COMPTIA Questions Flashcards
What licensing options are available for Microsoft Windows Enterprise editions?
-Volume licensing
-Full packaged product (FPP) license
-Original equipment manufacturer (OEM) licensing
-Personal license
Volume Licensing
In Microsoft 10 and 11, Windows Enterprise and Education editions are only available via volume licensing. Volume licensing allows customers to obtain discounts for bulk devices or user licenses.
Windows Home and Windows Pro are available as an OEM license. Users can also obtain it via a volume licensing program.
Windows Home and Windows Pro are available as a full packaged product (FPP) license. Users can also obtain it via a volume licensing program.
Intended for products used by one person at a time, personal licenses may also allow installation on multiple devices for that single user.
What Microsoft Windows tool provides a more robust means of configuring hundreds of networked Windows computer settings, and is a much more efficient way of implementing settings across a domain than manually configuring each networked client?
-BitLocker
-Services Console (services.msc)
-Robocopy
-Group Policy Editor(gpedit.msc)
Group Policy Editor (gpedit.msc)
The Group Policy Editor (gpedit.msc) is a Microsoft Windows tool, providing a more robust means of configuring hundreds of networked Windows computer settings and policies in a Windows Domain.
BitLocker is a full-disk encryption (FDE) feature. It is available with all editions of Windows except for the Home edition and is an alternative to file encryption.
The robocopy command is a file copy utility designed to work with long file names and New Technology File System (NTFS) attributes.
The Services Console (services.msc) tool enables control over essential and nonessential Windows services by offering manual and disable options for Windows services, improving performance and security.
What do Microsoft Windows 10 Pro and Education editions have a 2 terabytes (TB) support limitation for?
-File allocation table (FAT)
-Random access memory
-Bluetooth transfer rate
-Microprocessor
RAM
Windows 10 Pro and Education editions have a 2 TB RAM support limitation, while there is a 6 TB RAM limitation for Pro for Workstations and Enterprise editions.
Windows 10 Pro, Enterprise, and Education editions support computers with multiple processors. For example, Pro and Education editions support up to 128 cores, and Pro for Workstations and Enterprise support 256 cores.
The file allocation table (FAT) is an early iteration file system. FAT provides links from one data location to another.
Bluetooth supports transfer speeds up to 24 Megabits per second (Mbps) using adapters supporting version 3 or 4 of the Bluetooth standard.
User policies and security require administration on each machine in a workgroup network. What feature will a domain network offer over a workgroup to solve the time-consuming administration of networked systems?
-Comprehensive component reports
-Centralized management
-Full-disk encryption (FDE)
-Peer-to-peer networking
Centralized management
It is necessary to centrally manage user accounts and system policies in some environments due to the number of systems to administer and security requirements. Centralized management is a feature of a domain network not offered in workgroup networking.
BitLocker is a full-disk encryption (FDE) feature providing security and is available with all Windows editions except for Windows Home.
A peer-to-peer network model is an example of a workgroup where computers share resources. However, managing each resource on the individual computers is necessary.
The System Information (msinfo32.exe) tool provides comprehensive hardware and software component reports. Running the msinfo32.exe tool will produce an inventory of system information.
Windows Pro edition comes with a host of management features designed to allow network administrators more control over each client device, and there is also a Pro for Workstations edition. What additional feature will it provide?
-Advanced hardware support
-Microsoft Desktop Optimization Pack
-Microsoft’s DirectAccess virtual private networking technology
-AppLocker software execution control
Advanced hardware support
While the Windows Pro editions come with a host of management features, the Windows Pro for Workstations edition supports more advanced hardware and hardware optimization.
The Enterprise edition has several features that are not available in the Pro edition, and support for Microsoft’s DirectAccess virtual private networking technology is one.
AppLocker software execution control is one of several features offered in the Enterprise edition. However, it does not come with Pro editions of Windows.
The Microsoft Desktop Optimization Pack is available in the Windows Enterprise edition and does not come with Windows Pro editions.
A system administrator establishes Windows domain user accounts in a Windows-only environment. After working through the administrative tools and adding the appropriate snap-ins for the Computer Management Console (MMC), what security groups could the sysadmin expect to maintain? (Select all that apply.)
