Test Out Exam Questions Flashcards

1
Q

Bitlocker To Go can be used to encrypt?

A

a USB flash drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Single Sign­ On does what?

A

permits a user and their programs to use their credentials to automatically log in to other sites and services. It’s not used for encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Run as administrator is used to do what ?

A

Run an application with elevated privileges, not to encrypt data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Administrative share is used by administrators to do what?

A

To access system drives. It’s not used for encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What happens when Anti-Malware Software Quarantines a file?

A

Quarantine moves the infected file to a secure folder where it cannot be opened or run normally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ransomware ?

A

is a type of malicious software designed to block access to a computer system, often by encrypting files, until a sum of money is paid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Spyware ?

A

is malware that monitoring a user’s behavior without their knowledge. Spyware often secretly gathers information about a person or organization and relays this data to other parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Social engineering?

A

is a way of manipulating people so they give up confidential information, such as passwords, bank information, or access to a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A Trojan horse or Trojan?

A

is a type of malware that is often disguised as legitimate software. Ransomware may be introduced as a Trojan horse, but a Trojan horse does not always install ransomware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Can you use Telnet or SSH to remotely log on to a server and complete configuration tasks?

A

Yes, however, SSH provides a secure connection; Telnet does not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The ICMP protocol is used to?

A

transmit error messages on an IP network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which two situations would be best for restoring from a backup?

A

Restore Lost files and Restore lost e­mails. Using a backup allows you to explicitly specify what content you want to restore.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Using a system image would be appropriate when?

A

To restore a system after a hard disk failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Using a restore point would be best suited to which situation?

A

A misbehaving application or driver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The Time Machine application on Mac OS computers and the tar command in Linux are used for what?

A

Backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Patch management involves?

A

updating operating systems and applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

md (Make Directory)

A

will create a directory/folder or subdirectory/subfolder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

rd

A

removes a directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

cd (Change Directory)

A

changes which directory you are working in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The del command (DELete)

A

deletes files and directories.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The sfc command?

A

scans the integrity of all protected system files and replaces incorrect versions with correct Microsoft versions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Users who have the Manage documents permission can do what?

A

manage all documents in the queue (i.e., pause, resume, delete, or rearrange the order).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Users with the Print permission can do what?

A

print using the printer and manage (delete) their own documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Users with the Manage this printer permission can do what?

A

edit the printer properties and pause the printer, but cannot manage any documents waiting to be printed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

The Manage network printers permission?

A

does not exist.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

When would you use Use the compatibility mode?

A

In Windows to run older applications as if they were running under a different operating system version

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Windows XP Mode (XPM)

A

a feature of the Windows 7 that allows it to run applications that are only compatible with Windows XP via a virtual machine (VM) on Windows Virtual PC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

How to turn off Windows 7 automatic restart feature?

A
  • Press F8 during Startup
  • Select Disable automatic restart on system failure option
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What does Startup Repair do?

A

Corrects system boot errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Power Fail option?

A

in the BIOS determines what the system does after power is restored when the power is unexpectedly lost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

The grep command?

A

is used to search text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

The ls command ?

A

list the contents of a directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

The sudo command is short for

A

“superuser do” or “substitute user do”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

The sudo command ?

A

execute a command as a superuser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

• Lost clusters

A

are a series of used clusters on the hard disk drive that are not associated with a specific file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

• A cross­linked file

A

occurs when two files claim the same cluster. Check Disk will identify cross­linked files and correct their cluster associations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

• Orphaned files

A

are files on the hard drive which are not associated with a directory path in the index. Normally Check Disk can re­associate the file with the correct directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

• A bad sector

A

is a portion of the hard disk that cannot be used. Bad sectors are marked so that they are no longer used. Any used bad sectors are redirected to another sector.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What happens after removing a virus from a computer?

A
  • Install latest OS updates
  • Scheduled regular virus scans
  • Enable system restore
  • Create a new restore point
  • Educate end users on better practices.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Moving or copying files to a different NTFS partition does what?

A

It removes any existing NTFS permissions so that only inherited permissions apply.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

User data on a Windows 8.1 system can be protected using

A

File History

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What does file History do?

A

User data like documents, music, and videos are automatically backed up at a regular interval to a second storage device in the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

An app scanner can test?

A

a mobile app for security flaw

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Malware that can be remote controlled by an attacker are known as?

A

Zombies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Zombies

A

malware that can be remote controlled by an attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

A collection of zombies that are controlled by the same attacker are known as a

A

botnet (robot network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Phishing

A

is an attempt to trick a user into compromising personal information or downloading malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

botnet (robot network)

A

A collection of zombies that are controlled by the same attacker are known as a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

An attempt to trick a user into compromising personal information or downloading malware.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Phishing Most often it involves an email containing what?

