a+ prac exam 1102 JD #2
Two weeks ago, David's computer was infected with a virus. A technician performed the malware removal process on the machine, removed the infection from the system, update the system's software, and closed the trouble ticket. Now, many of the symptoms have returned on David's computer. Which of the following steps of the malware removal procedure did the technician MOST likely forget to perform as part of the original remediation? Update the anti-virus software and run a full system scan Enable System Restore and create a restore point in Windows Quarantine the infected system by removing its network connectivity Educate the end-user about how to avoid malware in the future
Educate the end-user about how to avoid malware in the future
Which of the following types of mobile device screen locks uses biometrics to securely unlock the device? pick all that apply FaceID TouchID Passcode Swipe
FaceID & TouchID
Which of the following types of software CANNOT be updated via the Windows Update program? Critical fixes Firmware updates Driver updates Security patches
Firmware updates
You are going to replace a power supply in a desktop computer. Which of the following actions should you take FIRST? Remove any jewelry you are wearing Verify proper cable management is being used Use a grounding probe to discharge the power supply Dispose of the old power supply
Remove any jewelry you are wearing
Which of the following would a technician use when trying to find the exact steps required to install a custom software package within their organization? SOW AUP SOP MSDS
SOP standard operating procedure
Which file system type is used by default when installing macOS on a modern workstation? HFS+ FAT32 APFS NTFS
The Apple file system (APFS)
Which of the following pairs of authentication factors should you choose to meet the requirements associated with MFA? Thumbprint and retina scan Username and pin Username and password Thumbprint and password
Thumbprint and password
You are configuring a Windows 10 Professional workstation to connect to the Dion Training domain. To provide additional security to its users, Dion Training requires that all uses route their internet traffic through a server located at 10.0.0.15 for inspection before it is sent to the internet. Once inspected, the server will route the traffic to the WAN router whose IP is 10.0.0.1. Which of the following settings should be configured on the workstation to achieve this? Under Internet Options, configure the proxy server address as 10.0.0.15 Under Internet Options, configure the workstation's gateway as 10.0.0.15 Under Network Adapter, configure the proxy server address as 10.0.0.15 Under Network Adapter, configure the workstation's gateway as 10.0.0.15
Under Internet Options, configure the proxy server address as 10.0.0.15
You have just installed a new photo-sharing social media app on your smartphone. When you try to take a photo with the app, you hear the picture-taking sound. Unfortunately, when you check the app and your photo album, you cannot find any new pictures. Which of the following actions should you take to fix this issue? Perform a firmware update Update all the smartphone's apps Uninstall and reinstall the app Verify the app has the correct permissions
Verify the app has the correct permissions
Your coworker is creating a script to run on a Windows server using PowerShell. Which of the following file formats should the script use? .bat .ps1 .py .sh
.ps1
What is the minimum amount of RAM needed to install Windows 10 on a 32-bit system? 1 GB 8 GB 4 GB 2 GB
1 GB
What is the minimum processor required to install Windows 10 (x86) on a device? 1 GHz single-core processor 2 GHz single-core processor 2 GHz dual-core processor 1 GHz dual-core processor
1 GHz single-core processor
Dion Training uses DHCP to assign private Class A IP addresses to its Windows 10 workstations. Which of the following IP addresses is a Class A address? 10.5.34.15 172.16.13.12 169.254.125.154 192.168.2.14
10.5.34.15
A network administrator has set up a firewall and set up only three allow rules so that traffic can be sent over ports 21, 110, and 25. Next, they added a final rule of "deny any any" to the end of the ACL to minimize the attack surface and better secure the network. Unfortunately, now the administrator is receiving complaints from users that they cannot access any web pages using their URLs, such as DionTraining.com. Which of the following should the administrator do to correct this issue? Add a rule to the ACL to allow traffic on ports 139 and 445 Add a rule to the ACL to allow traffic on ports 80 and 53 Add a rule to the ACL to allow traffic on ports 110 and 389 Add a rule to the ACL to allow traffic on ports 143 and 22
Add a rule to the ACL to allow traffic on ports 80 and 53. ACL = Access Control List
You have decided that you wanted to install a second operating system on your computer. After installing the OS and rebooting the computer, you see the "Operating System Not Found" error on your display. You verify that the boot.ini file is configured properly, but the error still appears. What is MOST likely causing this error? Windows Startup services are not properly running An unsupported version of Linux is installed The MBR bootloader was installed accidentally An incompatible partition is marked as active
An incompatible partition is marked as active
You are working on upgrading the memory of a laptop. After removing the old memory chips from the laptop, where should you safely store them until you are ready to reuse them in another laptop? Ziplock bags Antistatic bag Manila envelopes Cardboard box
Antistatic bag
You are working on a customer's computer when your cellphone begins to ring. What should you do? Apologize to the customer and send the call to voicemail Answer the phone while continuing to work on the customer's computer Ignore the phone and let it continue ringing until it goes to voicemail Apologize to the customer and answer the phone
Apologize to the customer and send the call to voicemail
Which mobile device strategy is most likely to introduce vulnerable devices to a corporate network? MDM CYOD BYOD COPE
BYOD People can bring their personal devices to the corporate network, and their devices may contain vulnerabilities that could be allowed to roam free on a corporate network.
Will, an IT technician, has been tasked with investigating a recent Windows upgrade and make a recommendation as to whether the company should upgrade its workstations. He notices that the upgrade will not work with a drawing program that is key to the Drafting Department. He asks the Drafting Department if they would consider using a different drawing program. Which upgrade consideration is represented by his conversation with the Drafting Department? Third-party drivers Hardware compatibility Backup files and user preferences Application support
Backup files and user preferences
Your company wants to increase the security of its server room. Which TWO of the following should they install to protect the server room's contents? Strong passwords Bollard Privacy window shades Badge reader Cable lock Biometric lock
Badge reader & Biometric lock
Which type of security measure is used to control access to an area by using a retina scan? Optical reader Biometric Cipher locks Two-factor authentication
Biometric
An employee at Dion Training complains that every time airplane mode is enabled on their laptop, their external mouse and headphones stop working. Which of the following technologies is being disabled by airplane mode and likely causing the issues experienced by this user? Wireless Cellular GPS Bluetooth
Bluetooth
Which of the following physical security controls would be the most effective in preventing an attacker from driving a vehicle through the glass doors at the front of the organization's headquarters? Bollards Intrusion alarm Access control vestibule Security guards
Bollards
A cybersecurity analyst notices that an attacker is trying to crack the WPS pin associated with a wireless printer. The device logs show that the attacker tried 00000000, 00000001, 00000002 and continued to increment by 1 number each time until they found the correct PIN of 13252342. Which of the following type of password cracking was being performed by the attacker? Dictionary Brute-force Rainbow table Hybrid
Brute-force
A home user brought their Windows 10 laptop to the electronics store where you work. They claim their computer has become infected with malware. You begin troubleshooting the issue by first pressing the power button, and the laptop loads properly without any issues. When you open Microsoft Edge, you notice that multiple pop-ups appear almost immediately. Which of the following actions should you take NEXT? Quarantine the machine and report it as infected to your company's cybersecurity department for investigation Document the pop-ups displayed and take a screenshot Clear the browser's cookies and history, enable the pop-up blocker, and scan the system for malware Reinstall or reimage the operating system
Clear the browser's cookies and history, enable the pop-up blocker, and scan the system for malware
A programmer is writing a script to calculate the disk space needed to perform a daily backup. The programming wants to document his script so that other programmers can understand what his logic was when he wrote it. Which of the following should he use? Comment Constant Variable Loop
Comment
Samuel's computer is taking a very long time to boot up, and he has asked for your help speeding it up. Which TWO of the following actions should you perform to BEST resolve this issue with the least amount of expense? Terminate processes in the Task Manager Defragment the hard drive Replace the hard drive with an SSD Install additional RAM Remove unnecessary applications from startup Perform a Disk Cleanup
Defragment the hard drive & Remove unnecessary applications from startup. key word here is booting up. these two are the best options to speed that process up
Your organization has recently suffered a data breach due to a server being exploited. As a part of the remediation efforts, the company wants to ensure that the default administrator password on each of the 1250 workstations on the network is changed. What is the easiest way to perform this password change requirement? Create a new security group Utilize the key escrow process Deploy a new group policy Revoke the digital certificate
Deploy a new group policy. GPOs can include many settings related to credentials, such as password complexity requirements, password history, password length, and account lockout settings. You can force a reset of the default administrator account password by using a group policy update.
You are troubleshooting a computer that is not producing any sounds through its speakers. Which of the following tools should you use to troubleshoot this workstation? Performance monitor Device manager RDS Task scheduler
Device manager
Which of the following Control Panel sections would allow a technician to add or remove an external scanner from a Windows 10 computer? Programs and Features Devices and Printers Device Manager System
Devices and Printers
An attacker is using a word list that contains 1 million possible passwords as they attempt to crack your Windows password. What type of password attack is this? Brute-force Rainbow table Hybrid Dictionary
Dictionary
Which of the following types of backups only copies data modified since the last full backup? Differential Incremental Synthetic Full
Differential
A computer has been performing slowly. During your troubleshooting, you notice that the Task Manager shows the processor is utilizing 90-100% of the system resources immediately after completing the boot-up process. Which of the following actions should you take? Remove a recently added hardware device Disable any unneeded applications configure to automatically startup Verify that disabling one service has not affected others Uninstall and reinstall the applications
Disable any unneeded applications configure to automatically startup
You are troubleshooting a Windows 10 laptop that is infected with malware. You have already identified the type of malware on the laptop. What should you do NEXT? (Select THREE) Disconnect the laptop from the network Educate the end user Disable System Restore in Windows Update the anti-malware software Enable System Restore in Windows Schedule scans and run system updates
Disconnect the laptop from the network, Disable System Restore in Windows, Update the anti-malware software
You have been asked to replace a computer's hard drive. Which of the following steps should you take FIRST to prevent an electrical hazard while working on the computer? Place the computer and its components on an ESD mat Disconnect the power before servicing the computer Connect an ESD strap to yourself to prevent shock Place the computer on a grounded workbench
Disconnect the power before servicing the computer
Which of the following tools should you utilize to ensure you don't damage a laptop's SSD while replacing it? Latex gloves Antistatic bag Air filter mask ESD strap
ESD strap
What does the command "shutdown /h" do on a Windows workstation? Enter hibernation mode Shutdown the workstation Log off the workstation Reboot the workstation
Enter hibernation mode
Dion Training is building a new computer for its video editor to use. The new computer will use an octa-core Intel processor, 3 TB of DDR4 memory, and a RAID 0 with two 4 TB SSDs for optimal performance. Which of the following editions of Windows 10 would support all of this computer's memory properly? Education Home Pro Enterprise
Enterprise
Dion Training has configured Windows Defender Firewall on all of its corporate Windows 10 laptops. When connected to a public network, the firewall has been configured to allow only inbound connections that match an existing rule and to only allow outbound connections that do match an existing rule to achieve the highest level of security. What type of security posture has Dion Training implemented? Implicit allow for inbound, implicit allow for outbound Explicit allow for inbound, implicit allow for outbound Implicit allow for inbound, explicitly allow for outbound Explicit allow for inbound, explicit allow for outbound
Explicit allow for inbound, explicit allow for outbound. Explicit allow refers to a security posture where the system will only allow an item to traverse the firewall if the traffic matches an existing rule. Implicit allow refers to a security posture where the system will allow all traffic to traverse the firewall unless there is a specific rule to prevent it.
You have just installed a second monitor for a bookkeeper's workstation so they can stretch their spreadsheets across both monitors. This would essentially let them use the two monitors as one combined larger monitor. Which of the following settings should you configure? Resolution Color depth Refresh rate Extended mode
Extended mode
Madison is trying to open up her anti-malware solution to run a full system scan because she suspects her computer has become infected. When she attempts to run the tool, an error of "Access denied" is received. What security issue is MOST likely occurring? Renamed system files Disappearing files File permission change Rogue anti-virus
File permission change
Jason is building a new workstation for his son to utilize when writing reports for school. The new computer will have an Intel x86 processor, 3 GB of memory, and a 256 GB SSD. Which of the following editions of Windows 10 would support this workstation at the lowest cost? Enterprise Pro for Workstations Home Pro
Home
A user is complaining about slow data speeds when they are at home in a large apartment building. The user uses Wi-Fi when they get home, and the device works fine on other wireless networks they connect to. Which of the following actions should the user take to increase their data speeds? Enable MAC filtering on their WAP Increase the Wi-Fi signal being transmitted by their WAP Turn off Wi-Fi and rely on their cellular data plan Upgrade to a new smartphone
Increase the Wi-Fi signal being transmitted by their WAP
A corporate workstation was recently infected with malware. The malware was able to access the workstation's credential store and steal all the usernames and passwords from the machine. Then, the malware began to infect other workstations on the network using the usernames and passwords it stole from the first workstation. The IT Director has directed its IT staff to develop a plan to prevent this issue from occurring again. Which of the following would BEST prevent this from reoccurring? Install a host-based intrusion detection system on all of the corporate workstations Monitor all workstations for failed login attempts and forward them to a centralized SYSLOG server Install an anti-virus or anti-malware solution that uses heuristic analysis Install a Unified Threat Management system on the network to monitor for suspicious traffic
Install an anti-virus or anti-malware solution that uses heuristic analysis. The other options might be able to monitor and detect the issue but not stop it from spreading, making them not the best at stopping this from reoccurring (which is what the question is asking). heuristic analysis will detect the issue and stop it from spreading throughout the network.
Which of the following data types would be used to store the number 21? Floating point Integers String Boolean
Integers
A home user brought their Windows 10 laptop to the electronics store where you work because they suspect it has a malware infection. Which of the following actions should you perform FIRST? Disable System Restore Run Windows Update Investigate malware symptoms Enable System Restore
Investigate malware symptoms
A new corporate policy dictates that all access to network resources will be controlled based on the user's job functions and tasks within the organization. For example, only people working in Human Resources can access employee records, and only the people working in finance can access customer payment histories. Which of the following security concepts is BEST described by this new policy? Least privilege Blocklists Permission creep Directory permissions
Least privilege
A programmer is writing a script to display all the numbers from 1 to 100 to the screen. Which of the following should they use in their script? Constant Comment Branch Loop
Loop
What type of structure is a "Do While" in scripting? Constant Variable Loop Branch
Loop
An employee's inbox is now filled with unwanted emails after their email password had been compromised last week. You helped them reset their password and regain access to their account. Many of the emails are coming from different email addresses such as @yahoo.com, @gmail.com, and @hotmail.com. Which of the following actions should the user take to help reduce the amount of spam they receive? Create a domain-based email filter Click the unsubscribe button of each email Establish an allow list of trusted senders Mark each email as spam or junk
Mark each email as spam or junk
Which of the following MacOS features allows you to use multiple desktops or spaces on a single system? Finder Dock Mission Control Boot Camp
Mission Control
Which type of antivirus scan provides the best protection for a typical home user? Weekly scheduled scans Safe mode scans On-access scans Daily scheduled scans
On-access scans. a type of antivirus scan where the AV software intercepts operating system calls to open files to scan the file before allowing or preventing the file from being opened.
A user has asked you for a recommendation on which word processing software they should install. There are four different software packages they are considering, and each uses a different licensing type. The user states they do not want to pay for the software. Which of the following would MOST likely be the best option for them? Personal Enterprise Corporate Open-source
Open-source
You are troubleshooting a computer that is operating slowly. Which of the following tools should you use to troubleshoot this workstation? DxDiag Performance monitor Task scheduler Device manager
Performance monitor
Jack has asked you for a recommendation on which word processing software they should install. There are four different software packages they are considering, and each uses a different licensing type. Jack states he wants to get a copy of Microsoft Word so their son can create reports for school. Which of the following would MOST likely be the best option for them? Business Personal Enterprise Open-source
Personal
You have submitted an RFC to install a security patch on all of your company's Windows 2019 servers during the weekly maintenance window. Which of the following change request documents would describe how the installation of the change will be performed during this maintenance window? Scope Purpose Risk analysis Plan
Plan
Your company is concerned about the possibility of power fluctuations that may occur and cause a small increase in the input power to their server room. What condition is this known as? Power spikes Power failure Power surge Under-voltage event
Power surge
When using an MBR, which of the following types of partitions can only have up to four partitions? Swap Logical Extended Primary
Primary
You have decided to have DNA genetic testing and analysis performed to determine your exact ancestry composition and possibly find some lost relatives through their database. Which of the following types of data should this be classified? PHI PII IP CUI
Protected health information (PHI)
Which mitigation provides the best return on investment by mitigating the most vulnerable attack vector in an enterprise network? Provide end-user awareness training for office staff Remove unneeded services running on the servers Update all antivirus definitions on workstations and servers Enable biometrics and SSO for authentication
Provide end-user awareness training for office staff
Which type of authentication method is commonly used with physical access control systems and relies upon RFID devices embedded into a token? HOTP Smart cards TOTP Proximity cards
Proximity cards
The video editor at Dion Training is having issues with her workstation. The workstation is running Windows 10 and is failing to boot up properly. A technician wants to replace the existing operating system files with a new copy of the same version. The technician has been told to ensure the user's data and applications are not modified or deleted during the upgrade or installation. Which types of upgrades or installations should the technician use? Refresh installation In-place upgrade Repair installation Clean install
Repair installation. a type of installation that attempts to replace the existing version of the operating system files with a new copy of the same version. A repair installation will only affect the system files and not any of the user's settings, customizations, or applications.
