General Knowledge Flashcards

1
Q

A help desk team lead contacts a systems administrator because the technicians are unable to log in to a Linux server that is used to access tools. When the administrator tries to use remote desktop to log in to the server, the administrator sees the GUI is crashing. Which of the following methods can the administrator use to troubleshoot the server effectively?

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Windows 11 comes with a refreshed desktop-style/user interface that can upgrade from Windows 10 with the in-place upgrade feature. What additional feature would an expanding business user gain when upgrading from Windows 10 Home to Windows 11 Pro for Workstations?

A

Domain Access/Centralized Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What licensing options are available for Microsoft Windows Enterprise editions?

A

Volume

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Identify support limitations for Windows editions.

A

Windows 10 Pro and Education editions have a 2 TB RAM support limitation, while there is a 6 TB RAM limitation for Pro for Workstations and Enterprise editions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What command is a Windows utility that can allow administrators to view shared resources and configure them on a Windows network?

A

net use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A user needs to manually connect to a wireless network that does not broadcast its Service Set Identifier. Where will the user go to set up this connection?

A

Network and Sharing Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In the Windows File Explorer Options applet, which tab allows administrators to configure settings, such as hiding extensions, hiding protected operating system files, and managing hidden fields and folders?

A

View

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A user has called in a helpdesk ticket to adjust the mouse clicks required for opening items and shortcuts. Currently set to a single-click, the user has requested the double-click style. What tab would the help desk technician find this setting under the File Explorer Options?

A

General

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A network technician must configure each client with the IP address and Transmission Control Protocol (TCP) port to forward traffic via a proxy in Network and Internet settings unless the organization uses which of the following? (Select all that apply.)

A

Intercepting, AutoConfiguring, and Transparent Proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A network technician is configuring a network adapter. By default, which of the following protocols and services are on Ethernet and Wi-Fi adapters? Explain why.

A

Internet Protocol; By default, the Internet Protocol, both IP version 4 and 6, will be on the adapter as it automatically uses the appropriate version of the protocol depending on the connecting network.

Link Layer Topology Discovery: By default, the Link-layer Topology Discovery Protocol will be on the adapter. It provides network mapping and discovery functions for networks without dedicated name servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An organization had a high IT department turnover, and the technicians are not sure which IP addresses the previous technicians statically assigned to hosts. What can the technicians do to ensure they do not assign the same IP address to multiple devices? Explain why.

A

DHCP; The technicians can implement Dynamic Host Configuration Protocol (DHCP) to automatically assign IP addressing information to hosts instead of configuring them statically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A desktop owner is installing a new application on a macOS. What format would the setup file be?

A

DMG; A setup file installs desktop programs. macOS apps support DMG (disk image) and PKG (package) file types.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A desktop owner is installing a new application on Windows. What format would the setup file be?

A

A setup file installs desktop programs. These are either .EXE or .MSI extensions on Windows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A desktop owner is installing a new application on Linux. What format would the setup file be?

A

Linux packages use the package manager the Yellowdog Updater, Modified (YUM), which is a free and open-source command-line package-management software for Linux machines. It uses the Red Hat Package Manager (RPM) install package format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does Linux use to verify the authenticity of software packages obtained from an online source?

A

A hash value; Linux software gets validated by disclosing the package’s hash value. Users must generate their own hash of the package after downloading it and compare it to the value provided by the package maintainer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of these applications will fail to run on a Windows PC with a 64-bit CPU running a 32-bit OS?

A

A 32-bit application installed with YUM or .DMG; a 64-bit application installed with an .EXE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A technician is installing software on Linux using setup files in the DEB file format. What package manager would the technician be using?

A

The Advanced Packaging Tool (APT) package manager manages Debian (DEB) packages on Linux. The setup file contains the executables, configuration files, and media files for the application. The files are extracted and transferred to a directory allocated for program installation during setup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What type of file represents a virtual mountable optical disk?

A

ISO; An ISO file is a file that incorporates the contents of an optical disc in a single file and is used instead of physical media. Mountable ISO files act as emulated drives and are frequently installed as operating systems or complex applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What would the main hardware requirement be for running multiple programs or applications simultaneously?

