Core 2

Ace your homework & exams now with Quizwiz!

resmon.exe

Resource monitor

Which of the following network configurations is used to identify your computer's individual host identifier and your computer's network identifier?

Subnet Mask

ext4 has a maximum volume size of

1 EB and maximum file size of 16 TB

What is the minimum amount of RAM needed to install Windows 10 on a 32-bit system?

1 GB

What is the minimum processor required to install Windows 10 (x86) on a device?

1 GHz single-core processor

What is the minimum amount of memory required to install Windows 10 (x64) on a device?

2 GB

ext3 has a maximum volume size of

32 TB and maximum file size of 2 TB

Octal notation in linux

4 for each R, 2 for each W, and 1 for each X

What is the minimum amount of storage space required to install Windows 11 (x64) on a device?

64 GB

Workgroup

A Windows Workgroup is a common sharing method for small departments with documents on their own computers.

.bat

A batch file (.bat) commonly runs in the console or command line of a Windows device, and it can automate the same processes that a user would perform manually at the Windows command prompt.

Knowledge base

A knowledge base commonly contains information about processes, procedures, and documentation for resolving technical issues. An internal knowledgebase would contain important historical information about the email server and would potentially document the hardware and software specifications for the server.

Which type of authentication method is commonly used with physical access control systems and relies upon RFID devices embedded into a token?

A proximity card is a contactless card that usually utilizes RFID to communicate with the reader on a physical access system. These are commonly used to access secured rooms (such as server rooms) or even a building itself (such as at an access control vestibule).

.sh

A shell script (.sh) commonly runs at the command prompt, or shell, of a Unix or Linux device. Since most Linux features can be managed from the command line, shell scripts are powerful automation options.

During a disaster recovery, which of the following statements is true?

A virtual machine has less downtime than a physical server

Dion Consulting Group has been hired by a small real estate office to build its network. The office has 4 computers running Windows 10 Professional edition configured in a workgroup to access a shared file server. Which of the following types of network models is being used by this real estate office?

A workgroup is a Microsoft peer-to-peer network model in which computers are connected together for access to shared resources for organizational purposes.

AES Galois Counter Mode Protocol (GCMP)

AES Galois Counter Mode Protocol (GCMP) is a high-performance mode of operation for symmetric encryption that supports authenticated encryption with associated data (AEAD). Management protection frames protect unicast and multicast management action frames to protect against eavesdropping and forgery in WPA3-based wireless networks.

All editions of Windows 11 are available in either____

All editions of Windows 11 only support x64 (64-bit) processors due to the higher minimum memory requirements. All Windows 11 editions require a minimum of 4 GB of memory to operate.

Performance Monitor can gather long-term statistics of OS metrics, set alerts and automated actions, store statistics, and display built-in reports.

All hardware is managed through the Windows Device Manager. Device drivers and hardware configurations can be managed through the Device Manager utility.

Which attack utilizes a wireless access point made to look as if it belongs to the network by mimicking the corporate network's SSID to eavesdrop on the wireless traffic?

An evil twin is meant to mimic a legitimate hotspot provided by a nearby business, such as a coffee shop that provides free Wi-Fi access to its patrons. An evil twin is a type of rogue wireless access point that masquerades as a legitimate Wi-Fi access point so that an attacker can gather personal or corporate information without the user's knowledge. This type of attack may be used to steal the passwords of unsuspecting users by monitoring their connections or phishing, which involves setting up a fraudulent website and luring people there

Which of the following installation types would allow a single technician to quickly install Windows 10 Enterprise on 50 workstations simultaneously?

An image deployment is a type of installation that uses a clone of an existing installation stored in an image file to perform the installation. The image can contain the base OS and configuration settings, service packs and updates, applications software, and whatever else is required. An image can be stored on DVD or USB media or can be accessed over a network.

Which type of installation would require an answer file to install the operating system?

An unattended installation is a traditional method of deploying a Windows operating system in a large enterprise environment. Unattended installations use an answer file that contains user input to various GUI dialog boxes that would otherwise appear during the installation process. Unattended installation is the most practical way to install Windows when the client computers have different hardware components, and an image file cannot be used. Unattended installations save deployment time and can be used either for clean installs or in-place upgrades.

