A+ Core 2 Stack 1 Flashcards

1
Q

Grants users all permissions on the folder. Administrators have this access

A

Full control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Modify —-

A

Grants users a high level of access, except the ability to take full ownership.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Read & Execute —

A

Allows users to read files and execute executable files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List Folder Contents —

A

Allows users to list the contents of the folder. It does not allow them to read the individual files within that folder. They can only see the file and folder names.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Read —

A

Allows users to read the folder’s contents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Write —

A

Allows user to write or edit the folder’s contents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Modify permissions combine

A

read, write, execute, and delete permissions on everything, including the folder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Read-only: Files with this attribute cannot be — .

A

edited or saved. Safest attribute when file sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hidden: Files with this attribute can only be —

A

seen in the system by Administrators or when certain commands are used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Recovery Console —-

A

This Windows software can be used to copy, rename or replace operating system files and folders and repair the file system boot sector or the Master Boot Record (MBR).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Terminal -

A

Terminal in the Mac OS operates like a command-line prompt in Windows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

System Restore/Snapshot -

A

This software that is available in Windows allows you to create restore points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Pre-installation environments - This environment prepares a computer for a full —–

A

Windows installation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Event Viewer -

A

This troubleshooting tool logs system events and errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In Windows 8 and higher, you can try to _______________________ the operating system.

A

Refresh/restore/reset -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

MSCONFIG/Safe Boot - The System Configuration (MSCONFIG) tool is used to —–

A

troubleshoot startup problems. It allows you to disable individual bootup options.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

If you discover inappropriate material on a company-owned computer but no specific computer-use policy exists (or Acceptable Use policy), you should —

A

inform your supervisor of the inappropriate material.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Because she is the only one having the problem, the problem likely arises from a —

A

setting on her computer. update the network settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The tool used to view the system event logs in Windows. This tool is available in Computer Management or from Administrative Tools in Control Panel. —-

A

Event Viewer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

To load into ____________, press F8 when the operating system menu is displayed during bootup. Safe Mode loads minimal drivers and can allow you to troubleshoot issues. —-

A

Safe Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Allows you to run many commands. —

A

Command prompt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

In Windows XP and later, ______________________is part of the Backup utility. This tool creates a disk that can be used to restore certain aspects of the system but can only be created on a floppy drive, which is often not an option in today’s computers. —

A

Automated System Recovery (ASR) —-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

_____________ an operating system completely removes it from the hard drive. Reinstalling or repairing an operating system allows you to fix any problems that may occur. You should always try repairing first as this will have the least effect on your system. Keep in mind that reinstalling or repairing may require you to update device drivers after the reinstall or repair occurs. —

A

Uninstall/reinstall/repair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

This is the firmware in a computer that is used to store system settings needed at boot time, such as hard drive parameters and boot devices. This is where you would go if you need to change the default boot device. —

