Comptia A+ Flashcards

1
Q

tool included in Windows that allows you to view detailed real-time information about CPU, memory, disk, and network performance and resource usage by the operating system, services, and running apps.

A

Resource Monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

controls the working environment of user accounts and computer accounts.

A

Group Policy Editor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

designed to free up disk space on a computer’s hard drive.

A

Disk Clean Up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

important functionality provided by the Operating System which can be used to create, delete, format disk partitions, and much more. It enables users to manage and view the different disks and functions like viewing, creating, deleting, and shrinking the partitions associated with the disk drives.

A

Disk Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

use these commands when computer running slow

A

-chkdsk (check disk)
-SFC (system file checker)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

verifies connectivity and gives you insight as to possible application problems at the computer that is attempting to print.

A

test page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

amount of memory a user is limited to with a 32-bit version of Windows

A

4gb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what command in linux allows you to see all the files on your system in long format

A

ls -la

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

chronological paper trail of evidence that may or may not be used in court.

A

chain of custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

steps a person takes when first responding to a computer with prohibited content or illegal activity: it includes identifying what exactly is happening, reporting through proper channels, and preserving data and devices.

A

First time responder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

part of first response; a person who first arrives at the scene of a computer incident will be in charge of preserving data and devices in their current state.

A

Data (and device) preservation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Two things you need to make secure wireless connection work?

A

-encryption standard used
-SSID of access point

Service Set Identifier (SSID) of the AP and then the encryption being used (for example, WPA or WPA2). The SSID takes care of the “connection” portion, and the encryption takes care of the “secure” portion. After all computers are connected, consider disabling the SSID for increased security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

is a virtually impenetrable symmetric encryption algorithm that uses a 256-bit key to convert your plain text or data into a cipher.

A

Advanced Encryption Standard (AES) 256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The data is included in dynamic content that is sent to a web user without being validated for malicious content

A

xss verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what control panel app in Windows 10 allows system administrators to modify local user account settings

A

user accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

performs copy includes all the files and directories along with their NTFS permissions

A

robocopy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

use this to clean dust inside computer

A

compressed air

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

main function of a device driver

A

allows operating system to talk to device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

an attacker that sits in the middle between two stations and is able to intercept, and in some cases, change that information that’s being sent interactively across the network

A

on-path attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

an attack meant to shut down a machine or network, making it inaccessible to its intended users

A

Denial-of-Service (DoS) attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Windows System Recovery Option attempts to automatically fix problems?

A

startup repair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A Windows Control Panel folder containing shortcuts to various system utilities is called:

A

admin tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

component of physical security addresses outer-level access control

A

fences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

a protocol that devices within a network use to communicate problems with data transmission

A

The Internet Control Message Protocol (ICMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

what program is typically designated to house the recovery utility for troubleshooting and repairs?

A

WinRE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

When a person takes control of a session between a server and a client, it is known as which type of attack?

A

session hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Session hijacking occurs when an unwanted mediator takes control of the session between a client and a server (for example, an FTP or HTTP session). An example of this would be a man-in-the-middle (MITM) attack.
True or False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

You create an answer file to aid in installing Windows. Which type of installation are you performing?

A

unattended installation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

An unattended installation of Windows requires an answer file. This file is normally named unattend.xml. Unattended installations can be done locally or as part of a network installation using Windows Deployment Services (WDS) in Server 2008 or higher.
True or Fasle

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

checks protected system files and replaces incorrect versions.

A

System File Checker ( SFC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which Microsoft Windows OS component allows to view and manage installed hardware components and device drivers?

A

devmgmt.msc

32
Q

a control panel that gives you access to many advanced administration tools: Task Scheduler, Event Viewer, Performance Monitor, Device Manager, Disk Management, Services, and more.

A

compmgmt.msc

33
Q

is a system utility designed to troubleshoot the Microsoft Windows startup process.

A

System Configuration (msconfig.exe)

34
Q

You must partition the drive before formatting. True or False

A

True

35
Q

A technician is installing a program on a Windows computer and the installation fails. Which to do next?

A

Run the installer as an administrator

36
Q

Programs cannot be installed by standard users or guests. You must have administrative rights to do so.
True or False

A

True

37
Q

measures the packet loss at each router as the packet travels to the destination address; it combines the ping and tracert commands.