-GUEST
-ADMINISTRATORS
-USERS
-ROOT
GUEST
ADMIN
USERS
Windows default security groups include Administrators. Adding a user account as a member of the Administrators group gives the account full privileges.
Windows standard accounts are members of the Users group and can shut down the computer, install, and run desktop applications. The administrator should create Accounts as a standard user unless there is a compelling reason for additional privileges.
The Guest group is one of the default security groups and is only present for legacy reasons to implement file sharing without passwords and is locked by default. Users should not use the Guest group.
The Root account is the superuser and administrative account in Linux operating systems. It can do anything on the system, so use it only when necessary.
In the Windows File Explorer Options applet, which tab allows administrators to configure settings, such as hiding extensions, hiding protected operating system files, and managing hidden fields and folders?
-VIEW
-SEARCH
-INDEXING
-GENERAL
VIEW
The View tab in the File Explorer Options applet in the Control Panel governs how Explorer shows folders and files, providing options to hide extensions, hide operating system files, and manage file attributes.
The General tab in the File Explorer Options applet, found in the Control Panel, provides a means to set options for the layout of Explorer windows and the single or double-click opening options for shortcuts.
The Search tab in the File Explorer Options applet of the Control Panel enables the configuration of the file search behavior. Indexing Options settings govern how it operates.
The Indexing Options applet is not within the File Explorer Options applet. However, it relates to searching and cataloging databases, including files and folders.
Microsoft recommends fast start-up for Windows computers. An administrator can enable it via the Power Options applet. Once enabled, how does fast start-up decrease boot times?
-By determining what to do when the laptop lid closes
-By Universal Serial BUs (USB) selective suspend
-By adjusting search and indexing behavior
-By hibernating file utilization
By hibernation file utilization
The fast start-up power saving option uses the hibernation file to instantly restore the previous system memory contents and swiftly resume computer operations.
The USB selective suspend option powers off peripheral devices to preserve energy when enabled. It is not a part of the Windows fast start-up option.
The search and indexing behavior, an advanced power option for MS Windows power plans, determines the resources allocated to folders, files, and database search and indexing. Therefore, it is not part of a fast start-up.
The Windows power plan determines what to do when the laptop lid closes. It can affect the time it takes to become operational. However, it is not part of a fast start-up option.
The Administrative Tools shortcut, located within the Control Panel, is home to what?
-Indexing Options applet
-Network and Sharing Center console
-Devices and Printers console
-Devices and Printers console
-Advanced Windows configuration consoles
Advanced Windows configuration consoles
The Administrative Tools shortcut, found within the Control Panel, is home to folder shortcuts to several Windows advanced configuration consoles, such as the Windows Defender Firewall.
The Network and Sharing Center, located within the Control Panel applet, shows network status information and is not in the administrative tool’s shortcut.
The Devices and Printers Control Panel applet is in the Windows Control Panel and is for configuring attached hardware. It is not in the administrative tool’s shortcut.
The Indexing options, located in the File Explorer shortcut, are not the administrative tool’s shortcut of the Control Panel applet, which relates to the searching and cataloging of databases.
What applet relates to and is responsible for the searching, cataloging, and database maintenance in the Microsoft Windows Control Panel?
-File Explorer Options
-Indexing Options
-Programs and Features
-Internet Options
Indexing Options
Indexing Options, found in the File Explorer options of the Control Panel applet, relate to the searching and cataloging of databases. Indexed locations include files and folders, although a common cause of search problems is a product of a corrupted index.
The File Explorer Options applet, found in the Control Panel, governs how Explorer shows folders and files, providing options to hide extensions, hide operating system files, and manage file attributes.
The Internet Options applet provides an interface to manage Microsoft’s Internet Explorer (IE) browser within the Control Panel.
The Programs and Features Control Panel applet is a Windows legacy software management interface found in the Control Panel to install and modify desktop applications and Windows Features.
A cyber technician working on a desktop computer attempts to reach the Windows Defender Firewall in the Control Panel. What shortcut within the Control Panel contains the advanced configuration consoles?
-System Information
-Administrative Tools
-Device Manager
-Service Console
Administrative Tools
The Administrative Tools shortcut is within the Control Panel and is home to the links of folder shortcuts to several Windows advanced configuration consoles, such as the Windows Defender Firewall.
