Pratice Flashcards

1
Q

Control Panel applet for managing adapter devices, including IP address information

A

Network Connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

modern settings app used to view network status, change the IP address properties of each adapter, and access other tools.

A

Network & Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Control Panel applet that shows various status information for a current network connection.

A

Network and Sharing Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A recent software installation on a Windows desktop fails. Which internal log file does a technician review to see what may have gone wrong?

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

records events generated during the installation of the operating system. This log assists in determining operating system setup failures.

A

setup log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which internal log contains information about events that affect the core operating system (OS). These include service load failures, hardware conflicts, driver load failures, network issues, and more.

A

System log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

allows the copying of the contents of more than one directory at a time while retaining the directory structure

A

xcopy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Windows file copy utility. This utility is designed to work better with long file names and NTFS attributes.

A

robocopy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A Windows user runs the Performance Monitor tool to check disk activity. What counter is the best option the user can evaluate to understand how busy the disk is at any given time?

A

% disk time

a metric is the percentage of elapsed time that the selected disk drive is busy servicing read or write requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The _________ is a memory metric. represents the number of pages read from or written to disk to resolve hard page faults.

A

page/sec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

displays a summary of any fixed and removable disks.

A

Disk management
(diskmgmt.msc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

allows administrators to view, edit, and troubleshoot the properties of installed hardware, update drivers, and remove or disable devices.

A

Device manager (devmgmt.msc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

To support UNIX/Linux compatibility, Microsoft engineered NTFS to support case-sensitive naming, hard links, and other key features

A

Portable Operating System Interface (POSIX) compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

WHat causes a BSOD (blue screen of death)?

A

Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A user experiences a blue screen of death (BSoD) while using a Windows computer. What does a support technician determine to be a good first troubleshooting step?

A

Remove any newly installed hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A user installs an application on a Linux system by using which method in the operating system?

A

Package manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Linux uses ____ package

A

DEB for YUM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A user needs to restore a problematic Windows system to its original factory state. What approach does the user utilize to achieve the restoration?

A

Recovery partition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

When is Window refresh used

A

to repair the installation and reverts most system settings to the default but can preserve user personalization settings, data files, and apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A user with a problematic Windows system tries to use a previously created system image. How does the user access the image?

A

Repair Disk
Advanced boot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The Instagram app on an Android phone will not launch. Which of the following options could fix the problem?

A

Force Stop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of the following should generate an alert when the account is disabled or altered?

A

Change default administrator account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A telltale sign of a malware infection is when changes occur to system files. Which of the following is likely the result of malware-induced changes to system files?

A

Files that are missing or renamed
Files with date stamps and file sizes that are different from known-good versions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

An _______ file is format for Android

A

.apk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A vulnerability manager is brainstorming different ways to enhance security for their cell phone devices. The company only uses Apple, and so one of the ideas the manager comes up with is to look for anomalistic files that do not belong with Apple for signs of possible malware which did not profile the device and instead just blasted malware out, hoping the operating system would be right. Which of the following would be anomalistic?

.dmg

.pkg

.app

.apk

A

.apk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What enables the integration of Linux and Windows systems.

A

Samba

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Samba allows Linux and Windows systems to do what?

A

file and print sharing protocol to access shared resources on a Windows host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Samba allows Linux and Windows systems to do what?

A

file and print sharing protocol to access shared resources on a Windows host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A threat actor uses a technique that instills statements through an unfiltered user response. What is this technique

A

SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Cross-site scripting (XSS) attack

A

exploits the fact that the browser is likely to trust scripts that appear to come from a site the user has chosen to visit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

SQL injection attack

A

attacker modifies one or more of the basic functions by adding code to some input accepted by the app, causing it to execute the attacker’s own set of SQL queries or parameters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

A Linux server administrator notices a service they do not recognize, although the environment is quite big. They look at the help file for the ksh process, but the documentation seems poor. It does seem to indicate that it provides interactivity, however. What type of program is this?

A

Terminal

ksh - product for Linux shell such as Bash, zsh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A helpdesk manager assesses older Windows 7 computers their company owns and tries to determine available upgrade paths. Which of the following can NOT be upgraded?

Windows 7 Home to Windows 10 Enterprise

Windows Home to Windows 10 Pro

Windows 7 Pro to Windows 10 Home

Windows 7 Home Premium to Windows 10 Pro

A

Windows 7 Home to Windows 10 Enterprise

Users cannot upgrade from a Home to an Enterprise edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

A company uses an element that reminds users when logging in to the company’s device of the current software version. What is this called?

A

Splash screen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Splash screen consists of what?

