SG: Practice Exam 2 Flashcards
You just finished installing Windows 8, and you need to install a sound editing application. Where can you search for this application?
A. Microsoft Store
B. Metro UI
C. OneDrive
D. Start screen
A. Microsoft Store
The Microsoft Store is a place where you can search and install utilities for Windows 8 and higher operating systems. The Metro UI was the original name of the Windows 8 user interface. OneDrive is an online/cloud storage location. The Start screen only allows you to select already installed applications.
Your supervisor asks you to plan for a fault-tolerant disk design on a sensitive Windows workstation. Which partition scheme should you use?
A. GPT
B. MBR
C. Dynamic
D. Basic
C. Dynamic
In the Windows operating system, if you are going to use RAID, the partitions scheme must be dynamic. MBR, GPT, and Basic (MBR) do not allow for RAID.
Which type of malware is able to conceal itself from many parts of the operating system and obtain/retain elevated privileges?
A. Worm
B. Trojan
C. Rootkit
D. Botnet
C. Rootkit
Rootkits are software programs that can hide certain things from the operating system. A worm is malware that replicates itself and infects other system. Trojans are programs that enter a system or network under the guise of another program. A botnet is a group of infected computers that can be remotely control via a command-and-control server.
Which Windows 10 feature allows for the searching of local documents, applications and web searches via voice commands?
A. UWP
B. Edge
C. Cortana
D. Spotlight
C. Cortana
Cortana is a digital person assistant that allows for searching the local computer for both application and documents as well as web results using your voice. The Universal Windows Platform (UWP) is a development platform. Edge is a new web browser that is to replace Internet Explorer. The Spotlight feature will display a random wallpaper on the login screen from Bing.com.
Which of the following is not an NTFS permission for a directory? (Choose the best answer.)
A. Full Control
B. Write
C. Read & Execute
D. Change
D. Change
Change is a share permission; the similar permission in NTFS is Modify. Full Control gives allows the user to change security and take ownership of files. Write permissions allow files to be written to. The Read & Execute permission allows files to be read and executed.
Which of the following types of firewalls block traffic to specific addresses based on the type of application associated with the data?
A. Proxy
B. Packet-filter
C. Stateful
D. Stateless
B. Packet-filter
A firewall operating as a packet filter passes or blocks traffic to specific addresses based on the type of application. Proxy firewalls act as intermediaries between the requestor and the server that fulfills the request. Stateful packet filter firewalls monitor the entire conversation between two hosts sending packet. Stateless packet filter firewalls act on condition and action statements, regardless of the conversation state.
You have a multiboot installation of Windows 8 and Windows 7. Where can you change the default operating system that is booted?
A. Boot Manager Settings
B. Advanced System Settings
C. diskpart
D. WinRE
B. Advanced System Settings
By navigating to Control Panel ➢ System and Security ➢ System, and then clicking Advanced System Settings, you can change the default operating system booted in a multiboot installation. There is no Windows utility called the Boot Manager Settings. The diskpartcommand-line utility allows you to view information about the disk and partitions (volumes). The Windows Recovery Environment (WinRE) is used to recover a Windows installation.
Which protocol is used with claims-based authentication of users?
A. SSO
B. Kerberos
C. LDAP
D. EFS
A. SSO
Single sign-on (SSO) is used in conjunction with Active Directory for claims-based authentication. Kerberos is the protocol used to authenticate a user with Active Directory and provides the network access token. Lightweight Directory Access Protocol (LDAP) is used to look up objects in Active Directory. Encrypted File System (EFS) is used to encrypt files on NTFS.
Which key allows you to individually select multiple files at one time for copying?
A. Shift
B. Alt
C. Ctrl
D. Windows
C. Ctrl
By holding the Ctrl key and clicking individual files, you can select multiple files for copying. Holding the Shift key will allow you to select a group of files, but not individual files. Holding Alt and double-clicking will open the properties of the file or folder. The Windows key will open the Start menu.
You have a laptop that has a CDROM drive, which ways could you install Windows 10? (Choose two answers).
A. USB
B. CDROM
C. eSATA
D. PXE
A. USB
D. PXE
Universal Serial Bus (USB) flash devices can install Windows 10 and it is the most popular way to install Windows 10 on a laptop with no optical drive. Windows 10 requires a DVD-ROM because of the size of the install media, a CDROM will not work. eSATA is not a media that can install Windows 10, although Windows 10 can be installed to eSATA it is not an option to install from. Preboot Execution Environment (PXE) is a way of booting over a network so that an installation of Windows 10 can be performed.
