Pratice Flashcards

1
Q

Control Panel applet for managing adapter devices, including IP address information

A

Network Connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

modern settings app used to view network status, change the IP address properties of each adapter, and access other tools.

A

Network & Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Control Panel applet that shows various status information for a current network connection.

A

Network and Sharing Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A recent software installation on a Windows desktop fails. Which internal log file does a technician review to see what may have gone wrong?

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

records events generated during the installation of the operating system. This log assists in determining operating system setup failures.

A

setup log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which internal log contains information about events that affect the core operating system (OS). These include service load failures, hardware conflicts, driver load failures, network issues, and more.

A

System log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

allows the copying of the contents of more than one directory at a time while retaining the directory structure

A

xcopy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Windows file copy utility. This utility is designed to work better with long file names and NTFS attributes.

A

robocopy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A Windows user runs the Performance Monitor tool to check disk activity. What counter is the best option the user can evaluate to understand how busy the disk is at any given time?

A

% disk time

a metric is the percentage of elapsed time that the selected disk drive is busy servicing read or write requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The _________ is a memory metric. represents the number of pages read from or written to disk to resolve hard page faults.

A

page/sec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

displays a summary of any fixed and removable disks.

A

Disk management
(diskmgmt.msc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

allows administrators to view, edit, and troubleshoot the properties of installed hardware, update drivers, and remove or disable devices.

A

Device manager (devmgmt.msc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

To support UNIX/Linux compatibility, Microsoft engineered NTFS to support case-sensitive naming, hard links, and other key features

A

Portable Operating System Interface (POSIX) compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

WHat causes a BSOD (blue screen of death)?

A

Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A user experiences a blue screen of death (BSoD) while using a Windows computer. What does a support technician determine to be a good first troubleshooting step?

A

Remove any newly installed hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A user installs an application on a Linux system by using which method in the operating system?

A

Package manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Linux uses ____ package

A

DEB for YUM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A user needs to restore a problematic Windows system to its original factory state. What approach does the user utilize to achieve the restoration?

A

Recovery partition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

When is Window refresh used

A

to repair the installation and reverts most system settings to the default but can preserve user personalization settings, data files, and apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A user with a problematic Windows system tries to use a previously created system image. How does the user access the image?

A

Repair Disk
Advanced boot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The Instagram app on an Android phone will not launch. Which of the following options could fix the problem?

A

Force Stop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of the following should generate an alert when the account is disabled or altered?

A

Change default administrator account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A telltale sign of a malware infection is when changes occur to system files. Which of the following is likely the result of malware-induced changes to system files?

A

Files that are missing or renamed
Files with date stamps and file sizes that are different from known-good versions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

