Comptia A+ 1102 Section 2 Flashcards
What Microsoft Windows tool provides a more robust means of configuring hundreds of networked Windows computer settings, and is a much more efficient way of implementing settings across a domain than manually configuring each networked client?
Group Policy Editor (gpedit.msc)
When typed at the command prompt in a Microsoft Windows client, what is the purpose of the ipconfig command?
Troubleshoot the network adapter.
Personal computer (PC) objects are drives, typically referred to by letters such as A, C, D, X, and sometimes names. They can be a physical disk, a partition on a disk, or a removable disc. While the C: drive is usually the primary drive (where the Windows installation resides), what drive navigation input would get a user to a file named “audit” on a floppy disk drive of a typical PC?
A:\ Audit
When typed at the command prompt in a Microsoft Windows client, what is the purpose of the cd command?
Moves to a different directory.
What command is a Windows utility that can allow administrators to view shared resources and configure them on a Windows network?
net use
From a Windows 10 command prompt, what command would display a network adapter’s configuration and aid in troubleshooting the network adapter?
ipconfig
A system administrator will need to configure the local users and groups on a stand-alone computer (PC). What default console provides an administrator the ability to schedule tasks and configure disks, services, devices, and local users and groups?
Computer Management (compmgmt.msc)
An organization has tasked a system administrator to procure a workstation with the same capabilities or more already in use by the engineering department for a Windows-based computer-aided drafting (CAD) program. What built-in Windows tool provides a comprehensive inventory that the administrator could utilize to ensure a comparable or better workstation that the organization can purchase?
System Information
What remotely accessible database stores operating system, device, and software application configuration information in a Microsoft Windows environment and allows manual edits to the Windows configuration?
The Registry
What does the Registry Editor (regedit.exe) provide the administrator in a Microsoft Windows environment?
It provides remote management of a client operating system and its devices, software, and applications configuration information.
An IT manager is setting up an image for dispatching airplanes at a major airport. They are trying to lock down the image to run only the dispatch service. One of the layers of security is to block unneeded service ports from communicating, such as email. Where should the manager start?
Windows Firewall
An IT manager, who is in charge of the client image, considers enabling a data at rest solution. Where can the manager go to enable the built-in Microsoft solution?
System Settings
A penetration tester conducts the initial reconnaissance phase and is currently targeting externally facing servers for a certain company. Currently, they are trying to enumerate the domain name system (DNS) servers. Which built-in tool will help them perform this?
dig
A security analyst conducts an incident response investigation against suspected malware on a userbox. The analyst suspects a certain variant of malware known to beacon out to a command and control server. What command will help them investigate this?
netstat
A marketing professional normally sends large files to other team members. The IT department recommended using a shared drive and assisted them in setting it up. The project was a very high priority, so the professional collaborated with several members but started receiving reports that some users could not access it sometimes and others could. They eventually figured out that only 20 people at a time seemed to be able to access it. What is causing the issue?
The share was created on a Windows Desktop
Which of the following extensions combines a scripting language with hundreds of prebuilt modules called cmdlets that can access and change most components and features of Windows and Active Directory components and features?
.ps1
A company has hundreds of employees who use the same software on their computers, so they offer a company product key to access the software. What is this product?
Corporate-use license
An administrator wants to listen to music through headphones to help with productivity during work. However, the administrator is having issues connecting the headphones via Bluetooth. Where should they go first to look?
Devices
An intern for a Windows server team is watching a server administrator verify the authenticity and integrity of an installer. Where did the administrator most likely get it from?
Internet Download
A user is conscientious about security after hearing about breaches in the news. The user wants to see if they are up to date on patches for their Apple computer. Where should the user go to check?
App Store
What technique is used on hard drives that reset them to factory condition and the hard drives only contain the information necessary to interact with a file system?
Low-level formatting
An employee uses an option to ask for help from a technician with an invitation file protected by a passcode. What is this option?
MSRA
A penetration tester targeted top-level executives during a test by sending out phishing emails. They received their first shell when the first executive opened the attachment in the phishing email. Once the penetration tester connects to the executive’s computer, what command will tell them the location of where their shell landed?
pwd
A security administrator for Linux systems in their demilitarized zone wants to ensure only some administrators can perform certain commands. Which of the following is best used to lock down certain commands?
sudo
A server administrator has not used the command line in quite some time and is trying to remember what will help them with commands and how to use them. Which of the following should the administrator use?
/?
While browsing the internet, a user receives a pop-up that states, “We have detected a Trojan virus. Click OK to begin the repair process.” Out of fright, the user clicks OK. Given the following choices, what is the most likely outcome of the user’s response?
Unwanted notifications start popping up in Windows.
An administrator in charge of user endpoint images wants to slipstream and use image deployment. Which boot method would best support this?
Network
What uses domain names of components loading on the web page against a vast blacklist?
Ad blocker
A user likes to watch Netflix on their phone while on the treadmill. The user turns the phone sideways for better viewing, but this time, the picture did not orient to landscape as it always has. Which of the following could cause this issue?
Rotation lock is enabled
According to CompTIA’s seven-step best practices procedure for malware removal, which of the following correctly lists the first three steps?
- Investigate and verify malware symptoms. 2. Quarantine infected systems. 3. Disable System Restore.
An IT manager is setting up an image for dispatching airplanes at a major airport. They are trying to lock down the image to run only the dispatch service. One of the layers of security is to block unneeded service ports from communicating, such as email. Where should the manager start?
Windows Firewall
A software engineer uses the “data protection” option for the apps on their mobile device. This option is subject to the second round of encoding using a key derived from and protected by the user’s credentials. What is this method?
Device Encryption
A computer administrator sets up a client workstation to join a centrally managed network. What options should the administrator configure to do this?
Access work or school
An administrator uses a backup rotations scheme that labels the backup tapes in generations. What is this called?
GFS
A technician helps a customer with a ticket request and needs to record that the customer has accepted that the ticket can be closed. Which of the following fields reflect this part of the ticket life cycle?
Problem resolution
A user just installed a new application on their workstation, but the application has issues even starting up. The user has been working on the machine regularly up to this point without any prior issues. Which of the following is most likely the issue?
Firewall
A technician uses a backup method that reflects how much lost work can be tolerated. What is this method?
Frequency
A pet store owner receives an email from their bank with a special financing offer. The owner clicks on the attachment, but it does not open. Later that day, when the owner returns to their computer, it is running very slowly and will not connect to the internet. By the time the IT consultant arrives, the computer has locked up. Which of the following is the best action for the IT consultant given the existing conditions?
Run an antivirus scan.
A security engineer runs a long tail analysis to determine the frequency of services and processes communicating to the internet. After baselining a large amount of normal traffic such as updates, they encounter a suspicious communication frequency every five minutes from a particular box. They have done a thorough job investigating running processes, memory analysis, and file integrity checks but find nothing. What else could the engineer check for persistence mechanisms that could send the communications?
taskschd.msc
A network administrator troubleshoots domain name system (DNS) issues that a particular user is having. Which of the following utilities will help the administrator troubleshoot DNS specifically?
nslookup