1002 Flashcards

1
Q

Characteristic features of open source applications

A
  • Permission to modify and redistribute the application

- Free access to the application code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A type of feature used by CPU’s for isolating areas of memory to prevent the execution code from non executable memory locations is known as

A
  • No-eXecute bit (NX bit)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is a complimentary instruction set that extends the capabilities of a CPU?

A

SSE2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Starting with the May 2019 OS release update the minimum hard disk space requirement for both 32bit & 64bit editions of Windows 10

A

32GB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Windows 7 Enterprise & Ultimate editions include the BranchCache feature

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following Windows 7 editions does not include EFS?

A
  • Windows 7 Starter
  • Windows 7 Home Basic
  • Windows 7 Home Premium
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which Microsoft Windows 10 editions include the BranchCache feature?

A
  • Windows 10 Education

- Windows 10 Enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Windows repair installation:

A
  • Does not affect user applications
  • Preserves application configuration settings
  • Does not affect user files
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which built in account was removed in Windows 10?

A

Power User

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Non-proprietary software

A
  • Linux

- Android

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An administrator was setting up a Windows Terminal Server. Which of the following settings should the administrator modify to increase server security?

A
  • Put the terminal server into the routers DMZ

- Block all unused ports on the LAN smart switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A company has hired a new IT firm to manage its network switches and routers. The firm is geographically separated from the company and will need to be able to securely access the devices. Which of the following will provide the ability to access these devices?

A
  • SSH
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A small office’s wireless network was compromised recently by an attacker who brute forced a pin to gain access. The attacker modified the DNS settings on the router and spread malware to the entire network. Which of the following configurations MOST likely allowed the attack to take place?

A
  • Default login

- WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A client wants a technician to create a PC naming convention that will make the clients PC’s easier to track and identify while in use. Which of the following naming convention formats should the technician follow?

A
  • AsseT ID

- MAC Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Best security for a server room

A
  • Badge Reader

- Biometric lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following threats uses personalized information in an attempt at obtaining information?

A
  • Spear Fishing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LAN do not exhibit this sympton. Which of the following needs to be advised on the workstation to fix the issue?

A
  • Date & time
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Physical Address Extension (PAE) is a memory management feature that allows 32-bit CPU’s to use more than 4GB of physical memory

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Physical Address Extension (PAE), No-eXecute bit (NX bit), and Streaming SIMD Extensions 2 (SSE2) are mandatory CPU requirements for Microsoft Windows 7/8/8.1/10, therefore Windows 7/8/8.1/10 cannot be installed on computer systems that lack support for these features.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following is a Microsoft Windows home theater software included in MS Windows versions prior to Windows 10?

A

Media Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The term “BranchedCache” refers to a Wide Area Network (WAN) bandwidth optimization technology implemented in some versions of MS Windows. BranchCache accelerates the process of serving network content by saving previously requested WAN resources on local servers or client computers which allows the subsequent requests to be served locally rather than from a remote server.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which edition(s) of Microsoft Windows 7 cannot participate in a Windows domain?

A
  • Windows 7 Starter
  • Windows 7 Home Basic
  • Windows 7 Home Premium
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

In Microsoft Windows 7, the only two editions that include the BitLocker full drive encryption feature are Windows 7 Enterprise and Windows 7 Ultimate.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the Microsoft Windows 7 editions include the BranchCache feature?

A
  • Windows 7 Enterprise

- Windows 7 Ultimate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which edition of Microsoft Windows 8/8.1 cannot participate in a Windows domain?

A

Core

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which of the following Windows 8/8.1 editions does not include the Bitlocker full drive encryption and Encrypting File System (EFS) features?

A

Core

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which of the Microsoft Windows 8/8.1 editions does not include the BranchCache feature?

A

Core

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

In a persistent VDI:

A
  • Each user runs their own copy of virtual desktop

- At the end of a session, user data and personal settings are saved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

In a non-persistant VDI:

A
  • Virtual desktop is shared among multiple users

- At the end of a session, user desktop reverts to it’s original state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A type of automated OS installation process that uses an answer file and does not require user interaction or presence is known as:

A

Unattended installation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is the name of an operating system installation type that preserves system settings, personal files, and applications from the older OS version?