The Windows Device Manager allows administrators to view, edit, and troubleshoot the properties of installed hardware, update drivers, and remove or disable devices.
The Services (services.msc) console tool enables control over essential and nonessential Windows services by offering manual and disable options for Windows services, improving performance and security. It is within the Administrative Tools folder.
The System Information (msinfo32.exe) tool provides comprehensive hardware and software component reports. Running the msinfo32.exe tool will produce an inventory of system information located within the Administrative Tools folder.
A user would like to adjust the power plan concerning what happens when closing the lid of their laptop computer. What are additional power management settings available under the advanced Power Options applet in a Microsoft Windows 2010 operating system? (Select all that apply.)
-Search and indexing behavior
-Interaction settings
-Display brightness
-Universal Serial Bus (USB) selective suspend
-Search and indexing behavior
-Display brightness
-Universal Serial Bus (USB) selective suspend
The Windows power plan provides a wide array of advanced power options. The USB selective suspend option powers off peripheral devices to preserve energy when enabled.
The search and indexing behavior is one of the advanced power options for MS Windows power plans, determining the resources allocated to folder, file, and database search and indexing.
Display brightness is one of the more apparent advanced power settings in a Microsoft Windows power plan. The brighter the display, the more power it will consume.
The interaction setting is an assistive technology that enables the user to configure the speech, eye-controlled input methods, and configures keyboard and mouse options. It is not a part of the Windows advanced power options.
A hardware break/fix technician replacing a failed hard drive on a MacBook computer has installed the operating system on the new drive. However, what accounts could the technician expect a desktop support specialist to have created and enabled when installing the macOS while setting up the operating system? (Select all that apply.)
The user accounts applet cannot be used to change the UAC settings.
The user accounts applet can be used to change the UAC settings.
The user accounts applet can be used in facilitating the creation of new accounts.
The user accounts applet cannot be used to add new accounts.
The user accounts applet can be used to change the UAC settings.
The user accounts applet cannot be used to add new accounts.
The Administrator account is the primary user account created by default when installing the macOS. Add additional users through the System Preferences, User, and Groups shortcut when needed.
Outside of the Administrator account, the optional Guest user account is available when installing the macOS. Add additional users through the System Preferences, User, and Groups shortcut when needed.
The Root account on a MacOS is a special superuser account for Unix/Linux operating systems. Due to increased security, it is disabled by default on a Mac but can be enabled, although not recommended.
The Power-user is a default Windows group account. While included in the latest Windows versions, its inclusion provides support solely to legacy applications.
What can a network technician implement to ensure that their connection to the company network will be secure when company employees work from remote locations?
-WWAN
-VPN
-Proxy server
-Metered connection
VPN
The technician can implement a virtual private network (VPN) which connects the components and resources of two (private) networks over another (public) network through a “tunnel.”
A metered network type sets a data limit within Windows to avoid the risk of exceeding the provider’s cap. The network technician can also monitor data usage by each app.
A proxy server forwards client internet requests to the internet. The proxy may also cache pages and content that multiple clients request, reducing bandwidth.
Wireless Wide Area Network (WWAN) refers to using a cellular adapter to connect to the internet. The bandwidth depends on the adapter’s supported technologies and the local cell tower.
A user connects their laptop to the internet by connecting to their cellular phone provider’s network over their phone. The user is taking advantage of what type of connection?
-WWAN
-Proxy
-Wired
-Wireless
WWAN
The user is taking advantage of a Wireless Wide Area Network (WWAN). This refers to using a cellular adapter to connect to the internet.
Almost all wired network connections are on some type of Ethernet. Therefore, the adapter’s media type must match the switch that connects the adapter.
Select the network and enter the required credentials to connect to a wireless network. If the user selects the Connect automatically option, Windows will use the network whenever it is in range.
A proxy server forwards client internet requests to the internet. The proxy may also cache pages and content that multiple clients request, reducing bandwidth.
A network technician is entering the network configuration for a host and must enter the address that distinguishes the network ID from the host ID of the IP address. Which address is this?
