random 2 Flashcards

1
Q

you will see every program configured to start up when Windows is booted up. This can be used to disable unwanted programs from launching during the boot-up process.

A

task manager: startup tab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

utility that gathers information about your computer and displays a comprehensive list of hardware, system components, and the software environment that can be used to diagnose computer issues

A

system information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

shows a log of application and system messages, including errors, information messages, and warnings

A

event viewer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

used to prevent malware from damaging a PC by blocking the automatic installation of unauthorized apps and preventing inadvertent changes to system settings.

A

User account control (UAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

only creates a copy of new files and files modified since the last full, incremental, or differential backup.
Unfortunately, it also takes the most time to restore since you have to first restore the full backup, then any differential and incremental backups until all your data is restored
Which of the following types of backup requires the LEAST time to complete a backup?

A

Incremental

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

only creates a copy of the selected data that has been modified since the last full backup. It is a good compromise in speed

A

Differential backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

the process of generating a file from a complete copy of a file created at some past time and one or more incremental copies created at later times.
merged or synthesized by a specialized application program from the original file and one or more modifications to it.

A

Synthetic backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

llows Windows 10 to find other computers and devices on a network. This feature is automatically turned on when connected to private networks like the one in your home or workplace.

A

Network discovery.
Network discovery is turned off when you’re connected to public networks that shouldn’t be trusted, and you should not allow your PC to be discoverable on those networks. If your Windows 10 computer or device can’t view other computers on the network, two things are probably at fault: either the incorrect network profile is assigned (public instead or private), or network discovery is disabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

tool is used to display the drive status, mount the drive, initialize the drive, and create/split/extend/shrink drive partitions. The utility displays a summary of any fixed and removable drives attached to the system.

A

disk management.
From the Disk Management console, you can see the S.M.A.R.T. status of each hard disk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

utility in Windows that is used to monitor the activities on CPU and memory activity on a computer.
can only monitor the resource utilization, but it cannot manage or terminate those processes.

A

performance monitor (perfmon.msc)
is used to view performance data either in real-time or from a log file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

an updated file system for optical media supporting multisession writing

A

The Universal Disk Format (UDF or ISO 13346)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

iOS

A

only be run on iPhones and iPADS, not laptops.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Andriod

A

can run on laptops

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

is designed to damage, disrupt, steal, or in general, inflict some other harmful action on your data or network

A

Trojan
The most common form of a trojan is a Remote Access Trojan (RAT), which allows an attacker to control a workstation or steal information remotely. To operate, a trojan will create numerous processes that run in the background of the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

malicious software designed to infect computer files or disks when it is activated.
such as deleting files or changing system settings

A

virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

linux command to delete all the files and directories

A

rm -rf/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

.

A

only begin deleting from the current working directory and then delete all files and folders further down the directory structure, not the entire file system. in linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

You are troubleshooting an issue with a Windows desktop and need to display the machine’s active TCP connections. Which of the following commands should you use?

A

netstat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

command is used to display active TCP connections, ports on which the computer is listening, Ethernet statistics, the IP routing table, IPv4 statistics (for the IP, ICMP, TCP, and UDP protocols), and IPv6 statistics (for the IPv6, ICMPv6, TCP over IPv6, and UDP over IPv6 protocols) on a Windows machine. This is a useful command when determining if any malware has been installed on the system and maybe maintaining a remote connection with a command and control server.

A

netstat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

displays all current TCP/IP network configuration values on a given system

A

ipconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

command is used to test a host’s reachability on an Internet Protocol network

A

ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

command is used to connect to, remove, and configure connections to shared resources such as mapped drives and network printer

A

net use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the following wireless technologies allows a wireless device to automatically be configured for a SOHO wireless network with the push of a button?

A

WPS

24
Q

a mechanism for auto-configuring a WLAN securely for home users. On compatible equipment, users push a button on the access point and connect adapters to associate them securely

A

WPS
WPS is subject to brute force attacks against the PIN used to secure them, making them vulnerable to attack

25
Q

uses the RC4 cipher and a temporal key integrity protocol (TKIP) to overcome the vulnerabilities in the older WEP protection scheme

A

WPA

26
Q

replaced the original version of WPA after the completion of the 802.11i security standard. ____ features an improved method of key distribution and authentication for enterprise networks, though the pre-shared key method is still available for home and small office networks. uses the improved AES cipher with counter mode with cipher-block chaining message authentication protocol (CCMP) for encryption.

A

WPA2

27
Q

is the propagation of radio waves at different frequencies and wavelengths. For example, Wi-Fi network products use a frequency of either 2.4 GHz or 5 GHz.

A

Radiofrequency

28
Q

utility that gathers information about your computer and displays a comprehensive list of hardware, system components, and the software environment that can be used to diagnose computer issues

A

System information (msinfo32.exe)

29
Q

utility used to display information about the use of hardware (CPU, memory, disk, and network) and software (file handles and modules) resources in real-time.
helps check the performance counters of specific resources and decide a course of action to improve the performance

A

resource monitor

30
Q

utility used to view and control the hardware attached to the computer. will highlight a piece of hardware that is not working so that a technician can repair or replace it.

A

device manager (devmgmt.msc)

31
Q

group include those rights and permissions that are required to allow members of the _____ group to install devices and to install programs that do not modify the operating system files.

A

power users

32
Q

Which of the following is an APIPA or link-local address?

