
You are a PC technician. You have been provided with a Windows XP computer which is not booting and is affected by a malware which has compromised the operating system enough to prevent repair. Which of the following should you use in this situation?
Recovery Console
crontab -r
Removes jon from a scheduled list in cron
What should you do with the default admin and guest accounts on a Windows system?
Rename them
When users are found in possession of content restricted by your Acceptable Use and corporate compliance policies, which of the following should be part of your first response?
Reporting through proper channels, Data/device preservation and Problem identification
You remove the toner cartridge from a laser printer. what should you do with it?
Return it to the manufacturer for recycling
Which of the following actions in Windows allow to invoke the User Account Security (UAC) access control feature and run an application with administrator account permissions?
Right-click on an application icon -> select Run as administrator from the pop-up menu / In Windows Start menu press and hold Control + Shift keys -> Left-click on an application icon / Launch Windows Run dialog box (Windows logo key + R) -> type in the application's name -> press Control + Shift + Enter.
A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network is known as:
Rootkit
SSH
Runs on TCP port 22. A remote administration and file copy program that is flexible enough to support VPNs too (Using port forwarding).
Which of the following would not be applicable to an electrostatic discharge (ESD) workstation?
Safety goggles
Which of the following power issues can lead to a brownout?
Sag
Which of the following features of Bitlocker is unavailable without a TPM 2.0 module?
Secure Boot (preboot security)
Which of the following locations in Windows provides an interface for managing background applications?
Services (services.msc)
Which MS Windows utilities provide an interface for managing applications/services that might affect the system by slowing down the boot process?
Services (services.msc) / Task Manager (taskmgr.exe).
Print Management
Set properties and monitor local printers and manage print sharing on a network
Which of the following locations allows to configure display brightness levels on an Android device?
Settings -> Display -> Brightness level
Windows power plans manage how the computer is using power. The Balanced (recommended) power plan (used by default in certain Windows versions) scales the CPU performance based on its current utilization, which might have a degrading effect on system performance. If the system is running slow, one of the troubleshooting methods is to enable the High performance power plan or customize the current plan settings. In Windows, the power configuration settings can be found in:
Settings menu (Windows 8/8.1/10) / Power Options applet in Windows Control Panel.
Edith and Clarence are studying for their A+ exam and want to learn more about NTFS permissions versus share permissions on Windows 8 computers. Which of the following statements is FALSE?
Share permissions include Read, Write, Modify, and Full Control
What is a brownout?
Short lived drop in voltage
Which activity is covered under the confidentiality objective of the CIA triad, and involves examining someone's computer to steal confidential information?
Shoulder surfing
Installing mobile apps from trusted sources (e.g. Apple's App Store for iOS devices, or Google Play for Android devices) decreases malware-related security risks. T or F
Sideloading
The practice of installing mobile apps from untrusted sources (i.e. websites and app stores other than the official marketplaces) is called:
Sideloading
SNMP
Simple Network Management Protocol
Shareware
Software that you can install free of charge so that you can evaluate it for a limited period.
Which tool troubleshoots the startup process of an operating system and Windows services?
System Configuration
Which of the following best describes the activity of an intruder on the network who has changed the MAC address of their laptop to gain access to a network with MAC filtering enabled?
Spoofing
Which of the following is a complete application installer which requires a network connection to download the applications but once downloaded, the user has all the files that are needed?
Standalone
Which of the following user groups in Windows 7/8/8.1/10 can use most software and change system settings that don't affect other users or computer's security?
Standard Users
Which formatting type in Windows 7/8/8.1/10 prevents data recovery by overwriting the contents of hard drive sectors?
Standard format
You detect the humidity of your server room fluctuating towards the lower side. What could be the possible effect of low humidity in server room?
Static electricity
shoulder surfing
Stealing password or PIN, by watching the user type it.
