Comptia A+ Flashcards
tool included in Windows that allows you to view detailed real-time information about CPU, memory, disk, and network performance and resource usage by the operating system, services, and running apps.
Resource Monitor
controls the working environment of user accounts and computer accounts.
Group Policy Editor
designed to free up disk space on a computer’s hard drive.
Disk Clean Up
important functionality provided by the Operating System which can be used to create, delete, format disk partitions, and much more. It enables users to manage and view the different disks and functions like viewing, creating, deleting, and shrinking the partitions associated with the disk drives.
Disk Management
use these commands when computer running slow
-chkdsk (check disk)
-SFC (system file checker)
verifies connectivity and gives you insight as to possible application problems at the computer that is attempting to print.
test page
amount of memory a user is limited to with a 32-bit version of Windows
4gb
what command in linux allows you to see all the files on your system in long format
ls -la
chronological paper trail of evidence that may or may not be used in court.
chain of custody
steps a person takes when first responding to a computer with prohibited content or illegal activity: it includes identifying what exactly is happening, reporting through proper channels, and preserving data and devices.
First time responder
part of first response; a person who first arrives at the scene of a computer incident will be in charge of preserving data and devices in their current state.
Data (and device) preservation
Two things you need to make secure wireless connection work?
-encryption standard used
-SSID of access point
Service Set Identifier (SSID) of the AP and then the encryption being used (for example, WPA or WPA2). The SSID takes care of the “connection” portion, and the encryption takes care of the “secure” portion. After all computers are connected, consider disabling the SSID for increased security.
is a virtually impenetrable symmetric encryption algorithm that uses a 256-bit key to convert your plain text or data into a cipher.
Advanced Encryption Standard (AES) 256
The data is included in dynamic content that is sent to a web user without being validated for malicious content
xss verification
what control panel app in Windows 10 allows system administrators to modify local user account settings
user accounts
performs copy includes all the files and directories along with their NTFS permissions
robocopy
use this to clean dust inside computer
compressed air
main function of a device driver
allows operating system to talk to device
an attacker that sits in the middle between two stations and is able to intercept, and in some cases, change that information that’s being sent interactively across the network
on-path attack
an attack meant to shut down a machine or network, making it inaccessible to its intended users
Denial-of-Service (DoS) attack
Windows System Recovery Option attempts to automatically fix problems?
startup repair
A Windows Control Panel folder containing shortcuts to various system utilities is called:
admin tools
component of physical security addresses outer-level access control
fences
a protocol that devices within a network use to communicate problems with data transmission
The Internet Control Message Protocol (ICMP)
what program is typically designated to house the recovery utility for troubleshooting and repairs?
WinRE
When a person takes control of a session between a server and a client, it is known as which type of attack?
session hijacking
Session hijacking occurs when an unwanted mediator takes control of the session between a client and a server (for example, an FTP or HTTP session). An example of this would be a man-in-the-middle (MITM) attack.
True or False
True
You create an answer file to aid in installing Windows. Which type of installation are you performing?
unattended installation
An unattended installation of Windows requires an answer file. This file is normally named unattend.xml. Unattended installations can be done locally or as part of a network installation using Windows Deployment Services (WDS) in Server 2008 or higher.
True or Fasle
True
checks protected system files and replaces incorrect versions.
System File Checker ( SFC)
Which Microsoft Windows OS component allows to view and manage installed hardware components and device drivers?
devmgmt.msc
a control panel that gives you access to many advanced administration tools: Task Scheduler, Event Viewer, Performance Monitor, Device Manager, Disk Management, Services, and more.
compmgmt.msc
is a system utility designed to troubleshoot the Microsoft Windows startup process.
System Configuration (msconfig.exe)
You must partition the drive before formatting. True or False
True
A technician is installing a program on a Windows computer and the installation fails. Which to do next?
Run the installer as an administrator
Programs cannot be installed by standard users or guests. You must have administrative rights to do so.
True or False
True
measures the packet loss at each router as the packet travels to the destination address; it combines the ping and tracert commands.
pathping
returns a single destination’s response time
ping command
resolve DNS addresses.
nslookup
allows you to see how a packet travels to its destination
tracert
Disabling the SSID broadcast is a security precaution, but it only keeps out the average user. Any attacker with two bits of knowledge can scan for other things the wireless access point broadcasts.
True or False
True
Using WEP is more secure than not using any encryption and disabling the SSID. RADIUS is an external method of authenticating users; it often requires a Windows Server. WPA2 is very secure; if you had one security option you could enable, make it WPA2.
True or False
True
attempts to rebuild the boot configuration store.
Bootrec /rebuildbcd
one of the methods you can try to repair bootmgr.exe in Windows.
Bootrec /fixboot
rewrites the master boot record in a Windows system that has an MBR-based hard drive (doesn’t affect the more common GPT-based drive)
Bootrec /fixmbr
where the boot configuration store is located
boot\bcd
Because there is only one computer, you can implement auditing only locally. This is done with the Local Security Policy.
True or False
True
is a shortcut in Windows operating system to get a list of all the services on the computer.
Services. msc
Jailbreaking is the process of removing the limitations of an Apple device’s iOS. It enables a user to gain root access to the system and download previously unavailable applications, most likely unauthorized by Apple.
True or False
True
copies all of the files that have changed since the last full backup was performed
Differential
Which type of attack denies authorized users access to network resources?
Denial of service attack
It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.
social engineering
two devices that have a grounding wire attached to them based on the manufacturer’s design?
UPS
Server rack
defends your data, after a connection is established and authenticated, against potential attackers
Encryption in transit
allows you to see all running programs in macOS
mission control
A tool, utility, or command within a program that allows users to locate specific objects (macOS)
finder
stores your passwords and account information, and reduces the number of passwords you have to remember and manage (macOs)
keychain
what command on linux combines files together
cat command
Cat command often used to concatenate one file to nothing to print the single file’s contents to the terminal. This is a quick way to preview the contents of a text file without having to open the file in a large application
True or False
True
file type for installing new software on a macOS computer
.app
computer file on windows that contains an encoded sequence of instructions that the system can execute directly when the user clicks the file icon.
.exe
a collection of files managed by the Debian packages management system (Linux)
.deb
best way to find out which type of connection the printer is using?
right click the printer, select properties, and click the port tabs
True or False
On the Ports tab, you can find how the printer is connected to the computer. This can be a USB, COM, LPT, or TCP/IP port. You might get to this tab by selecting Properties or Printer Properties, depending on the printer.
true
identification method that enables users to log in to multiple applications and websites with one set of credentials
single sign on (sso)
records all errors that occur in system
event viewer
-database that stores the settings for Windows
-contains hardware and software information, plus user settings.
Windows Registry
True or False
If you need to troubleshoot certain Dynamic-Link Libraries (DLLs) or ActiveX controls (for example, ones that work with Internet Explorer), you can manipulate them with the REGSVR32 command
True
True or False
macOS and Linux use a utility called Terminal that allows you to manipulate data and make configuration changes similar to the Command Prompt in Windows.
true
if your printer begins to smoke you should do what
unplug it
Which tab of the Windows’ 10 Task Manager provides an interface for managing background processes?
services
use this command to defrag the partition to drive hard?
defrag.exe -f
best method to apply spray cleaner to a monitor?
Spray on a lint-free cloth
common risk when installing Window drivers that are unsigned
Explanation
By installing a driver that is not signed by Microsoft, you are risking instability of the operating system
which device is best to setup a secure physcial access to a data center
badge reader
which mac command use to close app when not working?
force quit
resume practice question 67 (Practice Exam #2 (220-1102) - Results