RG: Practice Exam 1 Flashcards
Which command can be used to add, remove, and make changes to the user accounts on a computer?
A. NET USE
B. NET USER
C. NET SEND
D. NET FILE
A. NET USE
NETUSER is used to add, remove, and make changes to the user accounts on a computer. NET USE is used to connect to, remove, and configure connections to shared resources. NETSEND is used to send messages to users, computers, and aliases on the network. NETFILE is used to show a list of open files on a server
Which of the following prevents the denial of a digital signature?
A. Nonrepudiation
B. Negation
C. Confidentiality
D. None of the above
A. Nonrepudiation
Nonrepudiation prevents the denial of a digital signature. Confidentiality entails ensuring that data expected to remain private is seen only by those who should see it. Confidentiality is implemented through authentication and access controls. Negation is the elimination or countering of an action.
Which switch is used with IPCONFIG to show all the information related to the network cards and not just the summary information?
A. /VIEW
B. /ALL
C. /SHOW
D. /TRACE
B. /ALL
The /ALL switch with IPCONFIG shows all the information related to the network cards and not just the summary information. None of the other options is a valid IPCONFIG switch.
Which switch is used to set the number of ICMP echo requests to send?
A. -t
B. -a
C. -n
D. -f
C. -n
The -a switch will resolve, if possible, the hostname of an IP address target. You can use the -t switch with PING to indicate that it should continue to ping the host without stopping until you break out of it. The -n switch sets the number of ICMP echo requests to send, from 1 to 4294967295. The -f switch prevents ICMP echo requests from being fragmented by routers between you and the target.
Which switch is used with DEFRAG to force defragmentation even when disk space is low?
A. /A
B. /F
C. /V
D. /Z
B. /F
The /F switch is used with DEFRAG to force defragmentation even when disk space is low.
The /A option performs analysis on the specified volumes.
The /F option does not exist.
The /V option prints verbose output containing the fragmentation statistics.
There is no /Z option.
When you begin to collect evidence, you must keep track of that evidence at all times and show who has it, who has seen it, and where it has been. What is this known as?
A. Annulment
B. Reinforcement
C. Chain of custody
D. Compliance
C. Chain of custody
Tracking and documenting who has had or seen evidence, and where it has been, is known as the chain of custody. Annulment, reinforcement, and compliance are not terms used when discussing evidence.
Which class of fire extinguisher is meant for electrical fires?
A. Class A
B. Class B
C. Class C
D. None of the above
C. Class C
Three major classes of fire extinguishers are available, one for each type of flammable substance: A for wood and paper fires, B for flammable liquids, and C for electrical fires.
Which of the following is a command that enables you to verify the route to a remote host?
A. NETSTAT
B. NSLOOKUP
C. TRACERT
D. ECHOOFF
C. TRACERT
TRACERT is a command that enables you to verify the route to a remote host.
NETSTAT is used to display TCP/IP statistics.
NSLOOKUP is used to troubleshoot DNS issues.
ECHOOFF is used to turn off the display of commands in a batch file as they are executed.
On which tab of MSConfig can you choose the startup type?
A. Boot
B. General
C. Services
D. Startup
B. General
You can choose the startup type on the General tab. There are three sets of options: Normal, Diagnostic, and Selective. The Boot tab is used to manage the boot process of the system. The Services tab is used set the services that run at startup. The Startup tab directs you to the Task Manager.
Which switch can be used with IPCONFIG to obtain a new IP address?
A. /RELEASE
B. /NEW
C. /IP
D. /RENEW
D. /RENEW
The /RENEW switch can be used with the IPCONFIG command to obtain a new IP address. In the case where you have not preceded the IPCONFIG /renew command with the IPCONFIG /release command, it renews the current address.
The /release switch releases the current address.
There is no /new or /IP switch.
Which NTFS permission allows the user to navigate the entire directory structure, view the contents of the directory, view the contents of any files in the directory, and see ownership and attributes?
A. List Folder
B. Read
C. Full Control
D. Write
B. Read
The Read permission allows the user to navigate the entire directory structure, view the contents of the directory, view the contents of any files in the directory, and see ownership and attributes. The List folder permission allows all that read does plus Travers Folder/Execute File. Full Control allows all permissions. Write permission includes Create files/write data, Create folders/append data, Write attributes, Write extended attributes, Read, and Synchronize.