-Gateway
-DNS
-IP Address
-Subnet mask
Subnet mask
The subnet mask designates the number of bits applied to an IP address to mask the network ID portion from the host/interface ID portion and determines how many hosts can be on a network.
The default gateway is the IP address of a local router and is necessary so that the device can forward traffic destined for hosts with addresses in different ranges.
Domain Name System (DNS) is a service that maps fully qualified domain name labels to IP addresses on most TCP/IP networks, including the internet.
An Internet Protocol (IP) address is a format for logical host and network addressing. In IPv4, IP addressing uses a 32-bit binary address, and in IPv6, addresses use hexadecimal notation.
When manually configuring a host on a home network, which address will the user configure to be the same as the gateway?
-DNS
-Subnet mask
-VPN
-DHCP
DNS
The router usually forwards Domain Name System (DNS) queries on a home network, so the gateway and primary DNS server parameters for the user PCs will usually set to the same value.
The subnet mask is the number of bits applied to an IP address to mask the network ID portion from the host/interface ID portion.
Dynamic Host Configuration Protocol (DHCP) is a protocol used to automatically assign IP addressing information to hosts that a technician has not configured manually.
A virtual private network (VPN) connects the components and resources of two (private) networks over another (public) network.
An organization had a high IT department turnover, and the technicians are not sure which IP addresses the previous technicians statically assigned to hosts. What can the technicians do to ensure they do not assign the same IP address to multiple devices?
-WWAN
-Proxy settings
-DHCP
-VPN
DHCP
The technicians can implement Dynamic Host Configuration Protocol (DHCP) to automatically assign IP addressing information to hosts instead of configuring them statically.
A virtual private network (VPN) connects the components and resources of two (private) networks over another (public) network.
Wireless Wide Area Network (WWAN) refers to using a cellular adapter to connect to the internet. The bandwidth depends on the adapter’s supported technologies and the local cell tower.
Proxy settings allow client PCs to pass internet requests to a proxy server, which forwards them to the internet. The proxy may also cache pages and content, reducing bandwidth.
A network technician must configure each client with the IP address and Transmission Control Protocol (TCP) port to forward traffic via a proxy in Network and Internet settings unless the organization uses which of the following? (Select all that apply.)
-DNS
-Autoconfiguring proxy
-Intercepting proxy
-Transparent proxy
-Autoconfiguring proxy
-Intercepting proxy
-Transparent proxy
An intercepting proxy does not require any client configuration. Otherwise, the technician must configure each client with the IP address and TCP port to forward traffic via the proxy.
A transparent proxy does not require any client configuration, so the technician does not need to configure the clients with the IP address and TCP port to forward traffic via the proxy.
Some proxies are autoconfiguring. If the proxy is not autoconfiguring, the technician must configure each client with the IP address and TCP port to forward traffic via the proxy.
Domain Name System (DNS) is a service that maps fully qualified domain name labels to IP addresses on most TCP/IP networks, including the internet.
A network technician is configuring a network adapter. By default, which of the following protocols and services are on Ethernet and Wi-Fi adapters? (Select all that apply.)
-Client for Microsoft Networks
-DHCP
-Link-layer Topology Discovery
-Internet Protocol
-Link-layer Topology Discovery
-Internet Protocol
By default, the Internet Protocol, both IP version 4 and 6, will be on the adapter as it automatically uses the appropriate version of the protocol depending on the connecting network.
By default, the Link-layer Topology Discovery Protocol will be on the adapter. It provides network mapping and discovery functions for networks without dedicated name servers.
By default, the client for Microsoft Networks and File and Print Sharing for Microsoft Networks software will be on the adapter, but this is a client, not a protocol or service.
The IP properties will default to “Obtain an IP address automatically,” using a Dynamic Host Configuration Protocol (DHCP) server. The technician should double-click the IP properties item to configure a static address.
Every month, a user receives a bill from a provider that charges the user for the exact amount of computing, storage, and network resource units consumed the previous month. The provider bills the user for what kind of connection?
-Proxy
-Dynamic
-Static
-Metered
Metered
A user is connecting to their home folder at \server1\home$\jdoe. What is \server1\home$\?
-Application exception
-File server
-Shared folder
-Mapped drive
Shared folder
\server1\home$ is a shared folder created with the appropriate permissions to allow users to read and write their own subfolder only.