A

graphic design element consisting of a window containing an image, logo, and the current software version.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which of the following macOS features is used to backup and restore files to an external hard disk?

A

Time Machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Port ____ used for DNS

A

53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Port ___ used for DHCP or automatically assigning IP address

A

67

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Port _____ is used for email clients to retrieve email from a mail server. (POP3)

A

110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Port ____ provides a user with a graphical interface to connect to another computer over a network connection. (RDP)

A

3389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Which version of Windows supports Virtual Desktops?

A

Windows 10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

A coworker is creating a file containing a script. You look over their shoulder and see “#!/bin/bash” as the first line in the file. Based on this, what type of file extension should this script use?

A

.sh

used in Linux and macOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Which type of wireless encryption uses a 40-bit encryption key with an RC4 encryption cipher?

A

WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Which type of wireless encryption uses RC4 cipher and a temporal key integrity protocol (TKIP)

A

WPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Which type of wireless encryption AES cipher with counter mode with cipher-block chaining message authentication protocol (CCMP)

A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Your company recently downloaded and installed the latest audio card driver for all of its workstations. Now, several users have had their usernames and passwords for several websites compromised. You believe the two issues are related. If they are, which of the following was MOST likely contained in the audio card driver file that was installed?

A

Keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Which type of backup generates the recovered files from a complete copy of a file created at some point in time and one or more partial backups created at later times to merge them into the recovered data?

A

Synthetic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Which type of backup only creates a copy of the selected data that has been modified since the last full backup

A

differential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Which type of backup creates a copy of new files and files modified since the last full, incremental, or differential backup

A

Incremental

(takes the least to backup and longest to restore)

49
Q

While investigating a data breach, you discover that the account credentials used belonged to an employee who was fired several months ago for misusing company IT systems. The IT department never deactivated the employee’s account upon their termination. Which of the following categories would this breach be classified as?

A

Insider Threat

50
Q

Which types of attacks are usually used as part of an on-path attack?

A

Spoofing

51
Q

What is on-path attack

A

where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other

52
Q

Which file types are commonly used by network administrators to perform repetitive tasks using a Microsoft proprietary programming language?

A

.vbs

( programming language for Microsoft)

53
Q

Windows file servers commonly hold sensitive files, databases, passwords, and more. What common vulnerability is usually used against a Windows file server to expose sensitive files, databases, and passwords?

A

missing patches

54
Q

You are troubleshooting a user’s laptop that is unable to print a document. You have verified the printer is working and properly connected to the workstation by USB. Which log in Windows 10 would you review to determine if the print spooler service is causing this issue?

A

System log

55
Q

You are configuring a SOHO network and only allowing specific IP addresses to access the network while blocking any IP addresses that are not on the list. Which of the following should be implemented?

A

Allow List

56
Q

What type of filtering would provide access control list to a switch or access point so that only clients with approved MAC addresses connect.

A

MAC Filtering

57
Q

What is the minimum amount of storage space required to install Windows 10 (x64) on a device?

A

32GB

58
Q

What type of malware replicates itself to spread to other computers

A

Worm

59
Q

What type of malware is a malicious software designed to infect computer files or disks when it is activated

A

virus

60
Q

What type of malware ooks legitimate but can take control of your computer

A

trojan

61
Q

A computer was recently infected with a piece of malware. Without any user intervention, the malware is now spreading throughout the corporate network and infecting other computers that it finds. Which type of malware MOST likely infected these computers?

A

worm

62
Q

A home user brought their Windows 10 laptop to the electronics store where you work because they suspect it has a malware infection. You are in the process of remediating the infected system. Which of the following actions should you be performing?

A

Remove, quarantine, or erase the infected files

63
Q

You are troubleshooting a user’s computer. As part of your efforts, you want to install a new login with administrative privileges. Which of the following utilities should you use?

A

Local Users and Groups

64
Q

_________ is a utility used to define and control how programs, network resources, and the operating system operate for users and computers in an organization

A

group policy editor

65
Q

__________ system utility to troubleshoot the Microsoft Windows startup processes

A

System Configuration

66
Q

In an active directory environment, ________ is applied to users or computers based on their membership in sites, domains, or organizational units

A

a group policy

67
Q

_________ used to disable or re-enable software, device drivers, and Windows services that run at startup, or to change boot parameters

A

MSConfig

68
Q

____________ utility that gathers information about your computer and displays a comprehensive list of hardware, system components, and the software environment that can be used to diagnose computer issues.

