COMPTIA Questions Flashcards
What licensing options are available for Microsoft Windows Enterprise editions?
-Volume licensing
-Full packaged product (FPP) license
-Original equipment manufacturer (OEM) licensing
-Personal license
Volume Licensing
In Microsoft 10 and 11, Windows Enterprise and Education editions are only available via volume licensing. Volume licensing allows customers to obtain discounts for bulk devices or user licenses.
Windows Home and Windows Pro are available as an OEM license. Users can also obtain it via a volume licensing program.
Windows Home and Windows Pro are available as a full packaged product (FPP) license. Users can also obtain it via a volume licensing program.
Intended for products used by one person at a time, personal licenses may also allow installation on multiple devices for that single user.
What Microsoft Windows tool provides a more robust means of configuring hundreds of networked Windows computer settings, and is a much more efficient way of implementing settings across a domain than manually configuring each networked client?
-BitLocker
-Services Console (services.msc)
-Robocopy
-Group Policy Editor(gpedit.msc)
Group Policy Editor (gpedit.msc)
The Group Policy Editor (gpedit.msc) is a Microsoft Windows tool, providing a more robust means of configuring hundreds of networked Windows computer settings and policies in a Windows Domain.
BitLocker is a full-disk encryption (FDE) feature. It is available with all editions of Windows except for the Home edition and is an alternative to file encryption.
The robocopy command is a file copy utility designed to work with long file names and New Technology File System (NTFS) attributes.
The Services Console (services.msc) tool enables control over essential and nonessential Windows services by offering manual and disable options for Windows services, improving performance and security.
What do Microsoft Windows 10 Pro and Education editions have a 2 terabytes (TB) support limitation for?
-File allocation table (FAT)
-Random access memory
-Bluetooth transfer rate
-Microprocessor
RAM
Windows 10 Pro and Education editions have a 2 TB RAM support limitation, while there is a 6 TB RAM limitation for Pro for Workstations and Enterprise editions.
Windows 10 Pro, Enterprise, and Education editions support computers with multiple processors. For example, Pro and Education editions support up to 128 cores, and Pro for Workstations and Enterprise support 256 cores.
The file allocation table (FAT) is an early iteration file system. FAT provides links from one data location to another.
Bluetooth supports transfer speeds up to 24 Megabits per second (Mbps) using adapters supporting version 3 or 4 of the Bluetooth standard.
User policies and security require administration on each machine in a workgroup network. What feature will a domain network offer over a workgroup to solve the time-consuming administration of networked systems?
-Comprehensive component reports
-Centralized management
-Full-disk encryption (FDE)
-Peer-to-peer networking
Centralized management
It is necessary to centrally manage user accounts and system policies in some environments due to the number of systems to administer and security requirements. Centralized management is a feature of a domain network not offered in workgroup networking.
BitLocker is a full-disk encryption (FDE) feature providing security and is available with all Windows editions except for Windows Home.
A peer-to-peer network model is an example of a workgroup where computers share resources. However, managing each resource on the individual computers is necessary.
The System Information (msinfo32.exe) tool provides comprehensive hardware and software component reports. Running the msinfo32.exe tool will produce an inventory of system information.
Windows Pro edition comes with a host of management features designed to allow network administrators more control over each client device, and there is also a Pro for Workstations edition. What additional feature will it provide?
-Advanced hardware support
-Microsoft Desktop Optimization Pack
-Microsoft’s DirectAccess virtual private networking technology
-AppLocker software execution control
Advanced hardware support
While the Windows Pro editions come with a host of management features, the Windows Pro for Workstations edition supports more advanced hardware and hardware optimization.
The Enterprise edition has several features that are not available in the Pro edition, and support for Microsoft’s DirectAccess virtual private networking technology is one.
AppLocker software execution control is one of several features offered in the Enterprise edition. However, it does not come with Pro editions of Windows.
The Microsoft Desktop Optimization Pack is available in the Windows Enterprise edition and does not come with Windows Pro editions.
A system administrator establishes Windows domain user accounts in a Windows-only environment. After working through the administrative tools and adding the appropriate snap-ins for the Computer Management Console (MMC), what security groups could the sysadmin expect to maintain? (Select all that apply.)
-GUEST
-ADMINISTRATORS
-USERS
-ROOT
GUEST
ADMIN
USERS
Windows default security groups include Administrators. Adding a user account as a member of the Administrators group gives the account full privileges.
Windows standard accounts are members of the Users group and can shut down the computer, install, and run desktop applications. The administrator should create Accounts as a standard user unless there is a compelling reason for additional privileges.
The Guest group is one of the default security groups and is only present for legacy reasons to implement file sharing without passwords and is locked by default. Users should not use the Guest group.