A

A malicious attachment or hyperlink.

51
Q

A Man ­In The Middle (MITM) attack

A

intercepts communications between two systems, and alters the message before sending it on to the original recipient.

52
Q

Spoofing ?

A

An entity using a fake IP address, or fake email address that resembles a real address to trick you

53
Q

On Windows 2000 and XP, users who were members of the Power Users group could install applications as long as?

A

they didn’t modify any system files.

54
Q

On Windows Vista and later, Power Users …

A

cannot install applications. In fact, the Power Users group is only included in modern versions of Windows for backwards compatibility.

55
Q

NT loader (NTLDR)

A

is the boot loader for Windows operating systems

56
Q

If the NTLDR is damaged or missing, the computer will not be able to boot into which mode?

A

Safe mode

57
Q

If the files required for the boot loader are missing or damaged…

A

the operating system cannot start, and the error will appear

58
Q

• Hotspot­­

A

a physical location where you can obtain wireless Internet access using a (WLAN) with a device connected to an Internet service provider.

59
Q

• Tethering

A

Connecting one device without Wi-Fi to another device that has Wi-Fi connectivity through the use of a cable

60
Q

• Mobile VPN­­

A

provides mobile devices with access to network resources and software applications on their home network when they connect using other wireless or wired networks.

61
Q

• NFC

A

­­a type of connector used to emulate cryptographic smart card functionalities for RFID tags or memory cards.

62
Q

• Bluetooth

A

a wireless technology standard for exchanging data over short distances from fixed and mobile devices and for building personal area networks (PANs).

63
Q

The Mac OS Force Quit functions and the Linux kill command can be used to do what?

A

to stop a runaway application that does not respond to user input.

64
Q

What is a mount point?

A

an empty folder on the existing volume that points to another partition. Data saved to the folder is physically saved on the referenced partition

65
Q

Extending a volume does what?

A

adds space to the volume

66
Q

Extending a volume using space on a different disk creates what ?

A

A spanned volume

67
Q

The Trivial File Transfer Protocol (TFTP)

A

is a connectionless service for downloading files from a remote system. TFTP uses TCP/IP port 69.

68
Q

The Network News Transfer Protocol (NNTP)

A

is used to access and download messages from newsgroup servers. NNTP uses TCP/IP port 119.

69
Q

Trouble Shooting Steps (5)

A
  • Gathering Information
  • Identify what has changed
  • Form a hypothesis
  • Determine the appropriate fix
  • Implement the fix and test results.
70
Q

Anti­-Plagiarism Software

A

helps detect when someone has plagiarized someone else’s material.

71
Q

Anti­-Malware Software

A

helps protects a computer from software that is intentionally designed to cause harm or damage to

72
Q

Anti­-Spam Software

A

SPAM email (or junk email) is the unsolicited email users can receive. One of the best ways to prevent receiving this type of email is to use anti­spam software

73
Q

Steps to fixing internal computer components (4)

A

-Disconnect power -Remove jewelry -Place the computer on an ESD mat -Put on safety glasses

74
Q

Anti-Virus Software

A

helps protect the infiltration and spread of malicious code that is designed to alter the way a computer operates.

75
Q

What are three component that if faulty the computer will not boot?

A

Memory Video card Processor

76
Q

Bring Your Own Device (BYOD) policy

A

the protection of corporate data along with corporate control versus individual control of the device

77
Q

Trusted source

A

refers to the approved location for obtaining mobile applications, Google Play Store, App Store and Microsoft Store.

78
Q

Mission Control is a Mac OS tool that

A

shows every open application in every virtual window (desktop) on a Mac computer.

79
Q

Remote Disk is a utility that

A

allows a Mac computer to access another computers optical drive over the network.

80
Q

When you suspect that a computer may be infected with malware, you should…

A

-quarantine the computer to prevent the propagation of the malware.

81
Q

What does enabling System Protection do on Windows 10 computer?

A

Windows will automatically create restore points when system changes are made

82
Q

Program and Features

A

lets you view the programs installed on your computer and, if needed, uninstall, change, or repair an application

83
Q

Performance

A

lets you configure some advanced settings, such as configuring virtual memory.

84
Q

Which tabs in Task Manager give you the best overview of computers health?

A

The Processes and Performance tabs both show the overall performance of the main areas of the computer, including CPU, GPU, Memory, Hard disks & Network.

85
Q

App history (Task Manager)?

A

Displays performance and statistics for Microsoft applications.

86
Q

Details tab in (Task Manager) shows what?

A

Individual CPU utilization for each program running.

87
Q

Users tab in (Task Manager) shows what?

A

The same statistic as Processes & Performance, but they are divided out by each individual user instead of for the entire computer.

