A+, Core 2, Practice Test 2 Flashcards
Match the Windows utility to the function. Some functions will not have a match.
A network administrator is troubleshooting an intermittent Internet link outage to a server at 8.8.8.8. The administrator believes that the outage is occurring on one of the WAN connections between locations. Use a Windows network utility that can identify the router closest to the outage.
The tracert (traceroute) command will display a list of all network hops between two devices. If a route is down, the tracert output will show the last hop before the faulty link.
Match the scripting language with the most common use. Some uses will not have a match.
Select the Windows 10 Editions that include the following features. Some features will be included in multiple Windows 10 Editions:
A system administrator is concerned that a Windows system may contain logical file system errors. Scan and repair any logical file system errors from the Windows command line.
The chkdsk (Check Disk) command is used to identify and fix logical file system errors and bad physical sectors. The /f option will fix the logical file system and the /r option will locate bad sectors and attempt to recover any readable data.
In this example, the administrator would run this from the command line:
chkdsk /f
A desktop administrator is upgrading an older computer to support the 64-bit version of Windows 10 Pro. The computer currently has:
1 GHz CPU
1 GB of RAM
50 GB of free storage space
1024 x 768 video resolution
Which of the following should be upgraded to support the Windows 10 installation?
❍ A. CPU
❍ B. RAM
❍ C. Storage space
❍ D. Video resolution
The Answer: B. RAM
The 64-bit version of all Windows 10 editions require a minimum of
2 GB of system memory. Since this system only has 1 GB of RAM, it will need a memory upgrade before Windows 10 x64 can be installed.
The incorrect answers:
A. CPU
A processor running at 1 GHz is supported by both the 32-bit and 64-bit versions of Windows 10.
C. Storage space
The 64-bit version of Windows 10 requires 32 GB of free disk space. This system has 50 GB of free storage space, so it can easily support an upgrade to Windows 10 Pro x64.
D. Video resolution
Windows 10 Pro x64 requires a video resolution of 800 x 600, and this system supports a resolution of 1024 x 768 pixels.
A system administrator is analyzing a problem with a USB flash drive on a Windows 10 computer. When the flash drive is inserted, the CPU utilization increases to 100%. The administrator would like to disable one of the computer’s USB controllers for troubleshooting. Which of the following would provide this functionality?
❍ A. Services
❍ B. Performance Monitor
❍ C. Event Viewer
❍ D. Device Manager
The Answer: D. Device Manager
The Windows Device Manager provides access to the device drivers that manage the hardware on a computer. Individual drivers can be enabled, disabled, and managed from the Device Manager utility.
The incorrect answers:
A. Services
The Services utility manages background service processes in Windows. The Services utility does not manage or disable hardware components.
B. Performance Monitor
The Performance Monitor gathers long-term statistics and can alert or create reports for ongoing performance metrics. Performance Monitor does not manage hardware device drivers.
C. Event Viewer
The Event Viewer contains logs from the applications, operating system, and other services. Although the Event Viewer may provide additional details about this flash drive issue, the administrator would not manage the device drivers from the Event Viewer utility.
A medical research company is using laptop computers when visiting testing centers. The IT security team is concerned about a data breach if a laptop is lost or stolen. Which of the following would be the BEST way to manage this issue?
❍ A. BIOS password
❍ B. Authenticator application
❍ C. Full disk encryption
❍ D. Biometric authentication
❍ E. Cable lock
The Answer: C. Full disk encryption
Encrypting the laptop storage drives would prevent access to any data if the laptops are lost or stolen.
The incorrect answers:
A. BIOS password
A BIOS password would prevent someone from booting the operating system, but the data would still be accessible if the storage drive was removed from the laptop and moved to another system.
B. Authenticator application
An authenticator application would provide another factor during the login process, but it would not provide any additional security for the data stored on the laptop drive.
D. Biometric authentication
Using biometrics during the authentication process would ensure that the proper users were logging in, but it would not protect the data if the drives were removed from the laptop.
E. Cable lock
A cable lock might help prevent the laptop from theft, but it would not provide any data protection if the laptop was lost or stolen.
A user would like to encrypt a small group of files in a shared folder without modifying other files on the drive. Which of the following would be the BEST way to accomplish this?
❍ A. EFS
❍ B. Save the files “as Administrator”
❍ C. BitLocker
❍ D. Save the files with a dollar sign at the end of the filename
The Answer: A. EFS
EFS (Encrypting File System) allows a user to encrypt individual objects at the file system level. With EFS, a single file or group of files can be protected without encrypting any other items on the storage drive.
The incorrect answers:
B. Save the files “as Administrator”
Windows includes the option to execute an application with Administrator rights, but saving files does not include this option. By default, files are saved using the rights and permissions of the current user and changing this option would not provide any encryption features.
C. BitLocker
BitLocker is a full disk encryption technology that protects all of the data on the volume. BitLocker does not provide a feature to encrypt a single file or group of files.
D. Save the files with a dollar sign at the end of the filename
Creating a Windows share with a dollar sign at the end of the share name will hide the share from a public list. Saving a filename with a dollar sign at the end does not provide any protection or encryption of the file.
A local coffee shop has a public wireless network for customers and a private wireless network for company devices. The shop owner wants to be sure that customers can never connect to the company network. Which of the following should be configured on this network?
❍ A. Install a new access point for company devices
❍ B. Configure WPA3 on the company network
❍ C. Require static IP addresses on the customer network
❍ D. Assign MAC filters to the company network
❍ E. Use a firewall between the customer and corporate network
The Answer: B. Configure WPA3 on the company network
Enabling WPA3 (Wi-Fi Protected Access version 3) would require a password to connect and would prevent customers from connecting to the company wireless network.