The Root account is the superuser and administrative account in Linux operating systems. It can do anything on the system, so use it only when necessary.
In the Windows File Explorer Options applet, which tab allows administrators to configure settings, such as hiding extensions, hiding protected operating system files, and managing hidden fields and folders?
-VIEW
-SEARCH
-INDEXING
-GENERAL
VIEW
The View tab in the File Explorer Options applet in the Control Panel governs how Explorer shows folders and files, providing options to hide extensions, hide operating system files, and manage file attributes.
The General tab in the File Explorer Options applet, found in the Control Panel, provides a means to set options for the layout of Explorer windows and the single or double-click opening options for shortcuts.
The Search tab in the File Explorer Options applet of the Control Panel enables the configuration of the file search behavior. Indexing Options settings govern how it operates.
The Indexing Options applet is not within the File Explorer Options applet. However, it relates to searching and cataloging databases, including files and folders.
Microsoft recommends fast start-up for Windows computers. An administrator can enable it via the Power Options applet. Once enabled, how does fast start-up decrease boot times?
-By determining what to do when the laptop lid closes
-By Universal Serial BUs (USB) selective suspend
-By adjusting search and indexing behavior
-By hibernating file utilization
By hibernation file utilization
The fast start-up power saving option uses the hibernation file to instantly restore the previous system memory contents and swiftly resume computer operations.
The USB selective suspend option powers off peripheral devices to preserve energy when enabled. It is not a part of the Windows fast start-up option.
The search and indexing behavior, an advanced power option for MS Windows power plans, determines the resources allocated to folders, files, and database search and indexing. Therefore, it is not part of a fast start-up.
The Windows power plan determines what to do when the laptop lid closes. It can affect the time it takes to become operational. However, it is not part of a fast start-up option.
The Administrative Tools shortcut, located within the Control Panel, is home to what?
-Indexing Options applet
-Network and Sharing Center console
-Devices and Printers console
-Devices and Printers console
-Advanced Windows configuration consoles
Advanced Windows configuration consoles
The Administrative Tools shortcut, found within the Control Panel, is home to folder shortcuts to several Windows advanced configuration consoles, such as the Windows Defender Firewall.
The Network and Sharing Center, located within the Control Panel applet, shows network status information and is not in the administrative tool’s shortcut.
The Devices and Printers Control Panel applet is in the Windows Control Panel and is for configuring attached hardware. It is not in the administrative tool’s shortcut.
The Indexing options, located in the File Explorer shortcut, are not the administrative tool’s shortcut of the Control Panel applet, which relates to the searching and cataloging of databases.
What applet relates to and is responsible for the searching, cataloging, and database maintenance in the Microsoft Windows Control Panel?
-File Explorer Options
-Indexing Options
-Programs and Features
-Internet Options
Indexing Options
Indexing Options, found in the File Explorer options of the Control Panel applet, relate to the searching and cataloging of databases. Indexed locations include files and folders, although a common cause of search problems is a product of a corrupted index.
The File Explorer Options applet, found in the Control Panel, governs how Explorer shows folders and files, providing options to hide extensions, hide operating system files, and manage file attributes.
The Internet Options applet provides an interface to manage Microsoft’s Internet Explorer (IE) browser within the Control Panel.
The Programs and Features Control Panel applet is a Windows legacy software management interface found in the Control Panel to install and modify desktop applications and Windows Features.
A cyber technician working on a desktop computer attempts to reach the Windows Defender Firewall in the Control Panel. What shortcut within the Control Panel contains the advanced configuration consoles?
-System Information
-Administrative Tools
-Device Manager
-Service Console
Administrative Tools
The Administrative Tools shortcut is within the Control Panel and is home to the links of folder shortcuts to several Windows advanced configuration consoles, such as the Windows Defender Firewall.
The Windows Device Manager allows administrators to view, edit, and troubleshoot the properties of installed hardware, update drivers, and remove or disable devices.
The Services (services.msc) console tool enables control over essential and nonessential Windows services by offering manual and disable options for Windows services, improving performance and security. It is within the Administrative Tools folder.
The System Information (msinfo32.exe) tool provides comprehensive hardware and software component reports. Running the msinfo32.exe tool will produce an inventory of system information located within the Administrative Tools folder.
A user would like to adjust the power plan concerning what happens when closing the lid of their laptop computer. What are additional power management settings available under the advanced Power Options applet in a Microsoft Windows 2010 operating system? (Select all that apply.)
