Comptia A+ Flashcards

(77 cards)

1
Q

tool included in Windows that allows you to view detailed real-time information about CPU, memory, disk, and network performance and resource usage by the operating system, services, and running apps.

A

Resource Monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

controls the working environment of user accounts and computer accounts.

A

Group Policy Editor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

designed to free up disk space on a computer’s hard drive.

A

Disk Clean Up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

important functionality provided by the Operating System which can be used to create, delete, format disk partitions, and much more. It enables users to manage and view the different disks and functions like viewing, creating, deleting, and shrinking the partitions associated with the disk drives.

A

Disk Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

use these commands when computer running slow

A

-chkdsk (check disk)
-SFC (system file checker)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

verifies connectivity and gives you insight as to possible application problems at the computer that is attempting to print.

A

test page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

amount of memory a user is limited to with a 32-bit version of Windows

A

4gb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what command in linux allows you to see all the files on your system in long format

A

ls -la

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

chronological paper trail of evidence that may or may not be used in court.

A

chain of custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

steps a person takes when first responding to a computer with prohibited content or illegal activity: it includes identifying what exactly is happening, reporting through proper channels, and preserving data and devices.

A

First time responder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

part of first response; a person who first arrives at the scene of a computer incident will be in charge of preserving data and devices in their current state.

A

Data (and device) preservation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Two things you need to make secure wireless connection work?

A

-encryption standard used
-SSID of access point

Service Set Identifier (SSID) of the AP and then the encryption being used (for example, WPA or WPA2). The SSID takes care of the “connection” portion, and the encryption takes care of the “secure” portion. After all computers are connected, consider disabling the SSID for increased security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

is a virtually impenetrable symmetric encryption algorithm that uses a 256-bit key to convert your plain text or data into a cipher.

A

Advanced Encryption Standard (AES) 256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The data is included in dynamic content that is sent to a web user without being validated for malicious content

A

xss verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what control panel app in Windows 10 allows system administrators to modify local user account settings

A

user accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

performs copy includes all the files and directories along with their NTFS permissions

A

robocopy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

use this to clean dust inside computer

A

compressed air

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

main function of a device driver

A

allows operating system to talk to device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

an attacker that sits in the middle between two stations and is able to intercept, and in some cases, change that information that’s being sent interactively across the network

A

on-path attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

an attack meant to shut down a machine or network, making it inaccessible to its intended users

A

Denial-of-Service (DoS) attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Windows System Recovery Option attempts to automatically fix problems?

A

startup repair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A Windows Control Panel folder containing shortcuts to various system utilities is called:

A

admin tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

component of physical security addresses outer-level access control

A

fences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

a protocol that devices within a network use to communicate problems with data transmission

