A+ Software Flashcards

1
Q

What should be checked if computer continuously shuts down or reboots, or if there is a burning smell

A

PSU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What should you do if you hear a clicking sound

A

Backup and replace hard drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CHKDSK

A

Used to fix hard drive errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SFC

A

Used to verify/fix OS files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

FIXMBR

A

Used to repair Master Boot Record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

FIXBOOT

A

Used to write a new boot sector to system partition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SFC /SCANNOW

A

Scans OS files to verify integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Utility used to verify whether volumes on a PC are active and their assigned letters

A

Diskpart in Disk Management program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RAID 0

A

2 hard drives; striiped; fast and best performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RAID 1

A

2 Hard drives; mirroring; fault tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

RAID 5

A

3 hard drives; disk striping with parity; fast and fault tolerant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RAID 10

A

4 hard drives; 2 mirrors striped together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does one clear a hard drive

A

FORMAT OR DEGAUSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are methods for destroying hard drives?

A

Drill holes; incinerate; shred; Degauss (destroys factory low level format)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

RAID 0: What should be done if one drive fails?

A

Replace drive, format and install; data is lost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

RAID 1: What should be done if one drive fails?

A

Replace the hard drive and “rebuild” the array/mirror

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

RAID 5: What should be done if one drive fails?

A

Replace failed drive, reboot to recover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

RAID 5: What should be done if two drives fail?

A

Replace the two bad drives, restore from latest backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Drive Wipe

A

Overwrite every sector of a drive (ex DBAN, Dariks boot, Nuke); format for reuse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What command will securely delete and overwrite files on a drive

A

sdelete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What occurs when a drive is formatted?

A

A file system is applied (ex NTFS); A boot sector and MBR is created

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Quick Format

A

Sets up file system; installs MBR; does not clear previous data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Device Manager

A

Used to monitor hardware and add drivers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

You see error message indicating BOOTMGR file is missing/corrupt.
How do you proceed?

A

Boot form DVD, select Repair;

Can run bootrec /fixboot from recovery envir

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What command should you run if you get an error trying to boot after running antivirus software?

A

FIXMBR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

System Restore

A

Quick restore of computer without losing anything currently being worked on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Safe Mode

A

Boosts with basic settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Last Known Good Configuration

A
  • Loads drivers and registry that worked the last time you Windows successfully started and then shut down.
  • Recent data will be lost
  • Quickest method to restore system to working order besides system restore.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is fastest method to restore a computer to working order without losing personal files?

A

System Restore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is the 2nd fastest method to get a system up?

A

Last Known Good Configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What should be done if error indicates “NTLDR is missing” or “BOOTMGR file is corrupt” ?

A

Use BOOTREC /FIXBOOT or

BOOTREC/ FIXMBR from a DVD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Port 80

A

HTTP;

Used for browsing web pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

How is confidential data protected?

A

By enabling advanced encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

How is intermittent wireless connectivity resolved?

A

Change broadcast channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is the best definition of accelerometer?

A

Measure of velocity in a given direction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Best method for providing WiFi security?

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Use what to limit wireless access outside of a building?

A

Use directional antennae;

reduce radio power setting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

APIPA

A

Automatically assigned IP addr 169.254.x.x if NIC cannot obtain a legitimate address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Shoulder surfing

A

Observing someone enter confidential data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Tailgating

A

Following someone in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Phishing

A

Tricking someone into providing private information via phone or email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Social engineering

A

Psychological manipulation so individuals divulge confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Malware types

A

Rootkit
Trojan
Virus
Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Virus

A

Malware requiring user to spread through email/file attachments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Worm

A

Self replicating malware;

Can bog down a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Trojan

A

Malware in downloads;

Secretly performs an action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Rootkit

A

Hides from antivirus;

Attacks OS files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

A cookie is best described as what?

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

A popup is best described as what?

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Administrator account

A

Most powerful acct;
Only one acct exists;
Can install unsigned drivers and software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Power user account

A

Can install programs & create accts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Standard user account

A

Cannot install programs or add drivers;

Not weak as Guest acct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Guest account

A

Most restricted acct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Which account cannot install programs or drivers by default?

A

Standard user acct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Which account is minimally required to install most programs?