-Search and indexing behavior
-Interaction settings
-Display brightness
-Universal Serial Bus (USB) selective suspend
-Search and indexing behavior
-Display brightness
-Universal Serial Bus (USB) selective suspend
The Windows power plan provides a wide array of advanced power options. The USB selective suspend option powers off peripheral devices to preserve energy when enabled.
The search and indexing behavior is one of the advanced power options for MS Windows power plans, determining the resources allocated to folder, file, and database search and indexing.
Display brightness is one of the more apparent advanced power settings in a Microsoft Windows power plan. The brighter the display, the more power it will consume.
The interaction setting is an assistive technology that enables the user to configure the speech, eye-controlled input methods, and configures keyboard and mouse options. It is not a part of the Windows advanced power options.
A hardware break/fix technician replacing a failed hard drive on a MacBook computer has installed the operating system on the new drive. However, what accounts could the technician expect a desktop support specialist to have created and enabled when installing the macOS while setting up the operating system? (Select all that apply.)
The user accounts applet cannot be used to change the UAC settings.
The user accounts applet can be used to change the UAC settings.
The user accounts applet can be used in facilitating the creation of new accounts.
The user accounts applet cannot be used to add new accounts.
The user accounts applet can be used to change the UAC settings.
The user accounts applet cannot be used to add new accounts.
The Administrator account is the primary user account created by default when installing the macOS. Add additional users through the System Preferences, User, and Groups shortcut when needed.
Outside of the Administrator account, the optional Guest user account is available when installing the macOS. Add additional users through the System Preferences, User, and Groups shortcut when needed.
The Root account on a MacOS is a special superuser account for Unix/Linux operating systems. Due to increased security, it is disabled by default on a Mac but can be enabled, although not recommended.
The Power-user is a default Windows group account. While included in the latest Windows versions, its inclusion provides support solely to legacy applications.
What can a network technician implement to ensure that their connection to the company network will be secure when company employees work from remote locations?
-WWAN
-VPN
-Proxy server
-Metered connection
VPN
The technician can implement a virtual private network (VPN) which connects the components and resources of two (private) networks over another (public) network through a “tunnel.”
A metered network type sets a data limit within Windows to avoid the risk of exceeding the provider’s cap. The network technician can also monitor data usage by each app.
A proxy server forwards client internet requests to the internet. The proxy may also cache pages and content that multiple clients request, reducing bandwidth.
Wireless Wide Area Network (WWAN) refers to using a cellular adapter to connect to the internet. The bandwidth depends on the adapter’s supported technologies and the local cell tower.
A user connects their laptop to the internet by connecting to their cellular phone provider’s network over their phone. The user is taking advantage of what type of connection?
-WWAN
-Proxy
-Wired
-Wireless
WWAN
The user is taking advantage of a Wireless Wide Area Network (WWAN). This refers to using a cellular adapter to connect to the internet.
Almost all wired network connections are on some type of Ethernet. Therefore, the adapter’s media type must match the switch that connects the adapter.
Select the network and enter the required credentials to connect to a wireless network. If the user selects the Connect automatically option, Windows will use the network whenever it is in range.
A proxy server forwards client internet requests to the internet. The proxy may also cache pages and content that multiple clients request, reducing bandwidth.
A network technician is entering the network configuration for a host and must enter the address that distinguishes the network ID from the host ID of the IP address. Which address is this?
-Gateway
-DNS
-IP Address
-Subnet mask
Subnet mask
The subnet mask designates the number of bits applied to an IP address to mask the network ID portion from the host/interface ID portion and determines how many hosts can be on a network.
The default gateway is the IP address of a local router and is necessary so that the device can forward traffic destined for hosts with addresses in different ranges.
Domain Name System (DNS) is a service that maps fully qualified domain name labels to IP addresses on most TCP/IP networks, including the internet.
An Internet Protocol (IP) address is a format for logical host and network addressing. In IPv4, IP addressing uses a 32-bit binary address, and in IPv6, addresses use hexadecimal notation.
When manually configuring a host on a home network, which address will the user configure to be the same as the gateway?
-DNS
-Subnet mask
-VPN
-DHCP
DNS
The router usually forwards Domain Name System (DNS) queries on a home network, so the gateway and primary DNS server parameters for the user PCs will usually set to the same value.
The subnet mask is the number of bits applied to an IP address to mask the network ID portion from the host/interface ID portion.
Dynamic Host Configuration Protocol (DHCP) is a protocol used to automatically assign IP addressing information to hosts that a technician has not configured manually.
A virtual private network (VPN) connects the components and resources of two (private) networks over another (public) network.
An organization had a high IT department turnover, and the technicians are not sure which IP addresses the previous technicians statically assigned to hosts. What can the technicians do to ensure they do not assign the same IP address to multiple devices?