An _______ file is format for Android

A

.apk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
A vulnerability manager is brainstorming different ways to enhance security for their cell phone devices. The company only uses Apple, and so one of the ideas the manager comes up with is to look for anomalistic files that do not belong with Apple for signs of possible malware which did not profile the device and instead just blasted malware out, hoping the operating system would be right. Which of the following would be anomalistic? .dmg .pkg .app .apk
.apk
26
What enables the integration of Linux and Windows systems.
Samba
27
Samba allows Linux and Windows systems to do what?
file and print sharing protocol to access shared resources on a Windows host.
27
Samba allows Linux and Windows systems to do what?
file and print sharing protocol to access shared resources on a Windows host.
28
A threat actor uses a technique that instills statements through an unfiltered user response. What is this technique
SQL injection
29
Cross-site scripting (XSS) attack
exploits the fact that the browser is likely to trust scripts that appear to come from a site the user has chosen to visit.
30
SQL injection attack
attacker modifies one or more of the basic functions by adding code to some input accepted by the app, causing it to execute the attacker’s own set of SQL queries or parameters.
31
A Linux server administrator notices a service they do not recognize, although the environment is quite big. They look at the help file for the ksh process, but the documentation seems poor. It does seem to indicate that it provides interactivity, however. What type of program is this?
Terminal ksh - product for Linux shell such as Bash, zsh
32
A helpdesk manager assesses older Windows 7 computers their company owns and tries to determine available upgrade paths. Which of the following can NOT be upgraded? Windows 7 Home to Windows 10 Enterprise Windows Home to Windows 10 Pro Windows 7 Pro to Windows 10 Home Windows 7 Home Premium to Windows 10 Pro
Windows 7 Home to Windows 10 Enterprise Users cannot upgrade from a Home to an Enterprise edition.
33
A company uses an element that reminds users when logging in to the company’s device of the current software version. What is this called?
Splash screen
34
Splash screen consists of what?
graphic design element consisting of a window containing an image, logo, and the current software version.
35
Which of the following macOS features is used to backup and restore files to an external hard disk?
Time Machine
36
Port ____ used for DNS
53
37
Port ___ used for DHCP or automatically assigning IP address
67
38
Port _____ is used for email clients to retrieve email from a mail server. (POP3)
110
39
Port ____ provides a user with a graphical interface to connect to another computer over a network connection. (RDP)
3389
40
Which version of Windows supports Virtual Desktops?
Windows 10
41
A coworker is creating a file containing a script. You look over their shoulder and see "#!/bin/bash" as the first line in the file. Based on this, what type of file extension should this script use?
.sh used in Linux and macOS
42
Which type of wireless encryption uses a 40-bit encryption key with an RC4 encryption cipher?
WEP
43
Which type of wireless encryption uses RC4 cipher and a temporal key integrity protocol (TKIP)
WPA
44
Which type of wireless encryption AES cipher with counter mode with cipher-block chaining message authentication protocol (CCMP)
WPA2
45
Your company recently downloaded and installed the latest audio card driver for all of its workstations. Now, several users have had their usernames and passwords for several websites compromised. You believe the two issues are related. If they are, which of the following was MOST likely contained in the audio card driver file that was installed?
Keylogger
46
Which type of backup generates the recovered files from a complete copy of a file created at some point in time and one or more partial backups created at later times to merge them into the recovered data?
Synthetic
47
Which type of backup only creates a copy of the selected data that has been modified since the last full backup
differential
48
Which type of backup creates a copy of new files and files modified since the last full, incremental, or differential backup
Incremental (takes the least to backup and longest to restore)
49
While investigating a data breach, you discover that the account credentials used belonged to an employee who was fired several months ago for misusing company IT systems. The IT department never deactivated the employee's account upon their termination. Which of the following categories would this breach be classified as?
Insider Threat
50
Which types of attacks are usually used as part of an on-path attack?
Spoofing
51
What is on-path attack
where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other
52
Which file types are commonly used by network administrators to perform repetitive tasks using a Microsoft proprietary programming language?
.vbs ( programming language for Microsoft)
53
Windows file servers commonly hold sensitive files, databases, passwords, and more. What common vulnerability is usually used against a Windows file server to expose sensitive files, databases, and passwords?
missing patches
54
You are troubleshooting a user's laptop that is unable to print a document. You have verified the printer is working and properly connected to the workstation by USB. Which log in Windows 10 would you review to determine if the print spooler service is causing this issue?
System log
55
You are configuring a SOHO network and only allowing specific IP addresses to access the network while blocking any IP addresses that are not on the list. Which of the following should be implemented?
Allow List
56
What type of filtering would provide access control list to a switch or access point so that only clients with approved MAC addresses connect.
MAC Filtering
57
What is the minimum amount of storage space required to install Windows 10 (x64) on a device?
32GB
58
What type of malware replicates itself to spread to other computers
Worm
59
What type of malware is a malicious software designed to infect computer files or disks when it is activated
virus
60
