RG: Practice Exam 1 Flashcards

1
Q

Which command can be used to add, remove, and make changes to the user accounts on a computer?

A. NET USE

B. NET USER

C. NET SEND

D. NET FILE

A

A. NET USE

NETUSER is used to add, remove, and make changes to the user accounts on a computer. NET USE is used to connect to, remove, and configure connections to shared resources. NETSEND is used to send messages to users, computers, and aliases on the network. NETFILE is used to show a list of open files on a server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following prevents the denial of a digital signature?

A. Nonrepudiation

B. Negation

C. Confidentiality

D. None of the above

A

A. Nonrepudiation

Nonrepudiation prevents the denial of a digital signature. Confidentiality entails ensuring that data expected to remain private is seen only by those who should see it. Confidentiality is implemented through authentication and access controls. Negation is the elimination or countering of an action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which switch is used with IPCONFIG to show all the information related to the network cards and not just the summary information?

A. /VIEW

B. /ALL

C. /SHOW

D. /TRACE

A

B. /ALL

The /ALL switch with IPCONFIG shows all the information related to the network cards and not just the summary information. None of the other options is a valid IPCONFIG switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which switch is used to set the number of ICMP echo requests to send?

A. -t

B. -a

C. -n

D. -f

A

C. -n

The -a switch will resolve, if possible, the hostname of an IP address target. You can use the -t switch with PING to indicate that it should continue to ping the host without stopping until you break out of it. The -n switch sets the number of ICMP echo requests to send, from 1 to 4294967295. The -f switch prevents ICMP echo requests from being fragmented by routers between you and the target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which switch is used with DEFRAG to force defragmentation even when disk space is low?

A. /A

B. /F

C. /V

D. /Z

A

B. /F

The /F switch is used with DEFRAG to force defragmentation even when disk space is low.

The /A option performs analysis on the specified volumes.

The /F option does not exist.

The /V option prints verbose output containing the fragmentation statistics.

There is no /Z option.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When you begin to collect evidence, you must keep track of that evidence at all times and show who has it, who has seen it, and where it has been. What is this known as?

A. Annulment

B. Reinforcement

C. Chain of custody

D. Compliance

A

C. Chain of custody

Tracking and documenting who has had or seen evidence, and where it has been, is known as the chain of custody. Annulment, reinforcement, and compliance are not terms used when discussing evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which class of fire extinguisher is meant for electrical fires?

A. Class A

B. Class B

C. Class C

D. None of the above

A

C. Class C

Three major classes of fire extinguishers are available, one for each type of flammable substance: A for wood and paper fires, B for flammable liquids, and C for electrical fires.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is a command that enables you to verify the route to a remote host?

A. NETSTAT

B. NSLOOKUP

C. TRACERT

D. ECHOOFF

A

C. TRACERT

TRACERT is a command that enables you to verify the route to a remote host.

NETSTAT is used to display TCP/IP statistics.

NSLOOKUP is used to troubleshoot DNS issues.

ECHOOFF is used to turn off the display of commands in a batch file as they are executed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

On which tab of MSConfig can you choose the startup type?

A. Boot

B. General

C. Services

D. Startup

A

B. General

You can choose the startup type on the General tab. There are three sets of options: Normal, Diagnostic, and Selective. The Boot tab is used to manage the boot process of the system. The Services tab is used set the services that run at startup. The Startup tab directs you to the Task Manager.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which switch can be used with IPCONFIG to obtain a new IP address?

A. /RELEASE

B. /NEW

C. /IP

D. /RENEW

A

D. /RENEW

The /RENEW switch can be used with the IPCONFIG command to obtain a new IP address. In the case where you have not preceded the IPCONFIG /renew command with the IPCONFIG /release command, it renews the current address.

The /release switch releases the current address.

There is no /new or /IP switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which NTFS permission allows the user to navigate the entire directory structure, view the contents of the directory, view the contents of any files in the directory, and see ownership and attributes?

A. List Folder

B. Read

C. Full Control

D. Write

A

B. Read

The Read permission allows the user to navigate the entire directory structure, view the contents of the directory, view the contents of any files in the directory, and see ownership and attributes. The List folder permission allows all that read does plus Travers Folder/Execute File. Full Control allows all permissions. Write permission includes Create files/write data, Create folders/append data, Write attributes, Write extended attributes, Read, and Synchronize.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which command is like COPY but also duplicates any subfolders?