When Jonathan opens the web browser on his computer, the initial page loads up to a search engine that he does not recognize. Jonathan attempts to use the search engine, but the results are abysmal, and the browser creates numerous pop-ups. Jonathan asks for your assistance in fixing this issue. Which TWO of the following actions do you recommend Jonathan perform first?

Browser redirection and pop-ups are common symptoms of malware being installed on a computer. It is recommended that the web browser be reset to its default settings and configurations to remove any redirection settings that the malware may have made to the browser. Additionally, any unapproved applications should be unchecked from the Startup tab in Task Manager to ensure the malware isn't reloaded during the next reboot.

Which of the following components presents the largest risk of electrical shock to a technician?

CRT monitor

Which of these would be the BEST way to prevent an attacker from modifying default routes on a SOHO wireless network?

Change the router's default password The login credentials to a SOHO (Small Office / Home Office) router protect the device from configuration changes. If the default password is, configured on a router, then anyone would be able to make changes on the device.

What Windows Share permissions has the highest priority when assigning access on a mapped drive?

Deny - In Windows shares, the most restrictive setting has priority over all others. For example, the deny option takes priority over all other permissions.

After a change has been implemented and running for a couple of days, Which of the following change management steps should be followed NEXT

Document the changes After the final changes are complete, it's useful to document the process and the changes for future reference.

EFS

EFS (Encrypting File System) allows a user to encrypt individual objects at the file system level. With EFS, a single file or group of files can be protected without encrypting any other items on the storage drive

WPA3

Galois Counter Mode Protocol (GCMP), enhanced open, simultaneous authentication of equals (SAE), forward secrecy

The ___ ___ is a local plain text file that maps servers or hostnames to IP addresses

Host file - It was the original method to resolve hostnames to a specific IP address. The hosts file is usually the first process in the domain name resolution procedure. When a user requests a webpage, the hosts.ini file is first checked for the IP address. If the IP address isn't found in the hosts.ini file, then the workstation requests the IP address from the DNS server. Attackers often modify host.ini files to redirect users to a malicious webpage instead of one they would commonly use like Google, Facebook, and others.

Upon booting up a Windows 10 machine, you see an error message stating, "One or more services failed to start." Which of the following actions should you take?

If you see a message such as "One or more services failed to start" during the Windows load sequence, check Event Viewer and/or the Services snap-in to identify which service has failed. Troubleshooting services can be complex. Of the options presented in this question, only the one for verifying that disabling one service has not affected others would help correct a service that fails to start. This is because some services depend on other services to run, so if something or someone has disabled one service, it could have inadvertently affected others.

when installing a video editing application, the installation process fails due to lack of available drive space. Which of the following would be the BEST way to complete the installation process?

Install the application to a network share The installed application files can be much larger than the installation utility, so using a network share with a larger available storage space can be a good alternative until free space is available on the local computer.

Your supervisor has requested remote access to a particular server to check on specific data and processes in the evenings and weekends. You are concerned that the server could become infected and want to take some precautions. Which of the following is the MOST important thing to do before granting remote access to the server to your supervisor?

Install the latest security updates and patches to the server

.js

JavaScript (.js) is used on many web sites to enhance the functionality within a user's browser. This can be used for automation, tracking, interactivity features, and to extend the functionality of the browser.

What solution would provide protection against under-voltage events?

Line conditioner - they raise a sag or under-voltage event back to normal levels. It cannot protect against a full power outage event

You have been asked to recycle 20 of your company's old laptops. The laptops will be donated to a local community center for underprivileged children. Which of the following data destruction and disposal methods is MOST appropriate to allow the data on the drives to be fully destroyed and the drives to be reused by the community center?

Low-level formatting of the HDDs

MSDS

Material Safety Data Sheet; contains information on the possible health effects of exposure to chemicals

Domain

Microsoft's Active Directory Domain Services are designed for larger organizations that need centralized management of user accounts, computing devices, and servers.

Which of the following MacOS features allows you to use multiple desktops or spaces on a single system?

Mission Control is an application for facilitating multiple desktops in the macOS environment. This enables the user to set up one or more desktops with different sets of apps, backgrounds, and so on, which is an easy way of managing tasks more effectively.