A

BIOS/UEFI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
This is another method that can be used to repair an operating system. It is the best option to use if you cannot get Windows to boot at all. In Windows 2000, these were called
emergency repair disks (ERD). ---
26
You should use the _____________________to edit, modify, and update the Boot Configuration Data (BCD) file, which contains the boot settings for a computer. ---
bcdedit.exe utility
27
You could also change the boot order by using the ---
MSCONFIG tool.
28
The taskmgr.exe utility allows you to view and stop running ---
applications, processes, and services.
29
The boot.ini file held configuration data for Windows XP and earlier. It was replaced by the ----
BCD file in Windows Vista and later.
30
The regedit.exe utility edits ---
registry settings.
31
The registry contains important ---
configuration information and is should only be edited by administrators.
32
Regedit and regedt32 are used to edit the ---
registry.
33
Registry edits occur immediately and can
have grave consequences..
34
The Microsoft Register Server (regsrv32) utility registers and unregisters ---
dll files and ActiveX controls in the registry.
35
If a dll file is replaced, it may be necessary to ---
register the new file using this tool.
36
Whaling and spear phishing are two types of
targeted phishing attacks.
37
Spear phishing targets a ---
group of high-risk users in an organization through email and social media posts.
38
Whaling is conducted like spear phishing, except that whaling specifically targets ---
senior executives (the “big fish”).
39
A zombie is a computer that an attacker has accessed and configured to ---
forward transmissions to other computers on the Internet. Often an attacker has more than one zombie.
40
Mining or data mining is a database application term that examines ---
data to predict behavior..
41
Ransomware is a type of attack that installs itself on a computer and
blocks access to the computer until a sum of money is paid. You should contact authorities if you become a victim of a ransomware attack.
42
The Num Lk (Num Lock key) does not control the ---
scrolling feature.
43
Num Lk is a toggle key on the ---
numeric keypad.
44
Num Lk is used to switch between ---
number entry and arrow keys.
45
The Shift key will not prevent arrow keys from ---
moving the cursor from one cell to another cell.
46
The Shift key is a modifier key that can be used to type ---
characters in uppercase when Caps Lock is off.
47
Scroll Lk modifies the behavior of ---
arrow keys
48
According to CompTIA, the steps in the malware removal process are as follows: Identify and research malware symptoms.
1 Quarantine the infected systems. 2 Disable system restore (Windows). 3 Remediate the infected system. 4 Update (or install) anti-malware software. 5 Scan and use removal techniques (safe mode, pre-installation environment). 6 Schedule scans, and run updates. / Enable System Restore, and create a restore point (in Windows). 7 Educate the end user.
49
allows you to work with the Advanced Packaging Tool and install packages (applications) in Ubuntu, which is a Debian-based distribution. ---
apt-get
50
changes directory. ---
cd
51
changes the permissions on a file. ---
chmod
52
changes the ownership of the file. ---
chown
53
copies files and directories. ---
cp
54
allows you to copy a file and convert it to another format during the copying process. ---
dd
55
finds a pattern of text within a file or group of files. ---
grep
56
lists file and directory contents. ---
ls
57
renames or moves a file. ---
mv
58
provides a list of current processes running on the system. ---
ps
59
The ________command displays the working directory, or the directory that you are currently in. ----
pwd
60
quits (exits) the vi editor. ---
q
61
removes a file. ----
rm
62
turns off the computer. ---
shutdown - Adding the /h parameter to the command halts the shutdown and adding the /r parameter to the command reboots after shutdown.
63
The _______command allows you to log on as the superuser (root). The ______ command allows a regular user to execute commands as the superuser. ---
su/sudo -
64
the text editor in Linux. ----
vi
65
The local network login uses one-factor authentication. Although two items are being presented, both items are categorized as something ---
you know.
66
The remote network login uses two-factor authentication. Although three items are being presented, two items are something ---
you know and one is something you have.
67
Three-factor authentication uses something ---
you know (i.e. username or password), something you have (i.e., smart card), and something you are (i.e., biometric authentication).
68
The _______ contains important information regarding chemicals that were shipped by the chemical manufacturer and includes substance properties, identification of substances, substance storage, fire-fighting procedures, substance handling, safety information, and spillover cleanup procedures. ----
MSDS
69
A ______ is used for formatting HTML pages ---
CSS
70
_______________ your data that is stored on your phone is very wise as it scrambles your data making it unreadable. ----
Encrypting
71
This console includes Device Manager, Event Viewer, Shared Folders, Performance/Performance Logs and Alerts (depending on the operating system), and possibly Local Users and Groups and Task Scheduler. This is the console you would open for most computer management tasks.
Computer Management ----
72
It lists all installed hardware and allows you to add and remove hardware, update drivers, and reconfigure hardware. ---
Device Manager
73
You can edit the ______________ by running secpol.msc. This allows you to configure local security settings, including password policies and audit policies. ---