A basic data type designed to contain text information is known as:
String
Daisy, a student, is assigned a task to design a webpage for XYZ organization. She has used the scripting language to manage the behavior of the webpage, while coding she has used a variable which is a sequence of alphanumeric characters. Which of the following data types has she used?
String
What are the characteristic features of a WPA/WPA2 Enterprise mode?
Suitable for large corporate networks / Requires RADIUS authentication server.
What is the correct sequence of steps for enabling automatic virtual memory management in MS Windows?
System applet in Control Panel -> Advanced system settings -> Performance -> Settings -> Advanced -> Virtual memory -> Change... -> enable Automatically manage paging file size for each drive / Windows Run dialog box -> type in sysdm.cpl + press Enter -> Advanced tab -> Performance -> Settings -> Advanced -> Virtual memory -> Change... -> enable Automatically manage paging file size for each drive.
end-of-life system
System for which vendors have dropped all support for security updates due to the system's age.
An exact copy of the entire state of a computer system is known as:
System image
Which of the following would be the easiest step to troubleshoot the Blue Screen of Death (BSoD) in MS Windows?
System restart
A security protocol designed to strengthen WEP implementations is known as:
TKIP
Which cipher is used by the Wi-Fi Protected Access (WPA) encryption standard to encrypt network traffic?
TKIP
It is NOT recommended to leave system files and folders unhidden.
TRUE
Reverting a malware-infected system back to a previous restore point does NOT guarantee that a system is free of malware.
TRUE
You have installed a new software application on a Windows 10 PC. The user has mentioned that the PC now runs very slow. Which utility can be used to view the resources that are being used by the new application?
Task Manager
A user wants to be able to restore his system files on his Windows 7 computer to an earlier point in time. He asks that you ensure that a restore point is created every day at the same time. Which tool should you use to schedule the restore point creation?
Task Scheduler
TKIP
Temporal Key Integrity Protocol
system partition
The active partition of the hard drive containing the boot record and the specific files required to start the Windows launch.
What must you know in order to allow an app through the Windows Defender Firewall?
The path to the executable
New Technology File System (NTFS)
The preferred file system, largely because it supports a much larger hard disk (up to 16 exabytes), long file names, and enhanced security.
kernel
The software component that provides the core set of operating system functions
According to your organization's data backup policy, you must keep track of the number and location of backup versions of the organization's data. What is the main purpose of this activity?
To ensure proper disposal of information
While performing your IT technician duties, you plan to use the USMT tool. Why should you use this tool?
To migrate user settings and files from one operating system to another
A type of critical file that a computer system depends on to operate properly is known as a system file. In Microsoft Windows, system files are hidden by default; they might also have Read-only attribute turned on to prevent accidental changes to the file contents. Windows system files can be permanently displayed in Windows Explorer (Windows 7), or File Explorer (Windows 8/8.1/10) after modifying file and folder settings in the Folder Options applet in Windows 7 Control Panel, or File Explorer Options applet in Windows 8/8.1/10 Control Panel. T or F
True
A type of software that performs unwanted and harmful actions in disguise of a legitimate and useful program is known as a Trojan horse. This type of malware may act like a legitimate program and have all the expected functionalities, but apart from that it will also contain a portion of malicious code that the user is unaware of. T or F
True
According to the CompTIA's best practice procedures for malware removal, user education should be the final step of the malware removal process. T or F
True
An MS Windows feature enabling automatic execution of code contained on a mounted drive is called AutoRun. Since disabling AutoRun decreases potential security risk related to the propagation of malware, Windows 7/8/8.1/10 have AutoRun disabled by default. T or F
True
Because the Guest account in MS Windows allows a user to log on to a network, browse the Internet, and shut down the computer, it is recommended to keep it disabled when it isn't being used. T or F
True