A domain centralizes data storage and PC configuration so that administrators can more easily monitor them and back them up. This means that users store their data on file servers.
A mapped drive is a share that an administrator has assigned to a drive letter on a client device. To map a share as a drive, right-click it and select Map Network Drive.
Application exceptions are apps that an administrator allows through the firewall by configuring exceptions from the Windows Firewall status page.
A network technician needs to determine how many hosts to place on a network. What address can the technician use to calculate that?
-Subnet mask
-Gateway
-IP address
-DNS
Subnet mask
The subnet mask designates the number of bits applied to an IP address to mask the network ID portion from the host/interface ID portion and determines how many hosts can be on a network.
The default gateway is the IP address of a local router and is necessary so that the device can forward traffic destined for hosts with addresses in different ranges.
Domain Name System (DNS) is a service that maps fully qualified domain name labels to IP addresses on most TCP/IP networks, including the internet.
An Internet Protocol (IP) address is a format for logical host and network addressing. In IPv4, IP addressing uses a 32-bit binary address, and in IPv6, addresses use hexadecimal notation.
A home user wants their devices to keep the same IP addresses at all times, so the user is manually configuring all the hosts. Since the user’s router will forward all internet traffic, which address will the user configure to be the same as the gateway?
-DNS
-Subnet mask
-DHCP
-VPN
DNS
The router usually forwards Domain Name System (DNS) queries on a home network, so the gateway and primary DNS server parameters for the user PCs will usually be set to the same value.
The subnet mask is the number of bits applied to an IP address to mask the network ID portion from the host/interface ID portion.
Dynamic Host Configuration Protocol (DHCP) is a protocol used to automatically assign IP addressing information to hosts that a technician has not configured manually.
A virtual private network (VPN) connects the components and resources of two (private) networks over another (public) network.
What does Linux use to verify the authenticity of software packages obtained from an online source?
-An external hardware token
-Digital signatures
-A trusted platform module (TPM)
-A hash value
A hash value
Linux software gets validated by disclosing the package’s hash value. Users must generate their own hash of the package after downloading it and compare it to the value provided by the package maintainer.
To identify legitimate developers and software suppliers, Windows employs a digital signature mechanism. This validates not just the package but also the source.
An external hardware token such as a USB form factor device stores cryptographic user identification data. The user must present the token and supply a password, PIN, or fingerprint scan to authenticate.
A trusted platform module (TPM) is a standard for hardware-based storage of digital certificates, cryptographic keys, and hashed passwords. Each TPM microprocessor is hard coded with a unique, unchangeable key.
A PC user is installing an application that creates a considerably high number of temporary files and saves large amounts of user-generated data. What system requirement is most relevant to the user’s situation?
-Graphic card requirements
-Ram requirements
-CPU Requirements
-Storage requirements
Storage requirements
Storage requirements refer to how much space the software will use on the storage device during installation and space for user-generated data and temporary files.
Some programs will specify minimum requirements for CPU performance, clock speed, number of cores, or a specific CPU feature. For example, a 64-bit program requires the use of a 64-bit CPU.
There are RAM requirements for different use cases. This assumes that no other foreground program is running simultaneously. Running numerous apps at the same time will necessitate extra RAM.
A demanding program, such as a graphics design software or a game, is likely to necessitate using a specialized graphics card with its own video RAM distinct from the standard system RAM
Which of these applications will fail to run on a Windows PC with a 64-bit CPU running a 32-bit OS? (Select all that apply.)
-A 32-bit application installed with YUM
-A 64-bit application installed with an .EXE
-A 32-bit application installed with an .MSI file
-A 32-bit application installed with a .DMG
-A 32-bit application installed with YUM
-A 64-bit application installed with an .EXE
-A 32-bit application installed with a .DMG
Software programs can be in 32-bit or 64-bit versions. A 64-bit program requires a 64-bit CPU and operating system architecture and is incompatible with 32-bit platforms. However, 32-bit software programs can generally deploy on 64-bit systems.
Every software application can run under a specific operating system. For example, macOS apps support .DMG (disk image) and .PKG (package) file types.
Linux packages use the package manager the Yellowdog Updater, Modified (YUM), an open-source package-management software for Linux. Every software application can run on a particular operating system.
A 32-bit operating system or systems with 32-bit CPUs can only run 32-bit software. On Windows, a technician can install software using setup files of either the .EXE or .MSI formats.
A desktop owner is installing a new application on a macOS. What format would the setup file be?
-RPM
-DEB
-EXE
-DMG
DMG
A setup file installs desktop programs. macOS apps support DMG (disk image) and PKG (package) file types.
A setup file installs desktop programs. These are either .EXE or .MSI extensions on Windows.
Linux packages use the package manager the Yellowdog Updater, Modified (YUM), which is a free and open-source command-line package-management software for Linux machines. It uses the Red Hat Package Manager (RPM) install package format.
The Advanced Packaging Tool (APT) package manager manages Debian (DEB) packages on Linux. The setup file contains the executables, configuration files, and media files for the application. The files are extracted and transferred to a directory allocated for program installation during setup.
A company requires employees to use a USB security key to access company-owned devices. This type of requirement would be known as what?
-Dedicated graphics card
-External hardware token
-Distribution method
-32-bit operating system
External hardware token
An external hardware token such as a USB form factor device stores cryptographic user identification data. The user must present the token and supply a password, PIN, or fingerprint scan to authenticate.
A demanding program, such as a graphics design software or a game, would almost certainly necessitate using a dedicated graphics card with its own video RAM distinct from the standard system RAM.
Applications are installed on top of an operating system (OS). The distinction between a 32-bit or 64-bit OS is required for compatibility purposes to support 32-bit or 64-bit applications.
An app distribution method is how the vendor makes it available to install. For example, app stores publish many apps for users to download or purchase.
A Windows network administrator is remotely deploying new database software to individual desktops. What method would the administrator use to install the software from a network folder to Windows machines?
-Antivirus software
-Optical disks
-Group Policy Object (GPO)
-A mountable ISO
Group Policy Object (GPO)
Group Policy Objects (GPOs) in Windows may configure a machine to remotely install a program from a network folder without needing human interaction from an administrator.
An ISO file is a file that incorporates the contents of an optical disc in a single file and is used instead of physical media. Mountable ISO files act as emulated drives and are frequently installed as operating systems or complex applications.
Products, such as centrally controlled antivirus suites, frequently provide “push” deployment techniques for remotely installing the client or security sensor on each PC. This is only relevant to antivirus products.
A technician can transfer setup files using optical disks or physical media, such as a CD/DVD or a USB flash drive.
A technician is installing software on Linux using setup files in the RPM file format. What package manager would the technician be using?
-PKG
-YUM
-MIS
-APT
YUM
Linux packages use the package manager the Yellowdog Updater, Modified (YUM), which is a free and open-source command-line package-management software for Linux machines. It uses the Red Hat Package Manager (RPM) install package format.
The Advanced Packaging Tool (APT) package manager manages Debian (DEB) packages on Linux. The setup file contains the executables, configuration files, and media files for the application. The files are extracted and transferred to a directory allocated for program installation during setup.
A setup file installs desktop programs. macOS apps support DMG (disk image) and PKG (package) file types.
A setup file installs desktop programs. These are either .EXE or .MSI extensions on Windows.
What type of software secretly collects data from and provides access to the host or network?
-A program that consumes large amounts of resources
-A malicious Trojan horse program
-A program with unpatched vulnerabilities
-A program that is incompatible with existing applications
A malicious Trojan horse program
A Trojan horse is software that conceals its actual (malicious) function. Once deployed, such malware is likely programmed to steal data or enable covert remote access to the host or network.
Compatibility issues on a system or network generally prevent services from running properly. Therefore, it is best practice to ensure compatibility ahead of time when possible.
Software can influence a computer’s or network’s stability and performance. For example, the software may require more CPU and memory resources than expected or consume an unreasonable amount of network traffic.
Unpatched vulnerabilities in the software might allow worm malware to spread and damage the network. Therefore, software engineers should evaluate applications in a lab setting before fully deploying them.
What type of file represents a virtual mountable optical disk?
-ISO
-RPM
-DMG
-EXE
ISO
An ISO file is a file that incorporates the contents of an optical disc in a single file and is used instead of physical media. Mountable ISO files act as emulated drives and are frequently installed as operating systems or complex applications.
A setup file installs desktop programs. These are either .EXE or .MSI extensions on Windows.
A setup file installs desktop programs. For example, macOS apps support DMG (disk image) and PKG (package) file types.
Linux packages use the package manager the Yellowdog Updater, Modified (YUM), which is a free and open-source command-line package-management software for Linux machines. It uses the Red Hat Package Manager (RPM) install package format.
A desktop user is attempting to use a new 64-bit software application. Which of the following reasons could be why this software will not install and/or run on the desktop? (Select all that apply.)
-The software is not compatible with the OS.
-The OS is 64-bit.
-The CPU is 32-bit.
-The desktop does not meet RAM requirements.
-The software is not compatible with the OS.
-The desktop does not meet RAM requirements.
-The CPU is 32-bit
A 64-bit program necessitates a 64-bit CPU and operating system platform. Therefore, it is incompatible with 32-bit platforms. However, 32-bit software programs can install and load on 64-bit computers.
There might also be a RAM consideration. Some applications have certain hardware requirements. Running numerous apps at the same time will necessitate extra RAM.
When ordering, the user should choose the suitable OS version. For example, Windows will not be able to run the macOS operating system
If the application program is 64-bit, the CPU and operating system must likewise be 64-bit. However, if the application is 32-bit, it may run on either a 32-bit or 64-bit platform.
A technician is using the YUM package manager to install software on Linux. What setup file format does YUM use?
-EXE
-DEB
-DMG
-RPM
RPM
A technician installs Desktop applications from a setup file. Linux packages use the package manager the Yellowdog Updater, Modified (YUM), which is a free and open-source command-line package-management software for Linux machines. It uses the Red Hat Package Manager (RPM) install package format.
The Advanced Packaging Tool (APT) package manager manages Debian (DEB) packages on Linux. The setup file contains the executables, configuration files, and media files for the application. The files are extracted and transferred to a directory allocated for program installation during setup.
A setup file installs desktop programs. macOS apps support DMG (disk image) and PKG (package) file types.
A setup file installs desktop programs. These are either .EXE or .MSI extensions on Windows.
A user wants to set up two workspaces within their Windows 11 device. What feature of Windows 11 would allow the user to have more than one workspace on the same computer?
-Multiple desktops
-Multiple devices
-Multiple backups
-Multiple screens
Multiple desktops
Windows 10 and 11 features multiple desktops that allow users to set up multiple workspaces within the same device. In addition, the user can switch between them by using Windows+Tab.
Multiple screens are helpful for viewing more information at the same time. However, it would not allow the user to have multiple workspaces.
Backups protect data from loss in the case of damaged hard drives, power outages, or accidental deletion.
Having multiple devices is not what the user is requesting in this scenario. While the user could set up multiple devices, it comes at an added cost.
On an Apple Mac, what is the purpose of the COMMAND+OPTION+ESC option on a Mac operating system?
-Recovery
-Force Quit
-Spotlight Search
-Switch between desktops
Force Quit
The COMMAND+OPTION+ESC option on a macOS stops applications that no longer respond, allowing users to control hanging applications without shutting the computer down.
Mac operating systems include recovery and restore utilities. For example, to use the Mac Time Machine recovery menu on an Apple Mac, the user should hold down the COMMAND+R keys until the Apple logo appears upon startup.
On a Mac environment, pressing the COMMAND+SPACEBAR option activates the Spotlight Search option. It can search and find almost anything on a macOS.
The CONTROL+LEFT or CONTROL+RIGHT keys, when pressed on a keyboard in a macOS environment, allow a user to switch between multiple active desktops.
What file format is for installing programs in Windows?
Unsure Incorrect
YOU WERE UNSURE AND INCORRECT
-DEB
-DMG
-MSI
-PKG
MSI
Microsoft Installer (MSI) is the file format used by Windows 10 and 11 for installing software. It is known as the Windows Installer Package and is recommended in contrast to EXE file formats.
DMG (disk image) format is for simple installs where the package contents just need to be copied to the Applications folder.
