CompTIA A+ Core 2 Flashcards

(145 cards)

1
Q

an old partition style that allows for four primary bootable partitions per hard disk with one marked as active, and 1 extended partition per hard disk, containing additional logical partitions (not bootable)

A

MBR (Master Boot Record)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

category of user groups given a standard set of rights that allows them to perform appropriate system tasks

A

built-in local groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

the latest partition style which requires a UEFI BIOS and allows for 128 partitions, all bootable

A

GPT (GUID Partition Table)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

file system that allows for 2 TB volumes, and max file size of 4 GB

A

FAT32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Microsoft flash drive file system, files can be larger than 4GB

A

exFAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

an improved file system over FAT32 exclusively for use with Windows, including features such as quotas, file compression, encryption, etc

A

NTFS (New Technology File System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ISO 9660 Standard file system, where all OSs can read the CD

A

CDFS (Compact Disk File System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

file systems common on Linux

A

ext3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

file system common on Linux and Android OS

A

ext4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

file system that allows access to files across the network

A

NFS (Network File System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

file system for Mac OS, replaced by APFS in High Sierra

A

HFST (Hierarchical File System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

formatting method that creates a new file table but does not erase data that already existed. it is the default in Windows 7, 8, 10

A

quick format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

formatting method that writes zeroes to the whole disk, making old data unrecoverable, and checks the disk for bad sectors

A

full format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

type of storage involving volumes spanning over an array stored in fixed disks in the computer connected via SATA or NVMe bus

A

dynamic storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

feature that encrypts info on the disk drive

A

Bitlocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

feature that offers file and folder level encryption

A

EFS (Encrypting File System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

feature that allows remote computers to share access to a single cache of data

A

Branchcache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

change directory command

A

cd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

command to rename a file

A

ren OldName NewName

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Windows command to delete a file

A

del or erase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

command to create a directory

A

md or mkdir

ex. md DirectoryName

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

remove directory command

A

rd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

command to get more information

A

help or /?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Windows command to list files and directories

