FULL FLASHCARD STUDY DECK

CertMaster

1
Q

Instant Search

A

Windows feature allowing rapid search of apps, data folders, messages, and the web.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Windows Settings

A

Touch-enabled interface for managing user and system settings in Windows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Control Panel

A

Legacy management interface for configuring user and system settings in Windows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Microsoft account

A

Cloud-based SSO service allowing users to synchronize settings between multiple Windows devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Account Settings

A

Windows Settings pages relating to user account creation and maintenance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

User Accounts applet

A

Control Panel app relating to user account creation and maintenance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Privacy settings

A

Windows Settings pages related to personal data collection and use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Time & Language settings

A

Windows Settings pages allowing configuration of default data formats (date, currency, and so on), location information, and keyboard input locale.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Personalization settings

A

Windows Settings pages related to customizing the appearance of the desktop using themes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ease of Access

A

Windows Settings pages related to desktop and input/output device accessibility configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

OneDrive

A

Cloud storage service operated by Microsoft and closely integrated with Windows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This PC

A

File system object representing a Windows computer and the disk drives installed to it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Recycle Bin

A

When files are deleted from a local hard disk, they are stored in the Recycle Bin. They can be recovered from here if so desired.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

File Explorer Options

A

Control Panel app related to view and browsing settings for File Explorer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Indexing Options

A

Control Panel app related to search database maintenance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

System Settings

A

Windows Settings pages relating to basic and advanced system settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Update & Security settings

A

Windows Settings pages related to configuring automatic patching, deploying feature updates, and managing security features.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Windows Security

A

Touch-enabled app for configuring features such as firewall and antivirus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Devices settings

A

Windows Settings pages for using and configuring attached hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Phone settings

A

Windows Settings pages for associating a smartphone with Windows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Devices and Printers

A

Control Panel app for using and configuring attached hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Device Manager

A

Primary interface for configuring and managing hardware devices in Windows. Device Manager enables the administrator to disable and remove devices, view hardware properties and system resources, and update device drivers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Sound applet

A

Control Panel applet related to speaker and microphone configuration plus Windows sound events and notifications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Standby

A

Power-saving mode where power to all compatible components except system memory is cut. Note that systems on standby still consume some electricity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Hibernate

A

Power-saving state where the contents of memory are saved to hard disk (hiberfil.sys) and the computer is powered off. Restarting the computer restores the desktop.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

sleep

A

Power-saving mode in Windows. On a laptop, this functions much like standby, but on a desktop, the system also creates a hibernation file before entering the standby state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Power Options

A

Control Panel app related to configuring power button/lid events and power-saving modes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

fast startup

A

Power-saving option allowing swift resume from sleep via an image of system memory contents saved to a hibernation file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Apps

A

Windows Settings pages relating to configuration of Windows Features and third-party software apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Programs and Features

A

Control Panel applet allowing management of Windows Features and third-party software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Network & Internet

A

Windows Settings pages related to interface configuration, network profiles, and proxy configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Network and Sharing Center

A

Control Panel related to interface configuration, network profiles, and discovery/file sharing settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Windows Defender Firewall

A

Built-in, host-based filtering of network connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Internet Options

A

Control Panel applet allowing configuration of the Internet Explorer web browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Administrative Tools

A

Folder in Control Panel containing default Microsoft management consoles used to configure the local system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

WinX menu

A

Start button shortcut menu with quick access to principal configuration and management utilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Run dialog

A

Windows interface for executing commands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Disk Management (diskmgmt.msc)

A

Console related to initializing, partitioning, and formatting disk drives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Mail applet

A

Control Panel applet related to configuration of Microsoft Outlook email accounts and storage files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Storage Spaces

A

Windows feature for creating a single storage resource from multiple devices. Data can be protected against device failure by RAID-like mirroring or parity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Defragment and Optimize Drives tool (dfrgui.exe)

A

Fragmentation occurs when a data file is not saved to contiguous sectors on an HDD and reduces performance. The defragmenter mitigates this and can also perform optimization operations for SSDs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Disk Clean-up (cleanmgr.exe)

A

Windows utility for removing temporary files to reclaim disk space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Gaming settings

A

Windows Settings pages related to game mode settings and Xbox integration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Task Scheduler (tasksch.msc)

A

Enables execution of an action (such as running a program or a script) automatically at a pre-set time or in response to some sort of trigger.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Local Users and Groups (lusrmgr.msc)

A

Console for creating and managing user and group accounts with the authentication and permissions scope of the local system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Certificate Manager console (certmgr.msc)

A

Console related to managing digital certificates for the current user and trusted root certification authority certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Group Policy Editor (gpedit.msc)

A

Console related to configuring detailed user and system registry settings via policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Registry Editor (regedit.exe)

A

Tool for making direct edits to the registry database, such as adding or modifying keys or values. The Registry Editor can be used to make backups of the registry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

registry

A

In the Windows registry, a key is analogous to a folder on the file system. Keys are used to group like settings together in a hierarchy that is logical to navigate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

hives

A

File storing configuration data corresponding to a section of the Windows registry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Microsoft Management Console (MMC)

A

Utility allowing Windows administrative tools to be added as snap-ins to a single interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

System Information (msinfo32.exe)

A

Utility that provides a report of the PC’s hardware and software configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Event Viewer (eventvwr.msc)

A

Windows console related to viewing and exporting events in the Windows logging file format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Task Manager (taskmgr.exe)

A

Windows utility used to monitor and manage process execution, resource utilization, user sessions, startup settings, and service configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

process

A

Software program that has been executed and is running in system memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Startup

A

Apps and scripts set to run when the computer starts or when the user signs in. Startup items can be configured as shortcuts, registry entries, or Task Scheduler triggers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Services (services.msc)

A

Windows machines run services to provide functions; for example, Plug-and-Play, the print spooler, DHCP client, and so on. These services can be viewed, configured, and started/stopped via the Services console. You can also configure which services run at startup using msconfig. You can view background services (as well as applications) using the Processes tab in Task Manager.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Resource Monitor (resmon.exe)

A

Console for live monitoring of resource utilization data for the CPU and GPU, system memory, disk/file system, and network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Performance Monitor (perfmon.msc)

A

Console for reporting and recording resource utilization via counter data for object instances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

System Configuration Utility (msconfig.exe)

A

Utility for configuring Windows startup settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

cmd.exe

A

Basic shell interpreter for Windows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Run as administrator

A

Windows feature that requires a task to be explicitly launched with elevated privileges and consented to via UAC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

directory

A

File system object used to organize other file system objects into containers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

dir command

A

Command-line utility that displays information about the contents of the current directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

cd command

A

Command-line tool used to navigate the directory structure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

move command

A

Command-line tool for moving files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

copy command

A

Command-line tool for copying files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

xcopy command

A

Command-line directory and file copy utility offering improved functionality compared to the basic copy command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

robocopy command

A

Command-line file copy utility recommended for use over the older xcopy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

md command

A

Command-line tool for creating directories.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

rmdir

A

Command-line tool for deleting directories. The /s switch enables the deletion of non-empty directories.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

diskpart

A

Command-line utility used to configure disk partitions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

format command

A

Command-line utility for creating a file system on a partition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

X:

A

Command-line utility used to select the working drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

chkdsk

A

Command-line tool that verifies the integrity of a disk’s file system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

shutdown command

A

Command-line tool for shutting down or restarting the computer. The command is supported by Windows and Linux, though with different syntax.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

System File Checker

A

Command-line utility that checks the integrity of system and device driver files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

winver command

A

Command-line tool for reporting Windows version information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Windows

A

Windows started as version 3.1 for 16-bit computers. A workgroup version provided rudimentary network facilities. Windows NT 4 workstations and servers (introduced in 1993) provided reliable 32-bit operation and secure network facilities, based around domains. The Windows 9x clients (Windows 95, 98, and Me) had far-lower reliability and support only for workgroups but were still hugely popular as home and business machines. Windows 2000 and Windows XP workstations married the hardware flexibility and user interface of Windows 9x to the reliability and security of Windows NT, while the server versions saw the introduction of Active Directory for managing network objects. The subsequent client releases of Windows (Vista/7/8/8.1) feature a substantially different interface (Aero) with 3D features as well as security improvements. The latest client versions—Windows 10 and Windows 11—are designed for use with touch-screen devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

macOS

A

Proprietary (Closed-Source) OS designed by Apple for their range of iMac computers, Mac workstations, and MacBook portables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

UNIX

A

UNIX is a family of more than 20 related operating systems that are produced by various companies. It can run on a wide variety of platforms. UNIX offers a multitude of file systems in addition to its native system. UNIX remains widely deployed in enterprise data centers to run mission-critical applications and infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Linux

A

Open-source OS packaged in distributions supported by a wide range of hardware and software vendors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Chrome OS

A

Proprietary (Closed-Sourced) OS developed by Google to run on specific laptop (chromebooks) and PC (chromeboxes) hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

iPadOS

A

OS for some models of the Apple iPad tablet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

iOS

A

OS for Apple’s iPhone smartphone and most iPad tablet models.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

update limitations

A

Product life cycle and procurement consideration where a device or product no longer receives a full range of updates or support from its vendor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Android

A

Cell phone/smartphone/tablet OS developed by the Open Handset Alliance (primarily driven by Google). Unlike iOS, it is an open-source OS, based on Linux.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

file system

A

Structure for file data indexing and storage created by a process of formatting a partition that allows an OS to make use of a mass storage device, such as an HDD, SSD, or thumb drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

New Technology File System (NTFS)

A

64-bit default file system for Windows, with file-by-file compression and RAID support as well as advanced file attribute management tools, encryption, and disk quotas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

FAT32

A

32-bit file system used principally for system partitions and removable media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

exFAT

A

64-bit version of the FAT file system with support for larger partition and file sizes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

ext3

A

Standard Linux file system that includes journaling and has since been replaced with ext4.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Apple File System (APFS)

A

Default file system for macOS-based computers and laptops.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Compatibility concerns

A

Considerations that must be made when using an app in an environment with multiple device and OS platforms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

end of life (EOL)

A

Product life-cycle phase where mainstream vendor support is no longer available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

desktop

A

Graphical OS interface that allows programs to run within window containers. Desktop styles include tools for launching apps, such as the Windows Start Menu, and managing apps, such as the Windows taskbar. Changes to the desktop style over the course of version and feature updates can be confusing for users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

32-bit (x86) or 64-bit (x64)

A

Processing modes referring to the size of each instruction processed by the CPU. 32-bit CPUs replaced earlier 16-bit CPUs and were used through the 1990s to the present day, though most PC and laptop CPUs now work in 64-bit mode. The main 64-bit platform is called AMD64 or EM64T (by Intel). Software can be compiled as 32-bit or 64-bit. 64-bit CPUs can run most 32-bit software, but a 32-bit CPU cannot execute 64-bit software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Windows editions

A

Home versus Professional versus Enterprise. Windows xp, Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

feature updates

A

Release paradigm introduced for Windows 10 where significant changes and new features are distributed via Windows Update on a semiannual schedule.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

original equipment manufacturer (OEM)

A

In PC terms, companies that sell Windows co-branded under their own logo. OEM Windows licenses are valid only on the system that the software was installed on, and the OEM must provide support.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

BitLocker

A

Feature of Windows allowing for encryption of NTFS-formatted drives. The encryption key can be stored in a TPM chip on the computer or on a USB drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Remote Desktop Protocol (RDP)

A

Application protocol for operating remote connections to a host using a graphical interface. The protocol sends screen data from the remote host to the client and transfers mouse and keyboard input from the client to the remote host. It uses TCP port 3389.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

upgrade path

A

Earlier versions of an OS that support an in-place upgrade to a newer version, retaining settings, third-party apps, and user data files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Clean install

A

OS setup method where the target disk is repartitioned and formatted, removing any existing OS and/or data files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

In-place upgrade

A

OS installation method where the setup program is launched from an existing OS. This can typically retain user data files, settings, and third-party apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

unattended installations

A

Deployment method where installation choices are saved in an answer file or script so that the setup program executes without manual intervention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

image deployment

A

Deployment method where the target disk is written with an image of the new OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

boot media

A

Device used to start the setup program and hold source files for installing or upgrading an OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

master boot record (MBR)

