A+, Core 2, Practice Test 3 Flashcards
A Windows administrator would like to query the local DNS server to view the IP address for www.professormesser.com. Use a command line utility to view this information.
The nslookup (name server lookup) command can query a DNS server for information about IP addresses, fully qualified domain names, email server addresses, and other important name services.
Match the Linux command to the description. Some descriptions will not have a match.
A user has contacted the help desk because they are not able to browse any websites. The technician suspects a fault with the server that converts fully qualified domain names to IP addresses. What command line would confirm connectivity to this server?
The device that converts between fully qualified domain names and IP addresses is the DNS (Domain Name System) server. The nslookup results show the configured DNS server is located at 9.9.9.9, and the ping command is the easiest way to confirm the connectivity of the device.
Match the Control Panel utilities to the description. Some descriptions will not have a match.
. A system administrator would like to remove the TFTP Client in Windows 10. Which of the following Control Panel options would be the BEST choice for this task?
❍ A. Programs and Features
❍ B. Services
❍ C. Network and Sharing Center
❍ D. File Explorer options
The Answer: A. Programs and Features
The Programs and Features option of the Control Panel is used to view and manage installed applications, or to enable or disable individual Windows features.
The incorrect answers:
B. Services
The Services utility would allow the administrator to disable a TFTP service, or any other Windows service. To remove a client or Windows feature, the administrator would need to use Programs and Features.
C. Network and Sharing Center
The Network and Sharing Center manages all network adapters and sharing settings in Windows. The Network and Sharing Center does not enable or disable individual application use.
D. File Explorer options
The File Explorer options are used to customize the options available in the File Explorer, change the view in the window, and modify the Windows search options. File Explorer does not control the use of individual applications.
An attacker has gained access to a password hash file. Which of the following will the attacker use to obtain the passwords?
❍ A. DoS
❍ B. Decryption
❍ C. Brute force
❍ D. Phishing
The Answer: C. Brute force
Since a hash is a one-way cryptographic method, the only way to determine the original plaintext is to try every possible combination until the hash is matched. This brute force method is the only way to determine the original source of the hash.
The incorrect answers:
A. DoS
A DoS (Denial of Service) would cause a service to be unavailable to others. A DoS attack would not determine the original passwords based on a hash.
B. Decryption
A hash is a one-way function and it’s not encrypted data, so there’s no option available for decrypting the passwords.
D. Phishing
Phishing is a social engineering method that convinces someone to willingly provide secret or private information. Performing a brute force attack on a hash file is not a method of phishing.
A server administrator needs to create a folder on a Windows server to store weekly status report documents. Which of the following command- line tools would provide this functionality?
❍ A. md
❍ B. net use
❍ C. cd
❍ D. dir
❍ E. ls
The Answer: A. md
The md (Make Directory) command is used to create a subdirectory or folder on the file system.
The incorrect answers:
B. net use
The net command is used for many different Windows-related functions. The net use option will associate a drive letter with a Windows share.
C. cd
The cd (Change Directory) command is used to change the current command line context to a different working directory. The cd command is used in both Windows and Linux.
D. dir
The Windows dir (Directory) command is used to provide a list of the files and objects in the file system.
E. ls
The ls (list directory) command is used to view the files and objects in the Linux file system. This is the Linux equivalent of the Windows dir command.
Which of the following would be the BEST choice for a system administrator to manage an Active Directory database?
❍ A. Batch file
❍ B. PowerShell
❍ C. JavaScript
❍ D. Visual Basic Scripting
The Answer: B. PowerShell
PowerShell is Microsoft’s command line scripting environment for the Windows operating system and provides integrations to automate almost every aspect of Windows.
The incorrect answers:
A. Batch file
A batch file provides access to the Windows file system, but it does not directly integrate with a Microsoft Active Directory database.
C. JavaScript
JavaScript is commonly used in a browser to customize aspects of the user interface or a website. JavaScript would not be the first choice to manage an Active Directory database.
D. Visual Basic Scripting
Visual Basic Scripting provides general purpose scripting in Windows, and very commonly in Microsoft Office applications. Visual Basic Scripting would not be the best choice for Active Directory automation.
A desktop technician has received a complaint that a remotely-hosted application has stopped working. The technician believes that a network outage at the application provider is the root cause of the issue. Which of the following tools would be the BEST choice to confirm the location of the outage?
❍ A. ping
❍ B. nslookup
❍ C. netstat
❍ D. tracert
The Answer: D. tracert
The tracert (traceroute) utility will show the network routes between two devices. If the route is disrupted between those two devices, the last available router will be identified.
The incorrect answers:
A. ping
The ping command will identify devices on the network, but it does not provide any location details if the device does not respond.
B. nslookup
The nslookup (Name Server Lookup) command will query a DNS (Domain Name System) server to identify IP addresses and fully qualified domain names. The nslookup command does not provide any information about network traffic or outages.
C. netstat
The netstat command will display connections, routes, and other network statistics associated with a single device. The netstat command does not provide any information about the uptime and availability of a remote network connection.
A Linux administrator is using the grep command while monitoring a database application. Which of the following would BEST describe this activity?
❍ A. Search through a file for specific text
❍ B. View a list of running processes
❍ C. Change the permissions of a file
❍ D. View the name of the working directory
The Answer: A. Search through a file for specific text
The grep command is used to search through a file or set of files for specific text.
The incorrect answers:
B. View of list of running processes
The ps (Process List) command is commonly used to view all of the running processes on a Linux computer. This is similar in functionality to the Windows Task Manager.
