SG: Practice Exam 2 Flashcards

1
Q

You just finished installing Windows 8, and you need to install a sound editing application. Where can you search for this application?

A. Microsoft Store

B. Metro UI

C. OneDrive

D. Start screen

A

A. Microsoft Store

The Microsoft Store is a place where you can search and install utilities for Windows 8 and higher operating systems. The Metro UI was the original name of the Windows 8 user interface. OneDrive is an online/cloud storage location. The Start screen only allows you to select already installed applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Your supervisor asks you to plan for a fault-tolerant disk design on a sensitive Windows workstation. Which partition scheme should you use?

A. GPT

B. MBR

C. Dynamic

D. Basic

A

C. Dynamic

In the Windows operating system, if you are going to use RAID, the partitions scheme must be dynamic. MBR, GPT, and Basic (MBR) do not allow for RAID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which type of malware is able to conceal itself from many parts of the operating system and obtain/retain elevated privileges?

A. Worm

B. Trojan

C. Rootkit

D. Botnet

A

C. Rootkit

Rootkits are software programs that can hide certain things from the operating system. A worm is malware that replicates itself and infects other system. Trojans are programs that enter a system or network under the guise of another program. A botnet is a group of infected computers that can be remotely control via a command-and-control server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which Windows 10 feature allows for the searching of local documents, applications and web searches via voice commands?

A. UWP

B. Edge

C. Cortana

D. Spotlight

A

C. Cortana

Cortana is a digital person assistant that allows for searching the local computer for both application and documents as well as web results using your voice. The Universal Windows Platform (UWP) is a development platform. Edge is a new web browser that is to replace Internet Explorer. The Spotlight feature will display a random wallpaper on the login screen from Bing.com.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is not an NTFS permission for a directory? (Choose the best answer.)

A. Full Control

B. Write

C. Read & Execute

D. Change

A

D. Change

Change is a share permission; the similar permission in NTFS is Modify. Full Control gives allows the user to change security and take ownership of files. Write permissions allow files to be written to. The Read & Execute permission allows files to be read and executed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following types of firewalls block traffic to specific addresses based on the type of application associated with the data?

A. Proxy

B. Packet-filter

C. Stateful

D. Stateless

A

B. Packet-filter

A firewall operating as a packet filter passes or blocks traffic to specific addresses based on the type of application. Proxy firewalls act as intermediaries between the requestor and the server that fulfills the request. Stateful packet filter firewalls monitor the entire conversation between two hosts sending packet. Stateless packet filter firewalls act on condition and action statements, regardless of the conversation state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You have a multiboot installation of Windows 8 and Windows 7. Where can you change the default operating system that is booted?

A. Boot Manager Settings

B. Advanced System Settings

C. diskpart

D. WinRE

A

B. Advanced System Settings

By navigating to Control Panel ➢ System and Security ➢ System, and then clicking Advanced System Settings, you can change the default operating system booted in a multiboot installation. There is no Windows utility called the Boot Manager Settings. The diskpartcommand-line utility allows you to view information about the disk and partitions (volumes). The Windows Recovery Environment (WinRE) is used to recover a Windows installation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which protocol is used with claims-based authentication of users?

A. SSO

B. Kerberos

C. LDAP

D. EFS

A

A. SSO

Single sign-on (SSO) is used in conjunction with Active Directory for claims-based authentication. Kerberos is the protocol used to authenticate a user with Active Directory and provides the network access token. Lightweight Directory Access Protocol (LDAP) is used to look up objects in Active Directory. Encrypted File System (EFS) is used to encrypt files on NTFS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which key allows you to individually select multiple files at one time for copying?

A. Shift

B. Alt

C. Ctrl

D. Windows

A

C. Ctrl

By holding the Ctrl key and clicking individual files, you can select multiple files for copying. Holding the Shift key will allow you to select a group of files, but not individual files. Holding Alt and double-clicking will open the properties of the file or folder. The Windows key will open the Start menu.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You have a laptop that has a CDROM drive, which ways could you install Windows 10? (Choose two answers).

A. USB

B. CDROM

C. eSATA

D. PXE

A

A. USB

D. PXE

Universal Serial Bus (USB) flash devices can install Windows 10 and it is the most popular way to install Windows 10 on a laptop with no optical drive. Windows 10 requires a DVD-ROM because of the size of the install media, a CDROM will not work. eSATA is not a media that can install Windows 10, although Windows 10 can be installed to eSATA it is not an option to install from. Preboot Execution Environment (PXE) is a way of booting over a network so that an installation of Windows 10 can be performed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which Linux command can you use to rename a file?