A

Sector on a mass storage device that holds information about partitions and the OS boot loader.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

globally unique identifier(GUID) partition table (GPT)

A

Modern disk partitioning system allowing large numbers of partitions and very large partition sizes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

recovery partition

A

OEM recovery media enabling the user to reset the system to its factory configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

System requirements

A

Minimum specifications for CPU speed, memory, and disk capacity for installing an OS or app.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

distribution method

A

Formats for provisioning application installation files, such as via optical discs, downloads, and image files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

potential impacts

A

Considerations that should be made when planning the installation or upgrade of new apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

Safe Mode

A

Troubleshooting startup mode that loads a limited selection of drivers and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

Startup Repair

A

Troubleshooting boot options that allow use of tools such as safe mode and recovery discs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

Windows Recovery Environment (WinRE)

A

Windows troubleshooting feature that installs a command shell environment to a recovery partition to remediate boot issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

System Restore

A

Windows System Protection feature that allows the configuration to be reverted to a restore point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

Roll Back Driver

A

Windows troubleshooting feature that allows removal of an update or reversion to a previous driver version.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

Reset this PC

A

Windows feature to attempt system recovery by reinstalling Windows from source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

fixboot

A

Windows command in Windows allowing for the repair (or attempted repair) of the boot manager and boot loader.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

blue screen of death (BSoD)

A

Microsoft status screen that indicates an error from which the system cannot recover (also called a stop error). Blue screens are usually caused by bad driver software or hardware faults (memory or disk). Other operating systems use similar crash indicators, such as Apple’s pinwheel and Linux’s kernel panic message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

drifting out of sync

A

Situation where hosts on a network are not closely synchronized to the same date/time source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

network interface card (NIC)

A

Adapter card that provides one or more Ethernet ports for connecting hosts to a network so that they can exchange data over a link.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

subnet mask

A

Number of bits applied to an IP address to mask the network ID portion from the host/interface ID portion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

Internet Protocol (IP)

A

Network (Internet) layer protocol in the TCP/IP suite providing packet addressing and routing for all higher-level protocols in the suite.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

Domain Name System (DNS)

A

Service that maps fully qualified domain name labels to IP addresses on most TCP/IP networks, including the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

Dynamic Host Configuration Protocol (DHCP)

A

Protocol used to automatically assign IP addressing information to hosts that have not been configured manually.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

Network Location Awareness (NLA)

A

Windows feature that categorizes network profile as public or private. Each profile can have a different firewall configuration, with public network types being more restricted, by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

virtual private network (VPN)

A

Secure tunnel created between two endpoints connected via an unsecure transport network (typically the Internet).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

Wireless Wide Area Network (WWAN)

A

Network covering a large area using wireless technologies, such as a cellular radio data network or line-of-sight microwave transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

metered

A

Windows feature for indicating that network data transfer is billable and for setting warnings and caps to avoid unexpected charges from the provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

proxy server

A

Server that mediates the communications between a client and another server. It can filter and often modify communications as well as provide caching services to improve performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

ipconfig command

A

Command tool used to gather information about the IP configuration of a Windows host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

ping command

A

Cross-platform command tool for testing IP packet transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

tracert command

A

Diagnostic utilities that trace the route taken by a packet as it “hops” to the destination host on a remote network. tracert is the Windows implementation, while traceroute runs on Linux.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

pathping command

A

Windows utility for measuring latency and packet loss across an internetwork.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

nslookup command

A

Cross-platform command tool for querying DNS resource records.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

netstat command

A

Cross-platform command tool to show network information on a machine running TCP/IP, notably active connections, and the routing table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

access control list (ACL)

A

Collection of access control entries (ACEs) that determines which subjects (user accounts, host IP addresses, and so on) are allowed or denied access to the object and the privileges given (read-only, read/write, and so on).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

Implicit deny

A

Basic principle of security stating that unless something has explicitly been granted access, it should be denied access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

least privilege

A

Basic principle of security stating that something should be allocated the minimum necessary rights, privileges, or information to perform its role.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

local account

A

User account that can be authenticated again and allocated permissions for the computer that hosts the account only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

security group

A

Access control feature that allows permissions to be allocated to multiple users more efficiently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

Administrators

A

Privileged user account that has been granted memberships of the Administrators security group. There is also an account named Administrator, but this is usually disabled by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

standard account

A

Non-privileged user account in Windows that typically has membership of the Users security group only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

Guest

A

Non-privileged account that is permitted to access the computer/network without authenticating.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

Power Users

A

One of the default Windows group accounts. Its use is deprecated, but it is still included with Windows to support legacy applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

User Account Control (UAC)

A

Windows feature designed to mitigate abuse of administrative accounts by requiring explicit consent to use privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

Multifactor authentication (MFA)

A

Authentication scheme that requires the user to present at least two different factors as credentials; for example, something you know, something you have, something you are, something you do, and somewhere you are. Specifying two factors is known as 2FA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

2-step verification

A

Authentication mechanism that uses a separate channel to authorize a sign-on attempt or to transmit an additional credential. This can use a registered email account or a contact phone number for an SMS or voice call.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

soft token

A

Either an additional code to use for 2-step verification, such as a one-time password, or authorization data that can be presented as evidence of authentication in an SSO system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

short message service (SMS)

A

System for sending text messages between cell phones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

authenticator application

A

Software that allows a smartphone to operate as a second authentication factor or as a trusted channel for 2-step verification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

hard token

A

USB storage key or smart card with a cryptographic module that can hold authenticating encryption keys securely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q

Windows Hello

A

Feature that supports passwordless sign-in for Windows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

Trusted Platform Module (TPM)

A

Specification for secure hardware-based storage of encryption keys, hashed passwords, and other user- and platform-identification information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q

Fingerprint

A

Biometric authentication device that can produce a template signature of a user’s fingerprint and then subsequently compare the template to the digit submitted for authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

Facial recognition

A

Biometric authentication mechanism that uses an infrared camera to verify that the user’s face matches a 3D model recorded at enrollment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
162
Q

Single sign-On (SSO)

A

Authentication technology that enables a user to authenticate once and receive authorizations for multiple services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
163
Q

domain

A

Group of hosts that is within the same namespace and administered by the same authority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
164
Q

Active Directory (AD)

A

Network directory service for Microsoft Windows domain networks that facilitates authentication and authorization of user and computer accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
165
Q

member server

A

Any application server computer that has joined a domain but does not maintain a copy of the Active Directory database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
166
Q

organizational unit (OU)

A

Structural feature of a network directory that can be used to group objects that should share a common configuration or organizing principle, such as accounts within the same business department.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
167
Q

group policy objects (GPOs)

A

On a Windows domain, a way to deploy per-user and per-computer settings such as password policy, account restrictions, firewall status, and so on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
168
Q

gpupdate

A

Command-line tools to apply and analyze group policies. Group policies are a means of configuring registry settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
169
Q

login script

A

Code that performs a series of tasks automatically when a user account is authenticated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
170
Q

Mobile Device Management (MDM)

A

Process and supporting technologies for tracking, controlling, and securing the organization’s mobile infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
171
Q

workgroup

A

Group of network hosts that shares resources in a peer-to-peer fashion. No one computer provides a centralized directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
172
Q

network discovery

A

Windows firewall configuration that makes a host visible to network browsers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
173
Q

file sharing

A

Windows firewall configuration that opens the network ports required to operate as a file/print server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
174
Q

mapped drive

A

Windows mechanism for navigating shared network folders by assigning them with drive letters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
175
Q

NTFS permissions

A

ACL that mediates local and network access to a file system object under Windows when the volume is formatted with NTFS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
176
Q

inheritance

A

File system access-control-concept where child objects are automatically assigned the same permissions as their parent object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
177
Q

Everyone

A

System security group that represents any account, including unauthenticated users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
178
Q

home folder

A

Default local or network folder for users to save data files to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
179
Q

Roaming profiles

A

Configuring a network share to hold user profile data. The data is copied to and from the share at logon and logoff.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
180
Q

Folder redirection

A

In Windows, redirecting an individual user profile folder, such as Documents or Pictures, to a network share.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
181
Q

shell

A

System component providing a command interpreter by which the user can use a kernel interface and operate the OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
182
Q

Bash

A

Command interpreter and scripting language for Unix-like systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
183
Q

terminal

A

Software that implements input and output for a command shell.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
184
Q

consoles

A

Device that implements input and output for a command shell. In Linux, multiple virtual consoles support use of a single host by multiple user sessions simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
185
Q

Nano

A

Command-line text editor operated by CTRL key combinations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
186
Q

vi or vim

A

Command-line text editor that extends the original vi software. Vim uses a command mode for file operations and an insert mode for editing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
187
Q

pwd

A

Linux command for showing the current directory (“Print Working Directory”).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
188
Q

ls

A

Linux command for listing file system objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
189
Q

cat

A

Linux command to view and combine (concatenate) files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
190
Q

find command

A

Command-line Linux tool used to search the file system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
191
Q

grep

A

Linux command for searching and filtering input. This can be used as a file search tool when combined with ls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
192
Q

cp command

A

Command-line tool for copying files in Linux.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
193
Q

mv command

A

Command-line tool for moving files in Linux.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
194
Q

rm command

A

Command-line tool for deleting file system objects in Linux.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
195
Q

df and du commands

A

Command-line tools used to report storage usage in Linux.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
196
Q

su

A

Linux commands allowing a user to use the root account or execute commands restricted to privileged users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
197
Q

sudo

A

Linux commands allowing a user to use the root account or execute commands restricted to privileged users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
198
Q

symbolic

A

Syntax for setting Linux permissions that uses characters to represent permissions values.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
199
Q

chmod command

A

Linux command for managing file permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
200
Q

octal notation

A

Linux file-permission mode that uses numeric values to represent permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
201
Q

chown

A

Linux command for managing the account owner for files and directories.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
202
Q

apt-get

A

One of the package management tools available in Linux for installing and updating software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
203
Q

yum

A

Package manager for installing, maintaining, inventorying, and removing software from the Red Hat family of Linux distributions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
204
Q

ps command

A

Linux command for retrieving process information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
205
Q

top command

A

Interactive Linux command for monitoring process information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
206
Q

ifconfig

A

Deprecated Linux command tool used to gather information about the IP configuration of the network adapter or to configure the network adapter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
207
Q

ip command

A

Linux command tool used to gather information about the IP configuration of the network adapter or to configure the network adapter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
208
Q

dig

A

Utility to query a DNS server and return information about a particular domain name or resource record.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
209
Q

Samba

A

Linux software package that implements Server Message Block (SMB) file/print sharing, primarily to support integration with Windows hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
210
Q

cron

A

Scheduled task that is managed by the Linux cron daemon.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
211
Q

dock

A

macOS feature for managing applications from the desktop; similar to the Windows taskbar.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
212
Q

Spotlight Search

A

macOS file system search tool.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
213
Q

Mission Control

A

App facilitating multiple desktops in macOS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
214
Q

System Preferences

A

macOS control panel hosting multiple prefpane configuration utilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
215
Q

Magic Mouse

A

Touch-enabled mouse and trackpad hardware for Apple computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
216
Q

Accessibility prefpane

A

macOS utility related to desktop and input/output device accessibility configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
217
Q

Apple ID

A

Cloud-based service allowing users to synchronize settings and manage apps, file sharing, and backups between multiple Apple devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
218
Q

keychain

A

macOS app for managing passwords cached by the OS and supported browser/web applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
219
Q

FileVault

A

macOS disk encryption product.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
220
Q

Finder

A

File management app in macOS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
221
Q

iCloud

A

Mobile/cloud computing office-productivity and data-storage suite operated by Apple and closely integrated with macOS and iOS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
222
Q

DMG

A

macOS installer format that can be copied directly to the Applications folder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
223
Q

PKG

A

macOS installer format that supports complex setup tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
224
Q

.APP

A

Default extension for a macOS app subdirectory when installed to the Applications folder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
225
Q

Disk Utility

A

macOS tool for disk and file system support tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
226
Q

Remote Disc

A

macOS tool for sharing an optical drive over the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
227
Q

Time Machine

A

App facilitating backup operations in macOS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
228
Q

spinning wait cursor

A

macOS indicator that a process is busy and is not able to accept input.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
229
Q

Force Quit

A

macOS tool for halting a process; equivalent to the process management functionality in Task Manager.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
230
Q

confidentiality, integrity, and availability (CIA triad)

A

Three principles of security control and management. Also known as the information security triad. Also referred to in reverse order as the AIC triad.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
231
Q

cybersecurity

A

Protection of computer systems and digital information resources from unauthorized access, attack, theft, or data damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
232
Q

threat actor

A

Person or entity responsible for an event that has been identified as a security incident or as a risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
233
Q

Risk

A

Likelihood and impact (or consequence) of a threat actor exercising a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
234
Q

Vulnerability

A

Weakness that could be triggered accidentally or exploited intentionally to cause a security breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
235
Q

non-compliant system

A

System whose configuration is different from its secure baseline.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
236
Q

unprotected system

A

System where one or more required security controls (antivirus or firewall, for example) is missing or misconfigured.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
237
Q

exploit

A

Specific method by which malware code infects a target host, often via some vulnerability in a software process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
238
Q

zero-day

A

Vulnerability in software that is unpatched by the developer or an attack that exploits such a vulnerability.

