random Flashcards

1
Q

OBJ-3.1: The Boot Configuration Data (BCD) stores the list of known Windows installations that can be booted from a hard drive. If the Windows installation is not listed, the computer will be unable to boot into Windows. To add a missing Windows installation to the Boot Configuration Database (BCD), you should use the command “_____” and reboot the computer. If the disk cannot be detected, enter the system setup and try modifying settings (or even resetting the default settings). If the system firmware reports the disk’s presence, but Windows still will not boot, use a startup repair tool to open a recovery mode command prompt and use the bootrec tool to repair the drive’s boot information. The “bootrec /fixmbr” command is used to attempt a repair of the master boot record of a drive

A

bootrec /rebuildbcd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

command is used to attempt a repair of the boot sector of a drive

A

bootrec /fixboot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

command is used to attempt a repair of the master boot record of a drive

A

bootrec /fixmbr

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

is a command-line disk-partitioning utility available for Windows that is used to view, create, delete, and modify a computer’s disk partitions.

A

diskpart list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

is a form of protection where only the items identified specifically on the list are allowed, whereas all others are denied

A

allow list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

is the application of an access control list to a switch or access point so that only clients with approved MAC addresses connect

A

MAC filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

allows a router to take requests from the Internet for a particular application and send them to a designated host on the LAN

A

Port forwarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

is a type of attack that disguises a communication from an unknown source as being from a known, trusted source.

A

Spoofing
Spoofing can occur using different methods, such as MAC spoofing, IP spoofing, call spoofing, and others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

generates a random number code synchronized to a code on the server. The code changes every 60 seconds or so. This is an example of a one-time password. A SecureID token is an example of a ___ that is produced by RSA.

A

key fob

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is used in applications that need to protect personal information and/or deliver fast, secure transactions, such as transit fare payment cards, government, and corporate identification cards, documents such as electronic passports and visas, and financial payment cards.

A

smart card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

is used to configure the method used by Windows when searching for content within the storage devices. the system will catalog the information on the computer using the words within the files and their metadata to more easily find the content when requested by a user

A

Indexing Options
Jason wants to configure his Windows 10 laptop to more quickly find files when he is searching its hard drive. Which of the following Control Panel sections should he use to configure his laptop for optimal searching performance?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

section of the Control Panel allows technicians to customize the display of files and folders. For example, the ____ can enable or disable the ability to show hidden files, hide file extensions, and more

A

File Explorer Options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

backup scheme uses a set number of tapes and overwrites the oldest tape with the newest information

A

FIFO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

backup rotation scheme is widely used to combine full and incremental backups to reduce backup time and enhance storage security.

A

GFS
For example, each Monday a full backup can be conducted which becomes the father. Then, each day of the week a son is created by performing an incremental or differential backup. Once per month, a full backup is conducted to become the grandfather. The grandfather is a full backup that is stored off-site once per month. The father is a weekly full backup that is conducted. The son is an incremental or differential backup conducted each day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

backup rule states that an organization should create (3) one primary backup and two copies of the data, (2) save the backups to two different types of media, and (1) keep at least one backup copy off-site.

A

3-2-1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a backup rotation scheme that rotates backup media sets throughout the backup process to minimize wear and failure of tape backup media.

A

The Tower of Hanoi
For example, when using this method with four backup tapes labeled A, B, C, and D, a total of 16 days of backups can be maintained with just 4 tapes. Tape A is used every odd-numbered day for 16 days. Tape B is used on days 2, 6, 10, and 14. Tape C is used on days 4 and 12. Tape D is used on days 8 and 16. This allows Tape A to be overwritten every other day, while Tapes B is overwritten every four days and Tapes C and D are overwritten every 8 days.
Which of the following backup rotation schemes uses a complex mathematical puzzle to extend the number of unique days of backups stored with the least amount of tapes?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

contains information about service load failures, hardware conflicts, driver load failures, and more

A

system log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

contains information regarding application errors

A

application log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

contains a record of the events generated during the Windows installation or upgrade process

A

setup log

20
Q

used to save the current session to disk before powering off the computer to save battery life when the system is not being used. The computer takes longer to start up

A

Hibernate mode

21
Q

Control Panel allows technicians to customize how a computer manages its power to either conserve energy at the expense of performance or to maximize performance at the expense of energy savings by creating a power plan. The USB selective suspend feature allows the hub driver to suspend an individual port without affecting the operation of the other ports on the hub. Selective suspension of USB devices is helpful when using a laptop computer as it helps to conserve battery power by powering off USB ports that are not needed at the time.