A. rd

B. mv

C. cp

D. chown

A

B. mv

The mv command is used at the Linux shell to rename a file. The rd command is a DOS command to remove a directory. The cp command copies a file or directory. The chown command changes the ownership of a file or directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which technology allows you to power a device remotely using only a network connection?

A. PoE

B. WoL

C. QoS

D. WinPE

A

A. PoE

Power over Ethernet (PoE) allows you to power a device remotely using only a network connection. Wake-on-LAN (WoL) is used to wake up computers over the network with the use of a WoL Magic Packet. Quality of Service (QoS) is a packet-scheduling mechanism built into Windows for controlling the flow of network traffic. WinPE, the Windows Preinstallation Environment, is used to install, deploy, and repair Windows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You just installed a hard drive from an Apple computer into a Windows computer. Why can’t you view the files?

A. The drive needs to be initialized.

B. The drive needs to be mounted.

C. The drive needs to be converted to GPT.

D. The drive contains an HFS filesystem.

A

D. The drive contains an HFS filesystem.

Apple computers use a filesystem called Hierarchical File System (HFS), which is incompatible with Windows operating systems. None of the other options are valid. The files will need to be copied on an Apple PC to a disk containing FAT, FAT32, or NTFS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is a recommended physical security method?

A. Locking doors

B. Installing antivirus software

C. Enabling firewalls

D. Applying directory-level permissions

A

A. Locking doors

Locking doors is a recommended physical security method. Installing antivirus software is a form of digital protection. Firewalls and directory-level permissions are considered a form of logical security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You need to create a script that will run the same on both Windows and Linux operating systems. Which scripting language should you choose? (Choose the best answer.)

A. Python

B. Bash script

C. PowerShell

D. Windows batch script

A

A. Python

A Python script will work the same on both Windows and Linux operating systems, since both operating systems use the same interpreter to execute scripts. A Bash script will run uniquely on Linux only. A PowerShell script will run uniquely on Windows. Windows Batch scripts can only be executed on Windows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is a recommended physical security method?

A. Badges

B. Antispyware

C. Firewalls

D. User authentication

A

A. Badges

The use of badges is a recommended physical security method. Antispyware and user authentication are digital forms of security. Firewalls are logical forms of security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How can you get the Charms bar to appear from the Start screen in Windows 8/8.1?

A. Press the Windows button on the keyboard

B. Point to the upper-left corner of the screen

C. Point to the lower-right corner of the screen

D. Point to the lower-left corner of the screen

A

C. Point to the lower-right corner of the screen

The Charms menu appears when you place the pointer in the lower-right corner of the screen. Pressing the Windows button on the keyboard will launch the Start screen. Pointing to the upper-left corner of the screen will do nothing. Pointing to the lower-left corner of the screen will display the Start tile.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

You believe that the disk on your Linux operating system is full. Which command will allow you to verify this assumption?

A. df

B. su

C. pwd

D. ls

A

A. df

The df command allows you to see how much of the disk is free. The su command allows you to log in as a different user. The pwdcommand shows the current working directory. The ls command lists all of the files in the current working directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

You are having network issues. When you view the current IP address with the ipconfig command, you observe that your address is 169.254.34.3. What is most likely the problem?

A. The DHCP server is serving the wrong IP address range.

B. A user-configured IP address has been statically assigned.

C. An APIPA address has been statically configured.

D. The DHCP server has failed.

A

D. The DHCP server has failed.

The most likely problem is that the DHCP server has failed, causing the Automatic Private IP Addressing (APIPA) feature to configure the IP address. Although the cause of the problem in the following answers is possible, it is unlikely the cause of the problem described above. A DHCP server is not likely to serve an APIPA address. The User configured section on the Alternate Configured tab, is not likely to contain a user configured APIPA address. An APIPA address is not likely to be statically configured.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

You need to find out which application is listening on port 455. Which command should you use?

A. net use

B. nslookup

C. netstat

D. tracert

A

C. netstat

You can use the netstat command to view all listening ports (netstat –a) and the applications listening (netstat –b). The net usecommand is used to map drives. The nslookup command is used to look up DNS entries. The tracert command is used to determine the path a packet will take though the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which Linux command can you use to see the directory you are currently working in?

