ITProTV - A+ 1002 Practice Flashcards
- What is the best Implementation of the Principle of Least Privilege?
Issuing the Run As command to execute Administrative tasks during a regular user session.
Issuing a Single Account to each user, regardless of his job function
Completing Administrative tasks at a computer that functions only as a Server
Ensuring that all services use the main Administrative Account to execute their processes.
Issuing the Run As command to execute Administrative tasks during a regular user session.
Explanation:
The best implementation of the principle of least privilege is to issue the Run As command to execute administrative tasks during a regular user session. You should never use an Administrative Account to perform routine operations, such as creating a document, checking your email, or so on. Administrative Accounts should only be used when you need to perform an administrative task, such as configuring services or backing up a computer. The principle of least privilege is usually implemented by limiting the number of administrative accounts. Tools that are likely to be used by hackers should have permissions that are as restrictive as possible.
- You run Systeminfo command on a Windows 7 Computer, what will NOT be displayed?
Domain Name
Virtual Memory Statistics
Installed Hotfixes
Boot Options
Boot Options
- You need to access content on a CD or DVD drive when you do not have an Optical Drive in your Mac computer. Which feature should you use?
Finder
Boot Camp
iCloud
Remote Disk
Remote Disk
Explanation:
Remote Disk is the Feature of macOS to access content on a CD or DVD drive when you do not have an Optical Drive. When configured, it allows you to access a CD or DVD drive hosted on another Computer. Remote Disk does not work with most copyrighted media.
Boot Camp is a MAC feature that allows you to Install Windows on a MAC Computer.
iCloud is a central internet storage that allows you to store your content and have it accessible on any of your MAC devices.
Finder is the Filing System that you can use to organize your files on macOS.
- You decide to edit the boot order for your Windows 8 computer using the MSCONFIG utility. To which file is the Edit Saved?
Ntoskrnl.exe
bootmgr
boot.ini
BCD
BCD
Explanation:
BCD is a file that replaced the boot.ini File. Boot.ini was used in Windows XP and earlier, the BCD file was used in Windows Vista and Later. BCD holds configuration data about which OS systems are installed. You cannot copy a BCD file from another computer and expect it to work properly. You can use MSCONFIG utility to edit the BCD File. You can also use BCDEdit.exe in Windows 7 or Later.
bootmgr.exe file is the Boot Loader file for Windows Vista and later.
NTLDR was the Boot Loader for Windows XP and Earlier.
ntoskrnl.exe file is the Windows NT System Kernel, this file should NOT be edited.
- You organization is concerned with unauthorized users downloading confidential data to removable media. You decide to encrypt the confidential data using the Encrypting File System (EFS).
You need to copy an EFS-Encrypted File. The File will be copied to an NTFS volume that does not implement EFS. What is the state of the file?
The Original version of the file is decrypted. The new version is decrypted.
The Original version of the file remains encrypted. The new version is decrypted.
The Original version of the file remains encrypted. The new version is encrypted.
The Original version of the file is decrypted. The new version is encrypted.
The Original version of the file remains encrypted. The new version is decrypted.
- You have a 3TB drive on which you want to install Windows. How must you format the drive to have the Operating System recognize the entire drive?
MBR
Extended
GPT
Basic
GPT
Explanation:
To Install Windows on a 3TB Drive, you must format the drive as a GUID Partition Table (GPT) to have the OS recognize the entire drive. GPT is replacing the Master Boot Record (MBR). MBR supports up to 4 primary partitions and has a disk size limitation of 2TB. GPT requires a UEFI Motherboard.
You cannot install Windows on an Extended Partition. Extended refers to Partitioning, NOT Formatting.
Basic refers to Partitioning, not Formatting. Can be either Primary or Logical and reside on a Physical Drive. Basic Disk can have up to 4 Partitions.