A. XCOPY

B. SCOPY

C. DCOPY

D. GCOPY

A

A. XCOPY

XCOPY is like COPY, but it also duplicates any subfolders.

There is no SCOPY or DCOPY command.

GCOPY is a file copy utility under GNU Copyleft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the result of pressing Ctrl+Shift+Esc in Windows 7?

A. You toggle between windows.

B. Flip 3D opens.

C. Task Manager opens.

D. The screen lock is activated.

A

C. Task Manager opens.

To get to the Task Manager directly in any of the Windows versions, you can press Ctrl+Shift+Esc. Windows+P is used to toggle between windows. Press Control+Shift+Escape to launch the Task Manager, and the screen lock is activated with Ctrl+Alt+Del.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which switch is used with CHKDSK to tell it to fix errors that it finds?

A. /R

B. /C

C. /S

D. /A

A

A. /R

The /R (or /F) switch is used with CHKDSK to tell it to fix errors that it finds.

The /R option tells chkdsk to locate bad sectors and recover any readable information from them.

The /C option tells the command to run faster by skipping over certain regular checks including cycles within the folder structure to reduce the amount of time that the chkdsk command runs.

The /S option does not exist.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is a type of badge or card that gives you access to resources?

A. Smart card

B. Rootkit

C. Degaussing tool

D. MAC filter

A

A. Smart card

A smart card is a type of badge or card that gives you access to resources, including buildings, parking lots, and computers. It contains information about your identity and access privileges. A rootkit is a collection of hacking tools that have as their aim, achieving root status on the device. A degaussing tool is used to remove data from a drive. A MAC filter is used to allow only certain MAC addresses through a switch or access point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is a command that can be used to troubleshoot DNS issues?

A. NETSTAT

B. NSLOOKUP

C. TRACERT

D. ECHOOFF

A

B. NSLOOKUP

The NSLOOKUP command is used to troubleshoot DNS issues on a device.

TRACERT is a command that enables you to verify the route to a remote host.

NETSTAT is used to display TCP/IP statistics.

ECHOOFF is used to turn off the display of commands in a batch file as they are executed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following is known as the System Configuration Editor?

A. Edit

B. MSConfig

C. MSN

D. Regedit

A

B. MSConfig

The MSConfig utility, known as the System Configuration Editor, helps troubleshoot startup problems by allowing you to selectively disable individual items that normally are executed at startup.

There is no utility called Edit, nor is there one called MSN.

Regedit is a registry editing tool used in Windows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which type of networking utilizes POTS?

A. DSL

B. ISDN

C. Cable

D. Dial-up

A

D. Dial-up

With dial-up, you simply add a modem to your computer and connect to an Internet service provider (ISP) over the existing phone lines—also known as the Plain Old Telephone System (POTS) or the Public Switched Telephone Network (PSTN).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

To connect to the C:\SPENCER directory as MKTING, which command would you use?

A. NET USE MKTING C:\SPENCER

B. NET VIEW MKTING C:\SPENCER

C. NET SHARE MKTING=C:\SPENCER

D. NET MAKE C:\SPENCER MKTING

A

A. NET USE MKTING C:\SPENCER

To connect to the C:\SPENCER directory as MKTING, the command to use is NET USE MKTING=C:\SPENCER. The NET VIEW MKTING C:\SPENCER command is invalid because NET VIEW is used to show a list of computers and network devices on the network. NET SHARE MKTING=C:\SPENCER would be used to share the directory, and NET MAKE is an invalid command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which utility is used to terminate processes?

A. TASKKILL

B. ROBOCOPY

C. BOOTREC

D. TASKLIST

A

A. TASKKILL

The TASKKILL command can be used to terminate a process that has become problematic. ROBOCOPY is a more robust copy utility than COPY and is used in Windows. BOOTREC is used to troubleshoot and potentially fix errors that are preventing your computer to start. TASKLIST displays the list of processes running on the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which command can used to show a list of open files on a server?

A. NET USE

B. NET USER

C. NET SEND

D. NET FILE

A

D. NET FILE

NETFILE is used to show a list of open files on a server. NETSEND is used to send messages to users, computers, and messaging aliases on the network. NETUSER is used to add, remove, and make changes to the user accounts on a computer. NET USE is used to connect to, remove, and configure connections to shared resources.