A

System information (msinfo32.exe)

69
Q

Elizabeth was replacing a client’s security device that protects their screened subnet. The client has an application that allows external users to access the application remotely. After replacing the devices, the external users cannot connect remotely to the application anymore. Which of the following devices was MOST likely misconfigured and is now causing a problem?

A

Firewall

70
Q

What ensures that old data is destroyed by writing to each location on a hard disk drive?

A

Erasing/wiping

71
Q

What resets a disk to its factory condition?

A

low-level formatting

72
Q

Worried about a crash, a user creates a complete backup of the system configuration and data files on their computer. Identify what the user has created.

A

an image

73
Q

An accountant has an unlimited data plan and has set data usage limit triggers for their mobile phone. What concern does the accountant have with high data usage with an unlimited data plan? (Select all that apply.)

A

DDoS and cryptomining

74
Q

Even with an unlimited data plan, setting data usage limits allows a user to be alerted to unusually high data usage associated with being used as part of _________ attack

A

distributed denial of service DDoS

75
Q

Malware encyclopedias are a resource that antivirus vendors often make available to IT professionals. What is their value for IT practitioners? (Select all that apply.)

A

document known malware

and

They provide information about the type, symptoms, purpose, and removal of malware.

76
Q

A user wants to maximize resource dedication to 3D performance and frame rate. Where should the user go to do this?

A

Gaming

77
Q

The Snapchat app on an iOS phone will not close. The user rebooted the device, but that was unsuccessful. What would be the best for the user to try to fix the problem?

A

Uninstall then reinstall

78
Q

What allows a user to download from a vendor’s website and select the correct patch for their device’s make and model?

A

firmware updates

78
Q

What allows a user to download from a vendor’s website and select the correct patch for their device’s make and model?

A

firmware updates

79
Q

A security engineer researches how to make backup and antivirus apps available to their iOS mobile devices. Where should the apps be pushed?

A

Business Manager

80
Q

An employee enters the web address of their local newspaper to check for news on the company, and a site pops up with many click-bait celebrity stories. The employee re-enters the address assuming a misspelling but returns to the same page. When the help desk technician arrives, which of the following troubleshooting steps would be appropriate?

A

Check HOSTS files for malicious entries.

81
Q

A curious user looks through their local logs and sees errors in region-coding copy-protection mechanisms. What type of device is generating these logs?

A

Optical media

81
Q

A curious user looks through their local logs and sees errors in region-coding copy-protection mechanisms. What type of device is generating these logs?

A

Optical media

82
Q

An attacker uses a set of tools designed to gain control of a computer and can create a backdoor with system-level privileges without the user noticing. What is this called?

A

Rootkit

83
Q

An administrator uses a method that uses simultaneous authentication of equals (SAE) instead of the 4-way handshake. What is this method?

A

WPA3

84
Q

A penetration tester conducts the initial reconnaissance phase and is currently targeting externally facing servers for a certain company. Currently, they are trying to enumerate the domain name system (DNS) servers. Which built-in tool will help them perform this?

A

dig

85
Q

An IT technician is installing software on a device that inspects network traffic and accepts or blocks traffic based on a set of rules. What is this called?

A

Firewall

86
Q

A user receives an unsolicited call from a Microsoft support technician during a normal workday. The technician says the antivirus software on the user’s computer alerted Microsoft of a new malware infection. The technician needs to remote into the user’s computer to fix the problem. What is the technician trying to do?

A

circumvent security software

87
Q

A technician is tasked to figure out why a user’s Gmail app will not update on their mobile phone. The technician knows several reasons that would cause this to occur. Which of the following would be one of the reasons for this problem?

A

Storage

88
Q

An installer is implemented using. EXE file. What is this technique performing?

A

Installation of applications

89
Q

occur when an agent cannot resolve the ticket.

A

escalation

89
Q

occur when an agent cannot resolve the ticket.

A

Escalation

90
Q

A security analyst notices a critical incident that has a widespread effect on customers that can eventually involve a potential data breach. The analyst creates a ticket with the vendor and sets the importance in order to trigger a faster response time. What describes what attribute of the ticket the analyst set?

Problem resolution

Severity levels

Escalation levels

Categories

A

Severity levels

91
Q

A technician configures a method to run some server application from a network and make it accessible to the internet. What is this method?

A

Port forwarding

92
Q

the server always assigns the same IP address to the host. A user can usually choose which IP address this should be. What is this method?

A

DHCP reservation

93
Q

A technician uses a backup method that reflects how much lost work can be tolerated. What is this method?

A

Frequency

(period between backup jobs)

94
Q

An administrator for Apple endpoints has heard about roaming profiles on Windows where users can sync certain settings from different devices. Which of the following offers a similar functionality?