A

In place upgrade

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A type of Windows installation that erases the contents of target partition is called:

A

Clean install

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which of the following enable installation of an OS via network interface?

A
  • PXE

- Netboot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

A user complains that they can’t launch Hyper-V from home. The user cannot even find the program settings. However, the user can access the Internet. In order to help this user,

which question would you ask first?

A

Which edition of Windows is installed?

35
Q

When upgrading a system from Windows 7 Home Premium Edition (SP1) to Windows 10, which Windows 10 Edition is recommended?

A

Home

36
Q

By default, which type of script file will a script written with Windows 10 PowerShell ISE be saved as?

A

.ps1

37
Q

When configuring email you must enter:

A
  • SMTP
  • POP3
  • Account Name
38
Q

A technician is working on a Windows 10 PC that is running slowly. Which of the following commands should the technician use to correct this issue? (Select two answers)

A
  • chdsk

- dism

39
Q

Which of the installation types provides a simpler and less costly alternative to manual OS installation in an environment consisting of multiple hosts requiring the same configuration settings?

A

Image Deployment

40
Q

Which of the following replaced removable media used for reformatting hard drives and restoring an operating system to the original factory condition?

A

Recovery Partition

41
Q

Which of the built-in options added in Windows 8 enables OS reinstallation without affecting the existing user profiles and settings?

A

Refresh

42
Q

What are the advantages of organizing hard drive space into multiple partitions?

  • Multiboot environment
  • Separated disk space used for virtual memory
  • Preventative measure against hard drive failures
  • Separation of user files from the operating system and application files
  • Increased overall disk storage space available for user data
A
  • Multiboot environment
  • Separated disk space used for virtual memory
  • Separation of user files from the operating system and application files
43
Q

Which of the following are disk storage types used with MS Windows?

  • Extended
  • Basic
  • Logical
  • Dynamic
  • Primary
A
  • Basic

- Dynamic

44
Q

Which of the following are examples of partition types? (Select 3 answers)

  • Extended
  • Basic
  • Logical
  • Dynamic
  • Primary
A
  • Primary
  • Logical
  • Extended
45
Q

Which of the following are examples of partition styles? (Select 2 answers)

A
  • MBR

- GPT

46
Q

In MS Windows, dynamic disks provide features that basic disks do not, such as the ability to create volumes that span multiple disks (spanned and striped volumes) and the ability to create fault-tolerant volumes (mirrored and RAID-5 volumes).

A

True

47
Q

In MS Windows, a newly added drive is by default partitioned as a:

  • Striped disk
  • Basic disk
  • Mirrored disk
  • Spanned disk
  • Dynamic disk
A

Basic disk

48
Q

Which of the following answers describe the available options of the Master Boot Record (MBR) partition style? (Select 3 answers)

  • Overall number of partitions limited to four
  • Up to three primary partitions and one extended partition
  • Multiple logical drives within each primary partition
  • One primary partition and multiple extended partitions
  • Only one logical drive within extended partition
  • Up to four primary partitions
A
  • Overall number of partitions limited to four
  • Up to three primary partitions and one extended partition
  • Up to four primary partitions
49
Q

In the MBR partition style, each logical drive within the extended partition can be transformed into a bootable drive.

A

False

50
Q

The GPT partition style extends the MBR’s primary partition limit to:

  • 16 primary partitions
  • 32 primary partitions
  • 64 primary partitions
  • 128 primary partition
A

128 Primary partitions

51
Q

The 4 GB maximum file size limit and 2 TB maximum volume size limit are the characteristic features of:

A

FAT32

52
Q

Which of the following are advantages of the New Technology File System (NTFS) over FAT32 file system?

  • Disk quotas
  • Compression
  • Object permissions
  • Encryption
A

All of the above

53
Q

Which of the following are methods of storing and accessing data over computer network? (Select 2 answers)

  • ext3
  • DFS
  • ext4
  • FAT32
  • NFS
  • exFAT
A
  • DFS

- NFS

54
Q

Which of the following can provide some protection for your network from outside invaders? (Choose all that apply)

  • Firewalls
  • Class 3 modems
  • Class 2 modems
  • Packet-filtering Routers
  • Hidden files
  • Proxy Servers
A
  • Firewalls
  • Packet-filtering Routers
  • Proxy Servers
55
Q

Which device should not be plugged into a UPS?

