ITProTV - A+ 1002 Practice Flashcards
- What is the best Implementation of the Principle of Least Privilege?
Issuing the Run As command to execute Administrative tasks during a regular user session.
Issuing a Single Account to each user, regardless of his job function
Completing Administrative tasks at a computer that functions only as a Server
Ensuring that all services use the main Administrative Account to execute their processes.
Issuing the Run As command to execute Administrative tasks during a regular user session.
Explanation:
The best implementation of the principle of least privilege is to issue the Run As command to execute administrative tasks during a regular user session. You should never use an Administrative Account to perform routine operations, such as creating a document, checking your email, or so on. Administrative Accounts should only be used when you need to perform an administrative task, such as configuring services or backing up a computer. The principle of least privilege is usually implemented by limiting the number of administrative accounts. Tools that are likely to be used by hackers should have permissions that are as restrictive as possible.
- You run Systeminfo command on a Windows 7 Computer, what will NOT be displayed?
Domain Name
Virtual Memory Statistics
Installed Hotfixes
Boot Options
Boot Options
- You need to access content on a CD or DVD drive when you do not have an Optical Drive in your Mac computer. Which feature should you use?
Finder
Boot Camp
iCloud
Remote Disk
Remote Disk
Explanation:
Remote Disk is the Feature of macOS to access content on a CD or DVD drive when you do not have an Optical Drive. When configured, it allows you to access a CD or DVD drive hosted on another Computer. Remote Disk does not work with most copyrighted media.
Boot Camp is a MAC feature that allows you to Install Windows on a MAC Computer.
iCloud is a central internet storage that allows you to store your content and have it accessible on any of your MAC devices.
Finder is the Filing System that you can use to organize your files on macOS.
- You decide to edit the boot order for your Windows 8 computer using the MSCONFIG utility. To which file is the Edit Saved?
Ntoskrnl.exe
bootmgr
boot.ini
BCD
BCD
Explanation:
BCD is a file that replaced the boot.ini File. Boot.ini was used in Windows XP and earlier, the BCD file was used in Windows Vista and Later. BCD holds configuration data about which OS systems are installed. You cannot copy a BCD file from another computer and expect it to work properly. You can use MSCONFIG utility to edit the BCD File. You can also use BCDEdit.exe in Windows 7 or Later.
bootmgr.exe file is the Boot Loader file for Windows Vista and later.
NTLDR was the Boot Loader for Windows XP and Earlier.
ntoskrnl.exe file is the Windows NT System Kernel, this file should NOT be edited.
- You organization is concerned with unauthorized users downloading confidential data to removable media. You decide to encrypt the confidential data using the Encrypting File System (EFS).
You need to copy an EFS-Encrypted File. The File will be copied to an NTFS volume that does not implement EFS. What is the state of the file?
The Original version of the file is decrypted. The new version is decrypted.
The Original version of the file remains encrypted. The new version is decrypted.
The Original version of the file remains encrypted. The new version is encrypted.
The Original version of the file is decrypted. The new version is encrypted.
The Original version of the file remains encrypted. The new version is decrypted.
- You have a 3TB drive on which you want to install Windows. How must you format the drive to have the Operating System recognize the entire drive?
MBR
Extended
GPT
Basic
GPT
Explanation:
To Install Windows on a 3TB Drive, you must format the drive as a GUID Partition Table (GPT) to have the OS recognize the entire drive. GPT is replacing the Master Boot Record (MBR). MBR supports up to 4 primary partitions and has a disk size limitation of 2TB. GPT requires a UEFI Motherboard.
You cannot install Windows on an Extended Partition. Extended refers to Partitioning, NOT Formatting.
Basic refers to Partitioning, not Formatting. Can be either Primary or Logical and reside on a Physical Drive. Basic Disk can have up to 4 Partitions.
