Practice 3 Flashcards
Which of the following types of encryption uses a 128-bit encryption key but is considered weak due to its use of a 24-bit initialization vector?
WPS
WPA
WEP
WPA2
WEP
What type of structure is IF THEN ELSE in scripting?
Loop
Variable
Constant
Branch
Branch
Which of the following tools should a technician use to modify the HOSTS file on a Windows 10 system to solve a website address resolution issue?
Notepad
MMC
Services
RegEdit
Notepad
What command is used on a Linux system to convert and copy files from one hard disk to another?
dd
A developer uses a MacBook Pro when working from home, but they need access to both a Windows and macOS system to test their programs. What tool should be used to allow both operating systems to exist on their MacBook Pro?
Boot Camp
Which of the following types of backup would require the MOST time to complete?
Full
Differential
Incremental
Synthetic
Full
A customer is complaining that there are intermittent problems with their PC. As a technician, you don’t know exactly what the errors are, so which tool should you use to determine what errors have previously occurred?
Event Viewer
What tool shows a log of application and system messages, including errors, information messages, and warnings?
Event Viewer
What tool is used to only monitor the activities on the CPU and memory on a computer?
Performance Monitor
What utility gathers information about your computer and displays a comprehensive list of hardware, system components, and the software environment that can be used to diagnose computer issues?
System Information
Which of the following concepts is the MOST important for a company’s long-term health in the event of a disaster?
Vulnerability Scanning
Uninterruptible Power Supplies
Off-Site Backups
Implementing an acceptable use policy
Off-Site Backup
What is a placeholder in a script containing a number, character, or string of characters?
Variable
DMZ
Demilitarized Zone
aka Demilitarized Zone (DMZ)
Screened Subnet
A perimeter network that protects an organization’s internal local area network from untrusted traffic
Screened Subnet
Your mother says there is something wrong with her computer, but unfortunately, she doesn’t know how to fix it. She asks if you can remotely connect to her computer and see if you can fix it. Which technology would BEST allow you to remotely access her computer and interact with her Windows 10 laptop?
RDP
What are the steps of the seven-step malware removal process?
- Investigate and verify malware symptoms
- Quarantine the infected systems
- Disable System Restore in Windows
- Remediate the infected systems, update anti-malware software, scan the system, and use removal techniques
- Schedule Scans and Run Updates
- Enable System Restore and create a restore point in Windows
- Educate the end user
Your boss from work just sent you an important email, but you are not in the office. You tried to open the email from your smartphone, but it is encrypted and won’t open. What should you do?
Verify the digital certificate is installed on the device
How would you represent r-xrw-r– in octal notation?
564
Convert these letter permissions to their octal form
R
W
X
R = 4
W = 2
X = 1
Dion Training wants to upgrade its employees’ workstations from Windows 10 to Windows 11. All of the employees’ data and files are saved to the company’s shared drive. The technician has been told to choose an installation type that will delete all of the existing data, settings, and applications on the workstations during the upgrade. Which of the following types of upgrades or installations should you perform on the workstations?
Clean Install
Refresh Installation
Repair Installation
In-Place Upgrade
Clean Installation
An installation of a new operating system on a new computer or a computer that has been recently formatted
Clean Install
An installation of a new operating system on top of an existing version of the operating system. This will reserve the applications, user settings, and data files that already exist on the computer
In-Place Upgrade
A type of installation that will recopy the system files and revert most system settings to their default configuration while preserving user personalization settings, data files, and applications installed through the Windows Store
Refresh Installation
A type of installation that attempts to replace the existing version of the operating system files with a new copy of the same version. This is useful when trying to repair a Windows computer that will not boot or when you believe the system files have become corrupted.
Repair Installation
Joanne is having a drink at the coffee shop near her office. She takes out her Windows 10 laptop and connects it to the coffee shop’s wireless network to check her email. Which type of network should she select to hide their computer from other devices on the network and prevent file sharing with other patrons of the coffee shop?
Public
NFS
Network File System
Which file system type is used to mount remote storage devices on a Linux system?
Network File System (NFS)
APFS
Apple File System
A default file system for Mac computers using MacOS 10.13 or later.
Apple File System (APFS)
A file system optimized for external flash memory storage devices such as USB flash drives and SD drives
Extensible File Allocation Table (exFAT)
exFAT
Extensible File Allocation Table
Which file system supports a maximum volume size of up to 128 PB with a recommended maximum volume size of 512 TB for the best reliability?
Extensible File Allocation Table (exFAT)
NTFS
New Technology File System
A Windows file system that supports a 64-bit address space and can provide extra features such as file-by-file compression and RAID support as well as advanced file attribute management tools, encryption, and disk quotas
New Technology File System (NTFS)
A file system that can support a maximum volume size of up to 8 PB
New Technology File System (NTFS)
UPS
Uninterruptible Power Supply
An electrical apparatus that provides emergency power to a load when the input power source becomes too low or the main power fails.
Uninterruptible Power Supply (UPS)
GPT
Globally Unique Identification Partition Table
A modern disk partitioning system allowing large number of partitions and very large partition sizes
Globally Unique Identification Partition Table
A partitioning system that can support a maximum capacity of up to 9.7 ZB and up to 128 partitions
Globally Unique Identification Partition Table
ISO
Optical Disc Image
A disk image that contains everything that would be written to an optical disc.
ISO (Optical Disc Image)
A file system supported by Windows, macOS, and Linux computers that supports a maximum volume size of up to 2 TB and maximum file sizes of up to 4 GB
FAT32
Allows the bug driver to suspend an individual port without affecting the operation of the other ports on the hub
USB selective suspend
Used to save the current session to memory and put the computer into a minimal power state to save battery life when the system is not being used
Sleep/Standby mode
A mode between full shutdown and a hibernation mode
Fast Startup
Which of the following Control Panel options should a technician configure to automatically adjust the volume of different sounds when the computer is being used to place or receive telephone calls?
Ease of Access
Sound
Program and Features
USB selective suspent
Sound
Which section of the control panel brings together the functionality for the accessibility features in Windows?
Ease of Access
Which command-line tool could you use on a Windows system to enable an inactive administrator account?
Net User
Which command allows system administrators to manage user accounts on Windows PCs?
Net User
Which tool is used to mirror or synchronize directories and their contents?
Robocopy
Which command is used to end one or more tasks or processes on a Windows system?
Taskkill
RSoP
Resultant Set of Policy
PID
Process ID
Which command is used to display the Resultant Set of Policy (RSoP) information for a remote user and computer?
gpresult
Allows you to discover what policy settings are applied to local and remote commuters?
Resultant Set of Policy (RSoP)
What is used to communicate data and preferences to child processes within a script or batch file?
Environmental Variables
A process created by another process
Child Process
Which Linux command displays the present working directory oath to the terminal or display?
pwd
Which command is a utility in Windows that allows users to scan for and restore corrupted Windows system files from the command line?
SFC (System File Checker)
SFC
System File Checker
Which Windows command is used to check the file system and file system metadata of a volume for logical and physical errors?
chkdsk
Which of the following file types are commonly used to create applications that can run on Linux, macOS, and Windows?
.ps1
.py
.vbs
.sh
.py
Which file type is used for a shell script?
.sh
This type of files first line always begins with #!/bin/bash
.sh (Shell Script)
A scripting language based on Microsoft’s Visual Basic programming language
VBScript
What enables you to perform management and administrative tasks in Windows 7 and later?
Windows PowerShell
Which file type is used for PowerShell?
.ps1
Which file type is used for VBScript?
.vbs