Package (PKG) format is where the app setup needs to perform additional actions, such as running a service or writing files to multiple folders.
Linux packages use Debian (DEB) packages with the Advanced Packaging Tool (APT) package manager or RPM for Yellowdog Updater Modified (YUM).
The User Account Control (UAC) feature in Windows has a concern with what type of user account on a Windows machine?
-Remote desktop user
-Guest user
-Power user
-Administrator
Administrator
User Account Control (UAC) is a Windows security feature designed to protect the system against malicious scripts and attacks that could exploit the powerful privileges assigned to accounts that are members of the Administrators group.
Power users are available to support legacy applications. Historically, this group intended to have intermediate permissions between administrators and users.
The system disables the Guest user account by default. Microsoft ended support for using the Guest account to log in to Windows in a feature update. The Guest account only implements file sharing without passwords.
A remote desktop user is a standard account user who has access to log on to the desktop remotely. This can be a user that is not an administrator.
What type of local account does a user’s Windows computer utilize for legacy applications?
-Power user account
-Guest user account
-Microsoft account
-Administrator
Power user account
Power users are available to support legacy applications. Historically, this group intended to have intermediate permissions between administrators and users.
An administrator account is a local account with full access and privileges on a Windows system.
The system disables the Guest user account by default. Microsoft ended support for using the Guest account to log in to Windows in a feature update. The Guest account can only implement file sharing without passwords.
A Microsoft account gets managed via an online portal (account.microsoft.com) and identified by an email address. Configuring access to a device by a Microsoft account creates a profile associated with a local account.
The encrypting file system (EFS) is primarily for what purpose on a Windows machine? (Select all that apply.)
-Full drive encryption
-File-level encryption
-Folder-level encryption
-Removable drive encryption
-File-level encryption
-Folder-level encryption
The Encrypting File System (EFS) feature of the New Technology File System (NTFS) supports file-level encryption. However, EFS is not available in the Home edition of Windows.
The EFS feature of NTFS also supports folder-level encryption. First, open the file’s or folder’s property sheet and select the Advanced button to apply encryption. Next, check the Encrypt contents box, then confirm the dialogs.
The Windows BitLocker provides full disk encryption and is available with all editions of Windows except for the Home edition.
BitLocker To Go encrypts removable drives like a USB thumb drive. Like BitLocker, both prevent attackers from reading data from stolen hard drive disks (HDDs) or thumb drives.
Employees at a secure facility must log on to office workstations with two-factor authentication (2FA). All employees access the building with a smart card. What 2FA methods are employees most likely using to access their workstations? (Select all that apply.)
-Username and password
-Facial recognition
-PIN
-Fingerprint
PIN
Username and password
Using a username and password is a standard, single-factor authentication method used for almost all office workstations. However, this method alone is not enough to provide adequate physical security.
A personal identification number (PIN) is what employees use with a smart card to unlock user certificates that will provide access to a workstation.
Facial recognition requires a scanning device that can scan all face attributes to properly authenticate users to a service or system. Organizations do not typically use facial recognition in conjunction with a smart card.
Fingerprint requires a scanning device to scan a person’s finger. Organizations do not typically use fingerprint scanning in conjunction with a smart card.
Windows Defender Firewall uses which security feature based on Transmission Control Port (TCP) or User Datagram Protocol (UDP)?
-Application security
-Address
-Port filtering
-UAC
Port filtering
Employees have received their brand-new Windows 10 laptops to support a work-from-home initiative. Employees have already been using Office 365 applications in the office and are looking forward to picking up right where they left off. How should employees initially log on to their laptops?
-Log on as a Guest user.
-Request administrator access.
-Use their Microsoft account.
-Use a power user account.
Use their Microsoft account.
A Microsoft account is managed via an online portal (account.microsoft.com) and identified by an email address. Configuring access to a device by a Microsoft account creates a profile associated with a local account.
The system disables the Guest user account by default. Microsoft ended support for using the Guest account to log in to Windows in a feature update. The Guest account can only implement file sharing without passwords.
An administrator account has too much access and privilege. Regular users should never use administrator accounts to do non-administrative tasks.
Power users are available to support legacy applications. Historically, this group intended to have intermediate permissions between administrators and users.