A

169.254.64.23

33
Q

Which of the following file types are commonly used to create simple scripts in the Windows command-line environment?

A

.bat

34
Q

allow you to perform various functions. These functions include automation of commands and tasks of system administration and troubleshooting, creating simple applications, and manipulating text or files

A

shell scripts .sh

35
Q

You believe the video card driver may be at fault. Which log would you review to determine if the video card driver has been updated recently

A

system log
OBJ-3.1: If the driver was recently updated and is now causing issues, it will most likely be documented in the system log. The system log contains information about service load failures, hardware conflicts, driver load failures, and more

36
Q

Which of the following commands should you use to determine if the internal shared drive is mapped to your computer properly?

A

net use
OBJ-1.2: The net use command is used to connect to, remove, and configure connections to shared resources such as mapped drives and network printers. For example, “net use S: \SERVER\DATA /persistent:yes” would map the DATA folder on the SERVER to your local S: drive on a Windows computer

37
Q

command is used to test a host’s reachability on an Internet Protocol network

A

ping

38
Q

diagnostic utility determines the route to a destination by sending Internet Control Message Protocol (ICMP) echo packets to the destination.

A

tracert

39
Q

a type of installation that attempts to replace the existing version of the operating system files with a new copy of the same version. installation is useful when trying to repair a Windows computer that will not boot or when you believe the system files have become corrupted. installation will only affect the system files and not any of the user’s settings, customizations, or applications

A

Repair installation

40
Q

an installation of the new operating system on top of an existing version of the operating system. will preserve the applications, user settings, and data files that already exist on the computer.

A

In-place upgrade
nothing wrong with computer

41
Q

a type of installation that will recopy the system files and revert most system settings to their default configuration while preserving user personalization settings, data files, and applications installed through the Windows Store. Any applications installed outside of the Windows Store, though, will be deleted

A

refresh installlation

42
Q

a password-based authentication and password-authenticated key agreement method used in WPA3 that replaced the 4-way handshake used in WPA-based wireless networks. is also known as the dragonfly handshake

A

Simultaneous Authentication of Equals (SAE)
Which of the following features of WPA3 is used to provide a password-based authentication using the dragonfly handshake instead of the older WPA 4-way handshake?

43
Q

windows 10 supports up to 6TB of RAM

A

Enterprise

43
Q

windows 10 supports up to 2TB of RAM

A

Pro

44
Q

Which of the following allows a user to save their current session to memory and put a Windows 10 computer into a minimal power state?

A

sleep

45
Q

Which of the following types would support encryption for traffic being sent and received over the network while still allowing users to connect to the open network without a password, passphrase, or digital certificate?

A

WPA

46
Q

Which of the following MacOS features allows you to use multiple desktops or spaces on a single system?

A

Misson Control

47
Q

macOS feature for managing applications from the desktop that is similar to the Windows taskbar.

A

Dock

48
Q

The Hypertext Transfer Protocol (HTTP) uses port

A

80
is an application layer protocol for distributed, collaborative, hypermedia information systems using unencrypted data transfer. If the outbound port 80 is not open, then users will not be able to connect to a remote web server

49
Q

The Domain Name System (DNS) uses port

A

53
translates human readable domain names (for example, www.amazon.com) to machine readable IP addresses.
is a hierarchical and decentralized naming system for computers, services, or other resources connected to the Internet or a private network. If the outbound port 53 is not open, then the users will be unable to conduct a DNS name resolution and determine the IP address of the given web server based on its domain name.

50
Q

Which mitigation provides the best return on investment by mitigating the most vulnerable attack vector in an enterprise network?

A

provide end-user awareness training for office staff

51
Q

The seven steps of the malware removal procedures

A

(1) Investigate and verify malware symptoms, (2) Quarantine the infected systems, (3) Disable System Restore in Windows, (4) Remediate the infected systems, update anti-malware software, scan the system, and use removal techniques (e.g., safe mode, pre-installation environment), (5) Schedule scans and run updates, (6) Enable System Restore and create a restore point in Windows, and (7) Educate the end user.

52
Q

The workstation will utilize an Intel x86 processor. Which of the following editions of Windows will support installation on this workstation?

A

All editions of Windows 10 are available in either x86 (32-bit) or x64 (64-bit) versions

53
Q

Which of the following BEST describes how a DHCP reservation works?

A

by matching a MAC address to an IP address within the DHCP scope. When the client requests an IP address by sending a message on the network to the DHCP server, the DHCP server will assign an IP from its DHCP scope to the client and reserve it based on its MAC address. DHCP reservations allow the DHCP server to pre-set an IP address to a specific client based on its MAC address. This ensures that the client will always get the same IP address from the DHCP server when it connects to the network. DHCP reservations are usually used with servers or printers on your internal network and are rarely used with end-user or client devices.

54
Q

Your organization has recently suffered a data breach due to a server being exploited. As a part of the remediation efforts, the company wants to ensure that the default administrator password on each of the 1250 workstations on the network is changed. What is the easiest way to perform this password change requirement?

A

Deploy a new group policy. A group policy is used to manage Windows systems in a Windows network domain environment utilizing a Group Policy Object (GPO). GPOs can include many settings related to credentials, such as password complexity requirements, password history, password length, and account lockout settings. You can force a reset of the default administrator account password by using a group policy update.

55
Q
A