Event Viewer (eventvwr.msc) is a Windows utility for monitoring system health and troubleshooting problems with applications, operating system, and hardware. Event Viewer allows for browsing and managing event logs. The most common logs available in Event Viewer include Application, System, and Security logs. Depending on the severity of the event, Application and System logs display events that fall into three categories: Information, Warning, and Error. Information events denote normal operation of the system (such as starting and stopping of system services, or successful completion of some routine background tasks), warning events point to non-critical errors (for example when installation of a software component fails because the component is already on the system), error events point to serious issues, for example when programs stop responding and need to be closed by Windows. Security log contains events such as valid and invalid logon attempts, as well as events related to res. T or F
True
Hash functions allow for mapping large amounts of data content to a small string of characters. The result of hash function provides the exact "content in a nutshell" (in the form of a string of characters) derived from the original data content. In case there's any change to the data after the original hash was taken, the next time when hash function is applied, the resulting hash value calculated after content modification will be different from the original hash. T or F
True
In IT security, the term "Entry control roster" refers to a list of personnel allowed to access restricted areas. T or F
True
In IT security, the term "User authentication" refers to the process of proving user identity to a system. Authentication process can be based on different categories of authentication factors, including unique physical traits of each individual, such as fingerprints ("something you are"), physical tokens such as smart cards ("something you have"), or usernames and passwords ("something you know"). Additional factors might include geolocation ("somewhere you are"), or user-specific activity patterns such as keyboard typing style ("something you do"). Multi-factor authentication systems require implementation of authentication factors from two or more different categories. T or F
True
In MS Windows, a set of troubleshooting utilities (including tools for solving network-related problems) can be found in the Troubleshooting applet located in Windows Control Panel. T or F
True
In MS Windows, the attrib command is used to display or change file attributes. Some of the available options for this command include read-only (R), archive (A), system (S), and hidden (H). With attrib, the "+" symbol sets an attribute for a file, the "-" sign removes the attribute. T or F
True
In NTFS, a folder or file copied or moved from one location to another on a different volume inherits permissions of its new parent folder. T or F
True
NTFS permissions apply to both network and local users. NTFS permissions can be applied to a folder or individual file. T or F
True
One of the ways of confirming that a software application comes from a trusted source is the verification of its digital signature. A digitally signed software proves the identity of the developer and guarantees that the application code hasn't been tampered with since it was signed. The authenticity and integrity of the application's code can be verified by comparing results of a cryptographic hash function (original hash published by the application developer vs. hash obtained from a downloaded app).
True
One of the ways of confirming that a software application comes from a trusted source is the verification of its digital signature. A digitally signed software proves the identity of the developer and guarantees that the application code hasn't been tampered with since it was signed. The authenticity and integrity of the application's code can be verified by comparing results of a cryptographic hash function (original hash published by the application developer vs. hash obtained from a downloaded app). T or F
True
One of the ways to prevent data recovery from a hard drive is to overwrite its contents. The data overwriting technique is used by drive wipe utilities which might employ different methods (including multiple overwriting rounds) to decrease the likelihood of data retrieval. As an example, a disk sanitization utility might overwrite the data on the drive with the value of one in the first pass, change that value to zero in the second pass, and finally perform five more passes, overwriting the contents with random characters (the Schneier method). T or F
True
Physical and logical network diagrams provide visual representation of network architecture. A physical network diagram contains information on hardware devices and physical links between them. A logical network diagram describes the actual traffic flow on a network and provides information related to IP addressing schemes, subnets, device roles, or protocols that are in use on the network. T or F
True
Program Compatibility Troubleshooter is a Windows system utility used for automatic resolution of problems with older applications failing to run on newer versions of MS Windows. Program Compatibility Troubleshooter can be accessed via the Troubleshooting applet in Windows 7/8/8.1/10 Control Panel. Selecting the "Run programs made for previous versions of Windows" option in the Troubleshooting applet launches a guided tool for fixing problems with older programs installed on the current version of Windows.
