random Flashcards
OBJ-3.1: The Boot Configuration Data (BCD) stores the list of known Windows installations that can be booted from a hard drive. If the Windows installation is not listed, the computer will be unable to boot into Windows. To add a missing Windows installation to the Boot Configuration Database (BCD), you should use the command “_____” and reboot the computer. If the disk cannot be detected, enter the system setup and try modifying settings (or even resetting the default settings). If the system firmware reports the disk’s presence, but Windows still will not boot, use a startup repair tool to open a recovery mode command prompt and use the bootrec tool to repair the drive’s boot information. The “bootrec /fixmbr” command is used to attempt a repair of the master boot record of a drive
bootrec /rebuildbcd
command is used to attempt a repair of the boot sector of a drive
bootrec /fixboot
command is used to attempt a repair of the master boot record of a drive
bootrec /fixmbr
is a command-line disk-partitioning utility available for Windows that is used to view, create, delete, and modify a computer’s disk partitions.
diskpart list
is a form of protection where only the items identified specifically on the list are allowed, whereas all others are denied
allow list
is the application of an access control list to a switch or access point so that only clients with approved MAC addresses connect
MAC filtering
allows a router to take requests from the Internet for a particular application and send them to a designated host on the LAN
Port forwarding
is a type of attack that disguises a communication from an unknown source as being from a known, trusted source.
Spoofing
Spoofing can occur using different methods, such as MAC spoofing, IP spoofing, call spoofing, and others
generates a random number code synchronized to a code on the server. The code changes every 60 seconds or so. This is an example of a one-time password. A SecureID token is an example of a ___ that is produced by RSA.
key fob
is used in applications that need to protect personal information and/or deliver fast, secure transactions, such as transit fare payment cards, government, and corporate identification cards, documents such as electronic passports and visas, and financial payment cards.
smart card
is used to configure the method used by Windows when searching for content within the storage devices. the system will catalog the information on the computer using the words within the files and their metadata to more easily find the content when requested by a user
Indexing Options
Jason wants to configure his Windows 10 laptop to more quickly find files when he is searching its hard drive. Which of the following Control Panel sections should he use to configure his laptop for optimal searching performance?
section of the Control Panel allows technicians to customize the display of files and folders. For example, the ____ can enable or disable the ability to show hidden files, hide file extensions, and more
File Explorer Options
backup scheme uses a set number of tapes and overwrites the oldest tape with the newest information
FIFO
backup rotation scheme is widely used to combine full and incremental backups to reduce backup time and enhance storage security.
GFS
For example, each Monday a full backup can be conducted which becomes the father. Then, each day of the week a son is created by performing an incremental or differential backup. Once per month, a full backup is conducted to become the grandfather. The grandfather is a full backup that is stored off-site once per month. The father is a weekly full backup that is conducted. The son is an incremental or differential backup conducted each day
backup rule states that an organization should create (3) one primary backup and two copies of the data, (2) save the backups to two different types of media, and (1) keep at least one backup copy off-site.
3-2-1
a backup rotation scheme that rotates backup media sets throughout the backup process to minimize wear and failure of tape backup media.
The Tower of Hanoi
For example, when using this method with four backup tapes labeled A, B, C, and D, a total of 16 days of backups can be maintained with just 4 tapes. Tape A is used every odd-numbered day for 16 days. Tape B is used on days 2, 6, 10, and 14. Tape C is used on days 4 and 12. Tape D is used on days 8 and 16. This allows Tape A to be overwritten every other day, while Tapes B is overwritten every four days and Tapes C and D are overwritten every 8 days.
Which of the following backup rotation schemes uses a complex mathematical puzzle to extend the number of unique days of backups stored with the least amount of tapes?
contains information about service load failures, hardware conflicts, driver load failures, and more
system log
contains information regarding application errors
application log