- You need to create a Hard Drive Image of a Linux Computer. Which command should you use?
mv
ls
dd
cp
dd
Explanation:
dd = Allows you to copy a File and Convert it to another format during the copying process. Used for Hard Drive Images in Linux.
apt-get = Advanced Packaging Tool and Install Packages. cd = Changes Directory chmod = Changes Permissions on a File. chown = Changes the Ownership of a File. cp = Copies files and directories. grep = Finds a pattern of text within a file or group of files. iwconfig/ifconfig = Equal to ipconfig in Windows. ls = Lists file and directory contents. mv = renames or moves a file ps = provides a list of current processes running on a system pwd = Print Working Directory passwd = allows you to change the password of a user account q = quits the VI editor rm = removes a file shutdown = turns off the computer su/sudo = superuser root execute vi = text editor in Linux
- A user that has a Windows 7 Laptop is frequently away from the office. During that time, he needs access to several files that are on the Network. What should you do?
Enable BitLocker
Enable BitLocker To Go
Enable Offline Files
Create a Windows 7 Library
Enable Offline Files
Explanation:
Offline Files allows users to access network files even when the network is unavailable. When Network is available, the files are synced to ensure that both the online and offline versions are the same. Done in the Control Panel.
Sync Center basically syncs files with other devices on your network.
BitLocker/BitLocker To Go is Encryption Technology. BitLocker To Go encrypts files on removable drives such as USB Flash Drives.
Windows 7 Library are similar to Folders, but libraries do not actually store files. Library’s display files that are stored in several folders at the same time. Libraries allow a user to organize all related document, pictures, and other files so they appear to the user as a single location when they may be stored in separate locations.
- Ten computers in your department need the BIOS Updated, and it needs to be completed within a two-hour timeframe. What is the fastest way to accomplish this task?
Use a bootable flash drive
Use a boot loader file
Flash the BIOS
Update the EEPROM Chip
Flash the BIOS
Explanation:
You should NOT use a bootable flash drive to perform this task because a bootable flash drive does not contain a BIOS update.
Boot Loader is the set of tests or programs that a computer goes through when it initializes and tests system hardware components after the POST is complete.
Electrically Erasable Programmable Read Only Memory (EEPROM) chips are permanent chips that can be over-written or programmed with new info for the BIOS. The process to update these chips was much more difficult than just flashing the BIOS.
- Which of the following statements regarding Android Phones is INCORRECT?
The Android GPS needs a view of the sky.
The Android GPS will use battery life.
Android Apps can use Cell Towers, WIFI Hot Spots, or Satellites to obtain a location.
The Android GPS requires the help of Cell Towers to obtain a location.
The Android GPS requires the help of Cell Towers to obtain a location.
- A User requests that his Windows 7 Computer display dates using the YYYY-MM-DD format. Where should you go to make this change using the least administrative effort?
Control Panel Category View > Clock, Language, and Region - Select Date and Time
Control Panel Category View > Date, Time, Language and Regional Options - Select Regional and Language Options
Control Panel Category View > Clock, Language, and Region - Select Region and Language
Control Panel Category View > Date, Time, Language, Regional Options - Select Date and Time Options
Control Panel Category View > Date, Time, Language, Regional Options - Select Date and Time Options
- Which Windows Operating Systems include apps that use the Windows Store Feature? (Choose ALL That Apply)
Windows 8
Windows 10
Windows 8.1
Windows 7
Windows 8
Windows 10
Windows 8.1
- On which versions of Windows can PowerShell Core 6.0 be used? (Choose ALL That Apply)
Windows 10
Windows 8
Windows 8.1
Windows 7
Windows 10
Windows 8
Windows 8.1
Which of the following is described as gaining unauthorized access to the data center by using another user’s credentials?
piggybacking
turnstile
intrusion
mantrap
piggybacking
Your company has decided it wants to implement multi-factor authentication. What is the BEST implementation you should deploy?
smart cards, usernames, and PIN
usernames, strong passwords, and PIN
smart cards, usernames, and strong passwords
biometrics, smart cards, and strong passwords
biometrics, smart cards, and strong passwords
As a tech who frequently observes electrostatic discharge (ESD) damage to parts, you have become concerned about the presence of contributing factors in your work area. Which environmental condition is likely to cause ESD problems?
low humidity
high temps
low temps
high humidity
low humidity
Aaron is using Microsoft Excel on his portable computer, and reports being unable to move the cursor from one cell to the other cell with the arrow keys. Aaron also confirms that he is able to use the mouse to move the cursor from one cell to the other cell.
