A+ 1002

Ace your homework & exams now with Quizwiz!

Which of the following is an MS Windows utility designed both for system administrators and for application developers

Component Services (dcomcnfg.exe

Which of the following locations provide direct access to the Device Manager applet in MS Windows? (Select 3 answers)

Computer Management utility in the Administrative Tools folder in Windows Control Panel Windows Run dialog box (after typing in devmgmt.msc and pressing Enter) Windows Control Panel

Which of the following answers describes the correct sequence of steps for accessing the Speed & Duplex settings of an Ethernet adapter in MS Windows

Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Speed & Duplex settings

The /r switch of the chkdsk command-line utility in Windows

Locates bad sectors and recovers readable information Fixes errors on the disk

Which of the following statements apply to Windows domains

Logging on to any computer on the Windows domain requires a single set of credentials Security policies and permissions on the Windows domain are administered centrally Windows domains are based on the Client-Server networking architecture

What is the name of a logical security access control method in which a 48-bit physical address assigned to each Network Interface Card (NIC) is used to determine access to the network

MAC address filtering

What is the application of No-eXecute bit (NX bit)?

Malware protection

Which of the following password policy settings prevents attackers using cracked passwords from gaining permanent access to a Windows workstation?

Maximum password age setting

Which password policy setting prevents users from repeatedly changing their passwords to bypass the password history policy setting and get back to their original/preferred password?

Minimum password age setting

Which of the Control Panel applets in Windows 8/8.1/10 can be used for checking basic information about the network connection status and setting up network connections?

Network and Sharing Center

A type of feature used by CPUs for isolating areas of memory to prevent the execution of code from non-executable memory locations is known as:

No-eXecute bit (NX bit)

Which of the following allows to hide extensions for known file types in Windows 8/8.1/10?

Open the File Explorer Options applet in Windows Control Panel, then select Hide extensions for known file types in the Advanced settings on the View tab

Which of the following tools in MS Windows is used to examine (both in real time and by collecting log data for later analysis) how programs that are run affect a computer's performance

Performance Monitor (perfmon.exe)

What are the characteristic features of RADIUS?

Primarily used for network access Combines authentication and authorization Encrypts only the password in the access-request packet

Which of the following allow for administering print devices in Microsoft Windows

Printers applet in Control Panel in Windows OSs prior to Windows 7 Devices and Printers applet in Control Panel in Windows 7 and newer Microsoft OSs Print Management utility in the Administrative Tools folder (not available in home editions of MS Windows)

Which of the following solutions is used for controlling network resources and assigning priority to different types of traffic

Quality of Service (QoS)

Which of the following provides access to Remote Assistance and Remote Desktop configuration settings in Windows?

Remote settings in the System applet in Windows Control Panel

A type of user interface that enables the execution of operating system commands is commonly referred to as

Shell

An email sent from unknown source disguised as a trusted source known to the message receiver is an example of

Spoofing social engineering

Which of the following provide access to virtual memory (a.k.a. paging file) configuration options in Windows? (Select 2 answers)

System applet in Control Panel -> Advanced system settings -> Performance -> Settings -> Advanced -> Virtual memory Windows Run dialog box -> type in sysdm.cpl + press Enter -> Advanced tab -> Performance -> Settings -> Advanced -> Virtual memory

Which of the following locations enable adjustments to the volume of sound in Windows 8/8.1/10? (Select 2 answers)

Windows Taskbar notification area Sound applet in Control Panel

Which of the statements listed below apply to Windows workgroups?

Workgroups typically consist of no more than twenty computers Logging on to any computer in the workgroup requires an account on that computer Each computer in the workgroup has its own security policy

Which of the following answers refers to a built-in MS Windows account with complete and unrestricted system access?

administrator

Which of the following is a package management system most often used on Debian and Debian-based Linux distributions

apt

Which of the following are disk storage types used with MS Windows?

basic dynamic

In MS Windows, a newly added drive is by default partitioned as a

basic disc

Which of the Apple software utilities enables installation of an alternative OS in a multiboot environment

boot camp

Which parameter of the cd command in Windows moves the command-line prompt one folder up in the directory tree

cd..

