Hand 2.0 Flashcards

1
Q

Comptia Troubleshooting Steps

A
Identify the problem
Establish a theory
Test Theory
Establish a plan of action to resolve the problem
Document Findings, actions, and outcomes
End user training
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Comptia Malware Remediation

A
Identify Malware symptoms
Quarantine infected system
Disable system restore
Remediate infected system
Update antivirus software
Scan and removal techniques (safe mode, Pre-installation environment)
Schedule scans and updates
Educate the User
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Minimum account required to install a program on windows?

A

Power User

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Account that should be renamed for Security Principles?

A

Admin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Group that does not have power to install programs or add drivers?

A

Standard and Guests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Regular user that wants to run a program with higher power?

A

Right click select”run as “ and select admin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Things that are true about x86 and x64?

A

Not all CPUs can support 64-bit

64 can support more than 32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Command that performs a disk integrity check or Hard-drive check or read/write errors?

A

CHKDSK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Command that verify the integrity of you OS of system files

A

SFC/SCANNOW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Used to install a operating system remotely from another computer

A

PXE pxe NIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Best format for optical media

A

CDFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

file system supports the widest range of operating systems

A

FAT32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Unable to connect to internet website what do you run first

A

Ipconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Command that Helps fix the master boot record

A

FIXMBR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Command that Helps fix the boot sector of the hard-drive

A

BOOTREC /FIXBOOT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

added to show all of the available switches/commands that can be added to a command

A

/?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Command that tests connectivity with another computer

A

PING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Command that allows you to check your ip or NIC data or test why computer can’t connect to a website

A

IPCONFIG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Command that allows you to get a new IP address

A

IPCONIFG/release ipconfig/renew

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Command that clears the memory of a computer system

A

IPCONFIG/flushdns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Command that provides an ip address when you type in a computer name and vise versa

A

NSLOOKUP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Command that shows the path between one location to another (through Routers)

A

TRACERT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Command that moves files from one computer system to another

A

XCOPY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Static and distorted screen means you should

A

Lower refresh rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Fastest way to stop applications from running at the boot-up/startup?
MSCONFIG
26
Program that allows you to change a HKLM or HKEY_Local_Machine setting
REGEDIT
27
Program that looks up Errors for your Operating system or Program
Event Viewer
28
Program that limits what users can do on your computer
Local security policy
29
Browser is set to visit a random home-page and won't connect to the web for anything else, what changed?
Proxy settings
30
Command that displays a listing of active IP ports on the computer being tested
NETSTAT
31
Command that runs a diagnostic on your computer
DXDIAG
32
Method commonly used to destroy hard-drives and monitors
Drive degauss
33
If your screen is very large(Pictures/words are large) then
Resolution set too low
34
Printout is faded it must be
Transfer Corona
35
Magnets near a CRT monitor will just cause; or bad refresh rate will cause this
Distorted image
36
Computer starts and then shuts-down; it must be
Overheating
37
Black streak along the page then its the
Fuser
38
You have a paper jam then it's probably
Pickup roller
39
A laser printer is printing a 'shadow' image what needs to be done?
Replacing the drum
40
Computer turns off intermittently and later you smell smoke. What should you do?
Power down the system and replace the power supply
41
Fastest way to restore a computer to working order without losing personal files/settings?
System Restore
42
Can't boot and log in, what method will get your computer back up and running
Last Known Good Configuration
43
A virus stops you from updating. What can you use to restart and update?
Safe mode
44
If you get a NTLDR missing or BOOTMGR file corrupted error, how do you get started?
Advanced Revcovery DVD-Recovery Console & run BOOTREC /FIXBOOT
45
How would you connect to a shared folder, or map a connection to one?
\\servername\usershare
46
First step in securing anything; from computer to wireless networking
Change username/password
47
Early wireless network encryption?
WEP
48
Best way to secure a modern-day wireless network
Enable advanced Encryption
49
Security feature is becoming more popular with laptops
Biometrics
50
Internet browser's cookie could be classified as
Spyware
51
A regular running computer that is running but also secretly downloading malware
Trojan
52
In a SOHO wireless network, what stops unauthorized users from accessing confidential data
Set Encryption
53
You have heard your network is secure, but users cannot access the internet
Port 80 is disabled
54
A small network at home to share files; what is the best choice
Setup a workgroup
55
A wireless network is experiencing intermittent connectivity; what will fix it
Change broadcast channel
56
Fake website to get your private data, is known as
Phishing
57
Security threat that is defined by its self propagating characteristic
Worm
58
Harden the workstationss
Enable screensaver required passwords
59
Examples of physical security
Badges&Locked Doors
60
Keyboard, Video and Mouse Switches are used if you want to control multiple monitors from one keyboard and mouse
KVM switch
61
Device most likely to come standard with solid state hard drive
Tablet
62
What does a accelerometer do
Measures velocity in a given direction
63
Mobile phone feature redirects screen orientation as the user turns
Gyroscope
64
What is bluetooth Discovery Mode?
Allows a peripheral to be contacted by the mobile device
65
Laptop won't connect to wireless network you should check
External antenna switch
66
A company wants to prevent non-authorized users from entering into a secure building. what best mitigates this activity?
Install mantraps
67
A new wireless router needs to be secured from unauthorized users
Change router default logins and set encryption on router
68
If you start to hear weird noise from your hard-drive, even though your pc works, then first
Backup data from hard-drive;
69
Best way to secure a computer station
Complex password
70
Software/hardware used to manage virtual machines
Hypervisor
71
Command for mapping a drive letter to a remote share
NET (NET USE)
72
Opens Microsoft Management Console; allows you to add multiple tools you like
MMC