A

dir

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
command to wait nn seconds, then shutdown
shutdown /s /t nn
26
command to shut down and restart after nn seconds
shutdown /r /t nn
27
command to abort the countdown
shutdown /a
28
command that fixes logical file system errors on disk
chkdsk /f
29
command that locates bad sectors and recovers readable info
chkdsk /r
30
command that scans the integrity of all protected system files
sfc | system file checker
31
command that allows you to manage Windows Imaging Format (WIM) files
dism | Deployment Image Servicing and Management Tool
32
Windows command that shows currently running processes
tasklist
33
command that terminates tasks by process ID
taskkill
34
command to force group policy update
gpupdate
35
command that verifies policy settings for a computer or user
gpresult
36
command that formats a disk for use with Windows
format
37
command that copies files and verifies that the new files are written correctly
copy /v
38
command that copies files and suppresses prompting to confirm that you want to overwrite an existing destination file
copy /y
39
command that copies files and directory trees
xcopy
40
command that copies files and directory trees and is a better version of xcopy
robocopy
41
command that pings your local router/gateway, determines TCP/IP and network adapter info, and views details about DNS servers, DHCP server, etc
ipconfig
42
command that testes reachability using ICMP
ping
43
command that determines the route a packet takes to the destination
tracert
44
command that shows all active connections
netstat -a
45
command that shows binaries (Windows) and requires elevated access
netstat -b
46
command that tells terminal not to resolve names (show IPs, not DNS names)
netstat -n
47
command that looks up info from DNS servers
nslookup
48
What is the solution to internet connectivity issues?
- scan with anti-virus software - verify proxy server settings - verify network settings
49
What is the solution for a security alert?
- scan with anti-malware software | - ultimo system restore to return system to previous known-good state
50
What is the solution for web browser redirection?
- scan with anti-virus software - very proxy server settings in web browser - verify Host.ini file isn't corrupted
51
What is the solution to web browser pop-ups?
- scan with anti-spyware software - clear cache - delete cookies
52
graphical and text-based tool set to fix common Windows startup issues
recovery console
53
set of tools that can be booted and loaded from a CD, DVD, or thumb drive
Pre-Installation Environments (PE)
54
backup type that backs up everything on the machine
full backup
55
backup type that backs up new files and files modified since last full or incremental backup
incremental backup
56
backup type that backs up all data modified since the last full backup
differential backup
57
From where does a folder inherit its permissions by default?
Its parent folder
58
What actions should you take to secure your wireless network?
- Ensure access point and end host use the same encryption - Do not use default SSID - Change name of SSID (not last name, company name, location, etc) - Disable the SSID broadcast
59
What steps should you take to secure your network?
- Change default usernames and passwords - Enable MAC filtering - Turn off unneeded ports and cover unused network jacks - Configure a static IP address - Minimize DHCP IP scope to minimum needed
60
Which type of IP address is best for servers, more secure, but more time consuming?
static IP
61
Which type of IP address is best for network hosts?
Dynamic IP
62
Type of format done by the BIOS that erases the pointers to data on the drive, not the data itself
Low level format
63
Type of format done by the OS that erases pointers to data, not the data itself
Standard format
64
How should data on CDs, DVDs, and floppy disks be destroyed?
Shredder
65
What should you do to sanitize the hard drive if it is to be donated?
Overwrite the hard drive with DOD 5220.22-M compliant program
66
Possible causes of blue screen of death
- memory issue | - malware infection
67
possible causes of failure to boot
- incorrect boot configurations in BIOS - corrupted or missing boot files - missing drivers
68
Possible cause of spontaneous shutdown/reboot
often caused by a configuration to automatically restart upon a STOP or blue screen error
69
Possible cause of RAID not being detected during installation
Windows installation not recognizing RAID because it's missing special drivers
70
What could be the causes of slow system performance?
- system not configured for max performance - paging file drive is fragmented or full - system needs more memory - system is overheating
71
Possible causes of a file failing to open
- file corruption | - broken file association
72
command to remove a file from a directory or disk and prompt a delete for each file
del /p
73
command to remove a file from a directory or disk and suppress prompt for read-only files
del /f
74
command to remove a file from a directory or disk and suppress prompt on a wildcard delete
del /q
75
command to remove a file from a directory or disk and also delete files from subdirectories
del /s
76
the scheduling service in Linux when you want to run a batch of commands or a script to perform a backup or other maintenance task
Cron
77
a non-interactive account with the same, or in some ways better, privileges as the default Administrator account; executed processes are unrestricted in making changes
LocalSystem
78
a non-interactive account used to run services that cannot make system-wide changes and can access the network anonymously
LocalService
79
functions that describe the overall operation of an access control system
- authentication: prove who you say you are - authorization: only authenticated users can access - accounting: recording when/by whom it was accessed
80
controls implemented in software to create an access control system
logical security
81
the three principle types of cryptographic technology
- cryptographic hash: impossible to recover original string from has value - asymmetric encryption: public key and private key - symmetric encryption: single secret key
82
logical security technologies designed to prevent malicious software from running on a hose; does not entirely depend on the good behavior of individual users
execution control
83
classification category where viewing is restricted to the owner organization or third-parties under NDA
classified
84
classification level where the information is highly sensitive, for viewing only by approved persons within an organization
confidential
85
a type of release that is well-supported and will be regularly updated by the Linux distribution to support new hardware, performance, and security improvements. good for servers
LTS (Long-Term Support) release
86
ia concept in software development where an application is frequently updated through the release of new features over time.
Rolling release
87
standardized client-server environment that boots a software assembly, retrieved from a network, on clients. It allows a workstation to boot from a server on a network before booting the local hard drive's operating system. It is usually used to install an image on the computer over the network
The Preboot eXecution Environment (PXE)
88
What can you use to protect against an under-voltage event?
battery backup or a line conditioner
89
What can you use to protect against a power loss or power failure?
battery backup or generator should be used
90