A

More RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A technician is using the YUM package manager to install software on Linux. What setup file format does YUM use?

A

RPM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which file system is most commonly used for removable drives and USB flash drives?

A

exFAT; The Extensible File Allocation Table (exFAT) is a 64-bit version of FAT using removable hard drives and flash media. Like the New Technology File System (NTFS), exFAT supports large volumes (128 petabytes) and file sizes (16 exabytes).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What file system feature supports compatibility between UNIX/Linux and Windows?

A

POSIX Compliance; POSIX Compliance allows Microsoft New Technology File System (NTFS) to support UNIX/Linux compatibility related to case-sensitive naming, hard links, and other critical characteristics required by UNIX/Linux programs to support UNIX/Linux compatibility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Define journaling and discuss on which OS the feature is available?

A

When writing data, the affected sector gets flagged as bad if a fault occurs. Journaling helps the user recover faster and more reliably after power interruptions and is a feature in Apple File System (APFS), the ext file systems, and NTFS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What requirement of Windows 11 would cause a company using legacy hardware to delay upgrading the OS?

A

Windows 11 requires a CPU or motherboard that supports the trusted platform module (TPM) version 2. Its compatibility with older PCs and laptops has severe limits as a result.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Currently only available for Pro for Workstations and Enterprise editions, what file system will be fully replacing NTFS?

A

ReFs; Resilient File System (ReFS) is the successor for New Technology File System (NTFS). However, ReFS is only available in the Pro for Workstations and Enterprise versions and is currently NOT used as the boot volume.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A system engineer is setting up a dozen new laptops and is using the PXE feature to boot and set up the computers automatically to minimize configuration time. What kind of setup method is the engineer using?

A

Network-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A support engineer is reinstalling an operating system for a user on their older desktop. However, after using a fresh Windows image from Microsoft, the network driver does not work. Since the system cannot connect to the internet, what could the engineer do to resolve the connectivity issue?

A

When an operating system does not have the necessary drivers, the simplest solution would be to copy the driver installer from another computer using a USB drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A small company is upgrading their computers to the latest operating system to increase the lifespan of their devices and cut down on costs. However, after upgrading a test device, they realize that some older peripherals are not recognized properly. What might be the root cause of the issue?

A

Third-party drivers are missing from the image; Not all drivers get bundled with an operating system. Typically, they have base drivers that may not necessarily allow a device to run properly. As a result, a system administrator may need to download and manually install these drivers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A user reports that the new external USB hard drive does not show up with an associated disk letter, even though the driver installed correctly. What could the support engineer do to get the hard drive functioning properly?

A

Format the hard drive; typically, the support engineer formats a new USB drive to allow it to be useable when plugged in. However, if the USB driver installs properly but is not readily useable, the engineer will need to format the hard drive to make it functional.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

An IT department is looking to deploy three hundred new laptops and minimize the amount of configuration needed to set up the device. What could they use to prepare these computers for deployment with minimal setup?

A

Use an image; Using an image would speed up the setup process of new devices, as a sysadmin can install all the necessary applications and prepare settings in the image. This would remove duplicated efforts by streamlining the setup process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

A user has an older desktop and is looking for a cheap option to upgrade the desktops’ ability to read and write data. What could the user use to accomplish this need?

A

Solid State Drive; A solid-state drive (SSD) would be the best answer, as it would minimize costs and improve speed during the reading and writing of data. In addition, SSDs are now much cheaper than in the past, making them a cost-effective choice for upgrading older devices.

32
Q

A user reports that when plugging in the printer to the computer, the computer did not detect the printer. However, the printer worked as expected after the support technician replaced the cable. What kind of cable did the engineer replace?

A

USB; Small printers typically can hook up with USB, Ethernet, and Wi-Fi. However, only USB cables hook up directly to the computer during a printer setup.

33
Q

A systems administrator is setting up new computers that will store large amounts of data. The hard drives are going to be four terabytes in size. What kind of hard drive partition should the administrator set up?

A

GPT; A globally unique identifier (GUID) partition table (GPT) would be the recommended solution, as it supports hard drive capacities over two terabytes.

34
Q

A user reports their computer is becoming more and more sluggish. One recommendation was to reinstall the operating system. The user is not worried about data loss since they save their data to the cloud. What type of installation could a support technician do that may help cut down on the sluggishness without needing to order parts?