A

Power User acct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

A network admin is unable to install programs on a workstation… what is most likely the reason?

A

Username is not part of the local administrator group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What Wdws 7/8/8.1 feature prompts for admin password performing an admin level task?

A

User Account Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

How is User Account Control (UAC) enabled or disabled?

A

User Accounts in Control Panel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

How are older programs installed on a newer W7 machine?

A

Compatibility Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

How is a Windows OS installed across the network?

A

PXE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

“No Operating System” error may indicate?

A

A boot order change is needed or HD is bad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Non System Disk error

A

A non boot CD or USB device is listed before HD in boot order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

BOOTREC.exe /FIXBOOT

A

Command used to write a new boot sector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Factory Recovery Partition

A

Created upon installation which helps restore the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

What method allows a system to boot from a remote server?

A

PXE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

What is BIOS setting is modified to ensure the computer can load OS from a CD?

A

Boot sequence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Multiboot option

A

At startup, options allow loading different OS systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

NTFS

A

File system;
Supports large storage capacity;
Supports security (encryption)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

FAT32

A

Older file system;
Small storage capacity;
No security settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

CDFS

A

Compact Disc File System for CDs, DVDs and Blu-Ray

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

What file system can communicate between Linux and Windows?

A

Fat32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

What file system supports the widest range of operating systems?

A

Fat 32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

X86 OS RAM support

A

Supports 4GB RAM max

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

X64 OS support

A

Supports RAM beyond 4GB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Windows 7 Ultimate

A

Highest functional Windows OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

iCloud

A

Apple storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Time machine

A

Apple backup utility for OS X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Mission Control

A

Mac birds eye view of open windows

79
Q

Apple Boot camp

A

Allows installation of alternative multiple OS on one drive

80
Q

Apple Spotlight

A

Find / Search utility

81
Q

Virtualization

A

Solution allows multiple OS to function simultaneously on hardware

82
Q

What function key accesses Safe Mode

A

F8

83
Q

If the system will not boot after installing a new driver, what should you do?

A

Boot into Safe Mode

84
Q

How would one restore the system quickly if a video driver caused blurred sections on the display?

A

System Restore

85
Q

If the computer experiences the BSOD and the system does not start, what should be done?

A

Use Last Known Good Configuration;
Access via F8;
This loads drivers and registry data working the last time computer successfully started and shut down.

86
Q

How would one restore a configuration where an application was mistakenly uninstalled?

A

System Restore

87
Q

What should be done after malware/virus, adware, popups are discovered?

A

Quarantine virus after it is identified

88
Q

How are vulnerabilities or problems addressed for routers and switches?

A

Firmware updates

89
Q

How are PC vulnerabilities or problems addressed?

A

Patch updates

90
Q

What best practice is used to fix a zero day vulnerability on Linux or Windows systems?

A

Patch update

91
Q

If a downloaded file contains something that performs unexpected activities (i.e. downloads additional files, dials numbers, etc…). What type of file is it referred to as?

A

Trojan Horse

92
Q

What is used to address an issue where a browser is redirected to a specific web site regardless of the URL enterered?

A

Anti Malware

93
Q

What threat is defined by its self propagating characteristics, capable of spreading through the network?

A

Worm

94
Q

What is designed to avoid detection by antivirus program and goes after the OS files?

A

Rootkit

95
Q

A type of threat that uses computers or other networks to accept and pass on viruses?

A

Botnets

96
Q

A cookie is the best example of what?

A

Spyware

97
Q

A popup is the best example of what?

A

Adware

98
Q

Accelometer

A
  • Electronic device used to measure velocity, sense movement & vibration;
  • Used in mobile devices
99
Q

What is used to install applications on an iPad

A

iTunes; App Store

100
Q

What cloud based service is used to save attachments from an Outlook.com email?

A

OneDrive

101
Q

What feature of a mobile device operates the touch screen?