A

iCloud Keychain

(admin access )

95
Q

What feature helps users manage passwords for these accounts, other websites, and Wi-Fi networks. The regular keychain is just local.

A

Keychain

(users only)

96
Q

A customer has opened a ticket for a problem to be fixed, and when the customer opens the ticket, there will be a record that shows what?

A

Proper documentation

97
Q

What uses domain names of components loading on the web page against a vast blacklist?

A

Ad blocker

98
Q

What type of data breach can be associated with a specific person or use an anonymized or de-identified data set for analysis and research

A

Healthcare data

99
Q

An IT manager is in charge of client machine administration. The manager wants to test various boot settings before applying them to the environment. Which tool can the manager use to accomplish this best?

A

msconfig.exe

100
Q

What will block third-party cookies and enable strict tracking protection?

Ad blockers

Pop-up blockers

Private browsing mode

Clearing cache

A

Private browsing mode

101
Q

An intern for a Windows server team is watching a server administrator verify the authenticity and integrity of an installer. Where did the administrator most likely get it from?

A

Internet download

102
Q

Which of the following scenarios would result in a website having an untrusted or invalid certificate? (Select all that apply.)

The certificate is issued by a trusted CA.

The certificate is revoked.

The certificate has expired.

The certificate is self-signed.

A

The certificate is revoked.

The certificate has expired.

The certificate is self-signed.

103
Q

A server administrator migrates their environment from physical servers to a virtualized environment. The administrator wants to install new virtual machine operating systems. What is the best approach to use regarding deploying virtualized OSs?

A

ISOs

104
Q

An administrator uses a method that assigns permissions and rights to a collection of user accounts. What is this called?

A

Security group

105
Q

A client uses this software that allows access to a given computer. What is this software?

A

Screen-sharing

106
Q

A network administrator troubleshoots domain name system (DNS) issues that a particular user is having. Which of the following utilities will help the administrator troubleshoot DNS specifically?

A

nslookup

107
Q

The IT Department has learned that a new employee starts on Monday and will need a computer just before the weekend. There is a used PC in the storeroom. A “ no operating system found “ message appears when the computer is rebooted after a technician installs Windows 10 on the computer with the hard drive partition style set to support Unified Extensible Firmware Interface (UEFI). Determine which of the following scenarios would generate that message.

A

Damaged hard drive

108
Q

A user has owned the same personal computer for a while and thinks it might be time for an upgrade. Which of the following are upgrade considerations? (Select all that apply.)

Application support
Hardware compaibility
Backup Files
PXE support

A

Application support
Hardware compaibility
Backup Files

109
Q

A user is about to join a Zoom call and plugs in USB-C headphones with a built-in microphone to the computer’s USB 3 port. A message appears that there are “not enough USB controller resources.” Evaluate the situation and select the best fix for the problem.

A

Connect the headphones to a USB 2 port

110
Q

A lawyer opens an email attachment that appears to be a court summons, but it is malware. The law firm’s IT consultant quarantines the lawyer’s system and then disables System Restore. Which of the following should IT disable?

A

File History

111
Q

What are their options when a company wants to create and deliver a custom app for their employees without using a public store? (Select all that apply.)

Apple Business Manager

Developer Mode

Bootleg App Store

Managed Google Play

A

Managed Google Play

Apple Business Manager

112
Q

A manager for a large corporation is in charge of client machines and is currently undergoing a lifecycle hardware refresh. They want to optimize the machines to be powerful enough to run applications. The manager also wants to be sure that they are not underpowered either. What can the manager use to determine CPU optimization?

A

Privileged time

113
Q

A helpdesk technician is helping a user experiencing printer problems. After several troubleshooting steps, the technician thinks the user may have installed the wrong driver. Where can they go to install a different one?

A

Device Manager

114
Q

A user downloaded a script, but the file was in a text file format. The user needs to change the extension to a PowerShell script to run it, but they do not see the extension. Where can the user configure this setting?

A

File Explorer View tab

115
Q

A computer administrator sets up a client workstation to join a centrally managed network. What options should the administrator configure to do this?

A

Access work or school

116
Q

A server administrator experiences performance issues on a server and needs to narrow down the source of the problem. The server is an externally facing website with high visibility for the company. The longer the site is having issues, the more customers might notice and possibly damage the company’s reputation. What can the administrator use to view and log performance statistics? (Select all that apply.)

devmgmt.msc

msinfo32.exe

perfmon.msc

resmon.exe

A

perfmon.msc

resmon.exe