True
Rainbow tables are lookup tables used to speed up the process of password guessing. T or F
True
Restarting a PC regularly might help in resolving slower performance issues as it shuts down all background processes and clears out the system memory. T or F
True
Restoring the entire system from a known good backup copy is the most reliable method for effective malware removal. T or F
True
Service Set Identifier (SSID) is another term for the name of a Wireless Local Area Network (WLAN). Wireless networks advertise their presence by regularly broadcasting the SSID in a special packet called beacon frame. In wireless networks with disabled security features, knowing the network SSID is enough to get access to the network. SSID also pinpoints the wireless router that acts as a Wireless Access Point (WAP). Wireless routers from the same manufacturer are frequently configured with default (well-known) SSID names. Since multiple devices with the same SSID displayed on the list of available networks create confusion and encourage accidental access by unauthorized users (applies to networks that lack security), changing the default SSID is a recommended practice. T or F
True
Some of the Windows services require other background applications to run. If a service fails to start, one of the ways for troubleshooting such problem is to check whether all required components for a given service are also up and running. In MS Windows, the list of all connected services for a given service can be found by launching the Services (services.msc) utility, right-clicking on a service, selecting Properties, and checking the Dependencies tab. T or F
True
The process of securing a workstation should involve keeping track of available system updates and patches. A single PC running Windows can be updated and patched via the Windows Update service. A similar type of service that enables centralized management and distribution of updates and patches to multiple Windows-based hosts in a corporate environment is known as Windows Server Update Services (WSUS). T or F
True
The term "Unified Threat Management" (UTM) refers to a network security solution, commonly in the form of a dedicated device (called a UTM appliance or a web security gateway), which combines the functionality of a firewall with additional safeguards such as URL filtering, content inspection, spam filtering, gateway antivirus protection, IDS/IPS functionality, or malware inspection. T or F
True
VPN connection types are divided into remote-access VPNs (used for connecting a computer to a network), and site-to-site VPNs (used for connecting networks). T or F
True
Windows Active Directory service allows for grouping users and computers into containers known as Organizational Units (OUs). An OU is the smallest unit to which system administrators can assign Group Policy settings to manage the configuration and use of accounts and resources within a given OU. T or F
True
You are a help desk technician for your company. Several hours into the day, you receive your first technical call from a customer. Your radio is on, and you are in the process of eating your lunch. What should you do?
Turn off your radio, stop eating, and listen to your customer
What applet in Settings will let you recover a failed installation?
Update and Security
You have recently installed the latest version of Microsoft Edge on a Windows 7 computer. You want to prevent fraudulent Web sites from gaining access to your personal information through Microsoft Edge. What should you do?
Turn on the SmartScreen filter
UEFI
Unified Extensible Firmware Interface
UTM
Unified Threat Management
URL
Uniform Resource Locator
A user reports that an app that has worked fine in the past will no longer launch. He indicates that he closed out the app and then turned off and back on the device. What should you suggest that he do NEXT?
Uninstall and then reinstall the app
Recently, you upgraded a user's computer to a dual-core processor. The user complains that an application's performance did not increase after the upgrade. You need to ensure that the application fully utilized the dual-core processor. What should you do?
Upgrade the application to a version that supports multithreading
You are a PC technician in an organization. You are working on a Windows computer and get to know that some necessary DLL files are missing. Which of the following will you do to troubleshoot the missing DLL files?
Use REGSRV32
Which of the following actions would let you recover from a system failure with the least administrative effort?
Use the Factory Recovery Partition
The VPN protocols are managed either by software running on a host or router, or on a specialized hardware appliance known as __________.
VPN concentrator
Which of the following is typically NOT a specified system requirement for a word processing software application?
Video card
Read/list/execute
View the contents of a file or folder or start a program
Reliability and Performance Monitoring
View the performance of the local computer
VDI
Virtual Desktop Infrastructure
You are installing a 32-bit application on a Windows 10 64-bit computer. What is the special environment where a 32-bit application runs on a 64-bit system?
