test 3 Flashcards
A Windows desktop administrator would like to query the local DNS
server to view the IP address and for www.professormesser.com. Use a
command line utility to view this information.
nslookup www.professormesser.com
describe the following command: chmod
Chmod (Change Mode) allows the user to change the access (mode) of a file to
read, write, execute, or a combination of those permissions.
A user has contacted the help desk because they are not able to browse any
websites. What command line utility would be able to confirm the
connectivity to a server that could convert fully qualified domain names to
IP addresses?
ipconfig /all command to show the address of the dns server; then use the ping command to ping the DNS server ip address.
An application, foothold.exe, has become unresponsive and the user is not
able to close the application normally from the Windows desktop. Use the
Windows command line to terminate this application.
The “taskkill” command is used to terminate tasks at the command line.
The /IM option specifies an “image name” or application name. If the process
ID is known, the taskkill command can be used with the /PID option and /T
(terminate) option.
Give a description of this control panel applet: User Accounts.
The User Accounts applet is used to modify user rights, passwords, certificate
information, and more.
i.e. Change an account to an Administrator
Give a description of this control panel applet: File Explorer Options.
The Windows 10 File Explorer Options control the general operation of File
Explorer, the file viewing options, and search engine configurations.
i.e. Disable indexing of system directories
Give a description of this control panel applet: Credential Manager.
Credential Manager is used to store, view, and delete authentication details for
local devices, applications, and websites.
i.e. Save a website username and password
Give a description of this control panel applet: Device Manager.
Device Manager is the central management view of all hardware and devices
connected to the system. All device drivers can be enabled and disabled from
the Device Manager applet.
i.e. Disable a USB audio controller
Give a description of this control panel applet: BitLocker.
BitLocker provides full disk encryption for Windows volumes.
i.e. Protect all data saved on a volume
Give a description of this control panel applet: Internet Options.
The Content tab of the Internet Options applet can be used to manage
browser certificates.
i.e. View website certificates
Give a description of this control panel applet: Sync Center.
Sync Center makes files available when working offline, and synchronizes the
changes when back online.
i.e. Update a spreadsheet when away from the office
A system administrator would like to disable the TFTP Client in Windows 10. Which of the following Control Panel applets would be the BEST choice for this task? ❍ A. Programs and Features ❍ B. Services ❍ C. Credential Manager ❍ D. File Explorer options
The Answer: A. Programs and Features
The Programs and Features applet of the Control Panel is used to view and
manage installed applications, or to enable or disable individual Windows
features.
The incorrect answers:
B. Services
The Services utility would allow the administrator to disable a TFTP
service, or any other Windows service. To remove a client or Windows
feature, the administrator would need to use Programs and Features.
C. Credential Manager
The Credential Manager stores the usernames and passwords used on
Windows resources and websites. The Credential Manager does not
manage the use of different Windows utilities and programs.
D. File Explorer options
The File Explorer options are used to customize the options available
in the File Explorer, change the view in the window, and modify the
Windows search options. File Explorer does not control the use of
individual applications.
A user has recently been assigned a new tablet, but each time she tries to
read email messages she receives the message, “The email could not be
decrypted.” The user has reinstalled the email client, but the problem still
occurs over both Internet and VPN connections. Which of the following
would be the best way for a technician to resolve this issue?
❍ A. Ask the user to reset their password
❍ B. Change the user’s email alias
❍ C. Send the user a certificate with a private key
❍ D. Confirm the wireless network encryption settings
The Answer: C. Send the user a certificate with a private key
A problem with email decryption is most likely associated with the
decryption keys. If the keys are missing or are incorrect, then the local
device will not be able to view the email messages.
The incorrect answers:
A. Ask the user to reset their password
If the user is properly authenticated, then the issue is not related to the
password. Resetting the password would not provide any additional access
to the email messages.
B. Change the user’s email alias
The user’s email alias provides other options for sending messages, but it
would not provide any additional method of decrypting email messages.
D. Confirm the wireless network encryption settings
The wireless network is not part of the email client’s encryption process.
Confirming or modifying wireless network configurations will not resolve
this issue.
A user has just installed a driver update from a laptop manufacturer. After
restarting, their system shows a Windows Stop Error before the login
prompt is displayed. Each subsequent reboot causes the same error to be
displayed. Which of the following should the system administrator follow
to BEST resolve this issue?
❍ A. Modify the BIOS boot order
❍ B. Boot to Safe Mode and perform a Windows Reset
❍ C. Perform a System Restore
❍ D. Reinstall the patch files
The Answer: C. Perform a System Restore
A System Restore can be launched from the Advanced Boot Options
under Repair Your Computer. From there, you can select an existing
restore point that will restore the computer to a previous configuration.
The incorrect answers:
A. Modify the BIOS boot order
The BIOS boot order will change the priority for storage drives during the
startup process. This issue appears to be related to a device driver and not
to a specific startup drive.
B. Boot to Safe Mode and perform a Windows Reset
Although Safe Mode may allow a user to login and avoid the reboot
problem, performing a Windows Reset would be a significant change to
the operating system. A Reset will reinstall Windows and can delete files,
settings, and apps that were not included with the computer.
D. Reinstall the patch files
Since the problem occurred when the patch files were installed, installing
them again wouldn’t be advisable. It’s also difficult to reinstall the patch
files if the user can’t login to the computer.
An attacker has gained access to a password hash file. Which of the
following will the attacker use to obtain the passwords?
❍ A. DoS
❍ B. Decryption
❍ C. Brute force
❍ D. Phishing
The Answer: C. Brute force
Since a hash is a one-way cryptographic method, the only way to
determine the original plaintext is to try every possible combination until
the hash is matched. This brute force method is the only way to determine
the original source of the hash.
The incorrect answers:
A. DoS
A DoS (Denial of Service) would cause a service to be unavailable to
others. A DoS attack would not determine the original passwords based
on a hash.
B. Decryption
A hash is a one-way function and it’s not encrypted data, so there’s no
option available for decrypting the passwords.
D. Phishing
Phishing is a social engineering method that convinces someone to
willingly provide secret or private information. Performing a brute force
attack on a hash file is not a method of phishing.