- You need to create a Hard Drive Image of a Linux Computer. Which command should you use?
mv
ls
dd
cp
dd
Explanation:
dd = Allows you to copy a File and Convert it to another format during the copying process. Used for Hard Drive Images in Linux.
apt-get = Advanced Packaging Tool and Install Packages. cd = Changes Directory chmod = Changes Permissions on a File. chown = Changes the Ownership of a File. cp = Copies files and directories. grep = Finds a pattern of text within a file or group of files. iwconfig/ifconfig = Equal to ipconfig in Windows. ls = Lists file and directory contents. mv = renames or moves a file ps = provides a list of current processes running on a system pwd = Print Working Directory passwd = allows you to change the password of a user account q = quits the VI editor rm = removes a file shutdown = turns off the computer su/sudo = superuser root execute vi = text editor in Linux
- A user that has a Windows 7 Laptop is frequently away from the office. During that time, he needs access to several files that are on the Network. What should you do?
Enable BitLocker
Enable BitLocker To Go
Enable Offline Files
Create a Windows 7 Library
Enable Offline Files
Explanation:
Offline Files allows users to access network files even when the network is unavailable. When Network is available, the files are synced to ensure that both the online and offline versions are the same. Done in the Control Panel.
Sync Center basically syncs files with other devices on your network.
BitLocker/BitLocker To Go is Encryption Technology. BitLocker To Go encrypts files on removable drives such as USB Flash Drives.
Windows 7 Library are similar to Folders, but libraries do not actually store files. Library’s display files that are stored in several folders at the same time. Libraries allow a user to organize all related document, pictures, and other files so they appear to the user as a single location when they may be stored in separate locations.
- Ten computers in your department need the BIOS Updated, and it needs to be completed within a two-hour timeframe. What is the fastest way to accomplish this task?
Use a bootable flash drive
Use a boot loader file
Flash the BIOS
Update the EEPROM Chip
Flash the BIOS
Explanation:
You should NOT use a bootable flash drive to perform this task because a bootable flash drive does not contain a BIOS update.
Boot Loader is the set of tests or programs that a computer goes through when it initializes and tests system hardware components after the POST is complete.
Electrically Erasable Programmable Read Only Memory (EEPROM) chips are permanent chips that can be over-written or programmed with new info for the BIOS. The process to update these chips was much more difficult than just flashing the BIOS.
- Which of the following statements regarding Android Phones is INCORRECT?
The Android GPS needs a view of the sky.
The Android GPS will use battery life.
Android Apps can use Cell Towers, WIFI Hot Spots, or Satellites to obtain a location.
The Android GPS requires the help of Cell Towers to obtain a location.
The Android GPS requires the help of Cell Towers to obtain a location.
- A User requests that his Windows 7 Computer display dates using the YYYY-MM-DD format. Where should you go to make this change using the least administrative effort?
Control Panel Category View > Clock, Language, and Region - Select Date and Time
Control Panel Category View > Date, Time, Language and Regional Options - Select Regional and Language Options
Control Panel Category View > Clock, Language, and Region - Select Region and Language
Control Panel Category View > Date, Time, Language, Regional Options - Select Date and Time Options
Control Panel Category View > Date, Time, Language, Regional Options - Select Date and Time Options
- Which Windows Operating Systems include apps that use the Windows Store Feature? (Choose ALL That Apply)
Windows 8
Windows 10
Windows 8.1
Windows 7
Windows 8
Windows 10
Windows 8.1
- On which versions of Windows can PowerShell Core 6.0 be used? (Choose ALL That Apply)
Windows 10
Windows 8
Windows 8.1
Windows 7
Windows 10
Windows 8
Windows 8.1
Which of the following is described as gaining unauthorized access to the data center by using another user’s credentials?
piggybacking
turnstile
intrusion
mantrap
piggybacking
Your company has decided it wants to implement multi-factor authentication. What is the BEST implementation you should deploy?
smart cards, usernames, and PIN
usernames, strong passwords, and PIN
smart cards, usernames, and strong passwords
biometrics, smart cards, and strong passwords
biometrics, smart cards, and strong passwords
As a tech who frequently observes electrostatic discharge (ESD) damage to parts, you have become concerned about the presence of contributing factors in your work area. Which environmental condition is likely to cause ESD problems?
low humidity
high temps
low temps
high humidity
low humidity
Aaron is using Microsoft Excel on his portable computer, and reports being unable to move the cursor from one cell to the other cell with the arrow keys. Aaron also confirms that he is able to use the mouse to move the cursor from one cell to the other cell.