Which command is like COPY but also duplicates any subfolders?
A. XCOPY
B. SCOPY
C. DCOPY
D. GCOPY
A. XCOPY
XCOPY is like COPY, but it also duplicates any subfolders.
There is no SCOPY or DCOPY command.
GCOPY is a file copy utility under GNU Copyleft.
What is the result of pressing Ctrl+Shift+Esc in Windows 7?
A. You toggle between windows.
B. Flip 3D opens.
C. Task Manager opens.
D. The screen lock is activated.
C. Task Manager opens.
To get to the Task Manager directly in any of the Windows versions, you can press Ctrl+Shift+Esc. Windows+P is used to toggle between windows. Press Control+Shift+Escape to launch the Task Manager, and the screen lock is activated with Ctrl+Alt+Del.
Which switch is used with CHKDSK to tell it to fix errors that it finds?
A. /R
B. /C
C. /S
D. /A
A. /R
The /R (or /F) switch is used with CHKDSK to tell it to fix errors that it finds.
The /R option tells chkdsk to locate bad sectors and recover any readable information from them.
The /C option tells the command to run faster by skipping over certain regular checks including cycles within the folder structure to reduce the amount of time that the chkdsk command runs.
The /S option does not exist.
Which of the following is a type of badge or card that gives you access to resources?
A. Smart card
B. Rootkit
C. Degaussing tool
D. MAC filter
A. Smart card
A smart card is a type of badge or card that gives you access to resources, including buildings, parking lots, and computers. It contains information about your identity and access privileges. A rootkit is a collection of hacking tools that have as their aim, achieving root status on the device. A degaussing tool is used to remove data from a drive. A MAC filter is used to allow only certain MAC addresses through a switch or access point.
Which of the following is a command that can be used to troubleshoot DNS issues?
A. NETSTAT
B. NSLOOKUP
C. TRACERT
D. ECHOOFF
B. NSLOOKUP
The NSLOOKUP command is used to troubleshoot DNS issues on a device.
TRACERT is a command that enables you to verify the route to a remote host.
NETSTAT is used to display TCP/IP statistics.
ECHOOFF is used to turn off the display of commands in a batch file as they are executed.
Which of the following is known as the System Configuration Editor?
A. Edit
B. MSConfig
C. MSN
D. Regedit
B. MSConfig
The MSConfig utility, known as the System Configuration Editor, helps troubleshoot startup problems by allowing you to selectively disable individual items that normally are executed at startup.
There is no utility called Edit, nor is there one called MSN.
Regedit is a registry editing tool used in Windows.
Which type of networking utilizes POTS?
A. DSL
B. ISDN
C. Cable
D. Dial-up
D. Dial-up
With dial-up, you simply add a modem to your computer and connect to an Internet service provider (ISP) over the existing phone lines—also known as the Plain Old Telephone System (POTS) or the Public Switched Telephone Network (PSTN).
To connect to the C:\SPENCER directory as MKTING, which command would you use?
A. NET USE MKTING C:\SPENCER
B. NET VIEW MKTING C:\SPENCER
C. NET SHARE MKTING=C:\SPENCER
D. NET MAKE C:\SPENCER MKTING
A. NET USE MKTING C:\SPENCER
To connect to the C:\SPENCER directory as MKTING, the command to use is NET USE MKTING=C:\SPENCER. The NET VIEW MKTING C:\SPENCER command is invalid because NET VIEW is used to show a list of computers and network devices on the network. NET SHARE MKTING=C:\SPENCER would be used to share the directory, and NET MAKE is an invalid command.
Which utility is used to terminate processes?
A. TASKKILL
B. ROBOCOPY
C. BOOTREC
D. TASKLIST
A. TASKKILL
The TASKKILL command can be used to terminate a process that has become problematic. ROBOCOPY is a more robust copy utility than COPY and is used in Windows. BOOTREC is used to troubleshoot and potentially fix errors that are preventing your computer to start. TASKLIST displays the list of processes running on the system.