220-1102 Cont'd Flashcards
(20 cards)
What are the key differences between Windows, macOS, and Linux?
Windows is widely used for business and gaming, macOS is optimized for Apple hardware, and Linux is open-source with various distributions.
What is the purpose of the Windows Registry?
It stores system and application settings for Windows.
What command is used to check disk errors in Windows?
chkdsk
What is the primary function of the Windows Task Scheduler?
Automates tasks such as backups and software updates.
What is the difference between NTFS and FAT32 file systems?
NTFS supports larger files and advanced security features, while FAT32 is more compatible with older systems.
What is the difference between phishing and spear phishing?
Phishing targets a broad audience, while spear phishing is directed at specific individuals.
What is the purpose of multi-factor authentication (MFA)?
It adds an extra layer of security by requiring multiple forms of verification.
What is the difference between a virus and a worm?
A virus requires user action to spread, while a worm spreads automatically.
What is the role of a firewall in network security?
It filters incoming and outgoing traffic based on security rules.
What is the purpose of a security patch?
It fixes vulnerabilities in software to prevent exploits.
What is the first step in troubleshooting a slow computer?
Check Task Manager for high CPU or memory usage.
What tool can be used to restore Windows to a previous state?
System Restore.
What is the purpose of Safe Mode in Windows?
It loads Windows with minimal drivers to troubleshoot issues.
What is the difference between a hard reset and a soft reset on mobile devices?
A hard reset restores factory settings, while a soft reset simply restarts the device.
What command is used to repair corrupted system files in Windows?
sfc /scannow
What is the purpose of an incident response plan?
It outlines steps to handle security breaches and system failures.
What is the role of asset management in IT?
It tracks hardware and software resources for efficiency.
What is the importance of documentation in IT support?
It ensures consistency and helps troubleshoot recurring issues.
What is the purpose of change management in IT?
It minimizes risks when implementing system updates or modifications.
What is the best practice for disposing of sensitive data?
Use secure deletion methods like data wiping or physical destruction.