A. pwd

B. cd

C. ls

D. ps

A

A. pwd

The pwd command is used at the Linux shell to see the present working directory. The cd command allows you to change the current directory. The ls command displays the files in the current directory. The ps command displays the current process running on the operating system.

22
Q

Currently you have Windows 7 Ultimate installed and you want to upgrade to Windows 10. What is the recommended edition for Windows 10?

A. Windows 10 Pro

B. Windows 10 Enterprise

C. Windows 10 Ultimate

D. Windows 10 Home

A

A. Windows 10 Pro

Microsoft recommends upgrading to Windows 10 Pro, as the features are closely matched to Windows 7 Ultimate. Windows 10 Enterprise is a volume licensed edition of Windows. Windows 10 Ultimate is not a valid edition of Windows 10. Windows 10 Home lacks some of the features that Windows 10 Pro has.

23
Q

Which tool is used to update a print driver on the operating system?

A. Device Manager

B. Print Management

C. System Configuration

D. msconfig

A

B. Print Management

Although the Device Manager can be used to update most drivers, the Print Management console is the only place to update print drivers. The System Configuration tool (msconfig) is used to manage bootup and service settings.

24
Q

Madonna is interested in securing her SOHO wireless network. What should she do to be assured that only her devices can join her network?

A. Enable WPA2

B. Enable MAC filtering

C. Enable Port Security

D. Disable SSID broadcasts

A

B. Enable MAC filtering

Enabling MAC filtering on the access point will allow only the devices that she specifies. Enabling WPA2 encryption will not prevent unauthorized access to the SOHO network. Port Security is enabled on wired network switches to prevent unauthorized access. Disabling the SSID from broadcasting will not prevent unauthorized access.

25
Q

Which form of social engineering involves sorting through trash to find information?

A. Spearing

B. Phishing

C. Dumpster diving

D. Whaling

A

C. Dumpster diving

Dumpster diving is the act of sorting through trash to find information. Spear fishing is the act of phishing in an attempt to gain user credentials with a trusted source. Phishing is an overall attempt to gain user credentials. Whaling is a phishing attempt directed at a high-profile person in an organization.

26
Q

What is a method for stopping tailgating?

A. User authentication

B. Mantraps

C. Strong passwords

D. Change SSIDs

A

B. Mantraps

Using mantraps (small rooms that limit access to one or a few individuals) is a great way to stop tailgating. User authentication will not prevent or stop tailgating. Strong passwords will not prevent tailgating, as tailgating is a physical security problem. Changing SSIDs will not stop tailgating, as tailgating does not pertain to wireless.

27
Q

Chelsea is worried about the threat of malware on the network. She wants to install software that will detect worms and Trojan horses on every workstation. Which type software should she install?

A. Malware

B. Antivirus

C. Software firewalls

D. Spyware

A

B. Antivirus

Antivirus software is used to scan workstations for viruses, worms, and Trojan horses. Malware is software that causes malicious activity. Software firewalls will not detect Trojan horses and worms. Spyware is software that monitors user activity and offers unsolicited pop-up advertisements.

28
Q

Which Desktop element can restore recently deleted files for Microsoft operating systems?

A. Recently Deleted

B. Trash Can

C. Recycler

D. Recycle Bin

A

D. Recycle Bin

The Recycle Bin is the icon on the Desktop that can be used to recover recently deleted file. Recently Deleted and Recycler folders are not used in any mainstream operating system for restoring deleted files. The Trash Can is used the restore deleted items in the Apple operating system.

29
Q

You have a dual-boot computer and need to change the boot order. Which tool enables you to change the boot order?

A. Task Scheduler

B. System Properties

C. msinfo32

D. bootrec

A

B. System Properties

System Properties (sysdm.cpl) is used to change the boot order. Navigating to System Properties, then the Advanced tab, then Startup & Recovery Settings will display the boot order. Task Scheduler is used to schedule tasks. Msinfo32 is used to view the operating system environment and hardware. Bootrec is used to fix the MBR.

30
Q

Which remote access protocol provides TLS security?

A. SSH

B. Telnet

C. RDP

D. VNC

A

C. RDP

The Remote Desktop Protocol (RDP) encrypts with 128-bit TLS security. SSH is a text console–based remote access method and uses public-key cryptography. Telnet is a text console–based remote access method and does not offer any encryption. VNC is a remote screen-sharing application and does not offer any encryption.