You are configuring a SOHO network that will contain 7 devices, but you only have a single public IP address. Which of the following concepts should be configured to allow the 7 devices to share that single IP when connecting to the internet?

Network address translation (NAT) is a network service provided by a router or proxy server to map private local addresses to one or more publicly accessible IP addresses. NAT can use static mappings but is commonly implemented as network port address translation (PAT) or NAT overloading, where a few public IP addresses are mapped to multiple LAN hosts using port allocations.

What are On-access Antivirus scans?

On-access scans are a type of antivirus scan where the AV software intercepts operating system calls to open files to scan the file before allowing or preventing the file from being opened. On-access scans reduce performance somewhat but are essential to maintaining effective protection against malware

Enhanced open

One of the features of WPA3 (WIFI6) is enhanced open. Enhanced Open enables encryption for traffic being sent and received over a wireless network when still using open authentication.

Performance Monitor

Performance Monitor can gather long-term statistics of OS metrics, set alerts and automated actions, store statistics, and display built-in reports.

.ps1

PowerShell (.ps1) is a Windows-only scripting environment that extends the functionality of the traditional Windows command line. PowerShell extends the functionality of the command prompt to enable the automation of internal Windows and Active Directory functions.

When using an MBR, which of the following types of partitions can only have up to four partitions?

Primary partitions are limited to only four primary partitions on a system using MBR. To overcome this limitation, extended partitions can be used. An extended partition is a partition that can be divided into additional logical drives. Unlike a primary partition, you don't need to assign it a drive letter and install a file system

Where in the Control Panel sections would allow a technician to turn on Hyper-V on a Windows 10 Pro workstation?

Programs and Features

.py

Python (.py) is a scripting language that can handle almost anything, including a number of tasks in this list. However, Python is the best fit for a scripting language that can inter-operate with other devices, including devices across the network.

A user has logged into the Windows domain. However, the desktop does not show the user's normal wallpaper and all of the user's spreadsheets and documents in the "My Documents" folder are missing. What is one way to restore the user's normal work environment?

Rename the user's folder and delete their profile in the registry Problems with a user profile causes display problems on the desktop and user documents to disappear. To recreate the profile, the user's folder is deleted and the profile setting in the registry is deleted. Once the computer is restarted and the user logs in, a new profile will be created.

What is a repair installation

Repair installation is a type of installation that attempts to replace the existing version of the operating system files with a new copy of the same version. A repair installation is useful when trying to repair a Windows computer that will not boot or when you believe the system files have become corrupted. A repair installation will only affect the system files and not any of the user's settings, customizations, or applications.

Which of the following is used to communicate data and preferences to child processes within a script or batch file?

Shell scripts and batch files use environment variables to communicate data and preferences to child processes. They can also be used to store temporary values for reference later in a shell script.

SAE

Simultaneous Authentication of Equals (SAE) is a password-based authentication and password-authenticated key agreement method used in WPA3 that replaced the 4-way handshake used in WPA-based wireless networks. The SAE handshake is also known as the dragonfly handshake. Enhanced Open enables encryption for traffic being sent and received over a wireless network when still using open authentication.

3-2-1 Backup Rule

States that you should have three copies of your data, including your production copy on your servers, two different types of media, and one copy being held offline and off-site

msinfo32.exe

System information is a utility that gathers information about your computer and displays a comprehensive list of hardware, system components, and the software environment that can be used to diagnose computer issues.

Which of the following should you use to fix an issue with a graphics card's drivers in Windows 10?

The Device Manager is used to view and control the hardware attached to the computer. The device manager will highlight a piece of hardware that is not working so that a technician can repair or replace it

Disk Management

The Disk Management utility allows the administrator to create, change, remove, or format partitions on a storage drive.

A technician is trying to locate a protected .dll file to edit, but they cannot see it in the System32 folder. Which Control Panel utility should the technician use to find the file?

The File Explorer Options section of the Control Panel allows technicians to customize the display of files and folders. For example, the File Explorer Options can enable or disable the ability to show hidden files, hide file extensions, and more. General options allow a technician to configure the folders to open in a new window or the same window, to use a single-click or double-click when opening a file or program using its icon, and the ability to show or hide recently used files and folders in the Quick Access pane of the File Explorer window

FileVault

The FileVault utility provides full disk encryption for macOS devices.

