after exam b2 Flashcards

1
Q

Which Windows utility allows the system administrator to start, stop and
manage all of the functions of a background process.

A

Windows Services utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A system administrator is concerned that the local Windows file system
may contain logical file system errors. Scan and repair any potential file
system errors from the Windows command line.

A

The chkdsk (Check Disk) command is used to identify and fix logical file
system errors and bad physical sectors. The /f option will fix the logical file
system and the /r option will locate bad sectors and attempt to recover any
readable data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What’s the difference between SFC Scannow and CHKDSK?

A

SFC Scannow checks and fixes corrupt system files while CHKDSK checks and fixes file system errors and checks the physical hard drive bad sectors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A system administrator has inadvertently installed a Trojan horse that has
deleted a number of files across many Windows file shares. The Trojan
also had access to user documents and login credentials and transmitted
numerous documents to an off-site file storage system. Which of the
following would limit the scope of future exploits?
❍ A. Require multi-factor authentication
❍ B. Disable all guest accounts
❍ C. Modify the default permissions
❍ D. Configure full disk encryption
❍ E. Require complex passwords
❍ F. Require a screensaver password

A

The Answer: C. Modify the default permissions
Many system administrators configure their accounts to have full access
to the network as their default setting. This means that malicious software
would also have full access if the administrator’s desktop was exploited.
Changing the default permissions to have limited access would also limit
the scope of a Trojan horse exploit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A desktop administrator has just removed malware from a user’s desktop
computer and has configured the system to automatically update antivirus signatures and perform a scan each night. Which of the following
should be the NEXT step in the removal process?
❍ A. Enable System Protection
❍ B. Educate the end-user
❍ C. Quarantine the computer
❍ D. Boot to Safe Mode

A

The Answer: A. Enable System Protection
Before the malware was removed, System Protection was disabled to
delete all potentially-infected restore points. Once the malware is removed
and the anti-malware process is working again, System Protection can
be re-enabled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A security administrator is installing a new VPN connection for remote
users. The administrator would like all users to authenticate with their
usual Windows Active Directory credentials. Which of the following
technologies would provide this functionality?
❍ A. RADIUS
❍ B. WPA2
❍ C. TKIP
❍ D. WEP

A

The Answer: A. RADIUS
RADIUS (Remote Authentication Dial-in User Service) is an
authentication protocol commonly used to provide authentication from
devices to a centralized database. A common use of RADIUS is to
authenticate users to an Active Directory database from a router, switch,
VPN concentrator, or any other service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Which of the following partition types limit a Windows installation to a 
maximum partition size of 2 TB?
❍ A. FAT32
❍ B. GPT
❍ C. NTFS
❍ D. MBR
A

The Answer: D. MBR
The MBR (Master Boot Record) partition style is an older method
partitioning files, and the maximum partition size of an MBR partition is
2 terabytes in size.
The incorrect answers:
A. FAT32
FAT32 (File Allocation Table 32-bit) is a Microsoft file system originally
designed for earlier versions of Windows. FAT32 is not a partition type.
B. GPT
GPT (GUID Partition Table) is a modern partition style that increases
the number of partitions and partition sizes over the older MBR style.
C. NTFS
NTFS (NT File System) is a Microsoft file system designed to replace the
older FAT32 file system. NTFS is not a type of partition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Jack, an executive, has a laptop that runs very slowly after login and
continues running slowly throughout the day. Jack has complained that
certain applications cannot be started and others will randomly crash.
A check of the laptop shows that the memory utilization is very close to
100%. Which of the following would provide a short-term fix for
this issue?
❍ A. Disable startup items
❍ B. Update to the latest OS patches
❍ C. Defragment the hard drive
❍ D. Reboot the computer

A

The Answer: A. Disable startup items
The memory utilization issue appears immediately after the login process,
so disabling some startup items may help resolve the issue until a memory
upgrade or better laptop is located.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A user receives a browser security alert on his laptop when visiting any
website that uses HTTPS. If he uses his smartphone, he does not receive
any error messages. Which of the following would BEST describe
this situation?
❍ A. The date and time on the laptop is incorrect
❍ B. The smartphone is not updated with the latest OS version
❍ C. The laptop has an incorrect subnet mask
❍ D. The laptop does not have the latest anti-virus signatures

A

The Answer: A. The date and time on the laptop is incorrect
The date and time on a device is important when encryption is involved. If
a date is very different between devices, the encryption process may fail or
the encryption certificate may appear to be expired.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A user has opened a help desk ticket regarding the battery life in her
three-year old smartphone. If a power source is not available, the phone
battery is usually depleted by the middle of the work day. She uses the
smartphone to access resources across the VPN, send and receive email,
and run company-related apps. Her average screen time during the day
usually exceeds ten hours. Which of the following would be the MOST
likely reason for this battery issue?
❍ A. The phone is consuming more power than usual
❍ B. The battery capacity is decreased
❍ C. The company apps need to be updated
❍ D. The LCD screen is faulty

A

The Answer: B. The battery capacity is decreased
Smartphone batteries have a lifespan of about 300 to 500 charge cycles,
so smartphone that’s three years old will not have the same capacity as the
battery in a new smartphone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Which of the following script extensions would commonly be used inside 
of a Microsoft Office application?
❍ A. .vbs
❍ B. .py
❍ C. .bat
❍ D. .js
A

The Answer: A. .vbs
The .vbs extension is used for Microsoft Visual Basic Scripting Edition
scripts. These scripts provide general purpose scripting in Windows, and
are especially common inside of Microsoft Office applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A system administrator needs to configure a laptop to support inbound
Remote Desktop services for the help desk team. Which of these Control
Panel applets provides access to these settings?
❍ A. Internet Properties
❍ B. Devices and Printers
❍ C. Network and Sharing Center
❍ D. System

A

The Answer: D. System
The System applet includes a Remote tab for Remote Assistance and
Remote Desktop. The Remote Desktop option is available in non-Home
editions of Windows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A system administrator is installing a new video editing application on
a user’s workstation from an installation DVD-ROM. However, the
installation process fails due to lack of available drive space. Which of the
following would be the BEST way to complete the installation process?
❍ A. Use a USB drive for the installation source
❍ B. Compress the installation files
❍ C. Install the application to a network share
❍ D. Manually copy the installation files to the application directory

A

The Answer: C. Install the application to a network share
The installed application files can be much larger than the installation
utility, so using a network share with a larger available storage space can be
a good alternative until free space is available on the local computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of these would be the BEST way to prevent an attacker from
modifying default routes on a SOHO wireless network?
❍ A. Configure MAC address filtering
❍ B. Enable WPS connectivity
❍ C. Change the router’s default password
❍ D. Disable unneeded interfaces

A

The Answer: C. Change the router’s default password
The login credentials to a SOHO (Small Office / Home Office) router
protect the device from configuration changes. If the default password is
configured on a router, then anyone would be able to make changes on the
device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly