220-1002 Quiz 2 Flashcards

1
Q

What Windows command partitions disks?

A

diskpart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following commands in Windows Command Prompt changes the current directory to the root directory?

cd \
dir /root
cd ..
chdir /r

A

cd \

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What Windows command changes working directory?

A

cd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What Windows command terminates processes and kills tasks?

A

taskkill

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What Windows command shuts down the computer?

A

shutdown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In a virtualization environment, a host-based hypervisor is which type of hypervisor?

Type 1
Type 2
Emulated
Bare metal

A

Type 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which type of Hypervisor is VMware Workstation™?

Bare metal
Type 1
Host-based
Intel VT-x

A

Host-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the answers listed below refers to an ipconfig command parameter used for displaying the full TCP/IP configuration information for all adapters?

-a
/?
/all
/a

A

/all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following refers to capturing and reading data packets as they move over the network?

MAC (Media Access Control) Flooding
ARP (Address Resolution Protocol) Poisoning
Man-in-the-Middle (MITM)
Eavesdropping

A

Eavesdropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What Windows command displays group policy results for the user?

A

gpresult

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the name of an MS Windows command-line utility that can be used to display TCP/IP configuration settings?

ifconfig
net use
ipconfig
netstat

A

ipconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What can door locks be categorized as? (Select all that apply.)

Deadbolt

Electronic

Conventional

Token-based

A

Deadbolt

Electronic

Conventional

Token-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following refer to stealing a password or PIN, or other secure information, by watching the user type it?

Tailgating
Impersonation
Shoulder Surfing
Pharming

A

Shoulder Surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A command-line utility used for checking the reachability of a remote network host is known as:

ping
tracert
dig
netstat

A

ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When configuring Microsoft Hyper-V as a hypervisor, three types of virtual switches can be created. Which type is used by the virtual machine and the host only?

Internal
Private
External
Emulated

A

Internal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Netstat is a command-line utility used for: (Select 2 answers)

Displaying active TCP/IP connections
Testing the reachability of a remote host
Displaying intermediary points on the packet route
Viewing the TCP/IP configuration details
Displaying network protocol statistics

A

Displaying active TCP/IP connections

Displaying network protocol statistics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The use of encryption and other digital security techniques provides users with three important security requirements on computer networks: confidentiality, integrity, and availability. What are the principal types of cryptographic technology? (Select all that apply.)

Public Key Infrastructure (PKI)

Cryptographic Hashes

Asymmetric Encryption

Symmetric Encryption

A

Cryptographic Hashes
Asymmetric Encryption
Symmetric Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which parameter of the cd command in Windows moves the command-line prompt one folder up in the directory tree (sets the prompt at the parent folder of the current folder)?

cd \
cd /up
cd +
cd ..

A

cd ..

19
Q

What Windows command copies files?

A

copy

xcopy

20
Q

Which of the following command-line commands in MS Windows are used for resetting the DHCP configuration settings for all adapters? (Select 2 answers)

ipconfig /down
ipconfig /release
ipconfig /up
ipconfig /renew

A

ipconfig /release

ipconfig /renew

21
Q

What Windows command checks system files?

A

sfc

22
Q

What refers to logical security technologies designed to prevent malicious software from running on a host and can establish a security system that does not entirely depend on the good behavior of individual users?

Trusted/Untrusted Software Sources
Disable Auto Run
Anti-Virus/Anti-Malware
Execution Contro

A

Execution Control

23
Q

What Windows command creates a file system?

A

format

24
Q

Which of the following cloud computing characteristics allows resources to be provisioned to scale up or down as required by the customer?

Resource pooling
Measured service
Rapid elasticity
On-demand self service

A

Rapid elasticity

25
Q

What Windows command displays active TCP connections or network statistics?

A

netstat

26
Q

Which of the following Windows Command Prompt commands can be used to list all directory’s files and subdirectories contained in the current directory? (Select 2 answers)

dir
dir /?
dir *.*
dir /all
dir /list
A

dir

dir .

27
Q

What kind of backup is incremental?

All selected data no matter when it was previously backed up
New files and files modified since last backup
All data modified since the last full backup
Nothing is backed up

A

New files and files modified since last backup

28
Q

What Windows command updates group policy?

A

gpupdate

29
Q

What Windows command lists folder contents?

A

dir

30
Q

What Windows command looks up domain name server information?

A

nslookup

31
Q

What kind of backup is differential?

All selected data no matter when it was previously backed up
New files and files modified since last backup
All data modified since the last full backup
Nothing is backed up

A

All data modified since the last full backup

32
Q

What Windows command checks disks?

A

chkdsk

33
Q

What Windows command sends packets to check connectivity?

A

ping

34
Q

You are considering a computer to be used as a host in a virtualized environment. Which of the following is NOT a virtualization specific hardware feature?

Hyperthreading
Intel VT-x
AMD-V
Second Level Address Translations

A

Hyperthreading

35
Q

What kind of backup is full?

All selected data no matter when it was previously backed up
New files and files modified since last backup
All data modified since the last full backup
Nothing is backed up
You are configuring a virtual

A

All selected data no matter when it was previously backed up

36
Q

You are configuring a virtual desktop infrastructure (VDI) and need to configure the workstations for users. What type of computers will you be configuring?

Thick clients
Thin clients
Virtual desktop environment (VDE)
Windows 10 Enterprise

A

Thin clients

37
Q

Which ipconfig parameter allows to view the physical address of a Network Interface Card (NIC)?

-S srcaddr
/all
-i address
eth_addr

A

/all

38
Q

What Windows command copies or moves both files and folders?

A

robocopy

39
Q

What Windows command displays network information?

A

ipconfig

40
Q

A user known to your department as a “frequent flyer” with regard to support requests calls in with a genuine but non-urgent problem. You are in the middle of another important job that is urgent. What would be the best approach?

Confirm that the problem is not impacting their work and get them to email a support request, which you will attend to within 48 hours.

Do not assume—allow the customer to describe the problem fully then make a proper assessment.

Explain why the problem is taking so long to resolve, and get them to focus on helping you, rather than hindering you.

If the abuse continues, warn them that it cannot be tolerated and that you will have to end the call if it persists.

A

Confirm that the problem is not impacting their work and get them to email a support request, which you will attend to within 48 hours.

41
Q

There are several approaches to the problem of data remnants on magnetic disks. If a disk can be recycled or repurposed, destruction is obviously not an option so what do you do instead?

Physical Destruction
Remnant Removal
Overwriting/Disk Wiping
Low Level Format

A

Overwriting/Disk Wiping

42
Q

Logical security refers to controls implemented in software to create an access control system. What functions describe the overall operation of an access control system? (Select all that apply.)

Availability
Authentication
Authorization
Accounting

A

Authentication
Authorization
Accounting

43
Q

A network command-line utility in MS Windows that tracks and displays the route taken by IPv4 packets on their way to another host is called:

ping
traceroute
nslookup
tracert

A

tracert

44
Q

A network command-line utility in MS Windows that tracks and displays the route taken by IPv4 packets on their way to another host is called:

ping
traceroute
nslookup
tracert

A

tracert