WOW64 (Windows on Windows 64-bit)
Which wireless security solution should you choose?
WPA2 (AES)
You are installing a wireless access point. Rather than manually configure security settings, you decide to use the Wi-Fi Protected Setup (WPS) feature. Which security mechanism will be used for wireless access?
WPA2 (Wi-Fi Protected Access 2)
An optimal Wireless Access Point (WAP) antenna placement provides a countermeasure against:
War driving
You are creating a wireless network for your company. You need to implement a wireless protocol that provides maximum security while providing support for older wireless clients. Which protocol should you choose?
Wi-Fi Protected Access (WPA)
Which of the following steps provide access to configuration settings for Windows system visual effects, such as animations and shadow effects?
Windows Run dialog box -> type in sysdm.cpl + press Enter -> Advanced tab -> Performance -> Settings... -> Visual Effects / Windows Explorer (Windows 7) File Explorer (Windows 8/8.1/10) -> right-click on the Computer icon (Windows 7) This PC icon (Windows 8/8.1/10) -> Properties -> Advanced system settings -> Advanced tab -> Performance -> Settings... -> Visual Effects / Control Panel -> System applet -> Advanced system settings -> Advanced tab -> Performance -> Settings... -> Visual Effects.
Which of the following locations in MS Windows provide access to an interface containing options for configuring restore settings, managing disk space, and deleting restore points?
Windows Run dialog box -> type in sysdm.cpl + press Enter -> System Protection -> Configure. / Control Panel (Icon view) -> Recovery -> Configure System Restore -> Configure.
WSUS
Windows Server Update Services - a program on a server that allows the network administrator to approve updates for certain groups
Which of the following locations in Windows 8/8.1/10 provide access to an interface for managing startup applications?
Windows Settings (Settings -> Apps -> Startup) / Startup tab of the Task Manager utility.
Which of the following terms describes a large network of Windows-based PCs under single administration?
Windows domain
The process of planning and designing new WLANs for optimal performance, security and compliance typically involves:
Wireless site survey
A small business owner has five computers in the office that need to be networked. The users need to share files and print services and manage the administration of their shared resources. Which type of network would you recommend to the owner?
Workgroup
What is the name of a standalone malicious computer program that typically propagates itself over a computer network to adversely affect system resources and network bandwidth?
Worm
Device Manager
You can change device settings, update drivers, and resolve any known conflicts.
vi/vim
a text file editor in linux
ISO file
a file that contains all the contents of an optical disc
cluster
a group of sectors
shutdown -a
aborts command prompt shutdown
answer file
an xml text file that contains all the instructions a Windows Setup program would need to install and configure an OS with out any administrator intervention
dock
bottom of screen gives one-click access to favorite apps and files in macOS
chown
change ownership in linux
chmod
change permission modifiers in linux
chgrp
changes the group in linux
format D: /v: E
changes the name of drive D to drive E
df and du
check free space and report usage by directories and files
fsck
checks partition errors (partition should be unmounted before running this tool)
DBaas
database as a service
A low-level utility that can be used for creating/restoring filesystem backup copies in Linux is called:
dd
You need to create a hard drive image on a Linux computer. Which command should you use?
dd
You need to defragment a hard drive. When the defragmentation is complete, you want to view both the analysis and defragmentation reports. Which command should you run?
defrag /v
DMZ
demilitarized zone
DLT
digital linear tape
DRM
digital rights management
DSL
digital subscriber lin
DVD
digital versatile disc
DVD-RAM
digital versatile disc-random access memory
DVD-ROM
digital versatile disc-read only memory
DVD-R
digital versatile disc-recordable
DVD-RW
digital versatile disc-rewritable
DVI
digital visual interface
DVI-D
digital visual interface-digital
DMA
direct memory access
DAC
discretionary access control
Which of the following commands will mount the wim file E:\wims\install.wim to the mount directory E:\mount?