Which of the following commands in Windows Command Prompt changes the current directory to the root directory

cd\

Which Control Panel applet in Windows allows to manage usernames and passwords for websites, connected applications and networks?

credential manager

Which of the following Windows Command Prompt commands can be used to list all directory's files and subdirectories contained in the current directory?

dir dir*.*

Which of the following acronyms refers to software or hardware-based security solutions designed to detect and prevent unauthorized use and transmission of confidential information outside of the corporate network?

dlp

Which of the following can be used by system administrators to selectively block access to known malware sites?

dns configuration

An antivirus software is kept up to date via

engine updates virus signature updates

In the MBR partition style, each logical drive within the extended partition can be transformed into a bootable drive

false

Local Users and Groups (lusrmgr.msc) is a Microsoft Management Console (MMC) snap-in included by default in all editions of MS Windows. It is used to create and manage users and groups that are stored locally on a computer

false

Physical Address Extension (PAE), No-eXecute bit (NX bit), and Streaming SIMD Extensions 2 (SSE2) are mandatory CPU requirements for Microsoft Windows 7/8/8.1/10, therefore Windows 7/8/8.1/10 cannot be installed on computer systems that lack support for these features.

false

The Local Security Policy (secpol.msc) administrative tool in home editions of MS Windows can be used by system administrators to modify account and local policies, public key policies and IP security policies for a local host

false

The Security and Maintenance applet in Windows Control Panel provides access to Windows Firewall (Windows 7) / Windows Defender Firewall (Windows 8/8.1/10) configuration settings.

false

A Linux command-line command that enables searching files for lines containing a match to a given text pattern is called

find

A macOS file manager application is known as

finder

The /f switch of the chkdsk command-line utility in MS Window

fixes errors on the disk

An unresponsive application/process in macOS can be terminated with the use of:

force quit

For a newly added hard drive, this command allows to configure it with a file system so that Windows can store information on the disk

format

What kind of general term is used to describe the process of securing a computer system?

hardening

Which of the following firewall types would provide the best protection for an ingress/egress point of a corporate network?

hardware firewall network based firewall

Which of the following commands in Windows can be used to display help information related to a specific command-line utility

help [command name] [command name] /?

Which of the power-saving states in MS Windows uses the least amount of power?

hibernation

A security technician was asked to configure a firewall so that the protected system would not send echo reply packets. What type of traffic should be blocked on the firewall to accomplish this task

icmp

Examples of secure network protocols used for establishing VPN connections include

ipsec tls

Which of the following is a Linux command-line command used for configuring network interface parameters specific to the wireless communication

iwconfig

A password management system in macOS is known as

keychain

Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as

malware

What are the advantages of organizing hard drive space into multiple partitions

multiboot environment Separated disk space used for virtual memory Separation of user files from the operating system and application files

What is the name of the Linux command used for renaming files and directories

mv

Which of the following Command Prompt commands in Windows is used for listing a computer's connections to shared resources

net use

Which of the MS Windows command-line commands lists the user accounts for the computer

net user

Which of the following enable installation of an OS via network interface? (Select 2 answers)

netboot pxe

Which of the following CLI tools can be used for troubleshooting DNS-related problems

nslookup

A Linux command-line command allowing a user to change his/her own password is known as

passwd

Which user group in Windows (applies to Windows 7 and earlier versions) had rights and permissions that allowed its members to perform specific administrator-level tasks?

power users

Which of the following are examples of partition types?

primary logical extended

What is the name of a Linux command-line utility used for displaying statistics of running processes

ps

A Linux command displaying an absolute path to (i.e. full filename of) the current working directory is called

pwd

Which of the following terms refers to an example of crypto-malware?

ransomware

Which of the built-in options added in Windows 8 enables OS reinstallation without affecting the existing user profiles and settings

refresh

Which of the macOS features enables access to optical drive of another computer over a network

remote disc

The System Protection tab of the System Properties (sysdm.cpl) utility in Windows provides options for managing:

restore points

A command-line command in Linux used for deleting files and directories is known as

rm

Which of the following built-in macOS tools enables remote access to another Mac computer

screen sharing

Which of the following is the correct command for setting the time-out period of 60 seconds before powering off a Windows host

shutdown /s /t 60

Which of the following is a macOS system search utility

spotlight

Which of the following is a Linux command that allows to assume the identity of a different system user and execute commands with security privileges of that user account

su

A hidden file (or files) on the hard disk that Windows uses to hold parts of programs and data files that cannot be stored in RAM due to the insufficient memory space is called: (Select 3 answers)

swap file paging file virtual memory

An MS Windows system utility that allows to roll back system files and settings to an earlier point in time is called

system restore

Which of the answers listed below refers to the correct syntax for a Windows Command Prompt taskkill command that would allow to close notepad.exe by providing its imagename

taskkill /im notepad.exe

A security protocol designed to strengthen WEP implementations is known as

tkip

Windows Memory Diagnostic Tool (mdsched.exe) cannot be run inside Windows. This utility requires a system restart and is launched during next boot before loading the operating system

true

Which of the following can be used as an extension of RAM?