A

Jason wants to configure his Windows 10 laptop to suspend individual USB ports when not in use. Which of the following Control Panel sections should he use to set the USB selective suspend feature?
The USB selective suspend feature is located in the Power Options section of the Control Panel. Power Options

22
Q

Your company wants to provide a secure SSO solution for accessing both the corporate wireless network and its network resources. Which of the following technologies should be used?

A

With RADIUS and SSO configured, users on the network can provide their user credentials one time when they initially connect to the wireless access point or another RADIUS client and are then automatically authenticated to all of the network’s resources. The Remote Authentication Dial-in User Service (RADIUS) is used to manage remote and wireless authentication infrastructure. Users supply authentication information to RADIUS client devices, such as wireless access points. The client device then passes the authentication data to an AAA (Authentication, Authorization, and Accounting) server that processes the request. The Terminal Access Controller Access Control System (TACACS+) is a proprietary alternative to RADIUS developed by Cisco for handling authentication

23
Q

BOOTMGR is missing

A

bootrec /fixboot

24
Q

used to check the file system and file system metadata of a volume for logical and physical errors. If used without parameters, ____ displays only the status of the volume and does not fix any errors. If used with the /f, /r, /x, or /b parameters, it fixes errors on the volume

A

chkdsk command

25
Q

a utility in Windows that allows users to scan for and restore corrupted Windows system files from the command line

A

SFC (system file checker)

26
Q

Windows 10 (32-bit)

A

1 GHz processor, 1 GB of RAM, and at least 32 GB of hard drive space

27
Q

windows 10 (64-bit)

A

1 GHz processor, 2 GB of RAM, and at least 32 GB of hard drive space

28
Q

windows 11 (64-bit)

A

1 GHz processor, 4 GB of RAM, and at least 64 GB of hard drive space.

29
Q

command is a Windows command-line tool that is used to locate spots that have network latency and network loss between a client and a destination

A

pingpath
The advantages of PathPing over ping and traceroute are that each node is pinged as the result of a single command and that the behavior of nodes is studied over an extended period, rather than the default ping sample of four messages or default traceroute single route trace

30
Q

is a type of attack on a network in which an attacker uses their confidence and their victims’ gullibility to gain access. It is the only type of attack on a network that is directed towards the human element. The human interaction with the network administrator makes the other three answers incorrect

A

social engineering

31
Q

The Connections tab

A

in the Internet Options is used to set up the dial-up and VPN settings and the LAN settings. Under the LAN settings, you can configure the proxy server settings for the system.

32
Q

malicious software designed to infect computer files or disks when it is activated. A ____ may be programmed to carry out other malicious actions, such as deleting files or changing system settings.

A

virus

33
Q

a clandestine computer program designed to provide continued privileged access to a computer while actively hiding its presence. A ____ is generally a collection of tools that enabled administrator-level access to a computer or network. They can often disguise themselves from detection by the operating system and anti-malware solutions

A

rootkit
is suspected on a machine, it is best to reformat and reimage the system

34
Q

is a pre-release of a software product that is given out to software developers to test and modify their existing products to the upcoming version of an operating system or application

A

developer release

35
Q

a concept in software development where an application is frequently updated through the release of new features over time.

A

rolling release

36
Q

contract that outlines the detailed terms under which a service is provided, including reasons the contract may be terminated

A

service level agreement (SLA)

37
Q

document stipulating constraints and practices that a user must agree to for access to a corporate network or the internet

A

acceptable use policy (AUP)

38
Q

document that outlines all the work that is to be performed, as well as the agreed-upon deliverables and timeline

A

statement of work (SOW) or scope of work

39
Q

preliminary or exploratory agreement to express an intent to work together that is not legally binding and does not involve monetary exchange

A

memorandum of understanding (MOU)

40
Q

large capacitors that could retain high electricity levels even after being disconnected. A ______ is considered a field-replaceable part. It should not be fixed. It should simply be replaced.

A

power supply.
A technician should never open a power supply or stick anything into its interior for fear of electrocution.
Which of the following devices should you NEVER disassemble during troubleshooting due to the risk of electrocution?

41
Q

software solution that detects and prevents sensitive information from being stored on unauthorized systems or transmitted over unauthorized networks

A

Data loss prevention (DLP)

42
Q

the European Union that creates provisions and requirements to protect the personal data of European Union (EU) citizens. Transfers of personal data outside the EU Single Market are restricted unless protected by like-for-like regulations, such as the US’s Privacy Shield requirements

A

General Data Protection Regulation (GDPR)

43
Q

attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources

A

Distributed Denial of Service (DDoS)

44
Q

many internet-connected devices, each of which is running one or more bots

A

botnet

45
Q

computer or workstation that a remote attacker has accessed and set up to forward transmissions (including spam and viruses) to other computers on the internet

A

zombie (also known as a bot)