Group Policy Editor

The Group Policy Editor allows an administrator to make configuration changes to devices on an Active Directory network.

pwd

The Linux pwd (Print Working Directory) command will display the path of the current working directory.

rm

The Linux rm (remove) command will delete a file or object from the file system.

Which file system type is used to mount remote storage devices on a Linux system?

The Network File System (NFS) is used to mount remote storage devices into the local file system on a Linux system. It allows you to mount your local file systems over a network and remote hosts to interact with them while mounted locally on the same system.

RADIUS

The Remote Authentication Dial-in User Service (RADIUS) is used to manage remote and wireless authentication infrastructure. Users supply authentication information to RADIUS client devices, such as wireless access points. The client device then passes the authentication data to an AAA (Authentication, Authorization, and Accounting) server that processes the request.

TACACS+

The Terminal Access Controller Access Control System (TACACS+) is a proprietary alternative to RADIUS developed by Cisco for handling authentication.

Certificate Manager

The Windows Certificate Manager is used to view, add, or remove local certificates.

cat

The cat (concatenate) utility is used to link files together in a series. This can be used to view multiple files to the screen or to save multiple files into one single large file.

chmod

The chmod (Change Mode) command allows the user to change the access (mode) of a file to read, write, execute, or a combination of those permissions.

chown

The chown (Change Owner) command is used to modify the file owner or group owner assignment.

dir

The dir (directory) command will display a list of files from the command line. The command includes filtering options, so using "dir *.log" would display all files in the current directory with a .log extension.

A user contacts the service desk after they just finished attempting to upgrade their laptop to Windows 10. The upgrade failed, and the user asks you to explain why. Which of the following log files should you review to determine the cause of the upgrade failure?

The event viewer shows a log of application and system messages, including errors, information messages, and warnings. It's a useful tool for troubleshooting all kinds of different Windows problems. The setup log contains a record of the events generated during the Windows installation or upgrade process.

mkdir

The mkdir (Make Directory) command can be used in Linux or Windows to create a folder or directory in the file system.

mv

The mv (move) command is used to "move" a file from one location to another, or from one name to another.

What command is used on a Linux system to switch to another user's account?

The su command, which stands for substitute user, is used by a computer user to execute commands with the privileges of another user account

Which of the following commands is used on a Linux system to edit a text file on a server?

The vi (visual) utility is a popular screen-oriented text editor in Linux, Unix, and other Unix-like operating systems. When using vi, the terminal screen acts as a window into the editing buffer. Changes made to the editing buffer shall be reflected in the screen display, and the position of the cursor on the screen will indicate the position within the editing buffer.

Shutdown commands

Using the /r option will reboot the computer. Using the /s option will shut down the computer. Using the /l option will log off the current user. Using the /h option will enter sleep or hibernation mode.

.vbs

VBScript, (.vbs) (Microsoft Visual Basic Scripting Edition) can be used for many Windows-related scripting purposes, and one of the most common is to automate the functionality of Microsoft Office applications.

Which of the following encryption types was used by WPA to better secure wireless networks than WEP?

WPA uses the RC4 cipher and a temporal key integrity protocol (TKIP) to overcome the vulnerabilities in the older WEP protection scheme.

When joining a network for the first time, what is the difference between joining the network as public or private?

When connecting to a network for the first time, the user must select if it is a public or private network. A public network will hide your computer from other devices on the network and prevent file and printer sharing. A private network is considered trusted, allows the computer to be discoverable to other devices on the network, and supports the use of file and printer sharing.

Which of the following is the LEAST secure wireless security and encryption protocol?

Wired equivalent privacy (WEP) is an older mechanism for encrypting data sent over a wireless connection. WEP is considered vulnerable to attacks that can break its encryption. WEP relies on the use of a 24-bit initialization vector to secure its preshared key.

Which of the following types of encryption uses a 128-bit encryption key but is considered weak due to its use of a 24-bit initialization vector?

Wired equivalent privacy (WEP) is an older mechanism for encrypting data sent over a wireless connection. WEP is considered vulnerable to attacks that can break its encryption. WEP relies on the use of a 24-bit initialization vector to secure its preshared key.

