CompTIA A+ Core 2 Flashcards

1
Q

an old partition style that allows for four primary bootable partitions per hard disk with one marked as active, and 1 extended partition per hard disk, containing additional logical partitions (not bootable)

A

MBR (Master Boot Record)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

category of user groups given a standard set of rights that allows them to perform appropriate system tasks

A

built-in local groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

the latest partition style which requires a UEFI BIOS and allows for 128 partitions, all bootable

A

GPT (GUID Partition Table)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

file system that allows for 2 TB volumes, and max file size of 4 GB

A

FAT32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Microsoft flash drive file system, files can be larger than 4GB

A

exFAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

an improved file system over FAT32 exclusively for use with Windows, including features such as quotas, file compression, encryption, etc

A

NTFS (New Technology File System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ISO 9660 Standard file system, where all OSs can read the CD

A

CDFS (Compact Disk File System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

file systems common on Linux

A

ext3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

file system common on Linux and Android OS

A

ext4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

file system that allows access to files across the network

A

NFS (Network File System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

file system for Mac OS, replaced by APFS in High Sierra

A

HFST (Hierarchical File System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

formatting method that creates a new file table but does not erase data that already existed. it is the default in Windows 7, 8, 10

A

quick format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

formatting method that writes zeroes to the whole disk, making old data unrecoverable, and checks the disk for bad sectors

A

full format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

type of storage involving volumes spanning over an array stored in fixed disks in the computer connected via SATA or NVMe bus

A

dynamic storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

feature that encrypts info on the disk drive

A

Bitlocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

feature that offers file and folder level encryption

A

EFS (Encrypting File System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

feature that allows remote computers to share access to a single cache of data

A

Branchcache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

change directory command

A

cd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

command to rename a file

A

ren OldName NewName

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Windows command to delete a file

A

del or erase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

command to create a directory

A

md or mkdir

ex. md DirectoryName

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

remove directory command

A

rd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

command to get more information

A

help or /?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Windows command to list files and directories

A

dir

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

command to wait nn seconds, then shutdown

A

shutdown /s /t nn

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

command to shut down and restart after nn seconds

A

shutdown /r /t nn

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

command to abort the countdown

A

shutdown /a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

command that fixes logical file system errors on disk

A

chkdsk /f

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

command that locates bad sectors and recovers readable info

A

chkdsk /r

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

command that scans the integrity of all protected system files

A

sfc

system file checker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

command that allows you to manage Windows Imaging Format (WIM) files

A

dism

Deployment Image Servicing and Management Tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Windows command that shows currently running processes

A

tasklist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

command that terminates tasks by process ID

A

taskkill

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

command to force group policy update

A

gpupdate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

command that verifies policy settings for a computer or user

A

gpresult

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

command that formats a disk for use with Windows

A

format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

command that copies files and verifies that the new files are written correctly

A

copy /v

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

command that copies files and suppresses prompting to confirm that you want to overwrite an existing destination file

A

copy /y

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

command that copies files and directory trees

A

xcopy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

command that copies files and directory trees and is a better version of xcopy

A

robocopy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

command that pings your local router/gateway, determines TCP/IP and network adapter info, and views details about DNS servers, DHCP server, etc

A

ipconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

command that testes reachability using ICMP

A

ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

command that determines the route a packet takes to the destination

A

tracert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

command that shows all active connections

A

netstat -a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

command that shows binaries (Windows) and requires elevated access

A

netstat -b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

command that tells terminal not to resolve names (show IPs, not DNS names)

A

netstat -n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

command that looks up info from DNS servers

A

nslookup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What is the solution to internet connectivity issues?

A
  • scan with anti-virus software
  • verify proxy server settings
  • verify network settings
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is the solution for a security alert?

A
  • scan with anti-malware software

- ultimo system restore to return system to previous known-good state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What is the solution for web browser redirection?

A
  • scan with anti-virus software
  • very proxy server settings in web browser
  • verify Host.ini file isn’t corrupted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What is the solution to web browser pop-ups?

A
  • scan with anti-spyware software
  • clear cache
  • delete cookies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

graphical and text-based tool set to fix common Windows startup issues

A

recovery console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

set of tools that can be booted and loaded from a CD, DVD, or thumb drive

A

Pre-Installation Environments (PE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

backup type that backs up everything on the machine

A

full backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

backup type that backs up new files and files modified since last full or incremental backup

A

incremental backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

backup type that backs up all data modified since the last full backup

A

differential backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

From where does a folder inherit its permissions by default?

A

Its parent folder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What actions should you take to secure your wireless network?

A
  • Ensure access point and end host use the same encryption
  • Do not use default SSID
  • Change name of SSID (not last name, company name, location, etc)
  • Disable the SSID broadcast
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What steps should you take to secure your network?

A
  • Change default usernames and passwords
  • Enable MAC filtering
  • Turn off unneeded ports and cover unused network jacks
  • Configure a static IP address
  • Minimize DHCP IP scope to minimum needed
60
Q

Which type of IP address is best for servers, more secure, but more time consuming?

