A+ Part 2 Flashcards
Windows’ 64-bit shared system files (DLLs and EXEs) are stored in %SystemRoot%\____
System32
DLL/system Files for the 32-bit versions are stored in %SystemRoot%\
syswow64
A support operator helps a user who is complaining about latency and sluggish performance. Which of the following will be the least helpful in troubleshooting?
- Perform a system file check (SFC)
- Use Task Manager.
- Reboot.
- Run fewer programs.
In modern systems, checking file integrity will not improve sluggish performance. In most instances, it will have no effect.
A student considers upgrading but has many custom drivers and hardware in their Windows-driven rig. Where can the student look for a catalog of tested devices and drivers for this platform?
- HCL
- PXE
- NIST
- SED
Microsoft maintains a Windows Logo’d Product List (LPL) catalog, also called the Hardware Compatibility List (HCL). This is a catalog of tested devices and drivers. If a device has not passed Windows logo testing, users should check the device vendor’s website to confirm whether there is a driver available.
A user brings in a laptop that does not boot. Based on the user’s description, the assistant suggests running chkdsk. How can the user do this?
- System Restore
- WinRE
- UEFI
- BCD
Drop into the Windows Recovery Environment (WinRE) command prompt, where the user could run commands such as diskpart, sfc, chkdsk, bootrec, bcdedit, or regedit to try to repair the installation manually.
A curious IT professional investigates the hidden System Reserved partition. What will the professional find contained in the partition?
- RMM
- MSDS
- NLA
- BCD
*
The BOOTMGR and the boot configuration data (BCD) file are normally installed to a hidden System Reserved partition.
A penetration tester looks to harvest credentials from users who log in locally. Where should the penetration tester look for users who authenticated locally?
SAM
Kerberos
VPN
Web portal
In a Windows local sign-in, the Local Security Authority (LSA) compares the submitted credential to the one stored in the Security Accounts Manager (SAM) database, which is part of the registry. This is also referred to as interactive logon.
In a Windows network sign-in, the LSA can pass the credentials for authentication to a network service. The preferred system for network authentication is based on a system called Kerberos.
In a remote sign-in, if the user’s device is not connected to the local network, authentication can take place over some type of virtual private network (VPN).
A pen tester would need access to the web server to access credentials stored to access a web portal.
A PC user is looking at the wireless card adapter properties on their Windows computer. Which of the following is the most important setting to verify in order to ensure the PC is capable of connecting to an existing network?
- Power transmission
- SSID
- Automatic connection
- Protocol support
Protocol support
A server administrator wants to connect to a user’s computer. They are trying to get their patching numbers up and discover that users must pull the updates, so the administrator wants to push a script that forces the pull. The administrator wants to copy the file to users’ automatically hidden shares. Which of the following could the administrator use? (Select all that apply.)
- C:\Windows$
- C$
- C:\Users$
- ADMIN$
ADMIN$
C$
Where would you look for the option to view and configure wireless adapter status in macOS?
In the Status menu on the Menu bar, in the top-right of the screen, or in the Network prefpane.
What is the name of Apple’s backup software for macOS?
Time machine
A user finds a .app directory in their Downloads folder on their Mac. What is this most likely indicative of?
- The package contents were copied.
- The app setup needs to perform additional actions.
- The application is being sideloaded.
- The app has been installed.
The app has been installed.
A _ is a short representation of data. A _ function takes any amount of data as input and produces a fixed-length value as output.
hash
What type of cryptographic key is delivered in a digital certificate?
A digital certificate is a wrapper for a subject’s public key. The public and private keys in an asymmetric cipher are paired. If one key is used to encrypt a message, only the other key can then decrypt it.
What two factors must a user present to authenticate to a wireless network secured using EAP-TLS?
- A digital certificate and its associated private key are installed on the wireless station.
- Device authentication, typically via a password, PIN, or biometric gesture, permits access to the private key.