239
Q

Bring your own device (BYOD)

A

Security framework and tools to facilitate use of personally-owned devices to access corporate networks and data.

240
Q

Social engineering

A

Using persuasion, manipulation, or intimidation to make the victim violate a security policy. The goal of social engineering might be to gain access to an account, gain access to physical premises, or gather information.

241
Q

Impersonation

A

Social engineering attack where an attacker pretends to be someone they are not.

242
Q

pretexting

A

Social engineering tactic where a team will communicate, whether directly or indirectly, a lie or half-truth in order to get someone to believe a falsehood

243
Q

Dumpster diving

A

The social engineering technique of discovering things about an organization (or person) based on what it throws away.

244
Q

shoulder surfing

A

Social engineering tactic to obtain someone’s password or PIN by observing him or her as he or she types it in.

245
Q

Tailgating

A

Social engineering technique to gain access to a building by following someone who is unaware of their presence.

246
Q

Pibbybacking

A

Allowing a threat actor to enter a site or controlled location without authorization.

247
Q

Phishing

A

Email-based social engineering attack, in which the attacker sends email from a supposedly reputable source, such as a bank, to try to elicit private information from the victim.

248
Q

Spear Phishing

A

Email-based or web-based form of phishing which targets specific individuals.

249
Q

Whaling

A

An email-based or web-based form of phishing which targets senior executives or wealthy individuals.

250
Q

Vishing

A

Social engineering attack where the threat actor extracts information while speaking over the phone or leveraging IP-based voice messaging services (VoIP).

251
Q

evil twin

A

Wireless access point that deceives users into believing that it is a legitimate network access point.

252
Q

threats

A

Potential for an entity to exercise a vulnerability (that is, to breach security).

253
Q

insider threat

A

Type of threat actor who is assigned privileges on the system that cause an intentional or unintentional incident.

254
Q

Footprinting

A

The phase in an attack or penetration test in which the attacker or tester gathers information about the target before attacking it.

255
Q

spoofing

A

Attack technique where the threat actor disguises their identity or impersonates another user or resource.

256
Q

on-path

A

Attack where the threat actor makes an independent connection between two victims and is able to read and possibly modify traffic.

257
Q

denial of service (DoS)

A

Any type of physical, application, or network attack that affects the availability of a managed resource.

258
Q

distributed DoS (DDoS)

A

An attack that uses multiple compromised hosts (a botnet) to overwhelm a service with request or response traffic.

259
Q

botnet

A

Group of hosts or devices that have been infected by a control program called a bot that enables attackers to exploit the hosts to mount attacks.

260
Q

password

A

Any attack where the attacker tries to gain unauthorized access to and use of passwords.

261
Q

Dictionary

A

Type of password attack that compares encrypted passwords against a predetermined list of possible password values.

262
Q

Brute force

A

Type of password attack where an attacker uses an application to exhaustively try every possible alphanumeric combination to crack encrypted passwords.

263
Q

cross-site scripting

A

Malicious script hosted on the attacker’s site or coded in a link injected onto a trusted site designed to compromise clients browsing the trusted site, circumventing the browser’s security model of trusted zones.

264
Q

SQL injection

A

Attack that injects a database query into the input data directed at a server by accessing the client side of the application.

265
Q

hash

A

Function that converts an arbitrary length string input to a fixed length string output. A cryptographic hash function does this in a way that reduces the chance of collisions, where two different inputs produce the same output.

266
Q

symmetric encryption

A

Two-way encryption scheme in which encryption and decryption are both performed by the same key. Also known as shared-key encryption.

267
Q

asymmetric encryption cipher

A

Cipher that uses public and private keys. The keys are mathematically linked, using either Rivel, Shamir, Adleman (RSA) or elliptic curve cryptography (ECC) alogrithms, but the private key is not derivable from the public one. An asymmetric key cannot reverse the operation it performs, so the public key cannot decrypt what it has encrypted, for example.

268
Q

private key

A

In asymmetric encryption, the private key is known only to the holder and is linked to, but not derivable from, a public key distributed to those with which the holder wants to communicate securely. A private key can be used to encrypt data that can be decrypted by the linked public key or vice versa.

269
Q

public key

A

During asymmetric encryption, this key is freely distributed and can be used to perform the reverse encryption or decryption operation of the linked private key in the pair.

270
Q

digital signature

A

Message digest encrypted using the sender’s private key that is appended to a message to authenticate the sender and prove message integrity.

271
Q

Key exchange

A

Any method by which cryptographic keys are transferred among users, thus enabling the use of a cryptographic algorithm.

272
Q

Wi-Fi Protected Access (WPA)

A

Standards for authenticating and encrypting access to Wi-Fi networks.

273
Q

Temporal Key Integrity Protocol (TKIP)

A

Mechanism used in the first version of WPA to improve the security of wireless encryption mechanisms, compared to the flawed WEP standard.

274
Q

Advanced Encryption Standard (AES)

A

Symmetric 128-, 192-, or 256-bit block cipher used for bulk encryption in modern security standards, such as WPA2, WPA3, and TLS.

275
Q

Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP)

A

Encryption protocol used for wireless LANs that addresses the vulnerabilities of the WEP protocol.

276
Q

simultaneous authentication of equals (SAE)

A

Personal authentication mechanism for Wi-Fi networks introduced with WPA3 to address vulnerabilities in the WPA-PSK method.

277
Q

pre-shared key (PSK)

A

Wireless network authentication mode where a passphrase-based mechanism is used to allow group authentication to a wireless network. The passphrase is used to derive an encryption key.

278
Q

802.1x

A

Standard for encapsulating EAP communications over a LAN (EAPoL) or WLAN (EAPoW) to implement port-based authentication.

279
Q

Extensible Authentication Protocol (EAP)

A

Framework for negotiating authentication methods that enables systems to use hardware-based identifiers, such as fingerprint scanners or smart card readers, for authentication, and establish secure tunnels through which to submit credentials.

280
Q

Authentication, Authorization, and Accounting (AAA)

A

Security concept where a centralized platform verifies subject identification, ensures the subject is assigned relevant permissions, and then logs these actions to create an audit trail.

281
Q

Remote Authentication Dial-in User Service (RADIUS)

A

AAA protocol used to manage remote and wireless authentication infrastructures.

282
Q

Terminal Access Controller Access Control System Plus (TACACS+)

A

It is an AAA protocol that was developed by Cisco and used by numerous third-party implementations that is used in authenticating administrative access to routers and switches.

283
Q

Kerberos

A

Single sign-on authentication and authorization service that is based on a time-sensitive, ticket-granting system.

284
Q

home router

A

SOHO device providing Internet routing via a full fiber, DSL, cable, or satellite link. These appliances also provide a 4-port LAN switch and Wi-Fi plus a firewall.

285
Q

physical placement

A

Considerations for installation location for PC and network devices to ensure reliable and secure operation.

286
Q

firmware

A

Software instructions embedded on a hardware device such as a computer motherboard. Modern types of firmware are stored in flash memory and can be updated more easily than legacy programmable read-only memory (ROM) types.

287
Q

service set ID (SSID)

A

Character string that identifies a particular wireless LAN (WLAN).

288
Q

content filtering

A

Security measure performed on email and Internet traffic to identify and block suspicious, malicious and/or inappropriate content in accordance with an organization’s policies.

289
Q

reservation (DHCP)

A

DHCP configuration that assigns either a prereserved or persistent IP address to a given host, based on its hardware address or other ID.

290
Q

port forwarding

A

Process in which a router takes requests from the Internet for a particular application (such as HTTP) and sends them to a designated host on the LAN.

291
Q

port mapping

A

Type of port forwarding where the external port is forwarded to a different internal port on the LAN host.

292
Q

Port triggering

A

Mechanism to configure access through a firewall for applications that require more than one port. Basically, when the firewall detects activity on outbound port A destined for a given external IP address, it opens inbound access for the external IP address on port B for a set period.

293
Q

Universal Plug-and-Play (UPnP)

A

Protocol framework allowing network devices to autoconfigure services, such as allowing a games console to request appropriate settings from a firewall.

294
Q

screened subnet

A

Segment isolated from the rest of a private network by one or more firewalls that accepts connections from the Internet over designated ports.

295
Q

DMZ host

A

Home router implementation of DMZ where all ports with no existing forwarding rules are opened and directed to a single LAN host.

296
Q

bollards

A

Sturdy vertical post installed to control road traffic or designed to prevent ram-raiding and vehicle-ramming attacks.

297
Q

fencing

A

Security barrier designed to prevent unauthorized access to a site perimeter.

298
Q

access control vestibule

A

Secure entry system with two gateways, only one of which is open at any one time.

299
Q

magnetometer

A

Hand-held or walkthrough metal detector designed to detect concealed weapons.

300
Q

Badge reader

A

Authentication mechanism that allows a user to present a smartcard to operate an entry system.

301
Q

smart card

A

Security device similar to a credit card that can store authentication information, such as a user’s private key, on an embedded cryptoprocessor.

302
Q

Palmprint scanner

A

Biometric camera-based scanner that uses unique features of a palm shown by visible and infrared light.

303
Q

Retina scanner

A

Biometric scanner based on analysis of the unique pattern of blood vessels at the back of the eye.

304
Q

equipment locks

A

Physical security device that restricts access to ports and internal components to key holders.

305
Q

alarm system

A

Physical intrusion detection and warning that can use circuit, motion, proximity, and duress triggers.

306
Q

Motion sensors

A

Alarm system triggered by movement as detected by microwave radio reflection or passive infrared sensors.

307
Q

Video surveillance

A

Physical security control that uses cameras and recording devices to visually monitor the activity in a certain area.

308
Q

lighting

A

Physical security mechanisms that ensure a site is sufficiently illuminated for employees and guests to feel safe and for camera-based surveillance systems to work well.

309
Q

complexity requirements

A

Rules designed to enforce best-practice password selection, such as minimum length and use of multiple character types.

310
Q

expiration requirement

A

Rules designed to enforce best-practice password use by forcing regular selection of new passwords.

311
Q

BIOS/UEFI Passwords

A

This type of firmware-configured password is shared by all users and consequently is very rarely used. It might be used to provide extra security on a standalone computer that does not often require interactive logon, such as a computer used to manage embedded systems.

312
Q

lunchtime attack

A

Where a threat actor exploits an unlocked and unattended desktop or mobile device to gain unauthorized access.

313
Q

screensavers

A

Security mechanism that locks the desktop after a period of inactivity and requires user to authenticate to resume.

314
Q

personally identifiable information (PII)

A

Data that can be used to identify or contact an individual (or in the case of identity theft, to impersonate them).

315
Q

Execution control

A

Process of determining what additional software may be installed on a client or server beyond its baseline to prevent the use of unauthorized software.