A

Clean-install; A clean install would remove any unnecessary configurations, potential conflicting application issues, and data that may be causing the sluggishness. This option would be a quick-fix solution without spending money.

35
Q

On an Apple Mac, what is the purpose of the COMMAND+OPTION+ESC option on a Mac operating system?

A

The COMMAND+OPTION+ESC option on a macOS stops applications that no longer respond, allowing users to control hanging applications without shutting the computer down.

36
Q

A system administrator has identified suspicious behavior on a user workstation running a Linux operating system. What provides the system administrator a list of the processes running on the system to identify the suspicious behavior?

A

ps; will invoke the process tables, listing a summary of the processes currently running on the system.

top; acts like the Windows task manager on a Linux operating system, allowing the users to list, manage, and prioritize the currently running processes.

37
Q

What would the df command do when typed in the terminal of a Linux operating system environment?

A

Provides memory usage.

38
Q

What would the df command do when typed in the terminal of a Linux operating system environment?

A

Provide memory usage.

39
Q

What command would a knowledgeable Linux user use when searching for files on a Linux operating system computer?

A

Find

40
Q

A Linux system administrator currently logged on at the user level needs to temporarily elevate their administrative privileges to install a software package. From the terminal window, what command enables temporary rights escalation?

A

Sudo; The su (Super User) account is the Linux superuser; it can do anything on Linux. Using sudo (Super User Do) allows a user to temporally act as the superuser without logging out to switch users.

41
Q

The Linux command line offers a user the ability to manipulate the operating environment more efficiently than a graphical user interface. However, utilizing the wrong command with privileged access can quickly compromise a Linux operating system. When a user is unsure how to use a command or how the command line tool switches work, what command, when typed, provides usage help?

A

man; manual pages (help) command for Linux, although the user can also use help. When typed, the man command provides usage information for the operating system or the command typed with it.

42
Q

Jlyiu

A
43
Q

An organization has asked a network engineer why a particular wireless access point is not allowing users to authenticate to the company’s network. Users can connect to other access points without issue. The engineer finds that the problem access point can find and connect to the Remote Authentication Dial-in User Service (RADIUS) server, but they do not trust each other. What is most likely NOT configured on the access point? Explain.

A

Shared Secret; A shared secret allows the RADIUS server and access point to trust one another. Given that other access points are working without issue, the shared secret is configured on the RADIUS server and not on the problem access point.

44
Q

A growing company has just recently implemented a Windows domain and is building out its Active Directory structure. They have asked a network services company if they can manage access to their wireless network using permissions in the new domain. A network engineer tells them this is certainly achievable using this particular protocol.

A

EAP; Extensible Authentication Protocol (EAP) allows different mechanisms to authenticate against a network directory. This protocol would be the foundation of managing Wi-Fi access based on Active Directory user objects.

45
Q

Which protocol allows access points to use Remote Authentication Dial-in User Service (RADIUS), or Terminal Access Controller Access Control System Plus (TACACS+), and Extensible Authentication Protocol (EAP) to tunnel credentials and tokens that allow a domain user to connect via a wireless client to authenticate to a Windows domain controller and use single sign-on authorization?

A

Kerberos; Kerberos, a single sign-on authentication and authorization service based on a time-sensitive ticket-granting system, allows a user account to authenticate to a Windows domain controller.

46
Q

A network security analyst works with a small business to properly secure their Wi-Fi network. The owner states that they use Wi-Fi Protected Access with Temporal Key Integrity Protocol to secure wireless network traffic. The analyst advises against this solution since a threat actor could easily find the encryption key. What would strengthen encryption with AES and CCMP for securing Wi-Fi traffic?

A

WPA2; Wi-Fi Protected Access 2 (WPA2) uses the Advanced Encryption Standard (AES) cipher deployed within the Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP). AES replaces RC4, and CCMP replaces TKIP.

47
Q

Network engineers are talking at a conference, reminiscing about legacy Wi-Fi security standards. Unfortunately, they could not remember the cipher that replaced Rivest Cipher 4 (RC4) at the advent of WPA2. What cipher are they attempting to remember?