dism /mount-wim /wimfile:E:\wims\install.wim /index 2 /mountdir:E:\mount
ifconfig/iwconfig
displays the current state of network interfaces within linux
DDoS
distributed denial of service
EFS
encrypting file system
EULA
end user license agreement
EIDE
enhanced integrated drive electronics
EPP
enhanced parallel port
crontab -e
enters the editor
EPROM
erasable programmable read-only memory
ECC
error correcting code
ECP
extended capabilities port
exFAT
extended file allocation table
XGA
extended graphics array
EVGA
extended video graphics adapter/array
eSATA
external serial advanced technology attachment
FPM
fast page mode
FAT
file allocation table
FTP
file transfer protool
FDD
floppy disk drive
format D: /fs:NTFS /x
forces the volume to dismount
format D: /fs:EXFAT
formats D drive to an exfat file system
FSB
front-side bus
Which of the following commands are used on a Linux system to check a disk for errors?
fsck
Which application is used to factory reset an iOS device?
iTunes
A Linux command-line utility used for displaying and modifying network interface configuration settings is called:
ifconfig
IRP
incident response plan
ISA
industry standard architecutre
IR
infrared
ISDN
integrated services digital network
ICR
intelligent character recognition
IMEI
international mobile equipment identify
IMSI
international mobile subscriber identity
ISO
international organization for standardization
ICMP
internet control message protocol
MBR
master boot record
MSDS
material safety data sheet
KVM
kernel-based virtual machine keyboard-video-mouse
dir/t:w
list by last modified
dir/t:a
list by last time accessed
help netsat
lists all switches for the netstat command
netstat /?
lists all switches for the netstat command
dir/w/p
lists both wide format and one screen at a time
dir/p
lists files one screen at a time
dir/w
lists files using a wide format with no file details
LAN
local area network
Which of the following addresses can be pinged to test the functionality of a Network Interface Card (NIC)?
localhost / ::1 / 127.0.0.1
Component Services
located in Administrative Tools, enables you to register new server applications or reconfigure security permissions for existing services
Which of the following Linux commands is used to display information about files and directories contained within the current working directory?
ls
MAPI
messaging application programming interface
mATX
micro advanced technology extended
MicroDIMM
micro dual inline memory module
Which Windows utility command can be used to create a custom management console?
mmc
MDM
mobile device management
MPEG
moving picture experts group
MP3
moving picture experts group layer 3 audio
MP4
moving picture experts group layer 4
MFP
multifuncion products
MFD
multifunction device
MUI
multilingual user inteface
MIMO
multiple input multiple output
MIME
multipurpose internet mail extension
MIDI
musical instrument digital interface
What is the name of the Linux command used for renaming files and directories?
mv
Which of the following is a Linux command for transferring files/directories to a different directory?
