A+ Core 2 Stack 1 Flashcards

1
Q

Grants users all permissions on the folder. Administrators have this access

A

Full control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Modify —-

A

Grants users a high level of access, except the ability to take full ownership.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Read & Execute —

A

Allows users to read files and execute executable files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List Folder Contents —

A

Allows users to list the contents of the folder. It does not allow them to read the individual files within that folder. They can only see the file and folder names.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Read —

A

Allows users to read the folder’s contents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Write —

A

Allows user to write or edit the folder’s contents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Modify permissions combine

A

read, write, execute, and delete permissions on everything, including the folder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Read-only: Files with this attribute cannot be — .

A

edited or saved. Safest attribute when file sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hidden: Files with this attribute can only be —

A

seen in the system by Administrators or when certain commands are used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Recovery Console —-

A

This Windows software can be used to copy, rename or replace operating system files and folders and repair the file system boot sector or the Master Boot Record (MBR).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Terminal -

A

Terminal in the Mac OS operates like a command-line prompt in Windows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

System Restore/Snapshot -

A

This software that is available in Windows allows you to create restore points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Pre-installation environments - This environment prepares a computer for a full —–

A

Windows installation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Event Viewer -

A

This troubleshooting tool logs system events and errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In Windows 8 and higher, you can try to _______________________ the operating system.

A

Refresh/restore/reset -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

MSCONFIG/Safe Boot - The System Configuration (MSCONFIG) tool is used to —–

A

troubleshoot startup problems. It allows you to disable individual bootup options.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

If you discover inappropriate material on a company-owned computer but no specific computer-use policy exists (or Acceptable Use policy), you should —

A

inform your supervisor of the inappropriate material.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Because she is the only one having the problem, the problem likely arises from a —

A

setting on her computer. update the network settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The tool used to view the system event logs in Windows. This tool is available in Computer Management or from Administrative Tools in Control Panel. —-

A

Event Viewer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

To load into ____________, press F8 when the operating system menu is displayed during bootup. Safe Mode loads minimal drivers and can allow you to troubleshoot issues. —-

A

Safe Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Allows you to run many commands. —

A

Command prompt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

In Windows XP and later, ______________________is part of the Backup utility. This tool creates a disk that can be used to restore certain aspects of the system but can only be created on a floppy drive, which is often not an option in today’s computers. —

A

Automated System Recovery (ASR) —-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

_____________ an operating system completely removes it from the hard drive. Reinstalling or repairing an operating system allows you to fix any problems that may occur. You should always try repairing first as this will have the least effect on your system. Keep in mind that reinstalling or repairing may require you to update device drivers after the reinstall or repair occurs. —

A

Uninstall/reinstall/repair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

This is the firmware in a computer that is used to store system settings needed at boot time, such as hard drive parameters and boot devices. This is where you would go if you need to change the default boot device. —

A

BIOS/UEFI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

This is another method that can be used to repair an operating system. It is the best option to use if you cannot get Windows to boot at all. In Windows 2000, these were called

A

emergency repair disks (ERD). —

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

You should use the _____________________to edit, modify, and update the Boot Configuration Data (BCD) file, which contains the boot settings for a computer. —

A

bcdedit.exe utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

You could also change the boot order by using the —

A

MSCONFIG tool.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

The taskmgr.exe utility allows you to view and stop running —

A

applications, processes, and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

The boot.ini file held configuration data for Windows XP and earlier. It was replaced by the —-

A

BCD file in Windows Vista and later.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

The regedit.exe utility edits —

A

registry settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

The registry contains important —

A

configuration information and is should only be edited by administrators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Regedit and regedt32 are used to edit the —

A

registry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Registry edits occur immediately and can

A

have grave consequences..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

The Microsoft Register Server (regsrv32) utility registers and unregisters —

A

dll files and ActiveX controls in the registry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

If a dll file is replaced, it may be necessary to —

A

register the new file using this tool.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Whaling and spear phishing are two types of

A

targeted phishing attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Spear phishing targets a —

A

group of high-risk users in an organization through email and social media posts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Whaling is conducted like spear phishing, except that whaling specifically targets —

A

senior executives (the “big fish”).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

A zombie is a computer that an attacker has accessed and configured to —

A

forward transmissions to other computers on the Internet. Often an attacker has more than one zombie.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Mining or data mining is a database application term that examines —

A

data to predict behavior..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Ransomware is a type of attack that installs itself on a computer and

A

blocks access to the computer until a sum of money is paid. You should contact authorities if you become a victim of a ransomware attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

The Num Lk (Num Lock key) does not control the —

A

scrolling feature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Num Lk is a toggle key on the —

A

numeric keypad.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Num Lk is used to switch between —

A

number entry and arrow keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

The Shift key will not prevent arrow keys from —

A

moving the cursor from one cell to another cell.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

The Shift key is a modifier key that can be used to type —

A

characters in uppercase when Caps Lock is off.