What is the reason for this cursor issue?
Shift Key is Pressed
Num LK is On
Scroll LK is On
Application is Corrupt
Scroll LK is On
Explanation:
Scroll LK modifies the behavior of the Arrow Keys. When it’s ON, the Arrow Keys will scroll the contents of a text window instead of moving the cursor.
Num LK does not control the scrolling feature. It’s used to switch between Number Entry and Arrow Keys.
A user wants to be able to restore his system files on his Windows 7 computer to an earlier point in time. He asks that you ensure that a Restore Point is created every day at the same time. Which tool should you use to schedule the Restore Point creation?
Volume Shadow Copy Service
System Restore
Task Scheduler
msconfig
Task Scheduler
Management has requested that BitLocker To Go be implemented on all Windows 7 computers. Which hardware is required to implement this Technology?
Network Interface Card
USB Flash Drive
Optical DVD/CD Drive
DirectX 10.0
USB Flash Drive
Explanation:
BitLocker to Go is a Technology in Windows 7 that allows you to encrypt the contents of USB Flash Drives.
You upgrade a device driver on your Windows 7 computer and reboot. After logging in, you notice that the device does not perform. How do you go back to older version of the driver that you had installed on your computer?
Use the Last Known Good Configuration
Disconnect and Reattach the Device
Go to the Manufacturer’s Website to get previous version of the driver.
Use Device Manager to roll back to the previous version of the driver.
Use Device Manager to roll back to the previous version of the driver.
While discussing a computer problem with a user, you realize that solving the problem requires a level of expertise that you do not have. How should you handle this problem?
Ask the user if you can transfer him to appropriate personnel.
Go through a few troubleshooting steps
Put the user on hold, and call your supervisor
Tell the user you do not know how to fix his problem
Ask the user if you can transfer him to appropriate personnel.
Andrea is concerned that she is being lured to provide her financial institution’s credentials on an invalid site via a message she received. Which type of attack is most likely taking place?
IP Spoofing
Email Spoofing
Data Mining
MAC Address Spoofing
Email Spoofing
Explanation:
Email Spoofing occurs when an email header to make it look like the message came from a Valid Source, when in actually it comes from someone hoping to gain access to your information or assets.
IP Spoofing is a technique that hackers will use to gain unauthorized access to computers by using valid IP Addresses making it appear to be from a valid trusted host.
Mining or Data Mining is a database application term that examines data to predict behaviors.
MAC Address Spoofing occurs when an attacker changes the MAC Address of his computer to match that of a valid trusted host.
Two months after completing a service call, a customer sends you an email message complaining about the work done. The customer also copies the message to your supervisor and other officers in your company.
You locate the follow up report that was completed by the customer the day after the service was completed. In the report, the customer indicated he was satisfied with the work you completed.
What should you do?
Send a reply message and include everyone copied thanking the customer for his input and asking why he indicated satisfaction in your work on the Follow-Up Report after the work was completed.
Have a meeting with all those who received the email message explaining to them why you feel the customer is wrong.
Disregard the email.
Call the customer and tell him why you think his actions are wrong.
Send a reply message and include everyone copied thanking the customer for his input and asking why he indicated satisfaction in your work on the Follow-Up Report after the work was completed.