Which Linux command can you use to rename a file?
A. rd
B. mv
C. cp
D. chown
B. mv
The mv command is used at the Linux shell to rename a file. The rd command is a DOS command to remove a directory. The cp command copies a file or directory. The chown command changes the ownership of a file or directory.
Which technology allows you to power a device remotely using only a network connection?
A. PoE
B. WoL
C. QoS
D. WinPE
A. PoE
Power over Ethernet (PoE) allows you to power a device remotely using only a network connection. Wake-on-LAN (WoL) is used to wake up computers over the network with the use of a WoL Magic Packet. Quality of Service (QoS) is a packet-scheduling mechanism built into Windows for controlling the flow of network traffic. WinPE, the Windows Preinstallation Environment, is used to install, deploy, and repair Windows.
You just installed a hard drive from an Apple computer into a Windows computer. Why can’t you view the files?
A. The drive needs to be initialized.
B. The drive needs to be mounted.
C. The drive needs to be converted to GPT.
D. The drive contains an HFS filesystem.
D. The drive contains an HFS filesystem.
Apple computers use a filesystem called Hierarchical File System (HFS), which is incompatible with Windows operating systems. None of the other options are valid. The files will need to be copied on an Apple PC to a disk containing FAT, FAT32, or NTFS.
Which of the following is a recommended physical security method?
A. Locking doors
B. Installing antivirus software
C. Enabling firewalls
D. Applying directory-level permissions
A. Locking doors
Locking doors is a recommended physical security method. Installing antivirus software is a form of digital protection. Firewalls and directory-level permissions are considered a form of logical security.
You need to create a script that will run the same on both Windows and Linux operating systems. Which scripting language should you choose? (Choose the best answer.)
A. Python
B. Bash script
C. PowerShell
D. Windows batch script
A. Python
A Python script will work the same on both Windows and Linux operating systems, since both operating systems use the same interpreter to execute scripts. A Bash script will run uniquely on Linux only. A PowerShell script will run uniquely on Windows. Windows Batch scripts can only be executed on Windows.
Which of the following is a recommended physical security method?
A. Badges
B. Antispyware
C. Firewalls
D. User authentication
A. Badges
The use of badges is a recommended physical security method. Antispyware and user authentication are digital forms of security. Firewalls are logical forms of security.
How can you get the Charms bar to appear from the Start screen in Windows 8/8.1?
A. Press the Windows button on the keyboard
B. Point to the upper-left corner of the screen
C. Point to the lower-right corner of the screen
D. Point to the lower-left corner of the screen
C. Point to the lower-right corner of the screen
The Charms menu appears when you place the pointer in the lower-right corner of the screen. Pressing the Windows button on the keyboard will launch the Start screen. Pointing to the upper-left corner of the screen will do nothing. Pointing to the lower-left corner of the screen will display the Start tile.
You believe that the disk on your Linux operating system is full. Which command will allow you to verify this assumption?
A. df
B. su
C. pwd
D. ls
A. df
The df command allows you to see how much of the disk is free. The su command allows you to log in as a different user. The pwdcommand shows the current working directory. The ls command lists all of the files in the current working directory.
You are having network issues. When you view the current IP address with the ipconfig command, you observe that your address is 169.254.34.3. What is most likely the problem?
A. The DHCP server is serving the wrong IP address range.
B. A user-configured IP address has been statically assigned.
C. An APIPA address has been statically configured.
D. The DHCP server has failed.
D. The DHCP server has failed.
The most likely problem is that the DHCP server has failed, causing the Automatic Private IP Addressing (APIPA) feature to configure the IP address. Although the cause of the problem in the following answers is possible, it is unlikely the cause of the problem described above. A DHCP server is not likely to serve an APIPA address. The User configured section on the Alternate Configured tab, is not likely to contain a user configured APIPA address. An APIPA address is not likely to be statically configured.
You need to find out which application is listening on port 455. Which command should you use?
A. net use
B. nslookup
C. netstat
D. tracert
C. netstat
You can use the netstat command to view all listening ports (netstat –a) and the applications listening (netstat –b). The net usecommand is used to map drives. The nslookup command is used to look up DNS entries. The tracert command is used to determine the path a packet will take though the network.