Exam A Flashcards

1
Q

When you are performing a clean windows installation, which of the following is the default location for the Windows system files?

A) C:\Windows
B) C:\Windows\System32\Config
C) C:\Windows\System32
D) C:\System Files

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A customer browses to a company’s intranet page and receives an invalid certificate message. After analysis, you discover that the certificate has expired. You install a new certificate on the user’s computer. However, the user still received the same message when going to the intranet page. You try again with a different web browser, and it connects without error. You figure out that you need to make sure the old certificate is no longer used in the browser. Which of the following internet options settings should you use to ensure that the old certificate is removed?

A) certificates
B) advanced
C) clear SSL state
D) publishers

A

A
To get to this tab, go to control panel then internet options then content tab. This is where you can remove old browser certificates. This holds true for the older Internet Explorer and Microsoft Edge. You can also access internet options in Edge by typing edge://settings in the address bar and searching for manage certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Users are reporting to you that a Windows feature asks them for confirmation before running certain applications or when making system changes. What is the name of this windows feature, and where should you direct users to turn off the functionality?

A) security center, it can be turned off in the services console window
B) user account control, it can be turned off under security and the control panel
C) Windows Defender firewall, it can be turned off under system properties
D) user account control, it can be turned off under user accounts in the control panel

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You are a l a n administrator in charge of printers. Which of the following should you check first when a Windows user is trying to print a document and get the error message ‘print subsystem not available?’

A) the correct printer driver is installed
B) the printer has been added
C) the spooler service is running
D) the printer has power from the jack

A

C
If a print subsystem not available or similar message appears, it most likely means the Spooler has stalled. You can turn the spooler back on and the services section of computer management or by issuing the command net start spooler in the command prompt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Your managers Windows computer locks up after the graphical user interface starts to load. However, the computer will boot in a safe mode. When you access the event viewer, you see an entry stating that a driver failed. Which of the following steps will help you further diagnose the problem?

A) run sigverif
B) enable boot logging and then, and safe mode, analyze the ntbtlog.txt file
C) disable driver signature enforcement
D) access debugging mode

A

B
Boot logging can be enabled from the Windows recovery environment in startup settings. After this option is enabled, the system automatically creates a file called ntbtlog.txt. afterwards, you can access the system by booting into safe mode, once again from the recovery environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You are troubleshooting a computer that has a web browser issue. The end user says that multiple browser Pages open by themselves when she surfs the internet. Also, You observe that the computer is running slowly. Which of the following actions should you perform first?

A) install anti-malware software
B) update antivirus definitions
C) reboot the computer
D) enable a pop-up blocker

A

A
The first thing you should do is install anti-malware software. It would be surprising if the computer doesn’t have any, but it is a possibility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You are tasked with disabling services from starting on a Windows pc. Which command should be run to bring up a window to make these changes?

A) sfc.exe
B) chkdsk
C) msconfig
D) gpupdate

A

C
This is the only option listed with which you can disable services. The key and the question is the phrase bring up a window. This runs in a window, whereas the rest of the answers run as text at the command line. This can also be used to modify how the system boots. The services console window can also be used to disable services, as well as start and stop them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You are tasked with creating a laptop naming convention that will make a customers laptops easier to track and identify while in use. Which of the following naming conventions should you use?

A) asset ID and Mac address
B) location and RFID
C) domain name, location, and asset ID
D) domain name, location, and IP address

A

A
Use the asset ID and Mac address naming convention to help you track and identify laptops while in use. And asset ID is an identification code that helps track computers or other Assets in the organization. Many Asset Management Systems use them. However, the system still needs to find the computer in the scenario. Because they are laptops and they could move from place to place, one good option is to locate the laptops by their Mac address. A MAC address is a physical address that is programmed into a chip on the network interface card, it is outside of and not affected by the operating system. Normally, the MAC address does not change, making it a good way to locate laptops that might move from place to place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following commands is used to display hidden files?

A) dir /o
B) dir /a
C) dir /d
D) dir /?

A

B

dir /ah
can be used to show hidden files only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following statements best describes how to prepare a mobile device to be protected in the event that it is lost or stolen? Select the three best answers.