316
Q

AutoPlay

A

Windows mechanisms for automatic actions to occur when a peripheral storage device is attached.

317
Q

Windows Defender Antivirus

A

Security scanner installed and enabled by default in Windows that provides protection against general malware types.

318
Q

Definition/pattern updates

A

Information about new viruses and other malware used to update antivirus scanners.

319
Q

Encrypting File System (EFS)

A

Microsoft’s file-level encryption feature available for use on NTFS.

320
Q

trusted source

A

Installer package that can be verified by a digital signature or cryptographic hash.

321
Q

untrusted source

A

Installer package whose authenticity and integrity cannot be verified.

322
Q

Extentions

A

Add-on that uses the browser API to implement new functionality.

323
Q

Plug-ins

A

Software installed to a web browser to handle multimedia objects embedded in web pages. Use of most plug-in types is now deprecated.

324
Q

digital certificates

A

Identification and authentication information presented in the X.509 format and issued by a Certificate Authority (CA) as a guarantee that a key pair (as identified by the public key embedded in the certificate) is valid for a particular subject (user or host).

325
Q

secure connection

A

Using HTTPS to browse a site where the host has presented a valid digital certificate issued by a CA that is trusted by the browser. A padlock icon is shown to indicate the secure status of the connection.

326
Q

Pop-up blockers

A

Browser feature or extension that prevents sites from creating new browser windows.

327
Q

Ad blockers

A

Browser feature or add-in that prevents third-party content from being displayed when visiting a site.

328
Q

cache

A

Cookies, site files, form data, passwords, and other information stored by a browser. Caching behavior can be enabled or disabled and data can be cleared manually.

329
Q

Private/incognito browsing mode

A

Browser mode in which all session data and cache is discarded and tracking protection features are enabled by default.

330
Q

Viruses

A

Malicious code inserted into an executable file image. The malicious code is executed when the file is run and can deliver a payload, such as attempting to infect other files.

331
Q

Boot sector viruses

A

Malicious code inserted into the boot sector code or partition table of a storage device that attempts to execute when the device is attached.

332
Q

Trojans

A

Malicious software program hidden within an innocuous-seeming piece of software. Usually, the Trojan is used to try to compromise the security of the target computer.

333
Q

Worms

A

Type of malware that replicates between processes in system memory and can spread over client/server network connections.

334
Q

Fileless malware

A

Exploit techniques that use the host’s scripting environment to create malicious processes.

335
Q

backdoor

A

Mechanism for gaining access to a computer that bypasses or subverts the normal method of authentication.

336
Q

remote access Trojan (RAT)

A

Malware that creates a backdoor remote administration channel to allow a threat actor to access and control the infected host.

337
Q

command and control (C2 or C&C)

A

Infrastructure of hosts and services with which attackers direct, distribute, and control malware over botnets.

338
Q

Spyware

A

Software that records information about a PC and its users, often installed without the user’s consent.

339
Q

keylogger

A

Malicious software or hardware that can record user keystrokes.

340
Q

rootkit

A

Class of malware that modifies system files, often at the kernel level, to conceal its presence.

341
Q

Ransomware

A

Malware that tries to extort money from the victim by blocking normal operation of a computer and/or encrypting the victim’s files and demanding payment.

342
Q

cryptominer

A

Malware that hijacks computer resources to create cryptocurrency.

343
Q

antivirus scan

A

Software capable of detecting and removing virus infections and (in most cases) other types of malware, such as worms, Trojans, rootkits, adware, spyware, password crackers, network mappers, DoS tools, and so on.

344
Q

Rogue antivirus

A

Spoofed desktop notifications and browser ads designed to alarm users and promote installation of Trojan malware.

345
Q

Redirection

A

Consequence of malware infection where DNS and/or search results are corrupted to redirect requests from legitimate site hosts to spoofed sites or ads.

346
Q

certificate warnings

A

Browser indication that a site connection is not secure because the certificate is invalid or the issuing CA is not trusted.

347
Q

quarentine

A

The process of isolating a file, computer system, or computer network to prevent the spread of a virus or another cybersecurity incident.

348
Q

sandbox

A

Computing environment that is isolated from a host system to guarantee that the environment runs in a controlled, secure fashion. Communication links between the sandbox and the host are usually completely prohibited so that malware or faulty software can be analyzed in isolation and without risk to the host.

349
Q

screen lock

A

Mobile device mechanism that locks the screen after a period of inactivity.

350
Q

swipe

A

Mobile gesture that unlocks the screen without requiring authentication.

351
Q

Personal identification number (PIN)

A

Number used in conjunction with authentication devices such as smart cards; as the PIN should be known only to the user, loss of the smart card should not represent a security risk.

352
Q

Fingerprint

A

Mobile device bio gesture authentication mechanism that requires the user to scan their fingerprint to unlock the device.

353
Q

Pattern

A

Mobile device authentication mechanism that requires the user to input a join the dots pattern to unlock the device.

354
Q

failed login attempts

A

Mobile device authentication mechanism that progressively delays or blocks unlock attempts after multiple failures.

355
Q

locator application

A

Cloud app that uses mobile device location service to identify its current position on a map and enable security features to mitigate theft or loss.

356
Q

remote wipe

A

Software that allows deletion of data and settings on a mobile device to be initiated from a remote server.

357
Q

device wipe

A

Remote-initiated factory reset of a mobile device that removes all user data and settings.

358
Q

enterprise wipe

A

Remote-initiated wipe of a mobile device that removes corporate apps and data only.

359
Q

Internet of Things (IoT)

A

Devices that can report state and configuration data and be remotely managed over IP networks.

360
Q

factory reset

A

Standard routine created by manufacturer that can be invoked to restore an appliance to its shipped state, clearing any user customization, configuration, or modification.

361
Q

AirDrop

A

iOS feature for simple file sharing via Bluetooth.

362
Q

Nearby Share

A

Android feature for simple file sharing via Bluetooth.

363
Q

Root access

A

Gaining superuser level access over an Android-based mobile device.

364
Q

Jailbreak

A

Removes the protective seal and any OS specific restrictions to give users greater control over the device.

365
Q

developer mode

A

Mobile device feature designed for testing apps during development that may weaken corporate security protections if misused.

366
Q

.APK

A

Android app package format used when sideloading software from a source other than a trusted store.

367
Q

bootleg app

A

Software that illegally copies or imitates a commercial product or brand.

368
Q

Virtual Network Computing (VNC)

A

Remote access tool and protocol. VNC is the basis of macOS screen-sharing.

369
Q

Microsoft Remote Assistance (MSRA)

A

Windows remote-support feature allowing a user to invite a technical support professional to provide assistance over a network using chat. The user can also grant the support professional control over his or her desktop. Remote Assistance uses the same RDP protocol as Remote Desktop.

370
Q

Quick Assist

A

Windows support feature allowing remote screen-sharing over the Internet.

371
Q

Secure Shell (SSH)

A

Application protocol supporting secure tunneling and remote terminal emulation and file copy. SSH runs over TCP port 22.

372
Q

Remote monitoring and management (RMM)

A

Category of support software designed for outsourced management of client networks by MSPs.

373
Q

Desktop management or unified endpoint management (UEM)

A

Enterprise software for controlling device settings, apps, and corporate data storage on all types of fixed, mobile, and IoT computing devices.

374
Q

endpoint detection and response (EDR)

A

Software agent that collects system data and logs for analysis by a monitoring system to provide early detection of threats.

375
Q

screen-sharing

A

Software that allows clients to view and control the desktop over a network or the Internet.

376
Q

video-conferencing

A

Software that allows users to configure virtual meeting rooms, with options for voice, video, instant messaging, and screen-sharing.

377
Q

Backups

A

Security copy of production data made to removable media, typically according to a regular schedule. Different backup types (full, incremental, or differential) balance media capacity, time required to backup, and time required to restore.

378
Q

recovery

A

Operation to recover system functionality and/or data integrity using backup media.

379
Q

File History

A

Windows feature for backing up user data.

380
Q

Retention

A

Process an organization uses to maintain the existence of and control over certain data in order to comply with business policies and/or applicable laws and regulations.

381
Q

backup chain

A

Sequence of jobs starting with a full backup and followed by either incremental or differential backups to implement a media rotation scheme.

382
Q

full backup

A

Job type in which all selected files, regardless of prior state, are backed up.

383
Q

differential

A

Job type in which all selected files that have changed since the last full backup are backed up.

384
Q

synthetic full backup

A

Job type that combines incremental backup jobs to synthesize a full backup job. Synthetic full backups have the advantage of being easy to restore from while also being easy on bandwidth across the network as only changes are transmitted.

385
Q

grandfather-father-son (GFS)

A

Media rotation scheme that labels tapes/devices used for backup jobs in generations, with the youngest generation having a shorter retention period than the oldest.

386
Q

Incremental backups

A

Job type in which all selected files that have changed since the last full or incremental backup (whichever was most recent) are backed up.

387
Q

Off site backup storage

A

Media rotation scheme that ensures at least one copy of data is held at a different location to mitigate the risk of a disaster that destroys all storage at a single site.

388
Q

3-2-1 backup rule

A

Best practice maxim stating that at any given time there should be at least three copies of data stored on two media types, with one copy held off site.

389
Q

Regulated data

A

Information that has storage- and handling-compliance requirements defined by national and state legislation and/or industry regulations.

390
Q

Personal Government-Issued Information

A

Data related to identity documents issued by governments, such as passports, social security IDs, and driving licenses, that is liable to be subject to strict legal and regulatory compliance requirements.

391
Q

Healthcare data

A

Data that can be used to identify an individual and includes information about past, present, or future health as well as related payments and data used in the operation of a healthcare business.

392
Q

credit card transactions

A

Regulated data related to processing financial transactions.

393
Q

prohibited content

A

Data found on a computer system that is not permitted by policy or that is not compliant with relevant legislation or regulations.

394
Q

end-user license agreement (EULA)

A

Contract governing the installation and use of software.

395
Q

open-source

A

Licensing model that grants permissive rights to end-users, such as to install, use, modify, and distribute a software product and its source code, as long as redistribution permits the same rights.

396
Q

digital rights management (DRM)

A

Copyright protection technologies for digital media. DRM solutions usually try to restrict the number of devices allowed for playback of a licensed digital file, such as a music track or ebook.

397
Q

incident response plan (IRP)

A

Procedures and guidelines covering appropriate priorities, actions, and responsibilities in the event of security incidents, divided into preparation, detection/analysis, containment, eradication/recovery, and post-incident stages.

398
Q

Computer Security Incident Response Team (CSIRT)

A

Team with responsibility for incident response. The CSIRT must have expertise across a number of business domains (IT, HR, legal, and marketing, for instance).

399
Q

Digital forensics

A

Process of gathering and submitting computer evidence to trial. Digital evidence is latent, meaning that it must be interpreted. This means that great care must be taken to prove that the evidence has not been tampered with or falsified.

400
Q

chain of custody

A

Record of evidence-handling from collection to presentation in court to disposal.

401
Q

sanitization

A

Process of thoroughly and completely removing data from a storage medium so that file remnants cannot be recovered.

402
Q

standard formatting

A

Using a vendor tool to delete the file system and/or partition table on storage media before recycling or repurposing. This method carries the greatest risk of leaving persistent data remnants.

403
Q

erasing/wiping

A

Using a third-party tool to fully erase storage media before recycling or repurposing, minimizing the risk of leaving persistent data remnants.

404
Q

low level

A

Using a vendor tool to fully erase storage media before recycling or repurposing, minimizing the risk of leaving persistent data remnants.

405
Q

Secure Erase (SE)

A

Method of sanitizing a drive using the ATA command set.

406
Q

Instant Secure Erase (ISE)

A

Media sanitization command built into HDDs and SSDs that are self-encrypting that works by erasing the encryption key, leaving remnants unrecoverable.

407
Q

physical destruction

A

Using drilling, shredding, incineration, or degaussing of storage media before recycling or repurposing to minimize the risk of leaving persistent data remnants.