What type of malware ooks legitimate but can take control of your computer
trojan
61
A computer was recently infected with a piece of malware. Without any user intervention, the malware is now spreading throughout the corporate network and infecting other computers that it finds. Which type of malware MOST likely infected these computers?
worm
62
A home user brought their Windows 10 laptop to the electronics store where you work because they suspect it has a malware infection. You are in the process of remediating the infected system. Which of the following actions should you be performing?
Remove, quarantine, or erase the infected files
63
You are troubleshooting a user's computer. As part of your efforts, you want to install a new login with administrative privileges. Which of the following utilities should you use?
Local Users and Groups
64
_________ is a utility used to define and control how programs, network resources, and the operating system operate for users and computers in an organization
group policy editor
65
__________ system utility to troubleshoot the Microsoft Windows startup processes
System Configuration
66
In an active directory environment, ________ is applied to users or computers based on their membership in sites, domains, or organizational units
a group policy
67
_________ used to disable or re-enable software, device drivers, and Windows services that run at startup, or to change boot parameters
MSConfig
68
____________ utility that gathers information about your computer and displays a comprehensive list of hardware, system components, and the software environment that can be used to diagnose computer issues.
System information (msinfo32.exe)
69
Elizabeth was replacing a client’s security device that protects their screened subnet. The client has an application that allows external users to access the application remotely. After replacing the devices, the external users cannot connect remotely to the application anymore. Which of the following devices was MOST likely misconfigured and is now causing a problem?
Firewall
70
What ensures that old data is destroyed by writing to each location on a hard disk drive?
Erasing/wiping
71
What resets a disk to its factory condition?
low-level formatting
72
Worried about a crash, a user creates a complete backup of the system configuration and data files on their computer. Identify what the user has created.
an image
73
An accountant has an unlimited data plan and has set data usage limit triggers for their mobile phone. What concern does the accountant have with high data usage with an unlimited data plan? (Select all that apply.)
DDoS and cryptomining
74
Even with an unlimited data plan, setting data usage limits allows a user to be alerted to unusually high data usage associated with being used as part of _________ attack
distributed denial of service DDoS
75
Malware encyclopedias are a resource that antivirus vendors often make available to IT professionals. What is their value for IT practitioners? (Select all that apply.)
document known malware and They provide information about the type, symptoms, purpose, and removal of malware.
76
A user wants to maximize resource dedication to 3D performance and frame rate. Where should the user go to do this?
Gaming
77
The Snapchat app on an iOS phone will not close. The user rebooted the device, but that was unsuccessful. What would be the best for the user to try to fix the problem?
Uninstall then reinstall
78
What allows a user to download from a vendor’s website and select the correct patch for their device's make and model?
firmware updates
78
What allows a user to download from a vendor’s website and select the correct patch for their device's make and model?
firmware updates
79
A security engineer researches how to make backup and antivirus apps available to their iOS mobile devices. Where should the apps be pushed?
Business Manager
80
An employee enters the web address of their local newspaper to check for news on the company, and a site pops up with many click-bait celebrity stories. The employee re-enters the address assuming a misspelling but returns to the same page. When the help desk technician arrives, which of the following troubleshooting steps would be appropriate?
Check HOSTS files for malicious entries.
81
A curious user looks through their local logs and sees errors in region-coding copy-protection mechanisms. What type of device is generating these logs?
Optical media
81
A curious user looks through their local logs and sees errors in region-coding copy-protection mechanisms. What type of device is generating these logs?
Optical media
82
An attacker uses a set of tools designed to gain control of a computer and can create a backdoor with system-level privileges without the user noticing. What is this called?
Rootkit
83
An administrator uses a method that uses simultaneous authentication of equals (SAE) instead of the 4-way handshake. What is this method?
WPA3
84
A penetration tester conducts the initial reconnaissance phase and is currently targeting externally facing servers for a certain company. Currently, they are trying to enumerate the domain name system (DNS) servers. Which built-in tool will help them perform this?
dig
85
An IT technician is installing software on a device that inspects network traffic and accepts or blocks traffic based on a set of rules. What is this called?
Firewall
86
A user receives an unsolicited call from a Microsoft support technician during a normal workday. The technician says the antivirus software on the user's computer alerted Microsoft of a new malware infection. The technician needs to remote into the user's computer to fix the problem. What is the technician trying to do?
circumvent security software
87
A technician is tasked to figure out why a user's Gmail app will not update on their mobile phone. The technician knows several reasons that would cause this to occur. Which of the following would be one of the reasons for this problem?
Storage
88
An installer is implemented using. EXE file. What is this technique performing?
Installation of applications
89
occur when an agent cannot resolve the ticket.
escalation
89
occur when an agent cannot resolve the ticket.
Escalation
90