31
Q

Your junior administrator has come to you after finding an exploit on your computer systems. A patch for this particular exploit is not available. What has your junior administrator found?

A. A virus

B. A rootkit

C. A zero-day exploit

D. A zombie

A

C. A zero-day exploit

Your junior administrator has likely found a zero-day exploit, which has no known patch. Viruses can be prevented with antivirus or anti-malware software. Rootkits are software programs that can hide certain things from the operating system. Zombies are malware-infected computers awaiting a command from a command-and-control server.

32
Q

You need to provide a connection to a server, the requirements are the connection must be a text console–based connection with a high level of encryption. Which remote access technology should you choose?

A. RDP

B. Telnet

C. SSH

D. VNC

A

C. SSH

The Secure Shell (SSH) protocol is a text console–based remote access protocol that allows for a high-level of encryption. The Remote Desktop Protocol (RDP) is a GUI-based tool. Telnet is a text console–based remote access protocol that does not support encryption. Virtual Network Computing (VNC) is a GUI-based remote desktop tool.

33
Q

Which editions of Windows 7 allow the user to join a domain?

A. Ultimate and Home Premium

B. Professional and Home Premium

C. Enterprise, Professional, and Ultimate

D. Home Premium, Enterprise, Professional, and Ultimate

A

C. Enterprise, Professional, and Ultimate

This is available with Windows 7 in the Enterprise, Professional, and Ultimate editions. You cannot join Windows Home Premium to a domain; therefore, no other answers are correct.

34
Q

Which of the following statements is true?

A. An application-level proxy server provides better security than packet filtering.

B. An application-level proxy server is considered a weak form of security.

C. An application-level proxy server must handle all protocols supported.

D. A unique application-level proxy server must exist for each protocol supported.

A

D. A unique application-level proxy server must exist for each protocol supported.

A unique application-level proxy server must exist for each protocol supported. An application-level proxy server does not provide better security than packet filtering. An application-level proxy is not considered a weak form of security. An application-level proxy doesn’t have to handle all protocols; it typically handles only one protocol.

35
Q

Which Desktop element contains the volume adjustment for the computer?

A. System tray

B. Task tray

C. Start menu

D. Start screen

A

A. System tray

The system tray contains the volume adjustment that can be used to adjust the sound for the computer. In addition to the volume icon, the system tray holds other icons, such as eject, network, and date and time. The task tray is not an element of the Desktop. The Start menu is used to start applications and applets. The Start screen is similar to the Start menu and found in Windows 8.

36
Q

Which remote access protocol will connect local drives and Plug and Play (PnP) devices?

A. SSH

B. Telnet

C. RDP

D. VNC

A

C. RDP

The Remote Desktop Protocol (RDP) can transport several resources, including remote audio, printers, the Clipboard, local disks, and video-capture devices, as well as any other Plug and Play (PnP) devices. SSH is a text console–based remote access method and will not connect devices. Telnet is a text console–based remote access method and will not connect devices. VNC is a remote screen-sharing application, but it will not connect remote devices.

37
Q

Which Linux command can you use to download software packages?

A. sudo

B. dd

C. apt-get

D. pm

A

C. apt-get

The apt-get command can be used at the Linux shell to download software packages. The sudo command executes a single command with root privileges. The dd command is used to duplicate block-level data. There is no pm command in Linux.

38
Q

Which operating system lifecycle term is used to describe an OS that is almost ready to be sold to customers?

A. Alpha

B. Beta

C. Release candidate

D. Mainstream

A

C. Release candidate

A release candidate is a prerelease of an operating system, before it is released to market (RTM). It often has features that may or may not be in the final version. Alpha versions of software are highly unstable. Beta versions have bugs and are more stable than alpha versions, but not ready for retail. Mainstream is a term used to describe the current release operation system.

39
Q

Your computer suddenly rebooted. Which tool could help to explain why?

A. Event Viewer

B. Task Scheduler

C. shutdown

D. Performance Monitor

A

A. Event Viewer

Event Viewer records system errors that could explain why the computer abruptly rebooted. Task Scheduler is used to schedule tasks. The shutdown command shuts down a computer or reboots it. Performance Monitor shows only performance-related statistics.

40
Q

A RADIUS server is an example of which type of server?