47
Q

Scroll Lk modifies the behavior of —

A

arrow keys

48
Q

According to CompTIA, the steps in the malware removal process are as follows: Identify and research malware symptoms.

A

1 Quarantine the infected systems. 2 Disable system restore (Windows). 3 Remediate the infected system. 4 Update (or install) anti-malware software. 5 Scan and use removal techniques (safe mode, pre-installation environment). 6 Schedule scans, and run updates. / Enable System Restore, and create a restore point (in Windows). 7 Educate the end user.

49
Q

allows you to work with the Advanced Packaging Tool and install packages (applications) in Ubuntu, which is a Debian-based distribution. —

A

apt-get

50
Q

changes directory. —

A

cd

51
Q

changes the permissions on a file. —

A

chmod

52
Q

changes the ownership of the file. —

A

chown

53
Q

copies files and directories. —

A

cp

54
Q

allows you to copy a file and convert it to another format during the copying process. —

A

dd

55
Q

finds a pattern of text within a file or group of files. —

A

grep

56
Q

lists file and directory contents. —

A

ls

57
Q

renames or moves a file. —

A

mv

58
Q

provides a list of current processes running on the system. —

A

ps

59
Q

The ________command displays the working directory, or the directory that you are currently in. —-

A

pwd

60
Q

quits (exits) the vi editor. —

A

q

61
Q

removes a file. —-

A

rm

62
Q

turns off the computer. —

A

shutdown - Adding the /h parameter to the command halts the shutdown and adding the /r parameter to the command reboots after shutdown.

63
Q

The _______command allows you to log on as the superuser (root). The ______ command allows a regular user to execute commands as the superuser. —

A

su/sudo -

64
Q

the text editor in Linux. —-

A

vi

65
Q

The local network login uses one-factor authentication. Although two items are being presented, both items are categorized as something —

A

you know.

66
Q

The remote network login uses two-factor authentication. Although three items are being presented, two items are something —

A

you know and one is something you have.

67
Q

Three-factor authentication uses something —

A

you know (i.e. username or password), something you have (i.e., smart card), and something you are (i.e., biometric authentication).

68
Q

The _______ contains important information regarding chemicals that were shipped by the chemical manufacturer and includes substance properties, identification of substances, substance storage, fire-fighting procedures, substance handling, safety information, and spillover cleanup procedures. —-

A

MSDS

69
Q

A ______ is used for formatting HTML pages —

A

CSS

70
Q

_______________ your data that is stored on your phone is very wise as it scrambles your data making it unreadable. —-

A

Encrypting

71
Q

This console includes Device Manager, Event Viewer, Shared Folders, Performance/Performance Logs and Alerts (depending on the operating system), and possibly Local Users and Groups and Task Scheduler. This is the console you would open for most computer management tasks.

A

Computer Management —-

72
Q

It lists all installed hardware and allows you to add and remove hardware, update drivers, and reconfigure hardware. —

A

Device Manager

73
Q

You can edit the ______________ by running secpol.msc. This allows you to configure local security settings, including password policies and audit policies. —

A

Local Security Policy

74
Q

While ______________Monitor differs depending on the operating system, it purpose is the same: to use performance counters to gather performance statistics. —

A

Performance Monitor

75
Q

This console can be opened by running services.msc at the Run command line. It can also be accessed in the Computer Management console or Administrative Tools. —-

A

Services

76
Q

This tool can be accessed by running msconfig at the command line. This tool includes five tabs: General, Boot, Services, Startup, and Tools. It is mainly used to troubleshoot startup issues. — System Configuration

A

System Configuration

77
Q

This tool allows you to schedule jobs to run. —-

A

Task Scheduler

78
Q

This tool is in Administrative Tools and is used to manage component services. —

A

Component Services -

79
Q

This tool is also located in Administrative Tools and is used to manage how a computer connects to a data provider. —-

A

Data Sources -

80
Q

This tool is available in Windows 7 or higher. It allows you to manage printers and print servers. —-

A

Print Management

81
Q

This tool is available in Windows 7 and higher, and is used to check for memory problems. It requires a system reboot. At the reboot, the memory test will run. —

A

Windows Memory Diagnostics -

82
Q

This tool is accessed from the Control Panel and is used to configure firewall settings on the local computer. —

A

Windows Firewall

83
Q

This part of Windows firewall is available in Windows 7 and higher. Windows Firewall with Advanced Security is more powerful than Windows Firewall and can manage security associations and security rules. —

A

Advanced Security

84
Q

default installation folder for 64-bit applications in any edition of Windows is_______________, regardless of whether it is running a 32-bit or 64-bit version of the operating system. —

A

C:\Program Files

85
Q

If 32-bit applications are installed on a 64-bit Windows Vista computer, the 32-bit applications will install to the —

A

C:\Program Files (x86) folder.