408
Q

certificate of destruction

A

Validation from an outsourcing provider of recycling/repurposing services that media has been destroyed or sanitized to the agreed standard.

409
Q

script

A

Series of simple or complex commands, parameters, variables, and other components stored in a text file and processed by a shell interpreter.

410
Q

.SH

A

Extension for a Linux shell script file format. The shebang in the first line of the script identifies the shell type (Bash, for instance).

411
Q

variable (in programming)

A

Identifier for a value that can change during program execution. Variables are usually declared with a particular data type.

412
Q

branch (in programming)

A

In scripting and programming, control statement that uses a condition to determine which code block to execute next.

413
Q

loop (in programming)

A

In scripting and programming, control statement that executes code repeatedly based on a condition.

414
Q

operators (in programming)

A

Programming object that can resolve the truth value of a condition, such as whether one variable is equal to another.

415
Q

PowerShell (PS)

A

Command shell and scripting language built on the .NET Framework that use cmdlets for Windows automation.

416
Q

.PS1

A

Extension for the PowerShell script format.

417
Q

VBScript

A

A command shell and scripting language built on the .NET Framework, which allows the administrator to automate and manage computing tasks.

418
Q

.VBS

A

Extension for the Visual Basic Script file format.

419
Q

.BAT

A

Extension for the batch file format that is used to execute a series of Windows CMD shell commands.

420
Q

JavaScript

A

Scripting language used to add interactivity to web pages and HTML-format email.

421
Q

.JS

A

Extension for the JavaScript file format.

422
Q

automation

A

Use of scripts to perform configuration steps without requiring manual intervention.

423
Q

Python

A

High-level programming language that is widely used for automation.

424
Q

.PY

A

Extension for a script written in the Python programming language.

425
Q

application programming interface (API)

A

Methods exposed by a script or program that allow other scripts or programs to use it. For example, an API enables software developers to access functions of the TCP/IP network stack under a particular operating system.

426
Q

standard operating procedure (SOP)

A

Documentation of best practice and work instructions to use to perform a common administrative task.

427
Q

ticketing system

A

Database software designed to implement a structured support process by identifying each case with a unique job ticket ID and with descriptive fields to record how the issue was resolved.

428
Q

asset

A

Thing of economic value. For accounting purposes, assets are classified in different ways, such as tangible and intangible or short term and long term. Asset management means identifying each asset and recording its location, attributes, and value in a database.

429
Q

Escalation

A

In the context of support procedures, incident response, and breach-reporting, escalation is the process of involving expert and senior staff to assist in problem management.

430
Q

incident report

A

An analysis of events that can provide insight into how to improve response and support processes in the future.

431
Q

asset tag

A

Practice of assigning an ID to assets to associate them with entries in an inventory database.

432
Q

network topology diagram

A

Documentation showing how network nodes are connected by cabling or how they are logically identified and connected, such as in IP networks.

433
Q

knowledge base (KB)

A

Searchable database of product FAQs (Frequently Asked Questions), advice, and known troubleshooting issues. The Microsoft KB is found at support.microsoft.com.

434
Q

Change management

A

Process through which changes to the configuration of information systems are implemented as part of the organization’s overall configuration management efforts.

435
Q

configuration management

A

Process through which an organization’s information systems components are kept in a controlled state that meets the organization’s requirements, including those for security and compliance.

436
Q

risk analysis

A

Process for qualifying or quantifying the likelihood and impact of a factor.

437
Q

acceptable use policy (AUP)

A

Policy that governs employees’ use of company equipment and Internet services. ISPs may also apply AUPs to their customers.

438
Q

splash screen

A

Displaying terms of use or other restrictions before use of a computer or app is allowed.

439
Q

Active listening

A

Communication technique to ensure that you capture all the information that the other person is “transmitting,” including nonverbal cues such as tone of voice or gestures. There are various active-listening techniques for ensuring that you are “getting the right message,” such as summarizing, reflecting (matching the speaker’s communication style), interpreting, and verbal attends (such as “Uh-huh.” or “I see.”).

440
Q

fuse

A

Circuit breaker designed to protect the device and users of the device from faulty wiring or supply of power (overcurrent protection).

441
Q

grounded

A

Wire that provides a return path for electrical current as a safety feature; if an electrical connection short circuits into the metal chassis, a ground wire ensures that the current flows to ground rather than electrocuting someone handling the faulty device.

442
Q

Electrostatic discharge (ESD)

A

Metal and plastic surfaces can allow a charge to build up. This can discharge if a potential difference is formed between the charged object and an oppositely charged conductive object. This electrical discharge can damage silicon chips and computer components if they are exposed to it.

443
Q

Under-voltage event

A

When the power that is supplied by the electrical wall socket is insufficient to allow the computer to function correctly. Under-voltage events are long sags in power output that are often caused by overloaded or faulty grid distribution circuits or by a failure in the supply route from electrical power station to a building.

444
Q

Power failure

A

Complete loss of building power.

445
Q

surge suppressor

A

Device that protects electrical devices against the damaging effects of a power surge or spike.

446
Q

uninterruptible power supply (UPS)

A

Battery-powered device that supplies AC power that an electronic device can use in the event of power failure.

447
Q

material safety data sheet (MSDS)

A

Information sheet accompanying hazardous products or substances that explains the proper procedures for handling and disposal.

448
Q

You are developing a Bash script to test whether a given host is up. Users will run the script in the following format:

./ping.sh 192.168.1.1

Within the code, what identifier can you use to refer to the IP address passed to the script as an argument?

A

$1 will refer to the first positional argument.

449
Q

You are auditing a file system for the presence of any unauthorized Windows shell script files. Which three extensions should you scan for?

A

.PS1 for PowerShell scripts, .VBS for VBScript, and .BAT for cmd batch files.

450
Q

What type of cryptographic key is delivered in a digital certificate?

A

A digital certificate is a wrapper for a subject’s public key. The public and private keys in an asymmetric cipher are paired. If one key is used to encrypt a message, only the other key can then decrypt it.

451
Q

What is the purpose of a KB?

A

A knowledge base (KB) is a reference to assist with installing, configuring, and troubleshooting hardware and software. KBs might be created by vendors to support their products. A company might also create an internal KB, populated with guidelines, procedures, information from service tickets, and answers to frequently asked questions (FAQs).

452
Q

The building will house a number of servers contained within a secure room and network racks. You have recommended that the provisioning requirement includes key-operated chassis faceplates. What threats will this mitigate?

A

A lockable faceplate controls who can access the power button, external ports, and internal components. This mitigates the risk of someone gaining access to the server room via social engineering. It also mitigates risks from insider threat by rogue administrators, though to a lesser extent (each request for a chassis key would need to be approved and logged).

453
Q

What type of account management policy can protect against password-guessing attacks?

A

A lockout policy disables the account after a number of incorrect sign-in attempts.

454
Q

When might you need to consult SDS documentation?

A

A Safety Data Sheet (SDS), previously known as a Material Safety Data Sheet (MSDS), should be consulted when introducing a new product or substance to the workplace. Subsequently, you should refer to it in case of an accident involving the substance or when you need to dispose of it.

455
Q

A threat actor crafts an email addressed to a senior support technician and part-time football coach inviting him to register for free football coaching advice. The website contains password-stealing malware. What is the name of this type of attack?

A

A phishing attack tries to make users authenticate with a fake resource, such as a website. Phishing emails are often sent in mass as spam. This is a variant of phishing called spear phishing because it is specifically targeted at a single person, using personal information known about the subject (his or her football-coaching volunteer work).

456
Q

What backup issue does the synthetic job type address?

A

A synthetic full backup reduces data transfer requirements and, therefore, backup job time by synthesizing a full backup from previous incremental backups rather than directly from the source data.

457
Q

In AAA architecture, what type of device might a RADIUS client be?

A

AAA refers to Authentication, Authorization, and Accounting and the Remote Access Dial-in User Service (RADIUS) protocol is one way of implementing this architecture. The RADIUS server is positioned on the internal network and processes authentication and authorization requests. The RADIUS client is the access point, and it must be configured with the IP address of the server plus a shared secret passphrase. The access point forwards authentication traffic between the end-user device (a supplicant) and the RADIUS server but cannot inspect the traffic.

458
Q

You are trying to troubleshoot a problem over the phone and need to get advice from your manager. How should you handle this with the customer?

A

Advise the customer that you will put him or her on hold while you speak to someone else, or arrange to call the customer back.

459
Q

What role do barcodes play in managing inventory?

A

An inventory is a list of assets stored as database records. You must be able to correlate each physical device with an asset record by labeling it. A barcode label is a good way of doing this.

460
Q

How do you perform a scan to identify file system errors in read-only mode?

A

At a command prompt, run chkdsk without any switches.

(Note that sfc is not the correct answer as this verifies the integrity of protected system files rather than checks the file system on a drive.)

461
Q

Confidentiality and integrity are two important properties of information stored in a secure retrieval system. What is the third property?

A

Availability—information that is inaccessible is not of much use to authorized users. For example, a secure system must protect against denial of service (DoS) attacks.

462
Q

Katie works in a high-security government facility. When she comes to work in the morning, she places her hand on a scanning device installed at a turnstile in the building lobby. The scanner reads her palmprint and compares it to a master record of her palmprint in a database to verify her identity. What type of security control is this?

A

Biometric authentication deployed as part of a building’s entry-control system.

463
Q

A computer is caught in a reboot loop. It starts, shows a BSoD, and then reboots. What should you do?

A

Boot using a recovery tool, such as the product disc, and attempt startup repair and/or repair of the Windows installation using sfc or Windows reset.

464
Q

A threat actor recovers some documents via dumpster diving and learns that the system policy causes passwords to be configured with a random mix of different characters that are only five characters in length. To what type of password cracking attack is this vulnerable?

A

Brute force attacks are effective against short passwords. Dictionary attacks depend on users choosing ordinary words or phrases in a password.

465
Q

You have selected a secure location for a new home router, changed the default password, and verified the WAN IP address and Internet link. What next step should you perform before configuring wireless settings?

A

Check for a firmware update. Using the latest firmware is important to mitigate risks from software vulnerabilities.

466
Q

You are troubleshooting a user device that keeps powering off unexpectedly. You run hardware diagnostics and confirm there is no component fault or overheating issue. What should your next troubleshooting step be?

A

Check that the device has sufficient spare storage, and check for updates. If you can’t identify a device-wide fault, test to see whether the issue is associated with use of a single app.

467
Q

You are writing some work instructions to assist technicians with deploying new user desktops via cloning. What type of installation and boot method is this process most likely to use, and what are the boot requirements?

A

Cloning refers to the image deployment installation method. An image is a copy of an existing installation saved as a single file. Image deployment could use USB boot media (or even optical discs), but network boot is more likely. Network boot requires a PXE-compatible network adapter and motherboard in the computer and the boot device priority set to network/PXE. The network requires a Dynamic Host Configuration Protocol (DHCP) server plus a remote network installation server to run unattended setup and apply the image.

468
Q

How do you activate Spotlight Search using the keyboard?

A

COMMAND+SPACEBAR

469
Q

Why is DNS configuration a step in the malware remediation process?

A

Compromising domain-name resolution is a very effective means of redirecting users to malicious websites. Following malware infection, it is important to ensure that DNS is being performed by valid servers.

470
Q

Users working from home need to be able to access a PC on the corporate network via RDP. What technology will enable this without having to open the RDP port to Internet access?

A

Configure a virtual private network (VPN) so that remote users can connect to the corporate LAN and then launch the remote desktop protocol (RDP) client to connect to the office PC.

471
Q

A company wants to minimize the number of devices and mobile OS versions that it must support but allow use of a device by employees for personal email and social networking. What mobile deployment model is the best fit for these requirements?

A

Corporate owned, personally enabled (COPE) will allow standardization to a single device and OS. As the requirement does not specify a single device and OS, choose your own device (CYOD) would also fit.

472
Q

You are completing a checklist of security features for workstation deployments. Following the CompTIA A+ objectives, what additional item should you add to the following list, and what recommendation for a built-in Windows feature or features can you recommend be used to implement it?