A

The Internet Control Message Protocol (ICMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
what program is typically designated to house the recovery utility for troubleshooting and repairs?
WinRE
26
When a person takes control of a session between a server and a client, it is known as which type of attack?
session hijacking
27
Session hijacking occurs when an unwanted mediator takes control of the session between a client and a server (for example, an FTP or HTTP session). An example of this would be a man-in-the-middle (MITM) attack. True or False
True
28
You create an answer file to aid in installing Windows. Which type of installation are you performing?
unattended installation
29
An unattended installation of Windows requires an answer file. This file is normally named unattend.xml. Unattended installations can be done locally or as part of a network installation using Windows Deployment Services (WDS) in Server 2008 or higher. True or Fasle
True
30
checks protected system files and replaces incorrect versions.
System File Checker ( SFC)
31
Which Microsoft Windows OS component allows to view and manage installed hardware components and device drivers?
devmgmt.msc
32
a control panel that gives you access to many advanced administration tools: Task Scheduler, Event Viewer, Performance Monitor, Device Manager, Disk Management, Services, and more.
compmgmt.msc
33
is a system utility designed to troubleshoot the Microsoft Windows startup process.
System Configuration (msconfig.exe)
34
You must partition the drive before formatting. True or False
True
35
A technician is installing a program on a Windows computer and the installation fails. Which to do next?
Run the installer as an administrator
36
Programs cannot be installed by standard users or guests. You must have administrative rights to do so. True or False
True
37
measures the packet loss at each router as the packet travels to the destination address; it combines the ping and tracert commands.
pathping
38
returns a single destination’s response time
ping command
39
resolve DNS addresses.
nslookup
40
allows you to see how a packet travels to its destination
tracert
41
Disabling the SSID broadcast is a security precaution, but it only keeps out the average user. Any attacker with two bits of knowledge can scan for other things the wireless access point broadcasts. True or False
True
42
Using WEP is more secure than not using any encryption and disabling the SSID. RADIUS is an external method of authenticating users; it often requires a Windows Server. WPA2 is very secure; if you had one security option you could enable, make it WPA2. True or False
True
43
attempts to rebuild the boot configuration store.
Bootrec /rebuildbcd
44
one of the methods you can try to repair bootmgr.exe in Windows.
Bootrec /fixboot
45
rewrites the master boot record in a Windows system that has an MBR-based hard drive (doesn’t affect the more common GPT-based drive)
Bootrec /fixmbr
46
where the boot configuration store is located
boot\bcd
47
Because there is only one computer, you can implement auditing only locally. This is done with the Local Security Policy. True or False
True
48
is a shortcut in Windows operating system to get a list of all the services on the computer.
Services. msc
49
Jailbreaking is the process of removing the limitations of an Apple device’s iOS. It enables a user to gain root access to the system and download previously unavailable applications, most likely unauthorized by Apple. True or False
True
50
copies all of the files that have changed since the last full backup was performed
Differential
51
Which type of attack denies authorized users access to network resources?
Denial of service attack
52
It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.
social engineering
53
two devices that have a grounding wire attached to them based on the manufacturer's design?
UPS Server rack
54
defends your data, after a connection is established and authenticated, against potential attackers
Encryption in transit
55
allows you to see all running programs in macOS
mission control
56
A tool, utility, or command within a program that allows users to locate specific objects (macOS)
finder
57
stores your passwords and account information, and reduces the number of passwords you have to remember and manage (macOs)
keychain
58
what command on linux combines files together
cat command
59
Cat command often used to concatenate one file to nothing to print the single file's contents to the terminal. This is a quick way to preview the contents of a text file without having to open the file in a large application True or False
True
60
file type for installing new software on a macOS computer
.app
61
computer file on windows that contains an encoded sequence of instructions that the system can execute directly when the user clicks the file icon.
.exe
62
a collection of files managed by the Debian packages management system (Linux)
.deb
63
best way to find out which type of connection the printer is using?
right click the printer, select properties, and click the port tabs
64
True or False On the Ports tab, you can find how the printer is connected to the computer. This can be a USB, COM, LPT, or TCP/IP port. You might get to this tab by selecting Properties or Printer Properties, depending on the printer.
true
65
identification method that enables users to log in to multiple applications and websites with one set of credentials
single sign on (sso)
66
records all errors that occur in system
event viewer
67
-database that stores the settings for Windows -contains hardware and software information, plus user settings.
Windows Registry
68
True or False If you need to troubleshoot certain Dynamic-Link Libraries (DLLs) or ActiveX controls (for example, ones that work with Internet Explorer), you can manipulate them with the REGSVR32 command
True
69
True or False macOS and Linux use a utility called Terminal that allows you to manipulate data and make configuration changes similar to the Command Prompt in Windows.
true
70
if your printer begins to smoke you should do what
unplug it
71
Which tab of the Windows' 10 Task Manager provides an interface for managing background processes?
services
72
use this command to defrag the partition to drive hard?
defrag.exe -f
73
best method to apply spray cleaner to a monitor?
Spray on a lint-free cloth
74
common risk when installing Window drivers that are unsigned
Explanation By installing a driver that is not signed by Microsoft, you are risking instability of the operating system
75
which device is best to setup a secure physcial access to a data center
badge reader
76
which mac command use to close app when not working?
force quit
77
resume practice question 67 (Practice Exam #2 (220-1102) - Results