A) disable Bluetooth
B) configure remote backup
C) enable Wi-Fi encryption
D) enable GPS
E) enable Wi-Fi tethering
F) configure a pattern screen lock

A

B, D, F
First, you should configure some kind of remote backup. This way, if the device is compromised, you have the confidential data backed up outside of the device at another location. The other half of this solution is remote wipe. If you are positive that the device is lost or stolen, and you know the data was backed up at some point, trigger a remote wipe to remove all data from the device. Also, enabled GPS on the device so it can be tracked if it is lost or stolen. In addition, configure a screen lock of some sort, whether it is a pattern that is drawn on the display, a pin, or a password. A strong password is usually the best form of screen lock and the hardest to crack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Two accounting coworkers share the same file inside a folder. User A works on the file, makes changes, and saves the file. User B then works on the file, makes changes, and saves the file as well. The next time user A attempts to open the file, she receives an access denied error. Which of the following statements best describes the most likely cause of this error message?

A) the NTFS permissions were changed on the file to allow only execute
B) the file was set with the system and hidden attributes
C) the file was set to read only by the accounts receivable administrator
D) the file was moved before being modified and then moved back to the share

A

D
Most likely user B moved the file to another location outside the current partition, made the changes which is possible sent user B is the one who moved it, and then moved it back to the original location. Whenever a file is moved to another partition or volume, the file takes on the permissions of the parent folder. However if the file had been moved within the volume, the permissions would have been retained. Remember, if the file is moved within the same volume, it retains permissions, so the permissions don’t change. But if the file is moved to another volume, it takes on the permissions of the folder it is moved into. As for copying, they files copy always takes on the permissions of the parent regardless of where that copy is placed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following are the best options for securing a data center? Select the two best answers.

A) bollard
B) badge reader
C) cable lock
D) USB based hardware token
E) biometric lock
F) privacy shade

A

B, E
The badge reader and biometric lock are the best of the listed answers. Although all kinds of other security methods are possible. This scenario is an example of multi-factor authentication. And RFID based badge reader relies on something the person has, and the biometric lock relies on something the user is. Multi-factor authentication systems are more secure because they layer security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is the best Windows utility to use if an administrator wants to perform administrative tasks that integrate scripts over a network?

A) Powershell
B) command prompt
C) Mission Control
D) Bash

A

A
Windows Powershell enables administrators to perform administrative tasks that integrate scripts and executables and can be run over a network. For even more power and flexibility, use Visual Studio code VSC or the older Powershell integrated scripting environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You are working in the console of a Linux server. What command should you type to find out the type of file system used by the servers storage drives?

A) diskpart
B) rm
C) df -T
D) pwd

A

C
Use this command to find out what file systems are used by each of the storage Drive partitions. Note that the T option is needed to see the file system types. The console is simply the name of the command line terminal in Linux if you are working on the server locally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You are required to stop the Windows Defender Firewall service. Which of the following best describes how to accomplish this? Select the three best answers.

A) in performance monitor
B) with the net stop mpssvc command
C) within MSconfig
D) within the task manager
E) in system information
F) with gpegit.exe
G) in services.msc

A

B, D, G
The name of the Windows Defender Firewall service is mpssvc. So, the Third Way of the listed answers is to use the ‘net stop mpsspc’ command and Powershell or the command prompt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You are viewing the output of ipconfig /all on a Windows computer. You see the name dpro42.com toward the beginning of the results. Which type of network is this Windows computer most likely a part of?

A) workgroup
B) SAN
C) domain
D) VPN

A

C
If you see the name dpro42.com toward the beginning of the results of an ipconfig /all command, the computer is most likely a part of the domain. This would be listed in the primary DNS suffix entry, which is usually directly after the hostname entry. The com is the giveaway. Some kind of DNS extension such as.com or.net is necessary with a domain

17
Q

Which of the following should be used to clean a monitors screen when you are not sure how to do so?

A) isopropyl alcohol
B) mild detergent
C) water
D) boric acid

A

C

18
Q

As part of risk management for your company, you have been tasked with backing up three physical servers on a daily basis. These backups will be stored to a Nas device on the lan. Which of the following can you do to make sure the backup will work when needed?

A) create alerts to let the administrators know when they backups fail
B) set up scripts to automatically rerun failed backup jobs
C) store copies of the backups off site at a data center
D) frequently restore the servers from the backup files and test them
E) configure the backups to restore to VMs for rapid recovery

A

A
The best option here is to create alerts to let any and all administrators know if a backup failure occurs. These alerts would either be created at the network attached storage device or at the individual servers to be backed up. If an administrator receives an alert, that person will know to either rerun the backup or more likely, fix the backup task and then run it. One of the issues here is that, without the alert, you might not know if a backup fails

19
Q

You have an Intel Core i7 system with a uefi-enabled motherboard. Which of the following types of storage Drive partitioning schemes should be selected when installing windows?