  • Password best practices
  • End-user best practices
  • Account management
  • Change default administrator’s useraccount/password
  • Disable AutoRun/AutoPlay
  • Enable Windows Update, Windows Defender - Antivirus, and Windows Defender Firewall
A

Data-at-rest encryption. In Windows, this can be configured at file level via the Encrypting File System (EFS) or at disk level via BitLocker.

473
Q

When you arrive at a customer location to service a network printer, the user is upset because the printer is not working and therefore he cannot submit his reports on time. How should you approach this user?

A

Demonstrate empathy with the customer’s situation, use active listening skills to show that you understand the importance of the issue, and make the customer confident that you can help. Then use closed-questioning techniques to start to diagnose the problem.

474
Q

You are assisting with the configuration of MDM software. One concern is to deny access to devices that might be able to run apps that could be used to circumvent the access controls enforced by MDM. What types of configurations are of concern?

A

Devices that are jailbroken or rooted allow the owner account complete control. Devices that allow installation of apps from untrusted sources, such as by sideloading APK packages or via developer mode, could also have weakened permissions.

475
Q

Why are the actions of a first responder critical in the context of a forensic investigation?

A

Digital evidence is difficult to capture in a form that demonstrates that it has not been tampered with. Documentation of the scene and proper procedures are crucial.

476
Q

You are reviewing a secure deployment checklist for home router wireless configuration. Following the CompTIA A+ objectives, what additional setting should be considered along with the following four settings?

  • Changing the service set identifier (SSID)
  • Disabling SSID broadcast
  • Encryption settings
  • Changing channels
A

Disabling guest access. It might be appropriate to allow a guest network depending on the circumstances, but the general principle is that services and access methods that are not required should be disabled.

477
Q

You are working on the training documentation for help-desk agents. What should you include for dealing with difficult situations?

A

Do not argue with customers and/or be defensive. Avoid dismissing customer problems, and do not be judgmental. Try to calm the customer and move the support call toward positive troubleshooting diagnosis and activity, emphasizing a collaborative approach. Do not disclose experiences via social media outlets.

478
Q

In which atmospheric conditions is the risk of ESD highest?

A

During cool, dry conditions when humidity is low. When humidity is high, the static electricity can dissipate through the moisture present in the air.

479
Q

A command has generated a large amount of data on the screen. What could you add to the command to make the output more readable?

A

Either | more or | less.

480
Q

What two factors must a user present to authenticate to a wireless network secured using EAP-TLS?

A

1. A digital certificate and its associated private key are installed on the wireless station.

2. Device authentication, typically via a password, PIN, or biometric gesture, permits access to the private key.

481
Q

True or false? An organization should rely on automatic screen savers to prevent lunchtime attacks.

A

False.
A lunchtime attack is where a threat actor gains access to a signed-in user account because the desktop has not locked. While an automatic screensaver lock provides some protection, there may still be a window of opportunity for a threat actor between the user leaving the workstation unattended and the screensaver activating. Users must lock the workstation manually when leaving it unattended.

482
Q

True or false? The level of risk from zero-day attacks is only significant with respect to EOL systems.

A

False.
A zero-day is a vulnerability that is unknown to the product vendor and means that no patch is available to mitigate it. This can affect currently supported as well as unsupported end-of-life (EOL) systems. The main difference is that there is a good chance of a patch being developed if the system is still supported, but almost no chance if it is EOL.

483
Q

True or false. TKIP represents the best available wireless encryption and should be configured in place of AES if supported.

A

False. Advanced Encryption Standard (AES) provides stronger encryption and is enabled by selecting Wi-Fi Protected Access (WPA) version 2 with AES/CCMP or WPA3 encryption mode. The Temporal Key Integrity Protocol (TKIP) attempts to fix problems with the older RC4 cipher used by the first version of WPA. TKIP and WPA1 are now deprecated.

484
Q

True or false? Updates are not necessary for iOS devices because the OS is closed source.

A

False.
Closed source just means that the vendor controls development of the OS. It is still subject to updates to fix problems and introduce new features.

485
Q

True or false? Using a browser’s incognito mode will prevent sites from recording the user’s IP address.

A

**False. **
Incognito mode can prevent the use of cookies but cannot conceal the user’s source IP address.

(You do not need to include this in your answer, but the main way to conceal the source IP address is to connect to sites via a virtual private network (VPN).)

486
Q

True or false? Windows Defender Firewall can be disabled.

A

**True. **
It is not usually a good idea to do so, but it can be disabled via Security Center or the Control Panel applet.

487
Q

True or false? A factory reset preserves the user’s personal data.

A

**False. **
Restoring to factory settings means removing all user data and settings.

488
Q

True or False? You should fit an antistatic wrist strap over your clothing as this is most likely to retain a charge.

A

False. The conductive path will occur through your fingers as you touch electronic components. The stud in the wrist strap must make contact with your skin to drain the charge.

489
Q

True or false? Under default settings, the user account added during setup is not affected by User Account Control.

A

**False. **
User Account Control (UAC) is designed to prevent misuse of accounts with administrative privileges. Use of such privileges requires the user to approve a consent dialog or to enter the credentials of an administrator account. This system can be disabled via UAC settings, but it is enabled by default.

490
Q

True or False: SSDs can benefit from occasional defragmentation or optimization.

A

True. **
With flash drives and SSDs, while seek time is not a performance factor, the file system *can still benefit from occasional defragmentation or optimization.
There are several things to consider, including the lifespan of the SSD. You can read more about the technical considerations in optimizing SSDs at hanselman.com/blog/TheRealAndCompleteStoryDoesWindowsDefragmentYourSSD.aspx

491
Q

What two types of biometric authentication mechanism are supported on smartphones? (2)

A
  • Fingerprint recognition
  • Facial recognition.
492
Q

A user is assigned Read NTFS permissions to a resource via his user account and Full Control via membership of a group. What effective NTFS permissions does the user have for the resource?

A

Full control—the most effective permissions are applied.

493
Q

You are writing a tech note to guide new technicians on operational procedures for working with Active Directory. As part of this note, what is the difference between the gpupdate and gpresult commands?

A

gpupdate is used to refresh local policy settings with updates or changes from the policy template.
gpresult is used to identify the Resultant Set of Policies (RSoP) for a given computer and/or user account.

494
Q

You are updating a deployment checklist for installing new workstation PCs. What are the principal environmental hazards to consider when choosing a location? (4)

A
  • Heat
  • Direct sunlight,
  • Excessive dust and liquids
  • Very low or high humidity.

(Equipment should also be installed so as not to pose a topple or trip hazard.)

495
Q

You receive a support call from a user who is “stuck” on a web page. She is trying to use the Back button to return to her search results, but the page just displays again with a pop-up message. Is her computer infected with malware?

A

If it only occurs on certain sites, it is probably part of the site design. A script running on the site can prevent use of the Back button. It could also be a sign of adware or spyware though, so it would be safest to scan the computer using up-to-date anti-malware software.

496
Q

Why might a PC infected with malware display no obvious symptoms?

A

If the malware is used with the intent to steal information or record behavior, it will not try to make its presence obvious. A rootkit may be very hard to detect even when a rigorous investigation is made.

497
Q

While troubleshooting an issue with a graphics card in Windows 10, you discover that the driver version is not up to date. What first step could you perform to install the latest driver?

A

In the Settings app, select Update & Security. Under Windows Update, select “View optional updates.”

(If a graphics driver update is not listed here, check the vendor’s site for driver installation software.)

498
Q

Where would you look for the option to view and configure wireless adapter status in macOS?

A

In the Status menu on the Menu bar, in the top-right of the screen, or in the Network prefpane.

499
Q

A DHCP server has been reconfigured to use a new network address scheme following a network problem. What command would you use to refresh the IP configuration on Windows client workstations?

A

ipconfig /renew

500
Q

Early in the day, a user called the help desk saying that his computer is running slowly and freezing up. Shortly after this user called, other help desk technicians who overheard your call also received calls from users who report similar symptoms. Is this likely to be a malware infection?

A

It is certainly possible. Software updates are often applied when a computer is started in the morning, so that is another potential cause, but you should investigate and log a warning so that all support staff are alerted. It is very difficult to categorize malware when the only symptom is performance issues. However, performance issues could be a result of a badly written Trojan, or a Trojan/backdoor application might be using resources maliciously (for DDoS, Bitcoin mining, spam, and so on).

501
Q

You are documenting workstation backup and recovery methods and want to include the 3-2-1 backup rule. What is this rule?

A

It states that you should have three copies of your data across two media types, with one copy held offline and offsite. The production data counts as one copy.

502
Q

Another user calls to say he is trying to sign-on to his online banking service, but the browser reports that the certificate is invalid. Should the bank update its certificate, or do you suspect another cause?

A

It would be highly unlikely for a commercial bank to allow its website certificates to run out of date or otherwise be misconfigured. You should strongly suspect redirection by malware or a phishing/pharming scam.

503
Q

What feature of modern file systems assists recovery after power outages or OS crash events?

A

Journaling means that the file system keeps a log of updates that it can use to recover damaged data. The OS might also make use of snapshot capability to maintain a file-version history or perform continuous backups.

504
Q

Advanced malware can operate covertly with no easily detectable symptoms that can be obtained by scanning the device itself. What other type of symptom could provide evidence of compromise in this scenario?

A

Leaked data files or personal information such as passwords.

505
Q

Which Linux command will display detailed information about all files and directories in the current directory, including system files?

A

ls -la

506
Q

Angel unboxed a new tablet that his company just purchased and tried to connect to the corporate network. He knows the SSID of the wireless network and the password used to access the wireless network. He was denied access, and an enrollment warning message was displayed that he must contact the IT Department immediately. What happened, and why did he receive the message?

A

Mobile device management (MDM) is being used to mediate network access. The device must be enrolled with the MDM software before it can join the network.

507
Q

What command could you use to move a file names.doc from your current directory to the USB stick linked to folder /mnt/usb?

A

mv names.doc /mnt/usb

508
Q

A security consultant has recommended blocking end-user access to the chrome://flags browser page. Does this prevent a user from changing any browser settings?

A

**No. **
The chrome://flags page is for advanced configuration settings. General user, security, and privacy settings are configured via chrome://settings.

509
Q

You are pinging a host at 192.168.0.99 from a host at 192.168.0.200. The response is “Reply from 192.168.0.200: Destination host unreachable.” The hosts use the subnet mask 255.255.255.0. Does the ping output indicate a problem with the default gateway?

A

**No. **
The hosts are on the same IP network (192.168.0.0/24). This means that 192.168.0.200 does not try to use a router (the gateway) to send the probes. 192.168.0.200 uses address resolution protocol (ARP) to find the host with the IP 192.168.0.99. The host unreachable message indicates that there was no response, but the problem will be an issue such as the host being disconnected from the network or configured to block discovery rather than a gateway issue.

510
Q

An employee has a private license for a graphics editing application that was bundled with the purchase of a digital camera. The employee needs to use this temporarily for a project and installs it on her computer at work. Is this a valid use of the license?

A

**No. **
The license is likely to permit installation to only one computer at a time. It might or might not prohibit commercial use, but regardless of the license terms, any installation of software must be managed by the IT department.

511
Q

You are supporting a home user with upgrading a computer from Windows 10 to Windows 11. You have run Microsoft’s PC Health Check tool, and it verifies that the computer meets the hardware requirements. Should you now proceed with the in-place upgrade?

A

**No. **
You must backup user data and settings first. A backup is essential as a security precaution.

512
Q

You are monitoring system performance and notice that a substantial number of page faults are occurring. Does this indicate that a memory module is faulty?

A

No—it shows the system is using the pagefile intensively and could benefit from more system RAM being installed.

513
Q

You are attempting to run a command but receive the message “The requested operation requires elevation.” What must you do to run the command?

A

Open a new command prompt window with sufficient privileges.
You can right-click the Command Prompt icon and select Run as administrator or press CTRL+SHIFT+ENTER to execute the icon or cmd.exe command.

514
Q

You are supporting a user who has installed a vendor keyboard driver. The keyboard no longer functions correctly. Under Windows 10, what are the steps to revert to the previous driver?