A

A laser printer

56
Q

What routing feature hides the IP addresses on a private network from hosts beyond the router?

A

NAT

57
Q

Where in the Control Panel would you go to set up the offline files feature in Windows?

A

Sync Center

58
Q

What is the RF technology that enables two smartphones to share data by being placed within a few inches of each other?

A

NFC

59
Q

According to troubleshooting theory, what should you do immediately after establishing a theory of probable cause?

A

Test the theory to determine the cause

60
Q

A user is requesting a solution that will prevent file corruption and ensure a graceful shutdown while providing at least one hour of uptime in case of extreme weather conditions. Which of the following should a technician recommend?

A

Uninterruptible power supply

61
Q

Which of the following installation types would require the use of an answer file to install the OS?

A

Unattended

62
Q

A manager requests remote access to a server after hours and on weekends to check data. The manager insists on using the server. Before granting the access, which of the following is the MOST important step a technician can take to protect against possible infection?

A

Ensure the server is patched with the latest security updates

63
Q

A SOHO technician recently moved some data from one server to another to increase storage capacity. Several users are now reporting they cannot access certain shares on the network. When the users attempt to access the shares, they get the following error: Access Denied. The technician confirms the users are all in the proper security groups and have the proper access, but they are still unable to access the shares. Which of the following are the MOST likely reasons for these issues? (Select two answers)

  • Administrative share permissions
  • Mapped drives
  • Group Policy hours restriction
  • Denied write/delete permissions
  • Disabled proxy settings
A
  • Mapped drives

- Denied write/delete permissions

64
Q

With which of the following types is a man-in-the-middle attack associated?

  • Brute force
  • Spoofing
  • DDos
  • Zero-day
A

Spoofing

65
Q

An employee reported that a suspicious individual was looking through the recycle bin. Which of the following types of social engineering threats is this?

A

Dumpster diving

66
Q

A network administrator has given a technician documentation detailing the switch-ports the technician will need to patch in for a network upgrade. Which of the following documents did the network administrator MOST likely give to the technician?

  • Process diagram
  • Physical network diagram
  • Fiber backbone diagram
  • Logical topology diagram
A

Physical network diagram

67
Q

A network administrator notifies a technician that the company is experiencing a DDoS attack. Several internal Windows PCs are the source of the traffic. The network administrator gives the technician the Windows computer names and states they be scanned and cleaned immediately.

With which of the following types of infections are the PCs MOST likely infected? (Select two answers)

  • Spyware
  • Zombies
  • Virus
  • Ransomware
  • Worm
  • Botnet
A
  • Zombies

- Worm

68
Q

Ann, a user, is attempting to log in to her email service form a third-party email client on her phone. When Ann enters her usual username and password, she receives an error message saying the credentials are invalid. Ann then decides to reset her email password, but after the reset, the new credentials still do not work in the third-party email client.

Which of the following settings or features is responsible for the problems Ann is experiencing?

  • Full Device Encryption
  • Account lock
  • Multifactor authentication
  • Strong password requirements
A
  • Multifactor authentication
69
Q

Joe, a user, returns his computer to the technician who performed a virus removal on it the week before. Joe states that several symptoms have returned.

Which of the following should the technician have covered previously as part of the original repair?

  • End-user education
  • Pre-installation environment cleaning
  • Disabling of System Restore
  • Infected system quarantine
A
  • End-user education
70
Q

Ann, an end user, is utilizing a stylus on her tablet. The recognition point is off when she uses the stylus, but it registers In the correct spool when she her finger. Which of the following would be the BEST resolution to issue?

  • Disable and then renewable Bluetooth
  • Disconnect and then reconnect stylus
  • Restart the table
  • Calibrate the touchscreen sensor
A
  • Calibrate the touchscreen sensor
71
Q

A technician performs a virus cleaning on a computer that has been redirecting all browsers to a phishing website. System Restore was turned off before the cleaning. The technician runs the machine through several scanners, and then tests for redirection. A smaller number of sites are still redirecting to the phishing website. The antivirus software correctly blocks the website. Which of the following should the technician do NEXT?