A

AES; Advanced Encryption Standard (AES) is a symmetric 128-, 192-, or 256-bit block cipher used for bulk encryption in modern security standards, such as Wi-Fi Protected Access 2 (WPA2), WPA3, and Transport Layer Security (TLS), which replaced RC4 starting with WPA2.

48
Q

A medium-sized office has a growing number of employees whom all need access to the wireless network. Each employee has an individual Windows domain account and wireless network access account. What protocol or service could the office implement to allow users to use one account, granting them access to the wireless network and the domain?

A

Kerberos

49
Q

A new local coffee shop would like to provide customers with free Wi-Fi access. In addition, they would like to provide a secured wireless connection without using a pre-shared passphrase. Which type of protected access should the coffee shop use to meet these requirements?

A

WPA3; One main feature of Wi-Fi Protected Access 3 (WPA3) is Wi-Fi Enhanced Open, which allows supplicants to connect without a passphrase. This feature means that any station can still join the network, but traffic is encrypted.

50
Q

A medium-sized office has a growing number of employees whom all need access to the wireless network. Each employee has an individual Windows domain account and wireless network access account. What protocol or service could the office implement to allow users to use one account, granting them access to the wireless network and the domain?

A

Kerberos

51
Q

A new local coffee shop would like to provide customers with free Wi-Fi access. In addition, they would like to provide a secured wireless connection without using a pre-shared passphrase. Which type of protected access should the coffee shop use to meet these requirements?

A

WPA3; One main feature of Wi-Fi Protected Access 3 (WPA3) is Wi-Fi Enhanced Open, which allows supplicants to connect without a passphrase. This feature means that any station can still join the network, but traffic is encrypted.

52
Q

A managed service provider wants to provide their network engineers with a convenient yet secure method for accessing and administrating all their managed client Cisco routers, switches, and access points. What Authentication, Authorization, and Accounting (AAA) protocol would provide the best solution for this?

A

TACACS+; Terminal Access Controller Access Control System Plus (TACACS+) is a AAA protocol developed by Cisco that often authenticates to administrator accounts for network appliance management.

53
Q

A user brings their PC to the company’s IT help desk thinking it has a virus. After some investigation into the problems, the technician deems that there are so many viruses and malware on the system that there really is only one appropriate avenue to take to give the customer the security of knowing the help desk has removed everything from the PC. What remediation would this be?

A

Sometimes, if malware gains a persistent foothold on the computer, the technician might not be able to run antivirus software and would have to perform a complete system restore. This restore involves reformatting the disk and reinstalling the operating system (OS) and software.

54
Q

An IT security professional has finished removing a trojan malware infection using their company’s enterprise anti-malware platform. What three operating-system-specific validations would ensure no reinfections could occur?

A
  • Restore points
  • Software firewall settings
  • DNS Configuration
55
Q

A fairly new level one help desk technician has worked hard to remove some malware infections on a user’s computer. However, similar infections reappeared once the technician cleaned up and restarted the computer. What malware vector is manifesting in this situation?

A

Boot sector virus; malicious code inserted into the boot sector code or the storage device’s partition table and executes when the device is attached. The virus hijacks the bootloader process, loading itself into memory.

56
Q

When dealing with this particular malware payload, users should be aware that there is the possibility that it can compromise system files and programming interfaces. For example, compromised local shell processes, such as Explorer or Task Manager on Windows, ps or top on Linux, and port-listening tools no longer reveal their presence. What is this particular malware payload?

A

Rootkit; class of malware that modifies system files, often at the kernel level. They may also contain tools for cleaning system logs, further concealing its presence.

57
Q

A MSP has adopted CompTIA’s seven-step best practice procedure for malware removal. A technician is about to attempt to remove a malware infection according to these best practices. Which step will the technician take in the overall process of removal?

A
  • Disable System Restore (3 of 7)
  • Educate the end user. (7 of 7)
58
Q

A user thinks there may be a virus on their computer, calls into an IT help desk, and states that when browsing certain websites, the browser gives a scary warning about the site possibly being unsafe. What could cause a browser certificate warning?

A

Server name mismatch; expired; or certificate is self-assigned.