22
Q

You are currently working at the command line in the directory C:\Novell\Messenger\LogFiles and type CD .. Where will this move you to?

A. C:\Novell\Messenger\LogFiles

B. C:\Novell\Messenger

C. C:\Novell

D. C:\

A

B. C:\Novell\Messenger

The command CD .. would move you to C:\Novell\Messenger, while CD. would not move you to any other directory but simply signify the existing directory.

It will not move you to C:\Novell\Messenger\LogFiles. That is the current location.

It will not move you to C:\Novell. It would take executing the CD.. command twice to arrive there.

It will not move you to C:. It would take executing the CD.. command three times to arrive there.

23
Q

What Windows utility is used to prepare a computer to be imaged?

A. Sysprep

B. IPCONFIG

C. Nslookup

D. MSConfig

A

A. Sysprep

The Sysprep utility makes an exact image or replica of the reference computer (also known as the master computer) to be installed on other computers. Sysprep removes the master computer’s security ID. When the device reboots with the new image, it will generate a new ID. IPCONFIG is used to manage and view the IP configuration. Nslookup is used to troubleshoot DNS. MSConfig is a utility used for managing the startup process on your computer.

24
Q

You have been called to a site to clean a plethora of computers. Doing so will take cartons of compressed air, and you are looking for another solution. Which of the following can you use?

A. Air compressor

B. Feather duster

C. Iodized water

D. Hydrogen peroxide

A

A. Air compressor

It’s possible to use an air compressor instead of compressed-air cans when you need a lot of air. If you take this approach, make sure you keep the pounds per square inch (PSI) at or below 40 and include measures on the air compressor to remove moisture. Feather dusters can be used to clean keyboards. Iodized water is used for household cleaning and hydrogen peroxide is a disinfectant.

25
Q

Which of the following is not a type of wireless encryption that can be used on a SOHO wireless network?

A. WPA2

B. TFTP

C. WEP

D. WPA

A

B. TFTP

The available types of wireless encryption available include WEP, WPA, and WPA2. TFTP is an unsecure form of FTP.

26
Q

What is the part of a virus that uniquely identifies it?

A. Fingerprint

B. Signature

C. Swirl

D. Yarn

A

B. Signature

A signature is an algorithm or other element of a virus that uniquely identifies it. The other options are not terms used when discussing viruses.

27
Q

Which of the following commands used to connect to, remove, and configure connections to shared resources?

A. NET USE

B. NET USER

C. NET SEND

D. NET FILE

A

A. NET USE

NET USE is used to connect to, remove, and configure connections to shared resources. NETUSER is used to add, remove, and make changes to the user accounts on a computer. NETSEND is used to send messages to users, computers, and messaging aliases on the network. NETFILEis used to display a list of open files on a server.

28
Q

What is another name for MAC filtering?

A. Pharming

B. Sanitation

C. Disabling SSID

D. Network lock

A

D. Network lock

On a number of wireless devices, the term network lock is used in place of MAC filtering, and the two are synonymous. Pharming is a DNS-based attack. Sanitation is not a term used when discussing filtering. Disabling the SSID hides the SSID in beacon frames so the network does not appear when scanning.

29
Q

Which of the following entails ensuring that data expected to remain private is seen only by those who should see it?

A. Repudiation

B. Negation

C. Confidentiality

D. None of the above

A

C. Confidentiality

Confidentiality entails ensuring that data expected to remain private is seen only by those who should see it. Confidentiality is implemented through authentication and access controls. Repudiation is the denial of an action. Negation is the elimination or countering of an action.

30
Q

Which of the following is an email-based social engineering attack?

A. Shoulder surfing

B. Key fobbing

C. Tailgating

D. Phishing

A

D. Phishing

Phishing is an email-based social engineering attack. Tailgating is the term used for someone being so close to you when you enter a building that they are able to come in right behind you without needing to use a key, a card, or any other security device. Key fobbing is not a term used when discussing social engineering. Shoulder surfing is looking over someone’s shoulder as they type credentials.

31
Q

According to CompTIA, what is the first step in the troubleshooting theory?

A. Identify the problem.

B. Establish a plan of action.

C. Verify full system functionality.

D. Document.

A

A. Identify the problem.

The first step is to identify the problem. One way of so doing is to question the user and identify user changes to the computer. The steps in the process are

Identify the problem.