A

static IP

61
Q

Which type of IP address is best for network hosts?

A

Dynamic IP

62
Q

Type of format done by the BIOS that erases the pointers to data on the drive, not the data itself

A

Low level format

63
Q

Type of format done by the OS that erases pointers to data, not the data itself

A

Standard format

64
Q

How should data on CDs, DVDs, and floppy disks be destroyed?

A

Shredder

65
Q

What should you do to sanitize the hard drive if it is to be donated?

A

Overwrite the hard drive with DOD 5220.22-M compliant program

66
Q

Possible causes of blue screen of death

A
  • memory issue

- malware infection

67
Q

possible causes of failure to boot

A
  • incorrect boot configurations in BIOS
  • corrupted or missing boot files
  • missing drivers
68
Q

Possible cause of spontaneous shutdown/reboot

A

often caused by a configuration to automatically restart upon a STOP or blue screen error

69
Q

Possible cause of RAID not being detected during installation

A

Windows installation not recognizing RAID because it’s missing special drivers

70
Q

What could be the causes of slow system performance?

A
  • system not configured for max performance
  • paging file drive is fragmented or full
  • system needs more memory
  • system is overheating
71
Q

Possible causes of a file failing to open

A
  • file corruption

- broken file association

72
Q

command to remove a file from a directory or disk and prompt a delete for each file

A

del /p

73
Q

command to remove a file from a directory or disk and suppress prompt for read-only files

A

del /f

74
Q

command to remove a file from a directory or disk and suppress prompt on a wildcard delete

A

del /q

75
Q

command to remove a file from a directory or disk and also delete files from subdirectories

A

del /s

76
Q

the scheduling service in Linux when you want to run a batch of commands or a script to perform a backup or other maintenance task

A

Cron

77
Q

a non-interactive account with the same, or in some ways better, privileges as the default Administrator account; executed processes are unrestricted in making changes

A

LocalSystem

78
Q

a non-interactive account used to run services that cannot make system-wide changes and can access the network anonymously

A

LocalService

79
Q

functions that describe the overall operation of an access control system

A
  • authentication: prove who you say you are
  • authorization: only authenticated users can access
  • accounting: recording when/by whom it was accessed
80
Q

controls implemented in software to create an access control system

A

logical security

81
Q

the three principle types of cryptographic technology

A
  • cryptographic hash: impossible to recover original string from has value
  • asymmetric encryption: public key and private key
  • symmetric encryption: single secret key
82
Q

logical security technologies designed to prevent malicious software from running on a hose; does not entirely depend on the good behavior of individual users

A

execution control

83
Q

classification category where viewing is restricted to the owner organization or third-parties under NDA

A

classified

84
Q

classification level where the information is highly sensitive, for viewing only by approved persons within an organization

A

confidential

85
Q

a type of release that is well-supported and will be regularly updated by the Linux distribution to support new hardware, performance, and security improvements. good for servers

A

LTS (Long-Term Support) release

86
Q

ia concept in software development where an application is frequently updated through the release of new features over time.

A

Rolling release

87
Q

standardized client-server environment that boots a software assembly, retrieved from a network, on clients. It allows a workstation to boot from a server on a network before booting the local hard drive’s operating system. It is usually used to install an image on the computer over the network

A

The Preboot eXecution Environment (PXE)

88
Q

What can you use to protect against an under-voltage event?

A

battery backup or a line conditioner

89
Q

What can you use to protect against a power loss or power failure?

A

battery backup or generator should be used

90
Q

an electrical apparatus that provides emergency power to a load when the input power source becomes too low or the main power fails. provides near-instantaneous protection from input power interruptions by using a battery backup. The on-battery run-time is usually short (less than 60 minutes) but sufficient to properly shut down a computer system

A

uninterruptible power supply or uninterruptible power source (UPS)

91
Q

a remote access tool and protocol. It is used for screen sharing on Linux and macOS.

A

VNC (virtual network computing)

92
Q

a device that adjusts voltages in under-voltage and overvoltage conditions to maintain a 120 V output, used to protect an entire power circuit from under-voltage events and power sags

A

Line conditioners

93
Q

data used to identify, contact, or locate an individual

A

PII (Personally Identifiable Information)

94
Q

What are the steps for conducting an indecent response?

A
  1. Identify
  2. Report
  3. Preserve the data/device
95
Q

mode used to save the current session to disk before powering off the computer to save battery life

A

hibernate mode

96
Q

mode that saves current session to memory and puts computer in minimal power state to save battery

A

sleep/standby mode

97
Q

formal request to initiate a data transfer by establishing a circuit or connection between two networks

A

Data transport request

98
Q

chronological documentation/paper trail records of the sequence of custody, control, transfer, analysis, and disposition of materials

A

chain of custody

99
Q

formal process of exchanging info between parties about witnesses/evidence they will present at trial

A

Process of discovery

100
Q

process to preserve all forms of relevant information when there will be litigation

A

legal hold

101
Q

hidden system file with .sys extension stored in system drive; reduces workload of physical memory; often referred to as virtual memory

A

Pagefile

102
Q

7 steps to malware removal

A
  1. Investigate and verify malware symptoms
  2. Quarantine the infected systems
  3. Disable system restore in windows
  4. Remediate the infected systems, updated anti-malware software, scan the system, and use removal techniques (eg safe mode, pre-installation environment)
  5. Schedule scans and run updates
  6. Enable system restore and create a restore point in windows
  7. Educate the end user
103
Q

command that finds information in the DNS

A

nslookup

104
Q

what are the meanings of octal permissions 0-7?