59
Q

A computer science student is taking beginner-level classes on information security. The course discusses malware vectors, a method by which the malware executes on a computer. The student then learns about which of the following common vectors?

A

Worm
Trojan
Virus

60
Q

A user’s computer has an infection that renders the computer system unusable as soon as it boots up. After calling the support phone number for the system’s antivirus software, the support technician gives the user a .iso file to help remove the infection. What will this file allow the user to do differently from removing the infection after the computer starts up?

A

Scan the computer in recovery mode.

61
Q

After a recent data breach, a company’s IT department has concluded that the breach started with a laptop that accessed the Wi-Fi to gain access to its resources. The company uses a passphrase and media access control (MAC) address filtering to restrict access to Wi-Fi. What type of attack gained access to the company’s wireless network?

A

Spoofing; an attack where the threat actor can masquerade as a trusted resource. It can mean cloning a valid MAC or IP address or using a false digital certificate. The attacker obtained the passphrase and spoofed a valid MAC address to gain access.

62
Q

An employee receives a phone call from someone in the IT department informing them that their computer has a virus. In a panic, the employee quickly follows the instructions from the caller to grant remote access to their workstation. Unfortunately, the employee notices that the application used for remote access is not the same as the application used in the past when someone from IT has remotely worked on their workstation. What kind of attack has the user just experienced?

A

Vishing; occurs through a voice channel, like a telephone or Voice over Internet Protocol (VoIP). For example, someone purporting to represent the victim’s bank could call, asking them to verify a recent purchase by requesting their security details.

63
Q

An IT support desk intern is learning about fundamental security concerns that any support desk should look to remediate. What can be a security vulnerability when it comes to managing multiple endpoints?

A

Unprotected system; End of Life OS; Unpatched System

64
Q

What is the most used to access the certificates on a smart card to log on to an account for a web application?

A

PIN

65
Q

A large corporation has ordered all branch offices to secure office data to prevent unauthorized access to data in the case of theft. The change applies company-wide via a security policy for easy deployment. What does a computer technician need to address to fulfill these orders?

A

Disable USB ports; Enable BitLocker To Go

66
Q

Employees at a secure facility must log on to office workstations with two-factor authentication (2FA). All employees access the building with a smart card. What 2FA methods are employees most likely using to access their workstations?

A

PIN and/or
Username/Password

67
Q

A software engineer drafts a policy on execution control, emphasizing trusted/untrusted software sources. What should the engineer disable to ensure infections are not on a company device?

A

Disable auto play and auto run.

68
Q

A help center technician assists an employee set up a home network. What can be auto or manually configured to follow the service provider’s instructions to configure the correct address on the router’s interface?

A

Static WAN IP

69
Q

A cyber architect assists an employee in setting up their home router port forwarding configurations. What allows a device to retain the same IP each time it connects to a host?

A

DHCP reservation

70
Q

A technician is working on the organization’s network and connecting to corporate devices. What is a benefit of UPnP?

A

It provides a networking protocol framework, allowing networked devices to discover the network.

71
Q

A remote employee is reviewing their home router firewall configuration. What protects a network by allowing users to control what traffic to permit in and out of the network?

A

IP Filtering

72
Q

A cyber consultant assists a contracted employee with setting up their home router firewall. What occurs when the firewall downloads curated reputation databases that associate IP address ranges, fully-qualified domain names (FQDNs), and URL web addresses with sites that host various categories?

A

Content filtering

73
Q

A remote associate attempts to configure their home router firewall. What is the benefit of using IP filtering?

A

Internet protocol (IP) filtering protects networks by allowing users to control what traffic to permit in and out of the networks

74
Q

A remote cyber architect is working on their home router wide area network (WAN) configuration. To assist in protecting the network, the architect configures the router not to be visible to any device that the cyber architect has not manually configured. What action has the architect taken in this instance?

A

Disabling broadcast of the service set ID (SSID) prevents any stations not manually configured to connect to the name the architect specifies from seeing the network.

75
Q

A technician is working on Home Router WAN configurations. What can a Wi-Fi Analyzer do to assist in the configurations?

A

Changing channels allows the access point to change bands to find the least congested channel for transmission. A Wi-Fi analyzer can identify which channel has the least congestion.