Local Security Policy
74
While ______________Monitor differs depending on the operating system, it purpose is the same: to use performance counters to gather performance statistics. ---
Performance Monitor
75
This console can be opened by running services.msc at the Run command line. It can also be accessed in the Computer Management console or Administrative Tools. ----
Services
76
This tool can be accessed by running msconfig at the command line. This tool includes five tabs: General, Boot, Services, Startup, and Tools. It is mainly used to troubleshoot startup issues. --- System Configuration
System Configuration
77
This tool allows you to schedule jobs to run. ----
Task Scheduler
78
This tool is in Administrative Tools and is used to manage component services. ---
Component Services -
79
This tool is also located in Administrative Tools and is used to manage how a computer connects to a data provider. ----
Data Sources -
80
This tool is available in Windows 7 or higher. It allows you to manage printers and print servers. ----
Print Management
81
This tool is available in Windows 7 and higher, and is used to check for memory problems. It requires a system reboot. At the reboot, the memory test will run. ---
Windows Memory Diagnostics -
82
This tool is accessed from the Control Panel and is used to configure firewall settings on the local computer. ---
Windows Firewall
83
This part of Windows firewall is available in Windows 7 and higher. Windows Firewall with Advanced Security is more powerful than Windows Firewall and can manage security associations and security rules. ---
Advanced Security
84
default installation folder for 64-bit applications in any edition of Windows is_______________, regardless of whether it is running a 32-bit or 64-bit version of the operating system. ---
C:\Program Files
85
If 32-bit applications are installed on a 64-bit Windows Vista computer, the 32-bit applications will install to the ---
C:\Program Files (x86) folder.
86
The C:\Program Files (x64) folder is ---
not a valid default folder.
87
The C:\Windows\System32 folder contains ---
vital operating system files.
88
You can change the default folder for installation by editing the registry. Remember that editing the registry can ---
cause problems with your computer, so only edit the registry if you are sure of what you are doing.
89
32-bit applications can run on 32-bit and 64-bit computers, but 64-bit applications can only run on ---
64-bit computers.
90
If you install both 32-bit and 64-bit applications on a 64-bit computer, the 32-bit applications will be installed in the ----
C:\Program Files (x86)
91
All 32-bit versions of Windows 7 have the following minimum requirements:
1. 1 gigahertz (GHz) processor 2. 1 gigabyte (GB) RAM 3. 16 GB available hard drive space 4. DirectX 9 graphics card with WDDM 1.0 or higher driver
92
All 64-bit versions of Windows 7 have the following minimum requirements:
1. 1 GHz processor 2. 2 GB RAM 3. 20 GB available hard drive space 4. DirectX 9 graphics card with WDDM 1.0 or higher driver
93
Windows 8 and 8.1 have the following minimum requirements:
1. 1 GHz 32- or 64-bit processor with support for PAE,NX and SSE2 /2. 1 GB RAM (32-bit), 2 GB RAM (64-bit) /3. 16 GB hard drive space (32-bit) or 20 GB (64-bit) /4. DirectX 9 graphics card with WDDM driver
94
Windows 10 has the following minimum requirements:
1. Processor: 1 GHz or faster processor or SoC / 2. RAM: 1 GB for 32-bit or 2 GB for 64-bit /3. Hard disk space: 16 GB for 32-bit OS or 20 GB for 64-bit OS /4. Graphics card: DirectX 9 or later with WDDM 1.0 driver /5. Display: 800 x 600
95
The User State Migration Tool (USMT) is used to ---
migrate user settings from one operating system to another in Windows 7 and higher.
96
The Windows Upgrade Advisor is a tool used to ---
determine if your computer is able to run a new operating system version.
97
The Microsoft Assessment and Planning Toolkit is a tool used to ---
plan desktop and server migrations.
98
A hardware compatibility list (HCL) is a list of ---
hardware that is compatible with a particular operating system version. Each version of Windows has its own HCL.
99
WPA was created to fix core problems with ---
WEP.
100
WPA is designed to work with older wireless clients while implementing the ---
802.11i standard.
101
WAP is the default protocol used by ---
most wireless networks and devices
102
WEP was the first security standard for ---
wireless networks and devices that uses encryption to protect data.
103
WPA2 implements the 802.11i standard completely. Therefore, it does ---
not support the use of older wireless cards.
104
WPA uses ________________________for encryption. --- ---
Temporal Key Integrity Protocol (TKIP)
105
WPA2 uses _______________ for encryption. ---
CCM Mode Protocol (CCMP)
106
Both WPA and WPA2 can operate in two modes: -----
Personal and Enterprise.
107
A virus is
malicious software (malware) that relies on other application programs to execute and infect a system.
108
Stealth virus: ---
It hides the changes it makes as it replicates.
109
Self-garbling virus: ---
It formats its own code to prevent antivirus software from detecting it.
110
Polymorphic virus: ---
It can produce multiple operational copies of itself.
111
Multipart virus: ---
It can infect system files and boot sectors of a computer system.
112
Macro virus: ---
It generally infects the system by attaching itself to MS-Office applications.
113
Boot sector virus: ---
It infects the master boot record of the system and is spread via infected floppy disks.
114
Compression virus: ---
It decompresses itself upon execution but otherwise resides normally in a system.