A

Open Device Manager from the WinX menu, Instant Search, or the Computer Management console. Expand Keyboards, then right-click the device and select Properties. On the Driver tab, select Roll Back Driver.

515
Q

How would you update an app purchased from the Mac App Store?

A

Open the Mac App Store,
then select the Updates button.

516
Q

You are assisting a user over the phone and need to identify the edition of Windows that is installed. What step instructions must you give for the user to report this information to you?

A

Open the Settings app,
then select System.
Select the About section, and read the text next to Edition under the Windows specifications heading.

517
Q

You are checking that a remote Windows workstation will be able to dial into a web conference with good quality audio/video. What is the best tool to use to measure latency between the workstation’s network and the web conferencing server?

A

pathping measures latency over a longer period and so will return a more accurate measurement than the individual round trip time (RTT) values returned by ping or tracert.

518
Q

You are updating data handling guidance to help employees recognize different types of regulated data. What examples could you add to help identify healthcare data?

A

Personal healthcare data is
- Medical records,
- Insurance forms,
- Hospital/laboratory test results, and so on.

(Healthcare information is also present in de-identified or anonymized data sets.)

519
Q

A different user wants to configure a multiplayer game server by using the DMZ feature of the router. Is this the best configuration option?

A

Probably not. Using a home router’s “demilitarized zone” or DMZ host option forwards traffic for all ports not covered by specific port-forwarding rules to the host. It is possible to achieve a secure configuration with this option by blocking unauthorized ports and protecting the host using a personal firewall, but using specific port-forwarding/mapping rules is better practice. The most secure solution is to isolate the game server in a screened subnet so that is separated from other LAN hosts, but this typically requires multiple router/firewalls.

520
Q

You are monitoring CPU Usage and notice that it often jumps to 100% and then falls back. Does this indicate a problem?

A

Probably not—CPU Usage usually peaks and falls. If it stays over 80–90%, the system could require a faster CPU, or if it spikes continually, there could be a faulty application.

521
Q

A file is secured with the numeric permissions 0774. What rights does another user account have over the file?

A

Read-only

522
Q

A user calls saying that their screen occasionally goes blue, and the system shuts down. What should you advise the user to do?

A

Record STOP Error Information: Ask the user to take note of the STOP error code and any error messages that appear on the blue screen when the system crashes. The STOP error code, also known as the “Blue Screen of Death” (BSOD) code, can provide valuable clues about the cause of the issue.

523
Q

You are joining a new startup business that will perform outsourced IT management for client firms. You have been asked to identify an appropriate software solution for off-site support and to ensure that service level agreement (SLA) metrics for downtime incidents are adhered to. What general class of remote access technology will be most suitable?

A

Remote monitoring and management (RMM) tools are principally designed for use by managed service providers (MSPs). As well as remote access and monitoring, this class of tools supports management of multiple client accounts and billing/reporting.

524
Q

What command would allow you to delete the contents of the folder /home/jaime/junk and all its subdirectories?

A

rm -r /home/jaime/junk

525
Q

If you suspect improper handling during installation has caused damage to a RAM module, how could you test that suspicion?

A

**Run a Memory Diagnostic. **
Because this tests each RAM cell, it should uncover any fault.

526
Q

You are troubleshooting a print problem, which turned out to be caused by user error. The user is not confident that the problem is solved and wants more reassurance. You have already explained what the user was doing wrong in some detail. What should you do?

A

Run through the print process step-by-step to show that it works. It is very important to get a customer’s acceptance that a problem is closed.

527
Q

You have a computer with two SATA disks. You want to evaluate the performance of the primary disk. How would you select this in Performance Monitor, and what might be appropriate counters to use?

A

Select the Physical Disk object,
select the counter, and then select the 0 C: instance.

(Counters that are useful for evaluating performance include % Disk Time and Average Disk Queue Length.)

528
Q

You are writing work instructions for third-party app deployments using the CompTIA A+ objectives to guide you. In the section on system requirements for applications, you have covered the following topics:

  • 32-bit- vs. 64-bit-dependent Operating System requirements
  • Dedicated graphics card vs. integrated (VRAM requirements)
  • RAM requirements
  • CPU requirements
  • External hardware tokens

What additional topic should you include, if any?

A

Storage requirements.
Each app takes up a certain amount of space when installed to the fixed disk. Also, you must plan for user-generated file storage, temp files, log files, and other data generated through use of the app.

529
Q

Which Linux command allows a user to run a specific command or program with superuser/root privileges?

A

sudo

530
Q

In terms of system hardware, what is the main advantage of a 64-bit version of Windows?

A

Support for more than 4 GB RAM.

531
Q

You are assisting with the development of end-user security awareness documentation. What is the difference between tailgating and shoulder surfing?

A

Tailgating means following someone else through a door or gateway to enter premises without authorization.
Shoulder surfing means covertly observing someone type a PIN or password or other confidential data.

532
Q

A security consultant has recommended more frequent monitoring of the antivirus software on workstations. What sort of checks should this monitoring perform? (3)

A
  • That the antivirus is enabled,
  • It’s up to date with scan engine components and definitions,
  • And has only authorized exclusions configured.
533
Q

What primary indicator must be verified in the browser before using a web form?

A

That the browser address bar displays the lock icon to indicate that the site uses a trusted certificate. This validates the site identity and protects information submitted via the form from interception.

534
Q

What are the prerequisites for joining a computer to a domain? (3)

A
  • The computer must be running a supported edition of Windows (Pro, Enterprise, or Education).
  • The PC must be configured with an appropriate IP address and have access to the domain DNS servers.
  • An account with domain administrative credentials must be used to authorize the join operation.
535
Q

What are the requirements for configuring fingerprint authentication via Windows Hello?

A

The computer must have a fingerprint reader and a trusted platform module (TPM). Windows Hello must first be configured with a personal identification number (PIN) as a backup method.

536
Q

Your company is replacing its Windows desktops with Mac workstations, and you need to assist users with the transition. What is the equivalent of File Explorer in macOS?

A

The Finder.

537
Q

You are troubleshooting an issue with a wireless adapter. When you open Device Manager, you find the device’s icon is shown with a down arrow superimposed. What does this mean, and why might this configuration have been imposed?

A

The icon indicates that the device has been disabled. It could be that there was a fault, or there may be a network configuration or security reason for disabling the adapter.

(In this sort of situation, use incident logs and device documentation to establish the reason behind the configuration change.)

538
Q

A customer asks whether an iOS app that your company developed will also work on her Apple macOS computer. What issue does this raise, and what answer might you give?

A

The issue here is compatibility between different operating systems. Even though both are produced by Apple, iOS and macOS use different environments, so the iOS app cannot necessarily be installed directly. Your company might make a macOS version. With the latest versions of macOS, there is support for native iOS apps, so this might be something you can offer.

539
Q

For which backup/restore issue is a cloud-based backup service an effective solution?

A

The issue of provisioning an off-site copy of a backup. Cloud storage can also provide extra capacity.

540
Q

What care should you take when lifting a heavy object?

A

The main concern is damaging your back. Lift slowly and use your legs for power, not your back muscles.

541
Q

You are assisting another user who is trying to configure a static IP on a Windows workstation. The user says that 255.255.255.0 is not being accepted in the prefix length box. Should the user open a different dialog to complete the configuration or enter a different value?

A

The Network & Internet settings Edit IP settings dialog can be used. 255.255.255.0 is the subnet mask in dotted decimal format. The dialog just requires the number of mask bits. Each “255” in a dotted decimal mask represents 8 bits, so the user should enter 24.

542
Q

Apart from Windows and macOS, what operating system options are there for client PCs installed to a local network? (3)

A
  • The other main choice is one of the distributions of Linux
  • A company might also use some sort of UNIX.
  • Finally, Chrome OS is installed on Chromebox PCs. These are often used by educational institutions and businesses that rely primarily on web applications rather than locally installed desktop software.
543
Q

A company must deploy custom browser software to employees’ workstations. What method can be used to validate the download and installation of this custom software?

A

The package can be signed using a developer certificate issued by a trusted certificate authority. Alternatively, a cryptographic hash of the installer can be made, and this value can be given to each support technician. When installing the software, the technician can make his or her own hash of the downloaded installer and compare it to the reference hash.

544
Q

You are repurposing an old computer. You perform a clean OS install using optical media. During setup, you configured the partition manager to apply GPT style. After the file copy stage, the new installation fails to boot. What is the likely cause?

A

The PC is set to boot using the legacy BIOS method. This is not compatible with GPT-style partitioning.
(If supported by system firmware setup, switch to UEFI boot. If the firmware is BIOS only, change the boot method back to optical disc, run setup again, and choose MBR partitioning.)

545
Q

While you are assigning privileges to the accounting department in your organization, Cindy, a human resource administrative assistant, insists that she needs access to the employee records database so that she can fulfill change of address requests from employees. After checking with her manager and referring to the organization’s access control security policy, you discover that Cindy’s job role does not fall into the authorized category for access to that database. What security concept are you practicing in this scenario?

A

The principle of least privilege.

546
Q

You take a support call where the user doesn’t understand why a program runs at startup when the Startup folder is empty. What is the likely cause, and how could you verify this?

A

The program has added a registry entry to run at startup.
You could check this (and optionally disable the program) by using Task Manager.

547
Q

Which Windows command is probably best suited for scripting file backup operations?

A

The robocopy command offers more options than those offered by the xcopy command, so it will usually be the better choice. The copy command is quite basic and probably not suitable.

548
Q

What is the significance of a $ symbol at the end of a share name?

A

The share is hidden from the file browser.
It can be accessed by typing a UNC. The default administrative shares are all configured as hidden.

549
Q

In Windows, what is the difference between the boot volume and the system volume?

A

The boot volume contains the boot files; the system volume contains the system root (OS files).
The boot volume is not normally assigned a drive letter. The system volume is normally allocated the drive letter C:.

550
Q

You receive a call from a user trying to save a file and receiving an “Access Denied” error. Assuming a normal configuration with no underlying file corruption, encryption, or malware issue, what is the cause and what do you suggest?

A

The user does not have “Write” or “Modify” permission to that folder.
If there is no configuration issue, you should advise the user about the storage locations permitted for user-generated files. If there were a configuration issue, you would investigate why the user had not been granted the correct permissions for the target folder.

551
Q

Assuming default Explorer view settings are configured, what steps should the user take to get better context of files?

A

The user must first show file extensions, using the View tab in the File Explorer Options applet
(you might also note that this can be done via a check box on the View menu ribbon of File Explorer).

552
Q

You are assisting a user with configuring a static IP address. The user has entered the following configuration values and now cannot access the Internet. Is there a configuration issue or a different problem?

  • IP: 192.168.1.1
  • Mask: 255.255.255.0
  • Gateway: 192.168.1.0
  • DNS: 192.168.1.0
A

There is a configuration problem.
192.168.1.0 is not a host address. With the subnet mask 255.255.255.0, it identifies the network range as 192.168.1.0/24. The gateway is usually configured as the first available host address in this range: 192.168.1.1. The DNS server should also be set to 192.168.1.1. The client IP should be set to any other available value, such as 192.168.1.100.

553
Q

You are assisting with the design of a new campus building for a multinational firm. On the recommendation of a security consultant, the architect has added closely spaced sculpted stone posts with reinforced steel cores that surround the area between the building entrance and the street. At the most recent client meeting, the building owner has queried the cost of these. Can you explain their purpose?

A

These bollards are designed to prevent vehicles from crashing into the building lobby as part of a terrorist or criminal attack.

(The security consultant should only recommend the control if the risk of this type of attack justifies the expense.)

554
Q

When you set NTFS permissions on a folder, what happens to the files and subfolders by default?

A

They inherit the parent folder’s permissions.

555
Q

What are the principal characteristics of a surge protector? (3)

A

This is a circuit designed to protect connected devices from the effect of sudden increases or spikes in the supply voltage and/or current. Surge protectors are rated by:
- Clamping voltage (low values are better),
- Joules rating (higher values are better),
- Amperage (the maximum current that can be carried).