A

pathping

38
Q

returns a single destination’s response time

A

ping command

39
Q

resolve DNS addresses.

A

nslookup

40
Q

allows you to see how a packet travels to its destination

A

tracert

41
Q

Disabling the SSID broadcast is a security precaution, but it only keeps out the average user. Any attacker with two bits of knowledge can scan for other things the wireless access point broadcasts.
True or False

A

True

42
Q

Using WEP is more secure than not using any encryption and disabling the SSID. RADIUS is an external method of authenticating users; it often requires a Windows Server. WPA2 is very secure; if you had one security option you could enable, make it WPA2.
True or False

A

True

43
Q

attempts to rebuild the boot configuration store.

A

Bootrec /rebuildbcd

44
Q

one of the methods you can try to repair bootmgr.exe in Windows.

A

Bootrec /fixboot

45
Q

rewrites the master boot record in a Windows system that has an MBR-based hard drive (doesn’t affect the more common GPT-based drive)

A

Bootrec /fixmbr

46
Q

where the boot configuration store is located

A

boot\bcd

47
Q

Because there is only one computer, you can implement auditing only locally. This is done with the Local Security Policy.
True or False

A

True

48
Q

is a shortcut in Windows operating system to get a list of all the services on the computer.

A

Services. msc

49
Q

Jailbreaking is the process of removing the limitations of an Apple device’s iOS. It enables a user to gain root access to the system and download previously unavailable applications, most likely unauthorized by Apple.
True or False

A

True

50
Q

copies all of the files that have changed since the last full backup was performed

A

Differential

51
Q

Which type of attack denies authorized users access to network resources?

A

Denial of service attack

52
Q

It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.

A

social engineering

53
Q

two devices that have a grounding wire attached to them based on the manufacturer’s design?

A

UPS
Server rack

54
Q

defends your data, after a connection is established and authenticated, against potential attackers

A

Encryption in transit

55
Q

allows you to see all running programs in macOS

A

mission control

56
Q

A tool, utility, or command within a program that allows users to locate specific objects (macOS)

A

finder

57
Q

stores your passwords and account information, and reduces the number of passwords you have to remember and manage (macOs)

A

keychain

58
Q

what command on linux combines files together

A

cat command

59
Q

Cat command often used to concatenate one file to nothing to print the single file’s contents to the terminal. This is a quick way to preview the contents of a text file without having to open the file in a large application
True or False

A

True

60
Q

file type for installing new software on a macOS computer

A

.app

61
Q

computer file on windows that contains an encoded sequence of instructions that the system can execute directly when the user clicks the file icon.

A

.exe

62
Q

a collection of files managed by the Debian packages management system (Linux)

A

.deb

63
Q

best way to find out which type of connection the printer is using?

A

right click the printer, select properties, and click the port tabs

64
Q

True or False
On the Ports tab, you can find how the printer is connected to the computer. This can be a USB, COM, LPT, or TCP/IP port. You might get to this tab by selecting Properties or Printer Properties, depending on the printer.

A

true

65
Q

identification method that enables users to log in to multiple applications and websites with one set of credentials

A

single sign on (sso)

66
Q

records all errors that occur in system

A

event viewer

67
Q

-database that stores the settings for Windows
-contains hardware and software information, plus user settings.

A

Windows Registry

68
Q

True or False
If you need to troubleshoot certain Dynamic-Link Libraries (DLLs) or ActiveX controls (for example, ones that work with Internet Explorer), you can manipulate them with the REGSVR32 command

A

True

69
Q

True or False
macOS and Linux use a utility called Terminal that allows you to manipulate data and make configuration changes similar to the Command Prompt in Windows.

A

true

70
Q

if your printer begins to smoke you should do what

A

unplug it

71
Q

Which tab of the Windows’ 10 Task Manager provides an interface for managing background processes?

A

services

72
Q

use this command to defrag the partition to drive hard?

A

defrag.exe -f

73
Q

best method to apply spray cleaner to a monitor?

A

Spray on a lint-free cloth

74
Q

common risk when installing Window drivers that are unsigned

A

Explanation
By installing a driver that is not signed by Microsoft, you are risking instability of the operating system

75
Q

which device is best to setup a secure physcial access to a data center

A

badge reader

76
Q

which mac command use to close app when not working?

A

force quit

77
Q

resume practice question 67 (Practice Exam #2 (220-1102) - Results

A