A

Digitizer

102
Q

A procedure for identifying one’s physical location by obtaining GPS data from a mobile phone

A

Geotracking

103
Q

A 15 digit code which specifically identifies each phone

A

IMEI: International Mobile Equipment ID

104
Q

Turns off all radios in phone (Cell, WiFi, Bluetooth, NFC)

A

Airplane mode

105
Q

EFS

A

Encrypting File System;

Used to encrypt files on MS system

106
Q

Bitlocker

A

Encrypts entire hard drive volumes

107
Q

MSCONFIG

A

Startup configuration program;

Allows disabling of startup programs & services

108
Q

Fastest way to stop an application from running at bootup?

A

MSCONFIG

109
Q

How do you access the registry?

A

REGEDIT;

First command to use to access the registry

110
Q

HKEY

A

Handle to Registry Key

111
Q

What is contained in the registry?

A

Database of hardware and software settings

112
Q

HKCR

A

HKEY_CLASS_ROOT

113
Q

HKLM

A

HKEY_LOCAL_MACHINE

114
Q

REGEDT32

A

Second command to use when accessing the registry;

Allows setting and clearing permissions

115
Q

What utility is used to block and/or allow access to email, websites, ports

A

Windows Firewall

116
Q

Which program can be used to view OS and application errors?

A

Eventviewer

117
Q

How is the Event Viewer opened?

A

Start/Programs/Administrative Tools/Event Viewer

118
Q

Which program allows one to create a customized list of utilities in one location

A

MMC: Microsoft Management Console

119
Q

What diagnostic tool can be downloaded and run on Windows computers?

A

DXDIAG;

Used to troubleshoot video/sound related hardware problems

120
Q

How are users limited with what they can do on a computer?

A

Local security policy

121
Q

What program commands are used to stop a program / process without restarting the PC?

A

KILL / TASKKILL

122
Q

What command is used to share a file/folder, map a network share?

A

NET

123
Q

What command will provide a summary of the group policy configuration for a computer?

A

gpresult

124
Q

SU Command

A

Linux:Become a Super User after logging in as a regular user

125
Q

SUDO Command

A

Linux:Become a Super User for just one command

126
Q

Ls Command

A

Linux: List contents of a folder

127
Q

CD

A

Change Directory;

Linux uses a slash / between folders however (ie. CD /var/log)

128
Q

MV

A

Linux: Used to move files

129
Q

RMDIR

A

Linux / DOS: Deletes empty folders

130
Q

MKDIR

A

Makes directories/folders

131
Q

CP

A

Linux: Used to copy files

132
Q

CHMOD

A

Linux: Change read/write permissions of a linux file (Read, Write or Execute)

133
Q

GREP

A

Linux search function that allows you to look for specific text

134
Q

SHUTDOWN

A

Linux: Shutdown a computer; Shutdow -r will include a reboot

135
Q

PWD

A

Linux:: Print Working Directory writes the full pathname of the current working directory

136
Q

APT-GET

A

Linux: Advanced Packaging Tool; Install/update, remove applications via command line

137
Q

IFCONFIG

A

Linux/Mac: View IP address of network adapters

138
Q

What is a Linux command which can be used to rename files

A

MV; example… MV *.txt *.tsv

139
Q

Virtualization

A

Allows one to run multiple systems on a single piece of hardware

140
Q

Hypervisor

A

Software application used to manage and run many various operating systems

141
Q

Hyper-V

A

Microsoft utility enabling installation of alternative OS in a multiboot envir

142
Q

Identify 3 types of security authentication

A

Something you Know (pw);
Something you have (smartcard);
Something you are (fingerprint or other biometric method)

143
Q

Type I authentication security

A

Something you Know (pw)

144
Q

Type II authentication security

A

Something you have (smartcard)

145
Q

Type III authentication security

A

Something you are (fingerprint or other biometric method)

146
Q

Multifactor authentication

A

When two types of authentication are used

147
Q

Authentication that allows access to multiple computers, applications in a domain network

A

Single Sign On

148
Q

When is data on Bitlocker encrypted drives most secure from loss?

