random Flashcards
OBJ-3.1: The Boot Configuration Data (BCD) stores the list of known Windows installations that can be booted from a hard drive. If the Windows installation is not listed, the computer will be unable to boot into Windows. To add a missing Windows installation to the Boot Configuration Database (BCD), you should use the command “_____” and reboot the computer. If the disk cannot be detected, enter the system setup and try modifying settings (or even resetting the default settings). If the system firmware reports the disk’s presence, but Windows still will not boot, use a startup repair tool to open a recovery mode command prompt and use the bootrec tool to repair the drive’s boot information. The “bootrec /fixmbr” command is used to attempt a repair of the master boot record of a drive
bootrec /rebuildbcd
command is used to attempt a repair of the boot sector of a drive
bootrec /fixboot
command is used to attempt a repair of the master boot record of a drive
bootrec /fixmbr
is a command-line disk-partitioning utility available for Windows that is used to view, create, delete, and modify a computer’s disk partitions.
diskpart list
is a form of protection where only the items identified specifically on the list are allowed, whereas all others are denied
allow list
is the application of an access control list to a switch or access point so that only clients with approved MAC addresses connect
MAC filtering
allows a router to take requests from the Internet for a particular application and send them to a designated host on the LAN
Port forwarding
is a type of attack that disguises a communication from an unknown source as being from a known, trusted source.
Spoofing
Spoofing can occur using different methods, such as MAC spoofing, IP spoofing, call spoofing, and others
generates a random number code synchronized to a code on the server. The code changes every 60 seconds or so. This is an example of a one-time password. A SecureID token is an example of a ___ that is produced by RSA.
key fob
is used in applications that need to protect personal information and/or deliver fast, secure transactions, such as transit fare payment cards, government, and corporate identification cards, documents such as electronic passports and visas, and financial payment cards.
smart card
is used to configure the method used by Windows when searching for content within the storage devices. the system will catalog the information on the computer using the words within the files and their metadata to more easily find the content when requested by a user
Indexing Options
Jason wants to configure his Windows 10 laptop to more quickly find files when he is searching its hard drive. Which of the following Control Panel sections should he use to configure his laptop for optimal searching performance?
section of the Control Panel allows technicians to customize the display of files and folders. For example, the ____ can enable or disable the ability to show hidden files, hide file extensions, and more
File Explorer Options
backup scheme uses a set number of tapes and overwrites the oldest tape with the newest information
FIFO
backup rotation scheme is widely used to combine full and incremental backups to reduce backup time and enhance storage security.
GFS
For example, each Monday a full backup can be conducted which becomes the father. Then, each day of the week a son is created by performing an incremental or differential backup. Once per month, a full backup is conducted to become the grandfather. The grandfather is a full backup that is stored off-site once per month. The father is a weekly full backup that is conducted. The son is an incremental or differential backup conducted each day
backup rule states that an organization should create (3) one primary backup and two copies of the data, (2) save the backups to two different types of media, and (1) keep at least one backup copy off-site.
3-2-1
a backup rotation scheme that rotates backup media sets throughout the backup process to minimize wear and failure of tape backup media.
The Tower of Hanoi
For example, when using this method with four backup tapes labeled A, B, C, and D, a total of 16 days of backups can be maintained with just 4 tapes. Tape A is used every odd-numbered day for 16 days. Tape B is used on days 2, 6, 10, and 14. Tape C is used on days 4 and 12. Tape D is used on days 8 and 16. This allows Tape A to be overwritten every other day, while Tapes B is overwritten every four days and Tapes C and D are overwritten every 8 days.
Which of the following backup rotation schemes uses a complex mathematical puzzle to extend the number of unique days of backups stored with the least amount of tapes?
contains information about service load failures, hardware conflicts, driver load failures, and more
system log
contains information regarding application errors
application log
contains a record of the events generated during the Windows installation or upgrade process
setup log
used to save the current session to disk before powering off the computer to save battery life when the system is not being used. The computer takes longer to start up
Hibernate mode
Control Panel allows technicians to customize how a computer manages its power to either conserve energy at the expense of performance or to maximize performance at the expense of energy savings by creating a power plan. The USB selective suspend feature allows the hub driver to suspend an individual port without affecting the operation of the other ports on the hub. Selective suspension of USB devices is helpful when using a laptop computer as it helps to conserve battery power by powering off USB ports that are not needed at the time.
Jason wants to configure his Windows 10 laptop to suspend individual USB ports when not in use. Which of the following Control Panel sections should he use to set the USB selective suspend feature?
The USB selective suspend feature is located in the Power Options section of the Control Panel. Power Options
Your company wants to provide a secure SSO solution for accessing both the corporate wireless network and its network resources. Which of the following technologies should be used?
With RADIUS and SSO configured, users on the network can provide their user credentials one time when they initially connect to the wireless access point or another RADIUS client and are then automatically authenticated to all of the network’s resources. The Remote Authentication Dial-in User Service (RADIUS) is used to manage remote and wireless authentication infrastructure. Users supply authentication information to RADIUS client devices, such as wireless access points. The client device then passes the authentication data to an AAA (Authentication, Authorization, and Accounting) server that processes the request. The Terminal Access Controller Access Control System (TACACS+) is a proprietary alternative to RADIUS developed by Cisco for handling authentication
BOOTMGR is missing
bootrec /fixboot
used to check the file system and file system metadata of a volume for logical and physical errors. If used without parameters, ____ displays only the status of the volume and does not fix any errors. If used with the /f, /r, /x, or /b parameters, it fixes errors on the volume
chkdsk command