virtual memory paging file swap partition

Which of the following is a non-proprietary RDP alternative that enables control over another computer on the network with the use of a graphical user interface

vnc

Which of the following is a dedicated device designed to manage encrypted connections established over an untrusted network such as the Internet?

vpn concentrator

Which of the following is the best method to secure a small network lacking an authentication server?

wpa2-psk

Which of the Microsoft Windows command-line commands allow for copying multiple files or entire directory trees from one directory to another and for copying files across a network

xcopy robocopy

Which of the copy command switches suppresses the confirmation prompt displayed when Windows is about to overwrite the contents of an existing file

/y

What are the minimum system requirements for 32-bit (x86) version of Microsoft Windows 8/8.1?

1 GHz CPU with support for PAE, NX, and SSE2 1 GB of system RAM Microsoft DirectX 9 graphics device with WDDM 1.0 or higher driver 16 GB of free hard disk space

Which of the following answers describe the minimum system requirements for 32-bit (x86) version of Microsoft Windows 10?

1 GHz CPU with support for PAE, NX, and SSE2 1 GB of system RAM ( Your answer) Microsoft DirectX 9 graphics device with WDDM 1.0 or higher driver 16 GB of free hard disk space

What are the minimum system requirements for 64-bit (x64) version of Microsoft Windows 10?

1 GHz CPU with support for PAE, NX, and SSE2 2 GB of system RAM Microsoft DirectX 9 graphics device with WDDM 1.0 or higher driver 20 GB of free hard disk space

Which of the following are the minimum system requirements for 64-bit (x64) version of Microsoft Windows 8/8.1?

2 GB of system RAM Microsoft DirectX 9 graphics device with WDDM 1.0 or higher driver 20 GB of free hard disk space 1 GHz CPU with support for PAE, NX, and SSE2

Which of the following statements apply to the definition of a computer virus?

A self-replicating computer program containing malicious segment Requires its host application to be run to make the virus active Attaches itself to an application program or other executable component

Windows Task Scheduler (taskschd.msc) is a component of Microsoft Windows that provides the capability to schedule the launch of programs or scripts at pre-defined times or after specified time intervals. Which of the following locations contains the application icon shortcut used for launching the Task Scheduler MMC snap-in

Administrative Tools menu in Windows Control Panel

Which of the following locations in macOS provide access to multi-touch interface settings (a.k.a. Gestures)

Apple menu -> System Preferences... -> Mouse Apple menu -> System Preferences... -> Trackpad

Which of the following is a macOS disk maintenance tool

Disk Utility

Which of the following macOS utilities allows to create/restore a disk image

Disk Utility

Netstat is a command-line utility used for

Displaying active TCP/IP connections Displaying network protocol statistics

Which of the following allows to create a backup copy of the entire contents of a disk drive (which may include a pre-configured OS installation) and replicate the drive to a new computer

Drive imaging

Premium versions of the Microsoft OS contain a built-in component that enables encryption of individual files. This feature is known as

Encrypting File System (EFS)

What are the characteristics of TACACS+?

Encrypts the entire payload of the access-request packet Primarily used for device administration Separates authentication and authorization

Which of the following provides access to file/folder management settings in Windows 10?

File Explorer Options applet in Windows Control Panel

The Programs and Features Windows Control Panel applet can be used for: (Select all that apply)

Uninstalling applications Conducting repair installation of a malfunctioning program Adding/removing Windows components Managing installed updates

Which of the following options is not part of the General tab of the Folder Options applet (Windows 7) / File Explorer Options applet (Windows 8/8.1/10) in MS Windows?

Visibility of hidden files, folders, or drives


Related study sets

American Red Cross Basic Life Support

View Set

Policy Riders, Provisions, Options and Exclusions

View Set

Ch 5s- Decision Theory LearnSmart

View Set

Week 2, Day 6 - 질문 (question)

View Set

NADN 165 OB - Exam 2, Chapters 9-16

View Set

cog exam 2 + 1 (review 1-4 and 4-9)

View Set

PRECISION NUTRITION Introduction What is good nutrition?

View Set