The incorrect answers:
A. Install a new access point for company devices
Installing another access point doesn’t inherently provide any additional security.
C. Require static IP addresses on the customer network
Requiring the configuration of static IP address adds additional administrative overhead without providing any security enhancement. Static IP addressing does not prevent devices from connecting to a wireless network.
D. Assign MAC filters to the company network
MAC filtering can provide some administrative controls over access, but MAC filtering is not designed as a security control over wireless network access.
E. Use a firewall between the customer and corporate network
A firewall between networks would not prevent devices from connecting directly to a wireless network.
A system administrator has inadvertently installed a Trojan horse that has deleted a number of files across many Windows file shares. The Trojan also had access to user documents and login credentials and transmitted numerous documents to an off-site file storage system. Which of the following would limit the scope of future exploits?
❍ A. Require multi-factor authentication
❍ B. Disable all guest accounts
❍ C. Modify the default permissions
❍ D. Configure full disk encryption
❍ E. Require complex passwords
❍ F. Require a screensaver lock
The Answer: C. Modify the default permissions
Many system administrators configure their accounts to have full access to the network as their default setting. This means that malicious software would also have full access if the administrator’s desktop was exploited. Changing the default permissions to have limited access would also limit the scope of a Trojan horse exploit.
The incorrect answers:
A. Require multi-factor authentication
A Trojan horse exploit uses the permissions associated with the logged-in user. Requiring additional authentication factors will not have any effect on the scope of the malware infection.
B. Disable all guest accounts
Although disabling guest accounts is always a good best practice, the Trojan horse uses the current user permissions and does not require a guest account to function.
D. Configure full disk encryption
Full disk encryption protects the data on a storage drive if a device is lost or stolen. Once a user is logged in, the data can be accessed normally and the encryption is no longer a limitation to any user processes (such as a Trojan horse).
E. Require complex passwords
A complex password would protect against unauthorized user access, but it won’t stop a Trojan horse from exploiting a system using the current user’s account permissions.
F. Require a screensaver lock
A screensaver password protects a system when the user is away from their desktop. A Trojan horse is executed by the user at an active workstation, so configuring a screensaver password would not protect against this infection.
Which of the following Windows Share permissions has the priority when assigning access on a mapped drive?
❍ A. Allow
❍ B. Full control
❍ C. List folder contents
❍ D. Deny
The Answer: D. Deny
In Windows shares, the most restrictive setting has priority over all others. For example, the deny option takes priority over all other permissions.
The incorrect answers:
A. Allow
If a share is configured to deny access, it will take priority over an allow.
B. Full control
The permission option for full control would be configured for allow or deny access, and does not itself have priority over the deny option.
C. List folder contents
List folder contents is an NTFS permission configured to allow or deny. These permission categories do not take priority over a deny setting.
A desktop administrator has just removed malware from a user’s desktop computer and has configured the system to automatically update anti- virus signatures and perform a scan each night. Which of the following should be the NEXT step in the removal process?
❍ A. Enable System Protection
❍ B. Educate the end-user
❍ C. Quarantine the computer
❍ D. Boot to Safe Mode
The Answer: A. Enable System Protection
Before the malware was removed, System Protection was disabled to delete all potentially-infected restore points. Once the malware is removed and the anti-malware process is working again, System Protection can
be re-enabled.
The incorrect answers:
B. Educate the end-user
Once the malware is removed and all of the technical configurations are complete, the end-user can be educated on ways to identify and avoid a malware infection in the future.
C. Quarantine the computer
The quarantine process occurs immediately after malware has been identified. A technician would not wait until anti-malware configurations are complete before quarantining a system.
D. Boot to Safe Mode
Safe mode may be required during the malware removal process, but it’s not necessary once the malware is removed and the anti-virus signatures are updated.
A security administrator is installing a new VPN connection for remote users. The administrator would like all users to authenticate with their Windows Active Directory credentials. Which of the following technologies would provide this functionality?
❍ A. RADIUS
❍ B. WPA3
❍ C.TKIP
❍ D. AES
The Answer: A. RADIUS
RADIUS (Remote Authentication Dial-in User Service) is an authentication protocol commonly used to provide authentication from devices to a centralized database. A common use of RADIUS is to authenticate users to an Active Directory database from a router, switch, VPN concentrator, or any other service.
The incorrect answers:
B. WPA3
WPA3 (Wi-Fi Protected Access version 3) is an 802.11 wireless security protocol. WPA3 would not be used to provide authentication features between devices and centralized databases.
C. TKIP
TKIP (Temporal Key Integrity Protocol) is a wireless protocol used with the original version of WPA. TKIP is not used to provide authentication to a centralized database.
D. AES
AES (Advanced Encryption Standard) is an encryption protocol used with many wired and wireless services
Which of the following partition types limit a Windows installation to a maximum partition size of 2 TB?
❍ A. FAT32
❍ B. GPT
❍ C. APFS
❍ D. MBR
The Answer: D. MBR
The MBR (Master Boot Record) partition style is an older method partitioning files, and the maximum partition size of an MBR partition is two terabytes in size.
The incorrect answers:
A. FAT32
FAT32 (File Allocation Table 32-bit) is a Microsoft file system originally designed for earlier versions of Windows. FAT32 is not a partition type.
B. GPT
GPT (GUID Partition Table) is a modern partition style that increases the number of partitions and partition sizes over the older MBR style.
C. APFS
Apple’s APFS (Apple File System) is optimized for solid-state storage and includes support for encryption, snapshots, and increased data integrity.