You have discovered that hackers are gaining access to your WEP wireless network. After researching, you discover that hackers are using War Driving. You need to protect against this type of attack. What should you do? (Choose ALL That Apply)
Configure the WEP Protocol to WPA
Disable SSID Broadcast
Configure the Network to use Authenticated Access Only
Change the Default SSID
Configure the WEP Protocol to WPA
Disable SSID Broadcast
Configure the Network to use Authenticated Access Only
Change the Default SSID
Explanation:
War Driving is a method of discovering 802.11 Wireless Networks by driving around with a laptop and looking for Open Wireless Networks. NetStumbler is a common War Driving Tool.
Jane is new to the PC Tech world and is curious about ESD. Which steps would you tell her to use as a preventative measure against static electricity? (Choose ALL That Apply)
Having proper grounding of building and outlets.
Ensure that sensitive areas, such as server rooms, are carpeted.
Wear Anti-Static Bands while servicing computer components.
Wear leather soled shoes.
Ensure that the humidity level does not become too high.
Have proper grounding of building and outlets
Wear Anti-Static Bands while servicing computer components
Which factors generate and promote the transmission of electrostatic discharge (ESD) to devices? (Choose ALL That Apply)
moving people humidity greater than 40% humidity less than 40% moving machines improper grounding
moving people
humidity less than 40%
moving machines
improper grounding
Which of the following statements is True about an in-place upgrade and a clean installation?
an in-place upgrade can always be used when upgrading from a previous OS version.
an in-place upgrade installs the OS files and retains user settings.
a clean installation installs the OS files and retains user settings.
a clean installation does not require the reinstallation of applications.
an in-place upgrade installs the OS files and retains user settings.
You are responsible for purchasing New Windows Computers for your company. The Computers must be able to join your Company’s Domain. Which versions of Windows should you implement? (Choose ALL That Apply)
Windows 7 Home Premium Windows 8 Pro Windows 7 Pro Windows 7 Starter Windows 7 Ultimate
Windows 8 Pro
Windows 7 Pro
Windows 7 Ultimate
You need to provide a physical security measure for a data center located on the Second Floor of a building. Management wants you to implement the highest level of security possible. What physical security should you implement?
ID Badges
Key Fobs
Biometrics
Passwords
Biometrics
You launch Performance Monitor in Windows 7 Pro. Which components can you monitor using this tool? (Choose ALL That Apply)
Memory
Network
Processor
Disk
Memory
Network
Processor
Disk
You are researching Biometrics for Identification and Verification of employees in an organization. Which attributes or details of an employee can be used by Biometric Devices? (Choose ALL That Apply)
Face Iris Fingerprints Hand Geometry Signature Hair
Face Iris Fingerprints Hand Geometry Signature
Explanation:
Others include -
Voice
Retina
A user informs you that he cannot complete a task for his supervisor without an administrative password. The user will only have to complete this task once.
What should you do to achieve the objective using the least administrator effort?
Options:
Enter the Administrative Credentials yourself at the user’s computer.
Change the user’s account to an administrative level account. Return the account to its original state after the task is complete.
Tell the user to ask his supervisor for the supervisor’s account info.
Create a Temp Administrative Account for the user. Delete the account after the task is complete.
Enter the Administrative Credentials yourself at the user’s computer.
An IT Tech has recently discovered an Evil Twin on your company’s network. What is the best description of an Evil Twin?
unauthorized access point
cracking the WEP secret key using the initialization vector
signals about the wireless network marked on the outside of the building
an access point with the same SSID as the legitimate access point
an access point with the same SSID as the legitimate access point
Explanation:
Evil Twin is an access point with the same SSID as a legitimate access point. It’s a special type of unauthorized access point.
Rogue access point is an unauthorized access point that allows access to a secure network. Performing a site survey is the best way to discover rogue access points.
War Chalking is leaving signals about the wireless network on the outside of the building.
An IV attack is cracking WEP secret key using Initialization Vector (IV).
Gloria is holding free computer maintenance classes in her community. In her Class, she emphasizes tools anyone can access and use. She spends alot of time discussing the DEFRAG tool. What should she tell them is the minimum free disk space needed to run this tool?