  • Rebuild the OS on the machine
  • Rerun the antivirus scan with higher sensitivity
  • Do a system restore to a date before the infection
  • Check the contents of the hosts file
A
  • Check the contents of the hosts file
72
Q

A team needs to deploy a temporary server room at a site to provide support during construction. Which of the following should they use at this site while setting up the server room?

  • ESD Mats
  • Air filters
  • Vacuums
  • Privacy screens
A
  • Air filters
73
Q

A small business has an open WiFi network for employees but does not want customers to connect to the access point. A technician has been dispatched to address the business’s concerns. Which of the following configuration settings should the technician change to satisfy the requirements of the business? (Select two answer)

  • Encryption
  • Default SSID
  • Signal Strength
  • MAC filtering
  • QoS
  • NAT
A
  • Signal Strength

- MAC filtering

74
Q

A company brings in contractors several times a year to perform inventory, and the contractors use company supplied laptops. The company’s security policy states that once the inventory is completed, the contractors should not be able to log in to the laptops until the next inventory.

Which of the following BEST enforces this policy?

  • Delete the user accounts
  • Reset the user accounts
  • Disable the user accounts
  • Restrict the user accounts
A
  • Delete the user accounts
75
Q

A small business has an open wireless network so vendors can connect to the network without logging in. The business owners are concerned that a nearby company is connecting and using the wireless connection without permission.

If the small business requires that the network remain open, which of the following configuration settings should be changed to address these concerns?

  • Default SSID
  • Firewall
  • MAC filtering
  • Power levels
A
  • Power levels
76
Q

A user Is unable to access a network share but can access email. A technician has confirmed the user has the appropriate permissions to access the share.

Which of the following commands should the technician use FIRST?

  • net use
  • nslookup
  • ping
  • ipconfig
A
  • nslookup
77
Q

Corporate management is concerned about the security of the company’s mobile phones, in the event they are lost or stolen. Management instructs the IT staff to ensure the data on the devices is not accessible by unauthorized users. Which of the following would provide the BEST level of protection in this scenario? (Choose two answers)

  • Disable unknown application installations
  • Implement remote wipe features
  • Use full device encryption
  • Require complex administrator passwords
  • Use device lockout policies
  • Enable a pattern lock
A
  • Implement remote wipe features

- Use full device encryption

78
Q

Which of the following types of scripts would be seen on the user end of a web page?

  • .sh
  • .bat
  • .js
  • .vbs
A

.js

79
Q

A technician receives a phone call regarding ransomware that has been detected on a PC in a remote office.

Which of the following steps should the technician take FIRST?

A

Disconnect the PC from the network

80
Q

A technician has just finished installing a secondary OS on a workstation. After rebooting the computer, the technician receives the following error: No OS found. The technician confirms the boot.ini file is correct.

Which of the following is MOST likely causing this error?

  • An incompatible partition is marked as active
  • The computer has GRUB Legacy installed
  • An unsupported version of windows is installed
  • Windows Startup Services are not running
A
  • An incompatible partition is marked as active
81
Q

A department in an organization set up a proxy server to manage its Internet stage. A technician is configuring the Windows workstations to use the new proxy server.

Which of the following Control Panel utilities should the technician use to configure the setting?

  • Internet options-Advanced
  • Internet options-Connections
  • Internet options-Security
  • Internet options-Content
  • Internet options-Privacy
A
  • Internet options-Connections
82
Q

A technician is working at a help-desk form and receives a call from a user who has experienced repeated BSODs. The technician is scheduled to take a break just after the call comes in.

Which of the following is the BEST choice for the technician to make?

  • Politely ask the user to call back
  • Ask another technician to take the call
  • Troubleshoot the issue for the user
  • Input the issue as a ticket and escalate to Tier 2
  • Put the user on hold and troubleshoot after the scheduled break
A
  • Ask another technician to take the call
83
Q

Which of the following devices are MOST likely to have a grounding wire attached to them based on the manufacturer’s design? (Select two answers)

  • UPS
  • Server rack
  • PoE phone
  • Desktop printer
  • Modem
  • Patch Panel
A
  • UPS

- Server rack

84
Q

What should you disable if you want people who don’t have an account on your local PC to be able to access your shared folders?

  • NTFS sharing
  • Active Directory
  • Workgroup sharing
  • Password-protected sharing
A
  • Password-protected sharing