Test Out Exam Questions Flashcards
Bitlocker To Go can be used to encrypt?
a USB flash drive.
Single Sign On does what?
permits a user and their programs to use their credentials to automatically log in to other sites and services. It’s not used for encryption
Run as administrator is used to do what ?
Run an application with elevated privileges, not to encrypt data.
Administrative share is used by administrators to do what?
To access system drives. It’s not used for encryption.
What happens when Anti-Malware Software Quarantines a file?
Quarantine moves the infected file to a secure folder where it cannot be opened or run normally.
Ransomware ?
is a type of malicious software designed to block access to a computer system, often by encrypting files, until a sum of money is paid.
Spyware ?
is malware that monitoring a user’s behavior without their knowledge. Spyware often secretly gathers information about a person or organization and relays this data to other parties.
Social engineering?
is a way of manipulating people so they give up confidential information, such as passwords, bank information, or access to a computer.
A Trojan horse or Trojan?
is a type of malware that is often disguised as legitimate software. Ransomware may be introduced as a Trojan horse, but a Trojan horse does not always install ransomware.
Can you use Telnet or SSH to remotely log on to a server and complete configuration tasks?
Yes, however, SSH provides a secure connection; Telnet does not.
The ICMP protocol is used to?
transmit error messages on an IP network.
Which two situations would be best for restoring from a backup?
Restore Lost files and Restore lost emails. Using a backup allows you to explicitly specify what content you want to restore.
Using a system image would be appropriate when?
To restore a system after a hard disk failure
Using a restore point would be best suited to which situation?
A misbehaving application or driver
The Time Machine application on Mac OS computers and the tar command in Linux are used for what?
Backups
Patch management involves?
updating operating systems and applications
md (Make Directory)
will create a directory/folder or subdirectory/subfolder.
rd
removes a directory
cd (Change Directory)
changes which directory you are working in.
The del command (DELete)
deletes files and directories.
The sfc command?
scans the integrity of all protected system files and replaces incorrect versions with correct Microsoft versions
Users who have the Manage documents permission can do what?
manage all documents in the queue (i.e., pause, resume, delete, or rearrange the order).
Users with the Print permission can do what?
print using the printer and manage (delete) their own documents.
Users with the Manage this printer permission can do what?
edit the printer properties and pause the printer, but cannot manage any documents waiting to be printed.
The Manage network printers permission?
does not exist.
When would you use Use the compatibility mode?
In Windows to run older applications as if they were running under a different operating system version
Windows XP Mode (XPM)
a feature of the Windows 7 that allows it to run applications that are only compatible with Windows XP via a virtual machine (VM) on Windows Virtual PC
How to turn off Windows 7 automatic restart feature?
- Press F8 during Startup
- Select Disable automatic restart on system failure option
What does Startup Repair do?
Corrects system boot errors.
Power Fail option?
in the BIOS determines what the system does after power is restored when the power is unexpectedly lost.
The grep command?
is used to search text
The ls command ?
list the contents of a directory.
The sudo command is short for
“superuser do” or “substitute user do”.
The sudo command ?
execute a command as a superuser.
• Lost clusters
are a series of used clusters on the hard disk drive that are not associated with a specific file.
• A crosslinked file
occurs when two files claim the same cluster. Check Disk will identify crosslinked files and correct their cluster associations.
• Orphaned files
are files on the hard drive which are not associated with a directory path in the index. Normally Check Disk can reassociate the file with the correct directory.
• A bad sector
is a portion of the hard disk that cannot be used. Bad sectors are marked so that they are no longer used. Any used bad sectors are redirected to another sector.
What happens after removing a virus from a computer?
- Install latest OS updates
- Scheduled regular virus scans
- Enable system restore
- Create a new restore point
- Educate end users on better practices.
Moving or copying files to a different NTFS partition does what?
It removes any existing NTFS permissions so that only inherited permissions apply.
User data on a Windows 8.1 system can be protected using
File History
What does file History do?
User data like documents, music, and videos are automatically backed up at a regular interval to a second storage device in the system.
An app scanner can test?
a mobile app for security flaw
Malware that can be remote controlled by an attacker are known as?
Zombies
Zombies
malware that can be remote controlled by an attacker
A collection of zombies that are controlled by the same attacker are known as a
botnet (robot network)
Phishing
is an attempt to trick a user into compromising personal information or downloading malware.
botnet (robot network)
A collection of zombies that are controlled by the same attacker are known as a
An attempt to trick a user into compromising personal information or downloading malware.
Phishing