88
Q

What is the advantage of using the exFAT file system over NTFS?

A

Lower memory and processor resource use

89
Q

What is the the FASTEST way to transfer a file?

A

C$ administrative share (\computername\C$)

90
Q

C$ administrative share (\computername\C$)

A

Is the the FASTEST way to transfer a file

91
Q

Principle of least privilege?

A

The practice of limiting access rights for users to the bare minimum permissions they need to perform their work.

92
Q

A Ground­ Fault Circuit Interrupter (GFCI)

A

is a protection device designed to protect people from electric shock from an electrical system.

93
Q

Where will you often find A Ground­ Fault Circuit Interrupter (GFCI) ?

A

bathrooms and kitchens where the chance of an electrical shock is greater due to water.

94
Q

The virtual machine completely simulates a physical computer system.

A

Full virtualization

95
Q

Operating systems do not need modification to run within virtual machines.

A

Full virtualization

96
Q

Only some of the components of a virtual machine are virtualized.

A

Partial virtualization

97
Q

The hardware is not virtualized. All of the guest operating systems running on the hypervisor directly access various hardware resources in the physical device

A

Paravirtualization

98
Q

r

are a series of used clusters on the hard disk drive that are not associated with a specific file.

A

• Lost clusters

99
Q

r

occurs when two files claim the same cluster. Check Disk will identify and correct their cluster associations.

A

• A cross­linked file

100
Q

r

are files that exist on the hard drive but which are not associated with a directory in the index. Normally Check Disk can re­associate the file with the correct directory.

A

• Orphaned files

101
Q

r

is a portion of the hard disk that cannot be used. They are marked so that they are no longer used. Any used bad sectors are redirected elsewhere

A

• A bad sector

102
Q

r

  • Install latest OS updates
  • Scheduled regular virus scans
  • Enable system restore
  • Create a new restore point
  • Educate end users on better practices.
A

What happens after removing a virus from a computer?

103
Q

r

a malicious software designed to block access to a computer system, often by encrypting files, until a sum of money is paid.

A

Ransomware ?

104
Q

r

is malware that monitoring a user’s behavior without their knowledge. It often secretly gathers information about a person or organization and relays this data to other parties.

A

Spyware ?

105
Q

r

is a way of manipulating people so they give up confidential information, such as passwords, bank information, or access to a computer.

A

Social engineering?

106
Q

r

is a type of malware that is often disguised as legitimate software.

A

A Trojan horse or Trojan?

107
Q

r

manage all documents in the queue (i.e., pause, resume, delete, or rearrange the order).

A

Manage documents Permission

108
Q

r

print using the printer and manage (delete) their own documents.

A

Print permission

109
Q

r

edit the printer properties and pause the printer, but cannot manage any documents waiting to be printed.

A

Manage this Printer Permission

110
Q

r

a physical location where you can obtain wireless Internet access using a (WLAN) with a device connected to an Internet service provider.

A

• Hotspot­­

111
Q

r

Connecting one device without Wi-Fi to another device that has Wi-Fi connectivity through the use of a cable

A

• Tethering

112
Q

r

provides mobile devices with access to network resources and software applications on their home network when they connect using other wireless or wired networks.

A

• Mobile VPN­­

113
Q

r

­­a type of connector used to emulate cryptographic smart card functionalities for RFID tags or memory cards.

A

• NFC

114
Q

r

an empty folder on the existing volume that points to another partition. Data saved to the folder is physically saved on the referenced partition

A

What is a mount point?

115
Q

r

helps detect when someone has plagiarized someone else’s material.

A

Anti­-Plagiarism Software

116
Q

r

helps protects a computer from software that is intentionally designed to cause harm or damage to

A

Anti­-Malware Software

117
Q

r

(or junk email) is the unsolicited email users can receive. One of the best ways to prevent receiving this type of email is to use anti­spam software

A

Anti­-Spam Software

118
Q

r

helps protect the infiltration and spread of malicious code that is designed to alter the way a computer operates.

A

Anti-Virus Software

119
Q

r

refers to the approved location for obtaining mobile applications, Google Play Store, App Store and Microsoft Store.

A

Trusted source

120
Q

r

lets you view the programs installed on your computer and, if needed, uninstall, change, or repair an application

A

Program and Features

121
Q

r

adjust settings to use for the appearance and performance of Windows. It also lets you configure some advanced settings, such as configuring virtual memory.

A

Performance

122
Q

r

intercepts communications between two systems, and alters the message before sending it on to the original recipient.

A

A Man ­In The Middle (MITM) attack

123
Q

r

An entity misrepresents itself by using a fake IP address, or more commonly a fake email address that resembles a real address.

A

Spoofing ?