A) MBR
B) FAT32
C) Dynamic drive
D) GPT

A

D
If your system’s motherboard is equipped with a UEFI bios, you should definitely take advantage of the guid partitioning table gpt. It is superior to the older MBR technology. GPT allows for up to 128 partitions, is not limited to the 2 terabyte maximum partition size of mbr, and it stores multiple copies of itself on the system

20
Q

A customer’s mobile device cannot connect to wi-fi. According to the customer, it was working fine yesterday. Which of the following statements best describes the recommended course of action? Select the three best answers.

A) power cycle the device
B) repair the device
C) perform a hard reset
D) forget the Wi-Fi network
E) ensure that the correct SSID was entered
F) change the IP address

A

A, D, E
If a mobile device cannot connect to the network, you should attempt to power cycle the device, forget and reconnect to the Wi-Fi network and ensure that the correct SSID was entered in the first place. Perhaps the number one method would be to power cycle Wi-Fi which is not listed in the answers.

21
Q

Which of the following utilities enables a Windows user to edit a file offline and then automatically update the changes when the user returns to the office?

A) Sync Center
B) Powershell
C) Windows Defender Firewall
D) resource monitor

A

A
Sync Center is a Windows feature that enables you to keep information synchronized between your computer and network servers. You can still access the files and modify them even if you don’t have physical access to the server, in this case, they are modified offline and are synchronized automatically when you return to the network. Some mobile devices are also compatible with the sync center. Sync Center can be configured within the control panel

22
Q

You are acquiring Hardware devices and setting up a computer lab that will use Virtual desktops. The lab computers need to connect automatically to the remote session upon Boot and must be started remotely. Which of the following Solutions must the hardware be able to support? Select the two best answers.

A) PXE
B) image deployment
C) USB
D) multi boot
E) Wake On LAN
F) unattended installation

A

A, E
The hardware for the lab computers should support pre-boot execution environment and have wake-on Lan capability. To run the virtual desktops, they need pre-boot execution environment to automatically boot to the network server. Wake On LAN also known as WOL, should be enabled so that the lab computers can be started remotely and can wake up when pinged on the network

23
Q

Which of the following will occur if %temp% is executed from run?

A) applications located in the %temp% folder will be executed
B) the operating systems temporary folder will be opened
C) the current users temporary folder will be opened
D) applications will be deleted from the %temp% folder

A

C
Entering %temp% at the Run prompt will display a folder with the current users temporary files. For example, in windows, this would show the path
C:\Windows\Temp

24
Q

A Windows PC is not booting correctly. You need to locate bad sectors and recover information. Which command is best in this scenario?

A) chkdsk C: /R
B) chkdsk C: /F
C) chkdsk C: /C
D) chkdsk C: /I

A

A
chkdsk /R locate bad sectors and recovers the information from them

/F fixes errors but does not locate bad sectors and recover the information from them

25
Q

A user who is part of a work group reports that she cannot print to a new printer. Everyone else in the work group can print to the new printer, and the user can still automatically send print jobs to the old printer. Which of the following statements describe how to remedy the problem? Select the two best answers.

A) add the new printer to the user’s computer
B) clear the print queue on the new printer
C) change the user’s password and permissions
D) set the new printer as the default printer

A

A, D
If a user cannot print to a brand new printer but everyone else can print to it, you should check whether the printer is installed on that user’s computer and whether it is set as the default printer

26
Q

Your organization has an active directory domain. One of the users, bill, should not have read access to a folder named accounting. The accounting folder is shared on a network server, on a partition formatted as ntfs. Which of the following statements best describes how to stop bill from having read access to the folder without impacting any other users on the network?

A) remove bill from all domain groups that have access to the accounting folder
B) deny read access to the accounting folder for Bill through local access security
C) deny read access to the accounting folder for any group that bill is a member of
D) deny read access to the accounting folder for Bill through shared access security

A

D
The best option in this scenario would be to deny red access to the accounting folder for Bill through shared access security

You would not use local access security because the folder is shared from a network server within your active directory domain. Also, if you remove bill from all domain groups that have access to the accounting folder, bill will probably lose access to other folders as well. If you deny read access to the accounting folder for any group that bill is a member of, you will probably impact other users on the network negatively

27
Q

Your boss wants to encrypt a storage drive that will store critical data. Your boss needs to be able to drag and drop folders onto the volume and have them encrypted in real time. Which encryption technique should you suggest?