86
Q

The C:\Program Files (x64) folder is —

A

not a valid default folder.

87
Q

The C:\Windows\System32 folder contains —

A

vital operating system files.

88
Q

You can change the default folder for installation by editing the registry. Remember that editing the registry can —

A

cause problems with your computer, so only edit the registry if you are sure of what you are doing.

89
Q

32-bit applications can run on 32-bit and 64-bit computers, but 64-bit applications can only run on —

A

64-bit computers.

90
Q

If you install both 32-bit and 64-bit applications on a 64-bit computer, the 32-bit applications will be installed in the —-

A

C:\Program Files (x86)

91
Q

All 32-bit versions of Windows 7 have the following minimum requirements:

A
  1. 1 gigahertz (GHz) processor 2. 1 gigabyte (GB) RAM 3. 16 GB available hard drive space 4. DirectX 9 graphics card with WDDM 1.0 or higher driver
92
Q

All 64-bit versions of Windows 7 have the following minimum requirements:

A
  1. 1 GHz processor 2. 2 GB RAM 3. 20 GB available hard drive space 4. DirectX 9 graphics card with WDDM 1.0 or higher driver
93
Q

Windows 8 and 8.1 have the following minimum requirements:

A
  1. 1 GHz 32- or 64-bit processor with support for PAE,NX and SSE2 /2. 1 GB RAM (32-bit), 2 GB RAM (64-bit) /3. 16 GB hard drive space (32-bit) or 20 GB (64-bit) /4. DirectX 9 graphics card with WDDM driver
94
Q

Windows 10 has the following minimum requirements:

A
  1. Processor: 1 GHz or faster processor or SoC / 2. RAM: 1 GB for 32-bit or 2 GB for 64-bit /3. Hard disk space: 16 GB for 32-bit OS or 20 GB for 64-bit OS /4. Graphics card: DirectX 9 or later with WDDM 1.0 driver /5. Display: 800 x 600
95
Q

The User State Migration Tool (USMT) is used to —

A

migrate user settings from one operating system to another in Windows 7 and higher.

96
Q

The Windows Upgrade Advisor is a tool used to —

A

determine if your computer is able to run a new operating system version.

97
Q

The Microsoft Assessment and Planning Toolkit is a tool used to —

A

plan desktop and server migrations.

98
Q

A hardware compatibility list (HCL) is a list of —

A

hardware that is compatible with a particular operating system version. Each version of Windows has its own HCL.

99
Q

WPA was created to fix core problems with —

A

WEP.

100
Q

WPA is designed to work with older wireless clients while implementing the —

A

802.11i standard.

101
Q

WAP is the default protocol used by —

A

most wireless networks and devices

102
Q

WEP was the first security standard for —

A

wireless networks and devices that uses encryption to protect data.

103
Q

WPA2 implements the 802.11i standard completely. Therefore, it does —

A

not support the use of older wireless cards.

104
Q

WPA uses ________________________for encryption. — —

A

Temporal Key Integrity Protocol (TKIP)

105
Q

WPA2 uses _______________ for encryption. —

A

CCM Mode Protocol (CCMP)

106
Q

Both WPA and WPA2 can operate in two modes: —–

A

Personal and Enterprise.

107
Q

A virus is

A

malicious software (malware) that relies on other application programs to execute and infect a system.

108
Q

Stealth virus: —

A

It hides the changes it makes as it replicates.

109
Q

Self-garbling virus: —

A

It formats its own code to prevent antivirus software from detecting it.

110
Q

Polymorphic virus: —

A

It can produce multiple operational copies of itself.

111
Q

Multipart virus: —

A

It can infect system files and boot sectors of a computer system.

112
Q

Macro virus: —

A

It generally infects the system by attaching itself to MS-Office applications.

113
Q

Boot sector virus: —

A

It infects the master boot record of the system and is spread via infected floppy disks.

114
Q

Compression virus: —

A

It decompresses itself upon execution but otherwise resides normally in a system.