220-1002 Quiz 2 Flashcards
What Windows command partitions disks?
diskpart
Which of the following commands in Windows Command Prompt changes the current directory to the root directory?
cd \
dir /root
cd ..
chdir /r
cd \
What Windows command changes working directory?
cd
What Windows command terminates processes and kills tasks?
taskkill
What Windows command shuts down the computer?
shutdown
In a virtualization environment, a host-based hypervisor is which type of hypervisor?
Type 1
Type 2
Emulated
Bare metal
Type 2
Which type of Hypervisor is VMware Workstation™?
Bare metal
Type 1
Host-based
Intel VT-x
Host-based
Which of the answers listed below refers to an ipconfig command parameter used for displaying the full TCP/IP configuration information for all adapters?
-a
/?
/all
/a
/all
Which of the following refers to capturing and reading data packets as they move over the network?
MAC (Media Access Control) Flooding
ARP (Address Resolution Protocol) Poisoning
Man-in-the-Middle (MITM)
Eavesdropping
Eavesdropping
What Windows command displays group policy results for the user?
gpresult
What is the name of an MS Windows command-line utility that can be used to display TCP/IP configuration settings?
ifconfig
net use
ipconfig
netstat
ipconfig
What can door locks be categorized as? (Select all that apply.)
Deadbolt
Electronic
Conventional
Token-based
Deadbolt
Electronic
Conventional
Token-based
Which of the following refer to stealing a password or PIN, or other secure information, by watching the user type it?
Tailgating
Impersonation
Shoulder Surfing
Pharming
Shoulder Surfing
A command-line utility used for checking the reachability of a remote network host is known as:
ping
tracert
dig
netstat
ping
When configuring Microsoft Hyper-V as a hypervisor, three types of virtual switches can be created. Which type is used by the virtual machine and the host only?
Internal
Private
External
Emulated
Internal
Netstat is a command-line utility used for: (Select 2 answers)
Displaying active TCP/IP connections
Testing the reachability of a remote host
Displaying intermediary points on the packet route
Viewing the TCP/IP configuration details
Displaying network protocol statistics
Displaying active TCP/IP connections
Displaying network protocol statistics
The use of encryption and other digital security techniques provides users with three important security requirements on computer networks: confidentiality, integrity, and availability. What are the principal types of cryptographic technology? (Select all that apply.)
Public Key Infrastructure (PKI)
Cryptographic Hashes
Asymmetric Encryption
Symmetric Encryption
Cryptographic Hashes
Asymmetric Encryption
Symmetric Encryption
Which parameter of the cd command in Windows moves the command-line prompt one folder up in the directory tree (sets the prompt at the parent folder of the current folder)?
cd \
cd /up
cd +
cd ..
cd ..
What Windows command copies files?
copy
xcopy
Which of the following command-line commands in MS Windows are used for resetting the DHCP configuration settings for all adapters? (Select 2 answers)
ipconfig /down
ipconfig /release
ipconfig /up
ipconfig /renew
ipconfig /release
ipconfig /renew
What Windows command checks system files?
sfc
What refers to logical security technologies designed to prevent malicious software from running on a host and can establish a security system that does not entirely depend on the good behavior of individual users?
Trusted/Untrusted Software Sources
Disable Auto Run
Anti-Virus/Anti-Malware
Execution Contro
Execution Control
What Windows command creates a file system?
format
Which of the following cloud computing characteristics allows resources to be provisioned to scale up or down as required by the customer?
Resource pooling
Measured service
Rapid elasticity
On-demand self service
Rapid elasticity
What Windows command displays active TCP connections or network statistics?
netstat
Which of the following Windows Command Prompt commands can be used to list all directory’s files and subdirectories contained in the current directory? (Select 2 answers)
dir dir /? dir *.* dir /all dir /list
dir
dir .
What kind of backup is incremental?
All selected data no matter when it was previously backed up
New files and files modified since last backup
All data modified since the last full backup
Nothing is backed up
New files and files modified since last backup
What Windows command updates group policy?
gpupdate
What Windows command lists folder contents?
dir
What Windows command looks up domain name server information?
nslookup
What kind of backup is differential?
All selected data no matter when it was previously backed up
New files and files modified since last backup
All data modified since the last full backup
Nothing is backed up
All data modified since the last full backup
What Windows command checks disks?
chkdsk
What Windows command sends packets to check connectivity?
ping
You are considering a computer to be used as a host in a virtualized environment. Which of the following is NOT a virtualization specific hardware feature?
Hyperthreading
Intel VT-x
AMD-V
Second Level Address Translations
Hyperthreading
What kind of backup is full?
All selected data no matter when it was previously backed up
New files and files modified since last backup
All data modified since the last full backup
Nothing is backed up
You are configuring a virtual
All selected data no matter when it was previously backed up
You are configuring a virtual desktop infrastructure (VDI) and need to configure the workstations for users. What type of computers will you be configuring?
Thick clients
Thin clients
Virtual desktop environment (VDE)
Windows 10 Enterprise
Thin clients
Which ipconfig parameter allows to view the physical address of a Network Interface Card (NIC)?
-S srcaddr
/all
-i address
eth_addr
/all
What Windows command copies or moves both files and folders?
robocopy
What Windows command displays network information?
ipconfig
A user known to your department as a “frequent flyer” with regard to support requests calls in with a genuine but non-urgent problem. You are in the middle of another important job that is urgent. What would be the best approach?
Confirm that the problem is not impacting their work and get them to email a support request, which you will attend to within 48 hours.
Do not assume—allow the customer to describe the problem fully then make a proper assessment.
Explain why the problem is taking so long to resolve, and get them to focus on helping you, rather than hindering you.
If the abuse continues, warn them that it cannot be tolerated and that you will have to end the call if it persists.
Confirm that the problem is not impacting their work and get them to email a support request, which you will attend to within 48 hours.
There are several approaches to the problem of data remnants on magnetic disks. If a disk can be recycled or repurposed, destruction is obviously not an option so what do you do instead?
Physical Destruction
Remnant Removal
Overwriting/Disk Wiping
Low Level Format
Overwriting/Disk Wiping
Logical security refers to controls implemented in software to create an access control system. What functions describe the overall operation of an access control system? (Select all that apply.)
Availability
Authentication
Authorization
Accounting
Authentication
Authorization
Accounting
A network command-line utility in MS Windows that tracks and displays the route taken by IPv4 packets on their way to another host is called:
ping
traceroute
nslookup
tracert
tracert
A network command-line utility in MS Windows that tracks and displays the route taken by IPv4 packets on their way to another host is called:
ping
traceroute
nslookup
tracert
tracert