A

When combined with Trusted Platform Module

149
Q

Trusted Platform Module (TPM)

A

Specialized chip on an endpoint device that stores encryption keys specific to the host system for hardware authentication

150
Q

How is user access to a network printer limited

A

ACL: Access Control List

151
Q

SaaS

A

Software as a Service;
Cloud computing infrastructure where applications are hosted via the network/internet;
Eliminates need to install on client computers

152
Q

IaaS

A

Infrastructure as a Service;

Uses hardware and software from the Web

153
Q

Paas

A

Platform as a Service; Provides a platform allowing customers to develop, run, and manage applications without maintaining their own infrastructure

154
Q

Hybrid infrastructure example

A

A company that manages its own cloud while utilizing a 3rd party vendor to help manage storage

155
Q

Identify Software troubleshooting process

A

Identify problem; Establish theory; Test theory; Document Findings

156
Q

What is the best way to deal with a difficult customer?

A

Do not argue or become defensive

157
Q

What steps are used to address issue where a browser is redirected to a single website regardless of URL entered?

A

Identify symptoms, quarantine infected system, restore to a previous restore point

158
Q

MSDS documentation

A

Mtls Safety Data Sheet; Guidelines for safe handling and disposal of various computer components

159
Q

Chain of custody

A

In forensic procedures, a chronological record outlining persons in possession of an evidence

160
Q

Data Loss Prevention (DLP)

A

A software or hardware based security solutions designed to detect and prevent unauthorized use and transmission of confidential information outside of a corporate network

161
Q

Acceptable Use Policy (AUP)

A

A set of rules enforced in a network that restricts use of the network and sets guidelines as to how it should b e used

162
Q

Unified Threat Management (UTM)

A

A network security solution combining a firewall’s ability with unique safeguards such as URL filtering, content inspection, or malware inspection.

163
Q

Class A address range

A

0 - 127

164
Q

Class B address range

A

128 - 191

165
Q

Class C address range

A

192 - 223

166
Q

Class A Private Address Range

A

10.0.0.0 - 10.255.255.255

167
Q

Class B Private Address Range

A

172.16.00 - 172.31.255.255

168
Q

Class C Private Address Range

A

192.168.0.0 - 192.168.255.255

169
Q

Wireless standard 802.11b

A

11 Mbps rate
2,4GHz frequency
Distance 300’

170
Q

Wireless standard 802.11a

A

54 Mbps
5 GHz freq
Distance 150’

171
Q

Wireless standard 802.11g

A

54Mbps
2.4Ghz
Distance 300’

172
Q

Wireless standard 802.11n

A

600 Mbps
2.4 or 5.0 GHz
300’ - 400’ range

173
Q

Wireless standard 802.11ac

A

500 - 1300 Mbps (1GB???)
2.4 and 5.0 GHz
200 - 750’

174
Q

Port 25

A

SMTP: Used to send mail

175
Q

Port 22

A

SSH: Used as a secure protocol replacement for telnet

176
Q

Port 53

A

DNS: Used for DNS requests

177
Q

Port 21

A

FTP: Used to send data to client

178
Q

Port 443

A

HTTPS: Secure web traffic

179
Q

Port 110

A

Pop 3: Used to receive and read email

180
Q

Port 3389

A

RDP: Used to remotely access windows systems

181
Q

Port 143

A

IMAP: Used to read email

182
Q

QOS

A

Quality of Service: Capability of network to provide better svc to selected traffic over various technologies

183
Q

CAT 5e net speed

A

Up to 1000 Mbps (1 Gigabit)

184
Q

Cat 6 net speed

A

Up to 10 Gbps

185
Q

What would need to be done if a color laser printer is not printing one of its colors properly?

A

Run a cleaning page

186
Q

What type of power connections does a SATA hard drive need?

A

3.3, 5 and 12 volts

187
Q

What protocol is used for file sharing between Mac and Windows OS on a LAN?

A

SMB

188
Q

In CAT5e UTP cable, which pins transmit data?

A

1 and 2

189
Q

In CAT5e UTP cable, which pins recieve data?

A

3 and 6

190
Q

T568-B pinout

A
W//O
O
W/Gr
Bl
W/Bl
G
W/Br
Br
191
Q

What pairs of wires in a crossover cable are swapped?

A

1, 2, 3, 6
________
1—>3
2–>6

192
Q

FIXBOOT

A

Fixboot is used to write a new boot sector to the system partition.

193
Q

FIXMBR

A

fixmbr is used to repair the Master Boot Record (MBR).

194
Q

What is a GPT

A

GUID Partition table;

Supports partitions up to 18 exabytes