-WWAN
-Proxy settings
-DHCP
-VPN
DHCP
The technicians can implement Dynamic Host Configuration Protocol (DHCP) to automatically assign IP addressing information to hosts instead of configuring them statically.
A virtual private network (VPN) connects the components and resources of two (private) networks over another (public) network.
Wireless Wide Area Network (WWAN) refers to using a cellular adapter to connect to the internet. The bandwidth depends on the adapter’s supported technologies and the local cell tower.
Proxy settings allow client PCs to pass internet requests to a proxy server, which forwards them to the internet. The proxy may also cache pages and content, reducing bandwidth.
A network technician must configure each client with the IP address and Transmission Control Protocol (TCP) port to forward traffic via a proxy in Network and Internet settings unless the organization uses which of the following? (Select all that apply.)
-DNS
-Autoconfiguring proxy
-Intercepting proxy
-Transparent proxy
-Autoconfiguring proxy
-Intercepting proxy
-Transparent proxy
An intercepting proxy does not require any client configuration. Otherwise, the technician must configure each client with the IP address and TCP port to forward traffic via the proxy.
A transparent proxy does not require any client configuration, so the technician does not need to configure the clients with the IP address and TCP port to forward traffic via the proxy.
Some proxies are autoconfiguring. If the proxy is not autoconfiguring, the technician must configure each client with the IP address and TCP port to forward traffic via the proxy.
Domain Name System (DNS) is a service that maps fully qualified domain name labels to IP addresses on most TCP/IP networks, including the internet.
A network technician is configuring a network adapter. By default, which of the following protocols and services are on Ethernet and Wi-Fi adapters? (Select all that apply.)
-Client for Microsoft Networks
-DHCP
-Link-layer Topology Discovery
-Internet Protocol
-Link-layer Topology Discovery
-Internet Protocol
By default, the Internet Protocol, both IP version 4 and 6, will be on the adapter as it automatically uses the appropriate version of the protocol depending on the connecting network.
By default, the Link-layer Topology Discovery Protocol will be on the adapter. It provides network mapping and discovery functions for networks without dedicated name servers.
By default, the client for Microsoft Networks and File and Print Sharing for Microsoft Networks software will be on the adapter, but this is a client, not a protocol or service.
The IP properties will default to “Obtain an IP address automatically,” using a Dynamic Host Configuration Protocol (DHCP) server. The technician should double-click the IP properties item to configure a static address.
Every month, a user receives a bill from a provider that charges the user for the exact amount of computing, storage, and network resource units consumed the previous month. The provider bills the user for what kind of connection?
-Proxy
-Dynamic
-Static
-Metered
Metered
A user is connecting to their home folder at \server1\home$\jdoe. What is \server1\home$\?
-Application exception
-File server
-Shared folder
-Mapped drive
Shared folder
\server1\home$ is a shared folder created with the appropriate permissions to allow users to read and write their own subfolder only.
A domain centralizes data storage and PC configuration so that administrators can more easily monitor them and back them up. This means that users store their data on file servers.
A mapped drive is a share that an administrator has assigned to a drive letter on a client device. To map a share as a drive, right-click it and select Map Network Drive.
Application exceptions are apps that an administrator allows through the firewall by configuring exceptions from the Windows Firewall status page.
A network technician needs to determine how many hosts to place on a network. What address can the technician use to calculate that?
-Subnet mask
-Gateway
-IP address
-DNS
Subnet mask
The subnet mask designates the number of bits applied to an IP address to mask the network ID portion from the host/interface ID portion and determines how many hosts can be on a network.
The default gateway is the IP address of a local router and is necessary so that the device can forward traffic destined for hosts with addresses in different ranges.
Domain Name System (DNS) is a service that maps fully qualified domain name labels to IP addresses on most TCP/IP networks, including the internet.
An Internet Protocol (IP) address is a format for logical host and network addressing. In IPv4, IP addressing uses a 32-bit binary address, and in IPv6, addresses use hexadecimal notation.
A home user wants their devices to keep the same IP addresses at all times, so the user is manually configuring all the hosts. Since the user’s router will forward all internet traffic, which address will the user configure to be the same as the gateway?
-DNS
-Subnet mask
-DHCP
-VPN
DNS
The router usually forwards Domain Name System (DNS) queries on a home network, so the gateway and primary DNS server parameters for the user PCs will usually be set to the same value.
The subnet mask is the number of bits applied to an IP address to mask the network ID portion from the host/interface ID portion.
Dynamic Host Configuration Protocol (DHCP) is a protocol used to automatically assign IP addressing information to hosts that a technician has not configured manually.
A virtual private network (VPN) connects the components and resources of two (private) networks over another (public) network.