A

0: deny all - - -
1: execute - - x
2: write - w -
3: write and execute - w x
4: read-only r - -
5: read and execute r - x
6: read and write r w -
7: allow all r w x

105
Q

linux command that sets the permissions of files or directories on a Linux system

A

chmod

106
Q

linux command that changes user ownership of a file, directory, or link

A

chown

107
Q

linux command to change passwords for user accounts

A

passwd

108
Q

linux command that displays the present working directory

A

pwd

109
Q

linux command that is used to list files

A

ls

110
Q

linux command to display a long list of files

A

ls -l

111
Q

linux command to display all files including hidden or system files

A

ls -a

112
Q

linux command to change directory to the parent directory of the one you are currently working in

A

cd ..

113
Q

linux command used to create a copy of files either in the same or different folder with the same or different name

A

cp

114
Q

linux command that copies a file and displays the files copied

A

cp -v

115
Q

linux command is used to either move files from one directory to another or rename a file

A

mv

116
Q

linux command to delete files

A

rm

117
Q

linux command to remove contents of an entire directory

A

rm -r

118
Q

linux command used to filter files

A

grep

119
Q

command that allows a Linux user to switch to another user account, including superuser (or root) if another user id is not specified

A

su

120
Q

linux command that allows a normal user to run specified commands with superuser privilege level

A

sudo

121
Q

linux command used to list the currently running processes, and their PIDs plus some other info

A

ps

122
Q

linux command used along with a process ID to end the process

A

kill

123
Q

file system search feature in the macOS environment

A

Spotlight

124
Q

linux tool that displays information about the wireless adapters configured within the system

A

iwconfig

125
Q

macOS feature for managing applications from the desktop that is similar to the Windows taskbar

A

Dock

126
Q

MacOS feature used to allow dual booting on a Macintosh computer. It allows the user to boot into either macOS (OS X) or Windows as the computer is rebooted. only supported on Intel-based macOS systems

A

Boot Camp

127
Q

feature in macOS that enables a user to access a CD/DVD on another Mac or Windows computer.

A

Remote disk

128
Q

MacOS utility that enables data to be backed up to an external drive

A

Time Machine

129
Q

Under this protocol, Authentication, Authorization, and Accounting are performed by a separate server (the AAA server). Network access devices, such as routers, switches, wireless access points, or VPN servers, function as client devices of the AAA server. Rather than storing and validating user credentials directly, they pass this data between the AAA server and the user.

A

RADIUS (Remote Authentication Dial-in User Service)

130
Q

weight amount for team lifting

A

over 50 lbs

131
Q

a collection of user accounts that can be assigned permissions in the same way as a single user object. used when assigning permissions and rights, as it is more efficient to assign permissions to a group than to assign them individually to each user. In most corporate environments, they control access to share drives, mailing lists, and other network resources.

A

security group

132
Q

file format for a script to run in Windows PowerShell

A

.ps1

133
Q

used to uniquely identify each piece of hardware tracked in an asset management database

A

asset ID

134
Q

used to communicate data and preferences to child processes within a script or batch file

A

environmental variables

135
Q

interface that offers a glass design that includes translucent windows and was new with Windows Vista

A

Aero

136
Q

a piece of software that allows an application to be supported by a system that normally does not support it

A

shim

137
Q

Windows 7 interface that allows you to configure the firewall, Windows Update, virus protection, spyware and unwanted software protection, internet security settings, UAC, and network access protection

A

Action Center

138
Q

Windows 8 and 8.1 interface where the start menu was removed and the desktop replaced with a new look

A

Metro

139
Q

a standard Windows file system for optical media with support for multisession writing.

A

The Universal Disk Format (UDF or ISO 13346)

140
Q

displays a log of “system stability” events, so you can see at a glance whether a particular application has stopped responding frequently.

A

Reliability Monitor

141
Q

a concept designed to make it easier for less knowledgable users to add a new client to the WLAN without manually entering the security information on the client

A

Wi-Fi Protected Setup (WPS)

142
Q

group that gives read/write permission to the system, allowing members to install most software but keeping them from changing key operating system files

A

power user group

143
Q

device that passes or blocks traffic to specific addresses based on the type of application

A

packet filter

144
Q

a method to prevent a router from sending packets through a route that has become invalid within computer networks by changing the route’s metric to a value that exceeds the maximum allowable hop count so that the route is advertised as unreachable

A

route poisoning

145
Q

a method of preventing routing loops in distance-vector routing protocols by prohibiting a router from advertising a route back onto the interface from which it was learned

A

split-horizon route advertisement