You recently built a new gaming PC for a customer. The system has an octa-core 64-bit processor, 32 GB of DDR4 RAM, 1 TB SSD, a PCI x16 video card with 8 GB of RAM, and Windows 10 Pro (x86) installed. When you turn on the system, you notice that Windows only recognizes 3.5 GB of RAM. Which component should be upgraded to correct this issue? Set the processor to VT-enabled in the BIOS Replace the 32 GB of DDR4 RAM with DDR5 Replace the 1 TB SSD with a 4 TB 7200 RPM HDD Replace the OS with Windows 10 Pro (x64) edition
Replace the OS with Windows 10 Pro (x64) edition. Since the Windows 10 edition installed was for an x86 system, known as a 32-bit system, it will not recognize any RAM over 3.5 GB.
Susan is installing several updates on a Windows computer. Nine of the updates were installed without any issues, but one update produced an error and failed to install. Susan restarts the computer as part of the troubleshooting process, and the computer automatically attempts to install the failed update again. Again, the update fails to install. What should Susan do NEXT? Manually download and install the failed update Download the update from a third-party website like Source Forge and install it Research the error number for the failed update and determine if there is a known issue with this update Review the Event Viewer to determine the cause of the failure
Research the error number for the failed update and determine if there is a known issue with this update
Which of the following remote access protocols should you use to connect to a Linux server securely over the internet? RDP Telnet SSH FTP
SSH (Secure Shell)
Jason's company issued him an old 2018 laptop with an internal hardware security key that he uses to connect to his office network over a VPN while traveling. Without this laptop, Jason cannot access his company's internal servers, email, or share drive files. The Windows 10 laptop is extremely slow, and the screen recently cracked and needs to be replaced. When Jason returns to the company's headquarters, the company will provide him with a new laptop due to the broken screen. Until then, he is working out of his hotel room during a 45-day business trip and needs to continue using this laptop. Jason brings the laptop to the computer store you work at and asks for your assistance. Which of the following do you recommend? Sell him an external 15" tablet/monitor to connect to the laptop as a workaround Replace the display and charge him for the parts/installation
Sell him an external 15" tablet/monitor to connect to the laptop as a workaround
Dion Training wants to implement a new wireless network using WPA3 in their offices. Which of the following features of WPA3 is used to provide a password-based authentication using the dragonfly handshake instead of the older WPA 4-way handshake? AES GCMP SAE Enhanced open Management protection frames
Simultaneous Authentication of Equals (SAE) is a password-based authentication and password-authenticated key agreement method used in WPA3 that replaced the 4-way handshake used in WPA-based wireless networks. The SAE handshake is also known as the dragonfly handshake.
Which of the following allows a user to save their current session to memory and put a Windows 10 computer into a minimal power state? Lock Hibernate Sleep Shutdown
Sleep
Tamera and her husband are driving to the beach for the weekend. While her husband drives, she is using her iPhone to browse Facebook. Her phone shows only 1 bar of 3G signal in the current location. She can make and receive calls, but Facebook is refusing to load her news feed. Which of the following is MOST likely the problem? The data speeds are insufficient with only one bar of signal The smartphone has been infected with a virus The baseband firmware needs to be updated The cellular radio cannot connect to the cellphone towers
The data speeds are insufficient with only one bar of signal
Jason took home a company-issued Windows 10 laptop home to do some work. He successfully connected it to his home's wireless network and verified he could access the internet and browse his favorite websites. Unfortunately, Jason cannot access any of the network's shared files from his home network's media server. Which of the following may be why Jason cannot access the network shares in his home network? The laptop's DNS configuration is not properly setup The laptop has an IP conflict The laptop's gateway is not properly configured The laptop must join the network as private
The laptop must join the network as private
Sarah is installing Windows 10 (64-bit) in a virtual machine. The installation is continually failing and producing an error. She has configured the virtual machine with a dual-core 950 MHz processor, 4 GB of memory, a 64 GB hard drive, and a 1280 x 720 screen resolution. Which item in the virtual machine should be increased to fix the installation issue experienced? The amount of RAM is insufficient The amount of storage space is insufficient The screen resolution is insufficient The processor is insufficient
The processor is insufficient
Which type of installation would require an answer file to install the operating system? Upgrade Repair Unattended Clean
Unattended