What type of wireless security measure can easily be defeated by a hacker by spoofing their network interface card's hardware address?

Wireless access points can utilize MAC filtering to ensure only known network interface cards are allowed to connect to the network. If the hacker changes their MAC address to a trusted MAC address, they can easily bypass this security mechanism. MAC filtering is considered a good security practice as part of a larger defense-in-depth strategy, but it won't stop a skilled hacker for long. MAC addresses are permanently burned into the network interface card by the manufacturer and serve as the device's physical address

When a ____ _____ occurs, it usually results from a malicious proxy server setting being added to the browser

browser redirect

What command is used in the Linux terminal to change the permissions of a file?

chmod - The chmod command sets the permissions of files or directories on a Linux system. A set of flags associated with each file determines who can access that file and how they can access it. These flags are called file permissions or modes. The command name chmod stands for change mode and it restricts the way a file can be accessed.

When humidity is high in a server room (over 60%) it is a concern for what?

corrosion of the servers

if the_________ ______ is not properly installed then the encrypted email will not be able to be read.

digital certificate

How many cores does windows 11 require ?

dual-core 1 GHz

low humidity in a server room is causes concern for what

electrostatic discharge (ESD)

The date and time on a device is important when _____

encryption is involved. If a date is very different between devices, the encryption process may fail or the encryption certificate may appear to be expired.

swap partition on a Linux system

is a portion of the hard disk formatted with a minimal kind of file system and used in situations when the operating system runs out of physical memory and needs more of it. It can only be used by the memory manager and not for the storage of ordinary data files.

Boot Camp

is used to allow dual booting on a Macintosh computer. It allows the user to boot into either macOS (OS X) or Windows as the computer is rebooted. Boot Camp is only supported on Intel-based macOS systems, though. The terminal in macOS is the equivalent to the Windows Command Prompt window. The terminal is used to run network troubleshooting utilities such as the ping command and other advanced commands to modify the macOS environment

.dmg

macOS installer for copying self-contained apps to an app folder

.pkg

macOS installer that supports complex setup tasks using a setup wizard

Which of the following commands is used on a Linux system to copy a file to a new directory and then remove the original file from the previous directory?

mv

A Linux administrator is modifying a log file and needs to rename the file. Which of the following should be used to make this change?

mv The Linux mv (move) command will move a file from one location to another, or move/rename a file from one name to another.

What command is used to edit a text file on a Linux server?

nano - the nano utility is an easy-to-use command-line text editor for Linux systems. Nano includes the functionality of a regular text editor, as well as syntax highlighting, multiple buffers, search and replace with regular expression support, spellchecking, UTF-8 encoding, and more.

The user would like to access the shared drive as a drive letter inside of Windows File Explorer. What command line option would provide this functionality?

net use The net use command will assign a local drive letter to a network share. Once the net use command is completed, the drive letter can be used to reference the share in all applications and in the File Explorer.

All editions of Windows 10 are available in either _____

x86 (32-bit) or x64 (64-bit). When using a 32-bit version of Windows 10, a maximum of 4 GB of RAM is supported.

Which of the following commands can be used to install software on a Linux system?

yum

WPA2

▪802.11i standard to provide better wireless security featuring AES with a 128-bit key, CCMP, and integrity checking ▪If we make operations easier, then security is reduced

Rooting

▪Allows to get administrative rights on an Android device ▪Android devices are based on Linux ▪Custom firmware gives a new version of the Android OS ▪Custom firmware, or rooting, introduces lots of vulnerabilities ▪Rooting can lead to significant security vulnerabilities

Wi-Fi Protected Setup (WPS)

▪Automated encryption setup for wireless networks at a push of a button, but is severely flawed and vulnerable ▪Always disable WPS ▪Encryption and VPNs are always a good idea


Related study sets

Quiz - Fluid & Electrolyte & Acid-Base Balance - Med Surg

View Set

English 11 A, Cumulative Exam 82%

View Set

Intro to Public Speaking - Exam 2

View Set

FIN 311 Final Exam Terms/Questions

View Set

Chemical property of bases and acids

View Set

Final study guide: Microeconomics

View Set

CHEM 1005 - FINAL MULTIPLE CHOICE

View Set