A) BitLocker
B) pki
C) TPM
D) Kerberos

A

A
BitLocker is a type of whole disc encryption wde. It encrypts all the contents that are created on it or copied to it in real time. It requires a trusted platform module TPM chip on the motherboard or an encrypted USB flash drive. Only select additions of Windows support BitLocker when used in this manner. Other lesser versions of Windows are compatible with BitLocker to go for reading encrypted documents from USB flash drive

28
Q

The CEO of your company clicked on a malicious email link. As a result, the system was hacked, and a Year’s worth of extremely confidential company data was stolen. Which of the following could have possibly prevented this from happening? Select the two best answers.

A) AES
B) firewall.cpl
C) AUP
D) user education regarding common threats

A

C, D
This situation is more common than you might think. It seems as if no one is safe today from email threats and scams. We must be vigilant and make all users aware of the murky email Waters ahead. Did the CEO attend user training and sign an AUP? Sometimes user education works, sometimes it doesn’t. One way to make sure user education is more effective is to have a technical trainer educate your users instead of doing it yourself. This can provide for a more engaging learning environment. During this training, you might opt to define the organizations acceptable use policy aup. This is a document that stipulates constraints and practices that a user must agree to before being granted access to a corporate Network or the internet

29
Q

You have been asked to move data from one user’s laptop to another user’s laptop. Both laptops have EFS functioning. Which of the following statements best describes the first step you should take during this procedure?

A) give the user of the second laptop administrator privileges
B) export the user’s certificate
C) disable networking
D) convert the partition to FAT32

A

B
The first thing you should do is export the user certificate from the first laptop to the second laptop. You can do this by clicking start and typing certmgr.msc in the search box, then locate an export the correct personal certificate. The certificates console window can also be added to the mmc. Encrypting file system is the standard single file encryption method for Windows and additions of Windows that support it

30
Q

An external attacker is constantly trying to break into one of your customers Soho networks. Which of the following statements best describes the easiest, most practical way to protect the network from intrusion?

A) disable the SSID broadcast
B) install an antivirus server application
C) disconnect the internet connection
D) install a firewall
E) install an IDS

A

D
The most practical way to prevent intrusion to the network is to install a firewall. In fact if this is a small office home office network, chances are the network is controlled by a multi-function Network device that already acts as a switch and a router and probably has built-in firewall technology, it just has to be enabled. Usually, the firewall on such a device is enabled by default, but perhaps someone inadvertently disabled this feature, and that is one of the reasons and attacker keeps trying to get into the network

31
Q

One of the administrators recently moved a large chunk of data from one server to another. Now, several users are reporting that they cannot access certain data shares and that they get an access denied error. The administrator confirms that the users are in the proper security groups, but the users are still unable to access the shares. Which of the following are the most likely causes of the problem? Select the two best answers.

A) denied permissions
B) user account time of day restriction
C) mapped drives
D) administrative share permissions
E) disabled proxy settings

A

A, C
The most likely reasons the users cannot connect or denied permissions and mapped drives. If the data was moved to another computer, the folders will inherit new permissions from the parent by default. That will most likely eliminate the current user access. Also, the path to the share will change Again by default. Either the server name, IP address, the share name, or both will be different when the data is moved to another server. So, to fix the problem, the user and group permissions will have to be modified for the new share, and new mapped drives will need to be configured

32
Q

You are tasked with formatting and 8 TB external storage drive with a file system. The drive will be connected directly to a computer that dual boots to Windows and linux. Which file system should you use?

A) exFAT
B) NFS
C) FAT32
D) ext4

A

C

33
Q

You want to write a Powershell script that will turn off a remote computer. Which of the following can you use to accomplish this task? Select the two best answers.

A) stop-computer
B) poweroff
C) kill
D) shutdown
E) restart-computer

A

A, D
Use the stop-computer cmdlet or the shutdown command. Either of these can be used to turn off a local or remote computer. They can be used directly in Powershell or within a script.

34
Q

Which switch to the robocopy command copies subdirectories but skips empty ones?

A) /E
B) /B
C) /S
D) /DCOPY:T

A

C

/E copies all subdirectories, including empty ones
/B copies files and backup mode
/DCOPY:T also copies timestamps of files and folders