an electrical apparatus that provides emergency power to a load when the input power source becomes too low or the main power fails. provides near-instantaneous protection from input power interruptions by using a battery backup. The on-battery run-time is usually short (less than 60 minutes) but sufficient to properly shut down a computer system
uninterruptible power supply or uninterruptible power source (UPS)
91
a remote access tool and protocol. It is used for screen sharing on Linux and macOS.
VNC (virtual network computing)
92
a device that adjusts voltages in under-voltage and overvoltage conditions to maintain a 120 V output, used to protect an entire power circuit from under-voltage events and power sags
Line conditioners
93
data used to identify, contact, or locate an individual
PII (Personally Identifiable Information)
94
What are the steps for conducting an indecent response?
1. Identify 2. Report 3. Preserve the data/device
95
mode used to save the current session to disk before powering off the computer to save battery life
hibernate mode
96
mode that saves current session to memory and puts computer in minimal power state to save battery
sleep/standby mode
97
formal request to initiate a data transfer by establishing a circuit or connection between two networks
Data transport request
98
chronological documentation/paper trail records of the sequence of custody, control, transfer, analysis, and disposition of materials
chain of custody
99
formal process of exchanging info between parties about witnesses/evidence they will present at trial
Process of discovery
100
process to preserve all forms of relevant information when there will be litigation
legal hold
101
hidden system file with .sys extension stored in system drive; reduces workload of physical memory; often referred to as virtual memory
Pagefile
102
7 steps to malware removal
1. Investigate and verify malware symptoms 2. Quarantine the infected systems 3. Disable system restore in windows 4. Remediate the infected systems, updated anti-malware software, scan the system, and use removal techniques (eg safe mode, pre-installation environment) 5. Schedule scans and run updates 6. Enable system restore and create a restore point in windows 7. Educate the end user
103
command that finds information in the DNS
nslookup
104
what are the meanings of octal permissions 0-7?
0: deny all - - - 1: execute - - x 2: write - w - 3: write and execute - w x 4: read-only r - - 5: read and execute r - x 6: read and write r w - 7: allow all r w x
105
linux command that sets the permissions of files or directories on a Linux system
chmod
106
linux command that changes user ownership of a file, directory, or link
chown
107
linux command to change passwords for user accounts
passwd
108
linux command that displays the present working directory
pwd
109
linux command that is used to list files
ls
110
linux command to display a long list of files
ls -l
111
linux command to display all files including hidden or system files
ls -a
112
linux command to change directory to the parent directory of the one you are currently working in
cd ..
113
linux command used to create a copy of files either in the same or different folder with the same or different name
cp
114
linux command that copies a file and displays the files copied
cp -v
115
linux command is used to either move files from one directory to another or rename a file
mv
116
linux command to delete files
rm
117
linux command to remove contents of an entire directory
rm -r
118
linux command used to filter files
grep
119
command that allows a Linux user to switch to another user account, including superuser (or root) if another user id is not specified
su
120
linux command that allows a normal user to run specified commands with superuser privilege level
sudo
121
linux command used to list the currently running processes, and their PIDs plus some other info
ps
122
linux command used along with a process ID to end the process
kill
123
file system search feature in the macOS environment
Spotlight
124
linux tool that displays information about the wireless adapters configured within the system
iwconfig
125
macOS feature for managing applications from the desktop that is similar to the Windows taskbar
Dock
126
MacOS feature used to allow dual booting on a Macintosh computer. It allows the user to boot into either macOS (OS X) or Windows as the computer is rebooted. only supported on Intel-based macOS systems
Boot Camp
127
feature in macOS that enables a user to access a CD/DVD on another Mac or Windows computer.
Remote disk
128
MacOS utility that enables data to be backed up to an external drive
Time Machine
129
Under this protocol, Authentication, Authorization, and Accounting are performed by a separate server (the AAA server). Network access devices, such as routers, switches, wireless access points, or VPN servers, function as client devices of the AAA server. Rather than storing and validating user credentials directly, they pass this data between the AAA server and the user.
RADIUS (Remote Authentication Dial-in User Service)
130
weight amount for team lifting
over 50 lbs
131
a collection of user accounts that can be assigned permissions in the same way as a single user object. used when assigning permissions and rights, as it is more efficient to assign permissions to a group than to assign them individually to each user. In most corporate environments, they control access to share drives, mailing lists, and other network resources.
security group
132
file format for a script to run in Windows PowerShell
.ps1
133
used to uniquely identify each piece of hardware tracked in an asset management database
asset ID
134
used to communicate data and preferences to child processes within a script or batch file
environmental variables
135
interface that offers a glass design that includes translucent windows and was new with Windows Vista
Aero
136
a piece of software that allows an application to be supported by a system that normally does not support it
shim
137
Windows 7 interface that allows you to configure the firewall, Windows Update, virus protection, spyware and unwanted software protection, internet security settings, UAC, and network access protection
Action Center
138
Windows 8 and 8.1 interface where the start menu was removed and the desktop replaced with a new look
Metro
139
a standard Windows file system for optical media with support for multisession writing.
The Universal Disk Format (UDF or ISO 13346)
140
displays a log of "system stability" events, so you can see at a glance whether a particular application has stopped responding frequently.
Reliability Monitor
141
a concept designed to make it easier for less knowledgable users to add a new client to the WLAN without manually entering the security information on the client
Wi-Fi Protected Setup (WPS)
142
group that gives read/write permission to the system, allowing members to install most software but keeping them from changing key operating system files
power user group
143
device that passes or blocks traffic to specific addresses based on the type of application
packet filter
144
a method to prevent a router from sending packets through a route that has become invalid within computer networks by changing the route's metric to a value that exceeds the maximum allowable hop count so that the route is advertised as unreachable
route poisoning
145
a method of preventing routing loops in distance-vector routing protocols by prohibiting a router from advertising a route back onto the interface from which it was learned
split-horizon route advertisement