200 MB
25% of Hard Drive Space
800 MB
15% of Hard Drive Space
15% of Hard Drive Space
Deborah has a brand new iPhone that she thinks is defective because it keeps losing battery power. What are three easy fixes she can do herself without having to take it in for a technical service? (Choose ALL That Apply)
Dim the display Place in Airplane Mode Turn on Bluetooth Turn on WIFI Close out Background Apps
Dim the display
Place in Airplane Mode
Close out Background Apps
A user contacts you stating that he believes that his computer is infected with Malware. Which symptoms may indicate that he is correct? (Choose ALL That Apply)
low disk space warning alert browser redirection slower performance pop-ups junk email security alerts
browser redirection
slower performance
pop-ups
security alerts
You need to view the processes running on a Linux System. Which command should you use?
apt-get
ps
chmod
grep
ps
Your organization is adopting a new password policy to increase security. Which policy is the most secure password policy?
Password change requests must be made in writing.
Password change requests must be made by email message.
Password change requests must be made in person.
Password change requests must be made by telephone.
Password change requests must be made in person.
You are training two new computer techs on proper repair procedures. Which procedure should be performed off-site by a third party?
flashing a BIOS chip
repairing a power supply for a cathode ray tube (CRT)
disabling bus mastering
resolving an IRQ conflict
repairing a power supply for a cathode ray tube (CRT)
You are training new users about software licensing, DRM, and EULA. Which of the following licensing models allow you to modify an application’s code, creating a customized version of the software?
Personal License
Open-Source License
Commercial License
Enterprise License
Open-Source License
You need to establish a network connection on a Windows computer using the Setup a Connection or Network applet. Which one of these is NOT a valid connection type?
Wireless
VPN
Line of Sight
Dial-Up
Line of Sight
You need to broaden the area to which a wireless access point (AP) can transmit. What should you do?
Relocate the AP
Change the channel used by the AP
Adjust the power level setting slightly higher.
Maximize the power level setting.
Adjust the power level setting slightly higher.
You need to access a shared folder named research$. Which fact is true about this shared folder?
It is a local share.
It is visible
It is hidden
It is an administrative share
It is hidden
You are a desktop engineer for a graphic design company. The network consists of fifteen Windows 7 Client computers. Server users report that the performance of the computers is degrading. You detect that there is low free disk space on the computers. To enhance the performance of the computers, you instruct the users to back up the data and remove unwanted applications that are installed on that computer to free disk space.
What else should you instruct the users to do? (Choose Two)
Run the Disk Defragmenter Utility Run the Scheduled Tasks Utility Run the Action Center Utility Run the Files and Settings Transfer Wizard Run the Disk Cleanup Utility
Run the Disk Defragmenter Utility
Run the Disk Cleanup Utility
You need to download and install critical system updates, security patches or hotfixes, and upgrades for Windows components. Which Windows utility allows you to accomplish this?
File and Settings Wizard
Windows Update
Recovery Console
System Restore
Windows Update
Vivian wants to set permissions on a certain folder to allow users to modify data. What is she really allowing them to do with this type of permission?
The user can Read, Write, Execute, and Delete everything, EXCEPT the Folder.
The user can Read, Write, Execute, and Delete everything, including the Folder.
The user can Read Files and View the Contents of a Directory and any of its Subdirectories.
The user has All Rights to Change Permissions and take Ownership of the Directory or any of its Subdirectories.
The user can Read, Write, Execute, and Delete everything, including the Folder.
You have configured System Restore on the computers in your Network. Which condition will NOT result in a restore point being created?
Upgrading Device Driver
Saving a New File
Installing New Device Driver
Installing Software
Saving a New File
Elizabeth has given her teenage son an iPhone for his birthday. She has enabled all the services required to use the Find My iPhone feature. Which security risk may occur as a result?