A. DNS

B. Email

C. Proxy

D. Authentication

A

D. Authentication

Remote Authentication Dial-in User Service (RADIUS) servers are authentication servers. DNS servers perform name resolution for clients. Email servers deliver and receive email on the Internet. Proxy servers fetch requests on behalf of clients.

41
Q

What should you do before upgrading from Windows 8.1 to Windows 10?

A. Upgrade the hard drive

B. Upgrade RAM

C. Run the Upgrade Readiness Deployment Script

D. Upgrade the processor

A

C. Run the Upgrade Readiness Deployment Script

Microsoft recommends running the Upgrade Readiness Deployment Script to assess whether your hardware and software can be upgraded to Windows 10. The hardware requirements for Windows 8.1 are identical to Windows 10, so upgrading the hard drive, RAM, and processor are not required.

42
Q

When joining Windows 10 to an Active Directory domain, what is required?

A. Windows 10 Enterprise

B. The BitLocker feature installed.

C. An administrative account on the domain.

D. The BranchCache feature installed.

A

C. An administrative account on the domain.

When joining a Windows 10 operating system to a domain, an administrative account on the domain is required. As long as the operating system is not Windows 10 Home, it can be joined to an Active Directory domain. BitLocker is a volume level encryption tool for Windows. BranchCache is a caching tool to speed up access for remote computers at branch locations.

43
Q

What is the following PowerShell statement an example of?

If ($count < 5) {#do something}

A. A for loop

B. A branch loop

C. A while loop

D. Branch logic

A

D. Branch logic

This is an example of branch logic, which is used to branch execution based upon a true or false condition. A for loop is a loop that has a defined beginning, end, and step. There is no such thing as a branch loop; however, a branch can be used to exit a loop. A while loop is a loop that requires a condition to be satisfied to exit.

44
Q

Which line is used to comment VBScript code?

A. //comment

B. ‘comment

C. REM comment

D. # comment

A

B. ‘comment

The line of ‘comment is used to comment VBScript code. The line of //comment is used to comment JavaScript code. The line of REM comment is used to comment Windows Batch script code. The line of # comment is used to comment Bash script code and PowerShell code.

45
Q

You are assisting an end user with Windows 10 and need to transfer some files to her. Which remote access technology should you use?

A. SSH

B. Quick Assist

C. Telnet

D. Third-party remote assistance

A

D. Third-party remote assistance

Neither SSH nor Telnet transfer files or screen share. Quick Assist does not have a file-transfer function. So, third-party tools will be required.

46
Q

Which attribute is used by the operating system to protect files?

A. Hidden

B. System

C. Protect

D. Archive

A

A. Hidden

The Hidden attribute is used by the operating system to protect files by hiding them from the users. The System attribute will not protect files in the operating system. There is no Protect attribute. The Archive attribute works to notify backup software that a file should be backed up.

47
Q

Which editions of Windows 10 allows for joining a corporate domain?

A. Enterprise only

B. Enterprise and Pro only

C. Pro, Education, and Enterprise only

D. Home, Pro, Education, and Enterprise only

A

C. Pro, Education, and Enterprise only

All editions of Windows 10 allow for joining a corporate domain, except for Windows 10 Home.

48
Q

Which type of variable contains characters or text-based values?

A. Boolean

B. Integer

C. Floating-point

D. String

A

D. String

String variables allow for text values and characters. Integer variables allow for whole number values. Floating-point variables allow for precision math, also known as decimal math. Boolean variables allow for true or false values.

49
Q

You need to adjust the UAC settings. Which Control Panel applet should you launch?

A. User Account Control

B. Users and Groups

C. System

D. User Accounts

A

D. User Accounts

User Account Control (UAC) settings can be adjusted from the User Accounts applet inside of the Control Panel. The User Account Control applet does not exist. The Users and Groups applet does not exist as an applet; it’s a Microsoft Management Console (MMC) snap-in. The System applet is not used to adjust UAC settings.

50
Q

When you perform and in-place upgrade to Windows 8 or Windows 8.1, which folder is the prior operating system file kept in?

A. Windows.old

B. Windows.7

C. $Recycle.Bin

D. System Volume Information

A

A. Windows.old

After an in-place upgrade, the prior operating system is kept in the Windows.old folder for 28 days before being deleted. The Windows 8/8.1 operating system does not use a Windows.7 folder for anything. The $Recycle.Bin folder is used to keep files when they are deleted. The System Volume Information folder is used to keep prior versions of files.