C. Change the permissions of a file
The Linux chmod (Change Mode) command is used to change the permissions of a file for the file owner, the file group, and everyone else.
D. View the name of the working directory
The pwd (Print Working Directory) command is used to display the current working directory path. This command is the same in both Windows and Linux.
A company requires all users to authenticate to a proxy before communicating to external websites. Which of the following should be used to integrate the proxy authentication with the existing Active Directory credentials?
❍ A. AES
❍ B.TKIP
❍ C. RADIUS
❍ D. WPA3
The Answer: C. RADIUS
RADIUS (Remote Authentication Dial-in User Service) is an authentication protocol used to integrate with many existing user databases. It’s common to use RADIUS to connect a service with an Active Directory database to use for centralized authentication.
The incorrect answers:
A. AES
AES (Advanced Encryption Standard) is an encryption protocol, and AES does not integrate a third-party service with an Active Directory database.
B. TKIP
TKIP (Temporal Key Integrity Protocol) was commonly used with the original WPA (Wi-Fi Protected Access) encryption method on 802.11 wireless networks. WPA and TKIP are no longer recommended as encryption and integrity mechanisms.
D. WPA3
WPA3 (Wi-Fi Protected Access version 3) is an encryption technology for 802.11 wireless networks. WPA3 does not provide authentication integration to Active Directory databases.
A desktop administrator has been tasked with removing malware from an executive’s laptop computer. The system has been removed from the network, but the Windows startup process shows a Stop Error before rebooting into a repeating cycle. Which of the following would be the best NEXT step in the malware removal process?
❍ A. Perform a Windows Repair installation
❍ B. Boot with a pre-installation environment
❍ C. Schedule periodic scans
❍ D. Create a restore point
The Answer: B. Boot with a pre-installation environment
A Windows PE (Pre-installation Environment) can be used to boot into the Windows Recovery Console to resolve problems with the primary operating system. This is a common task when the primary operating system has been corrupted or will not boot properly.
The incorrect answers:
A. Perform a Windows Repair installation
A Windows Repair installation may resolve the rebooting issue, but
it may also make unintended changes to the operating system. Before making significant changes, it would be worthwhile to try fixing the issue manually.
C. Schedule periodic scans
Because the system is constantly rebooting, it’s not possible to make configuration changes to the anti-virus scanner or the Task Scheduler.
D. Create a restore point
If a restore point already existed, it may be possible to reboot to a previous configuration. However, it would be too late to create a restore point with the existing faulty configuration.
A system administrator would like to upgrade a user’s Windows video editing application to the latest version, but the upgrade utility fails with the error “Not enough free space.” Which of the following utilities would allow the system administrator to resolve this issue?
❍ A. cleanmgr
❍ B. perfmon
❍ C. eventvwr
❍ D. taskschd
❍ E. diskmgmt
The Answer: A. cleanmgr
The cleanmgr.exe (Disk Cleanup) utility will find unused or unneeded files and remove them from the file system. This might include temporary Internet files, error reports, downloaded program files, and others.
The incorrect answers:
B. perfmon
The perfmon.msc (Performance Monitor) utility displays long-term graphs and collects data regarding CPU, network, memory, and other system resources.
C. eventvwr
The eventvwr.msc (Event Viewer) utility provides a log of all operating system, application, and security events in Microsoft Windows.
D. taskschd
The Windows taskschd.msc (Task Scheduler) allow the scheduling of an application or script.
E. diskmgmt
Disk operations can be managed through the diskmgmt.msc (Disk Management) utility.
A user in the shipping department is using a tracking app on a tablet. The app normally takes 10 seconds to load, but is now taking over a minute before it can be used. Tracking searches that normally take seconds are taking almost a minute to show the tracking details. Other tablets are not experiencing this slowdown. Which of the following would be the best NEXT troubleshooting step?
❍ A. Reinstall the tracking app
❍ B. Check the app battery usage
❍ C. Roll back to the previous tablet OS version
❍ D. Perform a reboot
The Answer: D. Perform a reboot
Before making any significant changes, a reboot can be used to clear memory space and reset any potential conflicts.
The incorrect answers:
A. Reinstall the tracking app
Reinstalling the tracking app would make a change to the system. It would be much more efficient to reset the system and test before making any changes to the existing software.
B. Check the app battery usage
The performance of the app appeared to be related to performance on the network, and it did not appear that the battery usage was related to the issue.
C. Roll back to the previous tablet OS version
It would be useful to gather more troubleshooting information before making any significant system changes.
A help desk is receiving reports that a group of devices is not able to communicate outside of their local IP subnet. A technician can ping devices on the same network, but does not receive a response when pinging the IP address of external devices. Which of the following would be the MOST likely cause of this issue?
❍ A. Default gateway
❍ B. DNS server
❍ C. Proxy server
❍ D. Metered connection
The Answer: A. Default gateway
The default gateway is the router providing the communication between the local IP subnet and the rest of the world. If the default gateway isn’t working, users will not be able to access services that are outside of the local subnet.
The incorrect answers:
B. DNS server
The DNS server converts between a fully qualified domain name and an IP address. In this example, the technician was attempting to ping external devices by IP address, so the DNS server would not be part of this issue.
C. Proxy server
A proxy server is commonly used to provide security for incoming or outgoing web services. A technician pinging an external IP address would not commonly be communicating through a proxy server.
D. Metered connection
A metered connection will limit the type and amount of traffic sent over a network connection. Since the pings are working for one device, it’s safe to assume the network connections are not metered or restricted.