Establish a theory of probable cause.

Test the theory to determine cause.

Establish a plan of action to resolve the problem and implement the solution.

Verify full system functionality and if applicable implement preventative measures.

Document findings, actions, and outcomes.

32
Q

Which of the following is the term used for someone being so close to you when you enter a building that they are able to come in right behind you?

A. Shoulder surfing

B. Key fobbing

C. Tailgating

D. Phishing

A

C. Tailgating

Tailgating is the term used for someone being so close to you when you enter a building that they are able to come in right behind you without needing to use a key, a card, or any other security device. Key fobbing is not a term used when discussing social engineering. Shoulder surfing is looking over someone’s shoulder as they type credentials. Phishing is an email-based social engineering attack.

33
Q

Which switch is used to indicate that PING should continue to ping the host without stopping until you break out of it (using Ctrl+C)?

A. -t

B. -a

C. -n

D. -f

A

A. -t

You can use the -t switch to indicate that PING should continue to ping the host without stopping until you break out of it. The -a switch will resolve, if possible, the hostname of an IP address target. The -n switch sets the number of ICMP echo requests to send, from 1 to 4294967295. The -f switch prevents ICMP echo requests from being fragmented by routers between you and the target.

34
Q

Which switch is used to indicate that PING should resolve, if possible, the hostname of an IP address target?

A. -t

B. -a

C. -n

D. -f

A

B. -a

The -a switch will resolve, if possible, the hostname of an IP address target. You can use the -t switch to indicate that PING should continue to ping the host without stopping until you break out of it. The -n switch sets the number of ICMP echo requests to send, from 1 to 4294967295. The -f switch prevents ICMP echo requests from being fragmented by routers between you and the target.

35
Q

Which principle should be used with assigning permissions?

A. Grandfather-father-son

B. Least privilege

C. Differential

D. Incremental

A

B. Least privilege

The principle of least privilege in assigning permissions gives users only the permissions they need to do their work and no more.

36
Q

When computer systems are retired, the disk drives should be zeroed out, and all magnetic media should be:

A. Degaussed

B. Filtered

C. Reset

D. Calibrated

A

A. Degaussed

When computer systems are retired, the disk drives should be zeroed out, and all magnetic media should be degaussed. Filtering is the process of separating out a traffic type. A reset is the returning of a device to a previous state. Calibration is an adjustment of the screen.

37
Q

Which type of backup backs up only files for which the archive bit is currently turned on and leaves the archive bit in its current state?

A. Incremental

B. Differential

C. Full

D. Modification

A

B. Differential

A differential backup backs up all changes since the last backup of any type.

An incremental backup backs up all changes since the last full backup.

A full backup backs up everything.

There is no modification backup.

38
Q

Which installation method overwrites the operating system that existed on a machine and places a new one there?

A. Upgrade

B. Clean install

C. In-place upgrade

D. Refresh

A

B. Clean install

With a clean installation, you overwrite the operating system that existed on a machine and place a new one there. An example of a clean installation would be changing the operating system on a laptop from Windows Vista to Windows 7. The user accounts and other settings that existed with Windows Vista would be removed in the process and need to be re-created under Windows 7. Upgrades, including in-place upgrades, keep all applications and data. Refreshing also keep applications and data.

39
Q

From which government agency can MSDS sheets be obtained?

A. FCC

B. OSHA

C. FTC

D. EPA

A

D. EPA

These are traditionally created by the manufacturer, and you can obtain them from the manufacturer or from the Environmental Protection Agency at www.epa.gov. None of the other options issues MSDS sheets. FCC manages radio frequencies, the FTC oversees trade, and the EPA manages environmental issues.

40
Q

The command IPCONFIG /RENEW will renew an IP address for the host from what type of server?

A. DNS

B. DHCP

C. IPCONFIG

D. TRACERT

A

B. DHCP

The /RENEW switch with the IPCONFIG command renews an IP address for the host from a DHCP server. DNS servers resolve host names to IP addresses and do not respond to IPCONFIG /RENEW commands. There is no such thing as an IPCONFIG or TRACERT server; they are both commands. IPCONFIG is used to manage and view the IP configuration, and TRACERT is used to display the path taken to a destination.

41
Q

Which command can be used to send messages to users, computers, and messaging aliases on the network?