A security analyst notices a critical incident that has a widespread effect on customers that can eventually involve a potential data breach. The analyst creates a ticket with the vendor and sets the importance in order to trigger a faster response time. What describes what attribute of the ticket the analyst set? Problem resolution Severity levels Escalation levels Categories
Severity levels
91
A technician configures a method to run some server application from a network and make it accessible to the internet. What is this method?
Port forwarding
92
the server always assigns the same IP address to the host. A user can usually choose which IP address this should be. What is this method?
DHCP reservation
93
A technician uses a backup method that reflects how much lost work can be tolerated. What is this method?
Frequency (period between backup jobs)
94
An administrator for Apple endpoints has heard about roaming profiles on Windows where users can sync certain settings from different devices. Which of the following offers a similar functionality?
iCloud Keychain (admin access )
95
What feature helps users manage passwords for these accounts, other websites, and Wi-Fi networks. The regular keychain is just local.
Keychain (users only)
96
A customer has opened a ticket for a problem to be fixed, and when the customer opens the ticket, there will be a record that shows what?
Proper documentation
97
What uses domain names of components loading on the web page against a vast blacklist?
Ad blocker
98
What type of data breach can be associated with a specific person or use an anonymized or de-identified data set for analysis and research
Healthcare data
99
An IT manager is in charge of client machine administration. The manager wants to test various boot settings before applying them to the environment. Which tool can the manager use to accomplish this best?
msconfig.exe
100
What will block third-party cookies and enable strict tracking protection? Ad blockers Pop-up blockers Private browsing mode Clearing cache
Private browsing mode
101
An intern for a Windows server team is watching a server administrator verify the authenticity and integrity of an installer. Where did the administrator most likely get it from?
Internet download
102
Which of the following scenarios would result in a website having an untrusted or invalid certificate? (Select all that apply.) The certificate is issued by a trusted CA. The certificate is revoked. The certificate has expired. The certificate is self-signed.
The certificate is revoked. The certificate has expired. The certificate is self-signed.
103
A server administrator migrates their environment from physical servers to a virtualized environment. The administrator wants to install new virtual machine operating systems. What is the best approach to use regarding deploying virtualized OSs?
ISOs
104
An administrator uses a method that assigns permissions and rights to a collection of user accounts. What is this called?
Security group
105
A client uses this software that allows access to a given computer. What is this software?
Screen-sharing
106
A network administrator troubleshoots domain name system (DNS) issues that a particular user is having. Which of the following utilities will help the administrator troubleshoot DNS specifically?
nslookup
107
The IT Department has learned that a new employee starts on Monday and will need a computer just before the weekend. There is a used PC in the storeroom. A " no operating system found " message appears when the computer is rebooted after a technician installs Windows 10 on the computer with the hard drive partition style set to support Unified Extensible Firmware Interface (UEFI). Determine which of the following scenarios would generate that message.
Damaged hard drive
108
A user has owned the same personal computer for a while and thinks it might be time for an upgrade. Which of the following are upgrade considerations? (Select all that apply.) Application support Hardware compaibility Backup Files PXE support
Application support Hardware compaibility Backup Files
109
A user is about to join a Zoom call and plugs in USB-C headphones with a built-in microphone to the computer's USB 3 port. A message appears that there are "not enough USB controller resources." Evaluate the situation and select the best fix for the problem.
Connect the headphones to a USB 2 port
110
A lawyer opens an email attachment that appears to be a court summons, but it is malware. The law firm's IT consultant quarantines the lawyer's system and then disables System Restore. Which of the following should IT disable?
File History
111
What are their options when a company wants to create and deliver a custom app for their employees without using a public store? (Select all that apply.) Apple Business Manager Developer Mode Bootleg App Store Managed Google Play
Managed Google Play Apple Business Manager
112
A manager for a large corporation is in charge of client machines and is currently undergoing a lifecycle hardware refresh. They want to optimize the machines to be powerful enough to run applications. The manager also wants to be sure that they are not underpowered either. What can the manager use to determine CPU optimization?
Privileged time
113
A helpdesk technician is helping a user experiencing printer problems. After several troubleshooting steps, the technician thinks the user may have installed the wrong driver. Where can they go to install a different one?
Device Manager
114
A user downloaded a script, but the file was in a text file format. The user needs to change the extension to a PowerShell script to run it, but they do not see the extension. Where can the user configure this setting?
File Explorer View tab
115
A computer administrator sets up a client workstation to join a centrally managed network. What options should the administrator configure to do this?
Access work or school
116
A server administrator experiences performance issues on a server and needs to narrow down the source of the problem. The server is an externally facing website with high visibility for the company. The longer the site is having issues, the more customers might notice and possibly damage the company's reputation. What can the administrator use to view and log performance statistics? (Select all that apply.) devmgmt.msc msinfo32.exe perfmon.msc resmon.exe
perfmon.msc resmon.exe