Slow data speeds
unintended WIFI connections
unintended Bluetooth connection
unauthorized location tracking
unauthorized location tracking
While installing a web camera on a Windows 7 computer, you receive a blue screen error. You are unable to boot to Windows after installing the web camera. Instead, each time you boot the computer, it shows the blue screen error message. What should you do to troubleshoot the problem using the least administrative effort?
Boot the computer with a bootable USB flash drive.
Boot the computer using the Last Known Good Configuration
Boot the Computer with the Windows 7 bootable disk
Perform a fresh installation of Windows 7
Boot the computer using the Last Known Good Configuration
A user contacts you asking if she should run the chkdsk command on her computer. Why would you use this command?
To manage hard drive partitions
To check the specified drive and repair possible problems
To write new boot sector code on the system partition
To repair the master boot record (MBR) on the boot partition
To check the specified drive and repair possible problems
You have recently been hired as an IT Tech. You need to install Windows 7 on several computers on the Network. There are several installation options available. Move the correct items from the left column to the column on the right to match the installation type with the correct installation situation?
Clean Installation
Upgrade Installation
Multi-Boot Installation
Network Installation
Windows needs to be installed on multiple computers with identical hardware configurations
More than one Windows version needs to be installed on a computer
Windows should ignore the previous installation of Windows
Windows should retain user data and applications
Clean Installation – Windows should ignore the previous installation of Windows.
Upgrade Installation – Windows should retain user data and applications.
Multi-Boot Installation – More than one Windows version needs to be installed on a computer.
Network Installation – Windows needs to be installed on multiple computers with identical hardware configurations.
You need to schedule several disk maintenance tasks on a Windows computer. Where should you go to schedule these tasks?
Open Task Manager
Open Task Scheduler
Right-Click the commands for the tasks
Double-Click the commands for the tasks
Open Task Scheduler
Nicola reports to the security guards that individuals are following closely when she enters buildings, using her credentials to gain access. She knows that some of them are valid employees but is concerned that not all of the people are. What security breach is she reporting?
shoulder surfing
zero-day attack
zombie
tailgating
tailgating
You are concerned that there is an unauthorized open port that is allowing connection to a malicious website. You need to view all of a computer’s connections. Which command-line tool should you use?
ipconfig
netstat
ping
tracert
netstat
You use two different backup and recovery options. For full backups, you use cloud storage, and for incremental backups you use local storage. What type of backup is an incremental backup?
critical applications
file-level
account recovery
image-level
file-level
You are updating the offboarding procedures and policies for your organization. You need to retain a terminated employee’s data while blocking the terminated employee’s access to that data. Which Active Directory function should you implement?
Password reset
Account creation
Disable account
Account detection
Disable account
Which activity is covered under the confidentiality objective of the CIA triad, and involves examining someone’s computer to steal confidential information?
social engineering
shoulder surfing
dumpster diving
treason
shoulder surfing
Cathy is opening the case of a computer to add some memory and perform some additional maintenance. She wants to ensure that a static charge is not built up in her body. How can she proceed safely?
she should use an ESD strap
she should unplug the computer
she should connect her grounding strap to the system board
she should connect her grounding strap to a line voltage source
she should use an ESD strap
Which statement is more effective when dealing with a customer who keeps having the same problem?
“You should have should won your computer properly.”
“Often this type of problem is caused when a computer is not shut down properly.”
“I don’t know what is causing this problem.”
“You should never shut down your computer that way.”
“Often this type of problem is caused when a computer is not shut down properly.”
As stated in your organization’s new password policy, you must configure how many new passwords must be created before an old one can be reused. Which policy should you use?
password length password complexity password history password lockout password age
password history
Your mobile device is fully charged. You have been traveling all day using your mobile device to make calls. However, when you travel into remote areas, calls mysteriously disconnect. What is the most likely problem with the device?
slow data speeds
high resource utilization
signal drop/weak signal
power drain
signal drop/weak signal