A. NET USE

B. NET USER

C. NET SEND

D. NET FILE

A

C. NET SEND

NETSEND is used to send messages to users, computers, and messaging aliases on the network. NETUSER is used to add, remove, and make changes to the user accounts on a computer. NET USE is used to connect to, remove, and configure connections to shared resources. NETFILE is used to show a list of open files on a server

42
Q

Which type of virus is designed to make itself difficult to detect or analyze?

A. Armored

B. Red

C. Companion

D. Murky

A

A. Armored

An armored virus is designed to make itself difficult to detect or analyze. A companion virus renames itself as one of the system files and becomes its “companion.” Red and murky are not virus types.

43
Q

Which type of virus changes form to avoid detection?

A. Phage

B. Polymorphic

C. Phlegmatic

D. Time bomb

A

B. Polymorphic

Polymorphic viruses change form to avoid detection. A phage virus is a computer virus that, rather than attaching to host files, will modify host file programs. Phlegmatic is not a term used when discussing computer viruses. A time bomb is a virus that executes at a certain time.

44
Q

Which file system is primarily used on Unix-based systems?

A. FAT

B. FAT32

C. NTFS

D. NFS

A

D. NFS

Network File System (NFS) is a distributed file system protocol originally developed by Sun Microsystems. While it is supported on some Windows systems, it is primarily used on Unix-based systems. FAT, FAT32 and NTFS are all Windows file systems.

45
Q

Which switch is used with the COPY command to tell it that you are working with an ASCII text file?

A. /Z

B. /A

C. /V

D. /Y

A

B. /A

The /A switch tells COPY that you are working with an ASCII text file.

The /Z option copies networked files in restartable mode.

The /V option verifies that new files are written correctly.

The /Y option suppresses prompting to confirm you want to overwrite an existing destination file.

46
Q

Which Windows 7 edition is available only in a 32-bit version?

A. Windows 7 Starter.

B. Windows 7 Home Premium.

C. Windows 7 Professional.

D. None. All are available in both 32-bit and 54-bit versions.

A

A. Windows 7 Starter.

Windows 7 Starter is available only in a 32-bit version and supports a single processor with a maximum of 2 GB of RAM. The other editions all come with 64-bit versions.

47
Q

Which Windows feature allows you to use drive encryption to protect files, including those needed for startup and logon?

A. ReadyBoost

B. Defender

C. UAC

D. BitLocker

A

D. BitLocker

BitLocker allows you to use drive encryption to protect files, including those needed for startup and logon. Ready Boost enables NAND memory mass storage devices, including CompactFlash, SD cards, and USB flash drives, to be used as a write cache between a hard drive and random access memory. User Account Control aims to improve the security of Microsoft Windows by limiting application software to standard user privileges until an administrator authorizes an increase or elevation. Bit Locker is used to encrypt drives or entire disks.

48
Q

Which versions of Windows 8 offer offline file support? (Choose all that apply.)

A. Enterprise

B. Pro

C. Ultimate

D. Core

A

A. Enterprise

B. Pro

C. Ultimate

In Windows 8, offline file support is limited to the Enterprise and Pro versions.

It is not supported in what is sometimes called the Windows 8 Core version.

There is no Ultimate version of Windows 8.

49
Q

Which of the following is important when planning for solving a customer’s problems?

A. Punctuality

B. Belatedness

C. Cell access

D. Humor

A

A. Punctuality

Punctuality is important and should be part of your planning process before you ever arrive at the site. If you tell the customer you’ll be there at a certain time, you need to make every attempt to be there at that time. Belatedness and humor are not part if the process, and cell access has nothing to do with customer services.

50
Q

To share the C:\SPENCER directory as MKTING, which command would you use?

A. NET USE MKTING C:\SPENCER

B. NET VIEW MKTING C:\SPENCER

C. NET SHARE MKTING=C:\SPENCER

D. NET MAKE C:\SPENCER MKTING

A

C. NET SHARE MKTING=C:\SPENCER

NET SHARE MKTING=C:\SPENCER would be used to share the directory. To connect to the C:\SPENCER directory as MKTING, the command to use is NET USE MKTING=C:\SPENCER. The NET VIEW MKTING C:\SPENCER command is invalid because NET VIEW is used to show a list of computers and network devices on the network. NET MAKE is an invalid command.