556
Q

You discover that a threat actor has been able to harvest credentials from some visitors connecting to the company’s wireless network from the lobby. The visitors had connected to a network named “Internet” and were presented with a web page requesting an email address and password to enable guest access. The company’s access point had been disconnected from the cabled network. What type of attack has been perpetrated?

A

This is an evil twin attack where the threat actor uses social engineering techniques to persuade users to connect to an access point that spoofs a legitimate guest network service.

557
Q

A computer cannot connect to the network. The machine is configured to obtain a TCP/IP configuration automatically. You use ipconfig to determine the IP address and it returns 0.0.0.0. What does this tell you?

A

This is an irregular state for a Windows PC. If a DHCP server cannot be contacted, the machine should default to using an APIPA address (169.254.x.y). As it has not done this, something is wrong with the networking software installed on the machine. The best option is probably to perform a network reset via the Settings > Network & Internet > Status page

558
Q

You are advising a customer with an older-model Android smartphone. The customer wants to update to the latest version of Android, but using the update option results in a “No updates available” message. What type of issue is this, and what advice can you provide?

A

This is an issue with update limitations. Android is quite a fragmented market, and customers must depend on the handset vendor to implement OS updates for a particular model. The customer can only check the handset vendor’s website or helpline to find out if a version update will ever be supported for that model.

559
Q

A user reports that a new device is not sustaining a battery charge for more than a couple of hours. What type of malware could this be a symptom of?

A

This is most characteristic of cryptomining malware as that explicitly hijacks the computer resources of a device to perform the intensive calculations required to mine blockchain currency.

560
Q

You are writing a proposal to improve a company’s current support procedures with a ticketing system. You have identified the following requirements for information that each ticket should capture. Following the CompTIA A+ objectives, what additional field or data point should be captured?

  • User information
  • Device information
  • Problem description/Progress notes/Problem resolution
  • Categories
  • Escalation levels
A

This list contains no means of recording the severity of the ticket. This field is important for prioritizing issues.

561
Q

If a single physical disk is divided into three partitions in a non-Windows environment, how many different file systems can be supported?

A

Three—each partition can use a different file system.

562
Q

What is the name of Apple’s backup software for macOS?

A

Time Machine

563
Q

You are writing guidance for departmental managers to request new software installs. You want each manager to consider impacts to the business, operation, network, and devices as part of their request. In terms of impacts to business, you have written guidance to consider support and training requirements. What other topic should you include?

A

To consider:
- licensing requirements, such as number of users or devices.
- There also needs to be a system for monitoring license compliance
- ensuring there are no unauthorized installs

564
Q

Why might you run the shutdown command with the /t switch?

A

To specify a delay between running the command and shutdown starting. You might do this to give users a chance to save work or to ensure that a computer is restarted overnight.

565
Q

True or false? If you want the same policy to apply to a number of computers within a domain, you could add the computers to the same Organizational Unit (OU) and apply the policy to the OU.

A

True

566
Q

True or false? You can configure a web server running on Linux to accept remote terminal connections from clients without using passwords.

A

**True. **
This can be configured using public key authentication with the Secure Shell (SSH) protocol. The server can be installed with the public keys of authorized users.

567
Q

True or false? WPA3 personal mode is configured by selecting a passphrase shared between all users who are permitted to connect to the network.

A

**True. **
WPA3-Personal uses group authentication via a shared passphrase. The simultaneous authentication of equals (SAE) mechanism by which this passphrase is used to generate network encryption keys is improved compared to the older WPA2 protocol, however.

568
Q

A program is continually using 99–100% of processor time. What should you do?

A

Try to end the application or the process using Task Manager, and then contact the application vendor to find out why the problem is occurring.

569
Q

You are developing a script to ensure that the M: drive is mapped consistently to the same network folder on all client workstations. What type of construct might you use to ensure the script runs without errors?

A

Use a conditional block (If statement) to check for an existing mapping, and remove it before applying the correct mapping.

570
Q

You are updating an internal support knowledge base with advice for troubleshooting mobile devices. What is the first step to take if a user reports that an app will not close?

A

Use force stop if available and/or reboot the device.

571
Q

You are supporting a user who has just replaced a wireless router. The user has joined the new wireless network successfully but can no longer find other computers on the network. What should you check first?

A

Use Network & Internet to check the network profile type. When the network changed, the user probably selected the wrong option at the prompt to allow the PC to be discoverable, and the profile is probably set to Public. Change the type Private.

572
Q

A Windows user is trying to join a video conference and cannot hear any sound from her headset. Which tool can you suggest using to try to remedy the fault?

A

Use the Sound settings app or Control Panel applet to check the volume setting and that the headset is configured as the input and output device. If the headset is not listed, check the USB or Bluetooth connection.

573
Q

Which three principal user security groups are created when Windows is installed?

A

- Users,
- Administrators,
- Guests

(You might also include Power Users, though use of this group is deprecated. Going beyond the account types listed in the exam objectives, you might include groups such as Remote Desktop Users, Remote Management Users, or Backup Operators. There are also system groups, such as Everyone, but users cannot be assigned manually to these.)

574
Q

Your organization is donating workstations to a local college. The workstations have a mix of HDD and SSD fixed disks. There is a proposal to use a Windows boot disk to delete the partition information for each disk. What factors must be considered before proceeding with this method?

A

Using standard formatting tools will leave data remnants that could be recovered in some circumstances. This might not be considered high risk, but it would be safer to use a vendor low-level format tool with support for Secure Erase or Crypto Erase.

575
Q

You have downloaded an installer for a third-party app from the vendor’s website. What should you do before proceeding with setup?

A

Verify the integrity of the download using a hash value or the vendor’s digital certificate.

576
Q

A user calls to say that he clicked Yes to a prompt to allow the browser to access the computer’s location service while using a particular site and is now worried about personal information being tracked by other sites. How can the user adjust the app permission in Windows?

A

Via the App permissions section under Privacy settings.

(You might also note that most browser software can be configured to only allow location information on a per-site basis.)

577
Q

You are updating a procedure that lists security considerations for remote access technologies. One of the precautions is to check that remote access ports have not been opened on the firewall without authorization. Which default port for VNC needs to be monitored?

A

Virtual Network Computing (VNC) uses TCP port 5900 by default.

578
Q

A user works on a document and leaves the file open for lunch. Upon the user’s return, the computer is in power-saving mode. How do you reassure the user and advise on the status of the file?

A

When a computer goes into a power-saving mode, it will either maintain a small amount of power to the memory modules or write the contents of memory to a hibernation file on disk. Consequently, the user should be able to start the laptop again, and the desktop will resume with the open file still there. You should advise the customer to save changes to files regularly, however.

579
Q

You are developing a script to scan server hosts to discover which ports are open and to identify which server software is operating the port. What considerations should you make before deploying this script?

A

While the risk is low, scanning activity could cause problems with the target and possibly even crash it. Test the script in a sandbox environment before deploying it. Security software might block the operation of this script, and there is some risk from the script or its output being misused. Make sure that use of the script and its output are subject to access controls and that any system reconfiguration is properly change-managed.

580
Q

What does chain-of-custody documentation prove?

A

Who has had access to evidence collected from a crime scene and where and how it has been stored.

581
Q

You are advising a business that needs to provision video-editing workstations with 4-way multiprocessing. Which retail Windows edition will allow them to make full use of this hardware?

A

Windows Pro for Workstations supports 4-way multiprocessing (four CPUs installed to separate sockets) and up to 6 TB RAM. Windows Enterprise has the same hardware limits but is not available via a retail channel.

582
Q

You are advising a customer whose business is expanding. The business owner needs to provision an additional 30 desktop computers, some of which will be installed at a second office location. The business is currently run with a workgroup network of five Windows 10 Home Premium desktop computers and one file server. Why might you suggest licenses for an edition of Windows 10 that supports corporate needs for the new computers and has upgrades for the old computers? Which specific edition(s) could you recommend?

A

Without a domain, accounts must be configured on each computer individually. With more than 30 computers to manage at two locations, this would be a substantial task, so switching to a domain network, where the accounts can be configured on the server, is likely to save costs in the long term. You can suggest either Windows 10 Pro or Windows 10 Enterprise for use on a domain.

583
Q

If a user obtains Read permissions from a share and Deny Write from NTFS permissions, can the user view files in the folder over the network?

A

Yes (but he or she cannot create files).

584
Q

Is the command format d: /fs:exfat /q valid? If so, what is its effect, and what precaution might you need to take before running it?

A

Yes, it is valid. It formats drive D with the exFAT file system by using a quick format (does not scan for bad sectors). This will delete the file table on the drive so existing data files can be overwritten—the formatted drive will appear to be empty in Explorer. If there are existing files that need to be preserved, they should be backed up before running the format command.

585
Q

You are assisting a home user who wants her spouse to be able to sign in to a new Windows laptop using a Microsoft account. Is this possible, and if so, which management interface is used?

A

Yes, while there are varying methods in accomplishing this task, this can be done via the Accounts settings app. You can also use the legacy control panel on both Windows 10 and 11.

586
Q

The marketing department has refitted a kitchen area and provisioned several smart appliances for employee use. Should the IT department have been consulted first?

A

Yes. Uncontrolled deployment of network-enabled devices is referred as shadow IT. The devices could increase the network attack surface and expose it to vulnerabilities. The devices must be deployed in a secure configuration and monitored for security advisories and updates.

587
Q

You are assisting a user with setting up Internet access to a web server on a home network. You want to configure a DHCP reservation to set the web server’s IP address, allow external clients to connect to the secure port TCP/443, but configure the web server to listen on port TCP/8080. Is this configuration possible on a typical home router?

A

Yes.
You need to configure a port-mapping rule so that the router takes requests arriving at its WAN IP for TCP/443 and forwards them to the server’s IP address on TCP/8080. Using a known IP address for the server by configuring a Dynamic Host Configuration Protocol (DHCP) reservation simplifies this configuration. The home router’s DHCP server must be configured with the media access control (MAC) address or hardware identifier of the web server.

588
Q

What tool would you use to add a user to a local security group?

A

You can change the account type between Standard and Administrator via Control Panel, but the Local Users and Groups management console is the tool to use for a custom security group. You could also use the net localgroup command.

589
Q

What are the two main types of network topology diagrams?

A

You can create diagrams to show the physical topology or the logical topology.
- The physical topology shows how nodes are connected by cabling.
- The logical topology shows IP addresses and subnets/VLANs.

(There are lots of other types of network topology diagrams, of course, but physical and logical are the two basic distinctions you can make. It is best practice not to try to create a diagram that shows both as this is likely to reduce clarity.)

590
Q

What frequent tests should you perform to ensure the integrity of backup settings and media?

A

You can perform a test restore and validate the files. You can run an integrity check on the media by using, for example, chkdsk on a hard drive used for backup. Backup software can often be configured to perform an integrity check on each file during a backup operation. You can also perform an audit of files included in a backup against a list of source files to ensure that everything has been included.

591
Q

You want to execute a block of statements based on the contents of an inventory list. What type of code construct is best suited to this task?

A

You can use any type of loop to iterate through the items in a list or collection, but a For loop is probably the simplest.

592
Q

Why might you need to use a virus encyclopedia? (3)

A

You might need to:
- verify symptoms of infection
- Also, if a virus cannot be removed automatically, you might want to find a manual removal method
- You might also want to identify the consequences of infection—whether the virus might have stolen passwords, and so on.

593
Q

You need to set up a VPN connection on a user’s Windows laptop. The VPN type is IKEv2. What other information, if any, do you need to configure the connection?

A

You must also input the fully qualified domain name (FQDN) or IP address of the remote access VPN server.

594
Q

The contract ended recently for several workers who were hired for a specific project. The IT department has not yet removed those employees’ login accounts. It appears that one of the accounts has been used to access the network, and a rootkit was installed on a server. You immediately contact the agency the employee was hired through and learn that the employee is out of the country, so it is unlikely that this person caused the problem. What actions do you need to take?

A

You need to:
1. create an incident report
2. remove or disable the login accounts
3. isolate the infected server and possibly any user computers that communicate with the server
4. remove the rootkit from the server.

(In terms of wider security policies, investigate why the temporary accounts were not disabled on completion of the project.)