What is the reason for this cursor issue?
Shift Key is Pressed
Num LK is On
Scroll LK is On
Application is Corrupt
Scroll LK is On
Explanation:
Scroll LK modifies the behavior of the Arrow Keys. When it’s ON, the Arrow Keys will scroll the contents of a text window instead of moving the cursor.
Num LK does not control the scrolling feature. It’s used to switch between Number Entry and Arrow Keys.
A user wants to be able to restore his system files on his Windows 7 computer to an earlier point in time. He asks that you ensure that a Restore Point is created every day at the same time. Which tool should you use to schedule the Restore Point creation?
Volume Shadow Copy Service
System Restore
Task Scheduler
msconfig
Task Scheduler
Management has requested that BitLocker To Go be implemented on all Windows 7 computers. Which hardware is required to implement this Technology?
Network Interface Card
USB Flash Drive
Optical DVD/CD Drive
DirectX 10.0
USB Flash Drive
Explanation:
BitLocker to Go is a Technology in Windows 7 that allows you to encrypt the contents of USB Flash Drives.
You upgrade a device driver on your Windows 7 computer and reboot. After logging in, you notice that the device does not perform. How do you go back to older version of the driver that you had installed on your computer?
Use the Last Known Good Configuration
Disconnect and Reattach the Device
Go to the Manufacturer’s Website to get previous version of the driver.
Use Device Manager to roll back to the previous version of the driver.
Use Device Manager to roll back to the previous version of the driver.
While discussing a computer problem with a user, you realize that solving the problem requires a level of expertise that you do not have. How should you handle this problem?
Ask the user if you can transfer him to appropriate personnel.
Go through a few troubleshooting steps
Put the user on hold, and call your supervisor
Tell the user you do not know how to fix his problem
Ask the user if you can transfer him to appropriate personnel.
Andrea is concerned that she is being lured to provide her financial institution’s credentials on an invalid site via a message she received. Which type of attack is most likely taking place?
IP Spoofing
Email Spoofing
Data Mining
MAC Address Spoofing
Email Spoofing
Explanation:
Email Spoofing occurs when an email header to make it look like the message came from a Valid Source, when in actually it comes from someone hoping to gain access to your information or assets.
IP Spoofing is a technique that hackers will use to gain unauthorized access to computers by using valid IP Addresses making it appear to be from a valid trusted host.
Mining or Data Mining is a database application term that examines data to predict behaviors.
MAC Address Spoofing occurs when an attacker changes the MAC Address of his computer to match that of a valid trusted host.
Two months after completing a service call, a customer sends you an email message complaining about the work done. The customer also copies the message to your supervisor and other officers in your company.
You locate the follow up report that was completed by the customer the day after the service was completed. In the report, the customer indicated he was satisfied with the work you completed.
What should you do?
Send a reply message and include everyone copied thanking the customer for his input and asking why he indicated satisfaction in your work on the Follow-Up Report after the work was completed.
Have a meeting with all those who received the email message explaining to them why you feel the customer is wrong.
Disregard the email.
Call the customer and tell him why you think his actions are wrong.
Send a reply message and include everyone copied thanking the customer for his input and asking why he indicated satisfaction in your work on the Follow-Up Report after the work was completed.
You have discovered that hackers are gaining access to your WEP wireless network. After researching, you discover that hackers are using War Driving. You need to protect against this type of attack. What should you do? (Choose ALL That Apply)
Configure the WEP Protocol to WPA
Disable SSID Broadcast
Configure the Network to use Authenticated Access Only
Change the Default SSID
Configure the WEP Protocol to WPA
Disable SSID Broadcast
Configure the Network to use Authenticated Access Only
Change the Default SSID
Explanation:
War Driving is a method of discovering 802.11 Wireless Networks by driving around with a laptop and looking for Open Wireless Networks. NetStumbler is a common War Driving Tool.