Which of the following is the BEST way to regularly prevent different security threats from occurring within your network? Business continuity training Penetration testing User training and awareness Disaster recovery planning
User training and awareness
Which of the following open-source remote access tools allows users to connect to their desktop remotely, see what is on their screen, and control it with their mouse and keyboard? SSH Telnet VNC RDP
VNC (virtual network computing)
Jason is out of town on a business trip and needs to access the share drive on his company's corporate network. Which of the following types of network connections should he use to access the share drive from his hotel room? Dial-up Wired VPN Wireless
VPN
Upon booting up a Windows 10 machine, you see an error message stating, "One or more services failed to start." Which of the following actions should you take? Check the configuration of antivirus software Verify that disabling one service has not affected others Disable application startup Uninstall and reinstall the service
Verify that disabling one service has not affected others
Dion Training wants to implement a new wireless network in their offices. Which of the following types would support encryption for traffic being sent and received over the network while still allowing users to connect to the open network without a password, passphrase, or digital certificate? WPA2 WPA WPA3 WEP
WPA3
Which of the following types of encryption is considered the most secure to utilize in a SOHO network? WPA2 WPA3 WPS WEP
WPA3
A user with an older laptop running Windows 7 that has only 2 GB of RAM, 32 GB of SSD, and a 1.7 GHz 64-bit processor. The user would like to upgrade to a newer OS since Windows 7 is now considered end-of-life. Which of the following operating systems should the technician recommend to ensure the BEST performance on this computer? Windows 10 Windows 8 Windows 11 Windows 8.1
Windows 10
Jason is building an inexpensive workstation for one of the employees at Dion Training. The workstation will utilize an Intel x86 processor. Which of the following editions of Windows will support installation on this workstation? Windows 10 Enterprise Windows 11 Home Windows 10 Pro Windows 11 Pro
Windows 10 Enterprise & Windows 10 Pro
You are working as a penetration tester and have discovered a new method of exploiting a vulnerability within the Windows 10 operating system. You conduct some research online and discover that a security patch against this particular vulnerability doesn't exist yet. Which type of threat would this BEST be categorized as? Brute force DDOS Spoofing Zero-day
Zero-day. A flaw or software/hardware vulnerability is exploited and attackers release malware before a developer has an opportunity to create a patch to fix the vulnerability
You attempt to boot a Windows 10 laptop and receive an "Operating System Not Found" error on the screen. You can see the hard disk listed in the UEFI/BIOS of the system. Which of the following commands should you use to repair the boot sector of the hard disk? bootrec /fixmbr bootrec /fixboot bootrec /rebuildbcd diskpart list
bootrec /fixboot when you are able to see the hard drive in BIOS, then fixmbr or fixgpt wont help.
You are formatting a 4 TB external hard drive on your MacBook. The drive will be used to share files large video files between your MacBook and your friend's Windows 10 desktop. Which file format should you use? FAT32 NTFS exFAT HFS
exFAT. the only format that would work between the two systems are exFAT & FAT32. but FAT32 can only support up to 32 gb
Which command-line tool on a Windows system is used to display the resulting set of policy settings that were enforced on a computer for a specified user when they logged on? sfc gpresult gpupdate dism
gpresult
Which command-line tool and option on a Windows system is used to force a background refresh of all group policy settings on a system? gpresult /force gpupdate /force dism /force sfc /force
gpupdate /force
Which of the following commands is used on a Linux system to search for lines that match a pattern within a file? pwd grep apt-get vi
grep
Your boss has asked you to write a script that will copy all of the files from one hard drive to another each evening. This script should mirror the directories from one drive to the other and ensure they are synchronized each evening. Which command-line tool should you use in your script? xcopy cp robocopy copy
robocopy (the question has the exact defin. of this term)
What umask should be set for a directory to have 700 as its octal permissions? rwx------ rwxrwxrwx rwx---rwx r--r--r--
rwx------
You are working as a service desk analyst. This morning, you have received multiple calls from users reporting that they cannot access websites from their work computers. You decide to troubleshoot the issue by opening up your command prompt on your Windows machine and running a program to determine where the network connectivity outage is occurring. This tool tests the end-to-end connection and reports on each hop found in the connection. Which tool should you use to determine if the issue is on the intranet portion of your corporate network or if it is occurring due to a problem with your ISP? ping netstat tracert nslookup
tracert: a command-line utility. used to trace an IP packet's path as it moves from its source to its destination.