mv
NTSC
national transmission standards comittee
NFC
near field commmunication
NetBEUI
network basic input/output extended user interface
NFS
network file system
NIC
network interface card
NNTP
network news transfer protocol
NTP
network time protocol
NAS
network-attached storage
NetBIOS
networked basic input/output system
NLX
new low-profile extended
NTFS
new technology file system
NTLDR
new technology loader
NiCd
nickel cadmium
compmgmt.msc
opens the Computer Management console from runline
OCR
optical character recognition
OLED
organic light emitting diode
OEM
original equipment manufacturer
PVA
patterned vertical alignment
PVC
permanent virtual circuit
PHI
personal health infromation
PS/2
personal system/2 connector
PSTN
public switched telephone network
A Linux command displaying an absolute path to (i.e. full filename of) the current working directory is called:
pwd
QoS
quality of service
control + C
quits a running program in command prompt
5
r-w
RF
radio frequency
RAM
random access memory
ROM
read-only memory
RTC
real-time clock
shutdown -r +10
reboot 10 minutes from now
RAID
rebundant array of independent (or inexpensive) discs
apt-get update
refresh the local database with information about the packages available from the repository
RJ-11
registered jack function 11
RJ-45
registered jack function 45
RAS
remote access service
RADIUS
remote authentication dial-in user server
RDP
remote desktop protocol
RIS
remote installation service
rm -r
removes a directory and its contents recursively
secure boot
restricts OS installation to trusted software
RMA
returned materials authorization
A command-line command in Linux used for deleting files and directories is known as:
rm
RIP
routing information protocol
Standby/Sleep Mode
saves current session to memory and put the computer into a minimal power state
hibernate mode
saves the current session to disk before powering off the computer
SLI
scalable link interface or system level integration or scanline interleave mode
chkdsk C: /r
scans and attempts to recover bad sectors on drive C
Ext2
second extended file system
SCP
secure copy protection
SD card
secure digital card
SFTP
secure file transfer protocol
SSH
secure shell
S.M.A.R.T
self-monitoring, analysis, and reporting technology
SATA
serial advance technology attachment
SAS
serial attached SCSI
DB-25
serial communications D-shell connector, 25 pins
DB-9
serial communications D-shell connector, 9 pins
SMTP
server mail transfer protocol
SP
service pack
SSID
service set identifier
weekday
sets the day of the week in cron in either numerical or text format
Which of the following answers refers to a script file type designed to be run in Unix command line?
sh
STP
shielded twisted pair
tasklist /svc
shows a list of services within each process
Resource Monitor
shows an enhanced version of the sort of snapshot monitoring provided by task manager
mm
specifies minutes past the hour in cron(0-59)
hh
specifies the hour in cron(0-23)
MM
specifies the month in numerical or text format in cron
format D: /a:512
specifies the size of allocation units
taskkill /im
specify image name to kill
SPGA
staggered pin grid array
SRAM
static random access memory
kill
stops a process using its Process ID
SAN
storage area network
ST
straight tip
Which of the following is a Linux command that allows to assume the identity of a different system user and execute commands with security privileges of that user account?
su
SIM
subscriber identity module
SC
subscription channel
A Linux command that temporarily modifies security privileges to allow an execution of a single command that requires root access permissions is called:
sudo
SXGA
super extended graphics array
SFC
system file checker
system protection tab
tab in system properties that provides option for system restore
image
template containing the OS and required software
TACACS
terminal access controller access-control system
taskkill /f /pid processid
terminates process without any user notification
multiboot
the capability for choosing between two or more operating systems to boot from when a computer is turned on. A separate partition is required for each operating system.
TDR
time domain reflectomeneter
bootsect
tool to copy code to make the parition bootable
diskpart
tool to setup partitions on a hard drive. Sets up active partition
TCP
transmission control protocol
TCP/IP
transmission control prptocol/internet protocol
TFTP
trivial file transfer protocol
UXGA
ultra extended graphics array
apt-get upgrade
update all packages with latest versions
UAC
user account control
UDF
user defined functions or universal disk format or universal data format
linux group commands
useradd, usermod, userdel
xcopy
utility that allows you to copy the contents of more than one directory at a time and retain the directory structure
VA
vertical alignment
Which of the following commands is used for invoking a text editor in Unix-like operating systems?
vi
VESA
video electronics standards association
VGA
video graphics array
BRAM
video random access memory
VLAN
virtual LAN
VFAT
virtual file allocation table - file system for linux
VMM
virtual memmory monitor - manages the memmory mappings and assignments
VNC
virtual network computer
VPM
virtual private network
VoIP
voice over internet protocol
VDC
volts DC
WUXGA
wide ultra extended graphics array
WPA2
wifi protected access 2
WPS
wifi protected setup
WINS
windows internet name service
WEP
wired equivalent privacy
WAP
wireless access protocol/wireless access point
WIFI
wireless fidelity