Cyber Class Flashcards
Which of the following is a valid distinguished way of writing a website URL?
MarketSpace.org
Which of the following is true?
a. Group members have the access rights that are assigned to the group.
b. Users can log on as the group and have all the assigned access rights.
a.Group members have the access rights that are assigned to the group.
Which of the following must be set up before you can register a facial or fingerprint scan for your account?
Pin
Security Key
Picture password
Password
Pin
Domain
A collection of network resources that share a common directory database.
Organizational Unit
A folder-like container that organizes network resources.
Built-in Containers
Default containers used to organize Active Directory objects that cannot be deleted.
Which remote access solution is built into macOS?
Quick Assist
Remote Assistance
Screen Sharing
Remote Desktop.
Screen Sharing
You want to use a VPN tunneling protocol that can encapsulate other LAN protocols and carry the data securely over an IP Network. Which of the following protocols is suitable for this task?
PPTP - Point to point tunneling Protocol
NetBeui - Net Bios Extended User Interface
PPP - Point to point Protocol
SLIP - Serial Line Internet Protocol
PPTP - Point to point tunneling Protocol
VPN
Virtual Private Network
LAN
Local Area Network
What is a VPN’s primary purpose?
Support the distribution of public web documents
Allow use of network-attached printers
Support secure communications over an untrusted network
Allow remote systems to save on long-distance charges.
Support secure communications over an untrusted network
Which user type is the Windows beta channel recommended for?
Administrators
The average user
Highly technical users
Commercial users
The average user
Full Backup
Backs up all files (even those that have not changed).
Incremental Backup
Backs up every file that has changed since the last full or incremental backup.
Differential Backup
Backs up every file that has changed since the last full backup
Synthetic Backup
Compares the data found i the last full backup with the current content and uploads only the changes.
Why should you store backup media offsite?
To reduce the possibility of theft
To prevent the same disaster from affecting both the system and it’s associated backup media.
To improve the efficiency of the restoration process
It is required by government regulations in the USA.
To prevent the same disaster from affecting both the system and it’s associated backup media.
What tool can you use to create a full system image of your windows drive?
Backup and Restore
System Repair
Recovery Drive
Windows Installation Media
Backup and Restore
While running a presentation editor on your Windows 11 laptop, your computer locks up. When you try powering the computer, Windows 11 will not start up.
Which of the following tools should you use FIRST to try and resolve the issue?
Backup and Restore
Recovery Drive
Startup Repair
Restore files
Startup Repair
Which of the following actions occur during the Pre-EFI Initialization (PEI) stage of the UEFI boot process? (Pick 2)
Device drivers are loaded into memory.
The CPU and chipset are verified and fully initialized.
Power is supplied to the CPU
The EFI boot manager initializes.
System memory is initialized, verified, and allocated.
The CPU and chipset are verified and fully initialized.
System memory is initialized, verified, and allocated.
EFI
Extensible Firmware Interface
UEFI
Unified Extensible Firmware Interface
Which of the following is the first process that runs once a computer is powered on and the CPU loads the BIOS?
Boot Loader
POST - Power On Self Test
Winload.exe
WININIT
POST - Power On Self Test
BIOS
Basic Input output system
You need to install a 32-bit application on a 64-bit version of Windows 11. In which default directory will the application be installed?
%systemdrive%\Program Files (x86)
%systemdrive%\Applications (32-bit)
%systemdrive%\Applications
%systemdrive%\Program Files
%systemdrive%\Program Files (x86)
You have installed Windows 11 on your C: drive. What is the path to the directories that hold user profiles in Windows 11?
C: Users\Profiles\username
C: Documents and Settings \username
C:\Users\username
C:\Users \Documents and Settings\username
C:\Users\username
Which of the following statements are true regarding administrative shares? (select Two.)
Adding a ! sign to the end of a share name creates an administrative share.
If you are a member of the Administrators group, the administrative shares are visible to you when you browse the network.
By default, Windows automatically creates an administrative share for every volume.
To connect to an administrative share, you must use the UNC path.
Default administrative shares grant access to the Administrators or Power Users group.
By default, Windows automatically creates an administrative share for every volume.
To connect to an administrative share, you must use the UNC path.
A help desk technician determines that a user’s issue is caused by a corrupt file on their computer. Which of the following would be the FASTEST way to transfer a good file to the computer?
Use the C$ administrative share to copy the file.
Have the user share the folder as a local share and copy the file to the share.
Attach the file to an email and have the user copy the file to the correct folder.
Use the C$ administrative share to copy the file.
EFS
Encrypting File System
You have used EFS to encrypt a directory of highly sensitive company files on your hard drive. You then decide to copy one of the files in the directory to a thumb drive to edit the files on a laptop computer while you are traveling to an industry conference.
What is the result of copying the file to the thumb drive?
aThe file becomes inaccessible.
The file will no longer be encrypted.
The file is compressed and remains secure.
The file remains secure and accessible.
The file will no longer be encrypted.