misc Flashcards

(61 cards)

1
Q

What is the Mac OS X function you would use to run first aid, partition a disk, and perform other disk maintenance functions?

A

Disk Utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

On Mac OS X, where would you go to see which device drivers are installed?

A

System Information Utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What Mac OS X utility allows you to stop a running application?

A

Command+Option+Esc will open the Force Quit window. Select the defective application and select force quit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A user calls the helpdesk and asks how he can open a terminal session on a Mac OS X system. Where would you direct him to launch a terminal session?

A

To run a terminal session, open the Utilities folder and select terminal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A user calls the help desk asking how he can find the IP address that has been assigned to his Linux system. He said he is currently at the command prompt and needs the command to see his IP address. What Linux command will display the requested IP address information?

A

ifconfig command (Interface configuration) with the -a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which transport layer protocol uses windowing for flow control and is considered a reliable connection-oriented protocol?

A

TCP (transmission control protocol) is considered a reliable connection-oriented protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which transport layer protocol is considered an unreliable, connectionless protocol?

A

When UDP (user datagram protocol) is used as the transport layer protocol, a connection is not established.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In a client server network, this is the mechanism used to ensure that client application data being sent is received by the proper server application.

A

port number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This is the term used to identify a single endpoint of a communication session on a network.

A

socket number

For example, 66.83.10.24:443 is a socket number that shows a connection established over HTTPS to the IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A user calls the help desk and tells you he needs to block access to the Internet to prevent his employees from wasting time surfing the net. He is connected to his firewall and wants to know what port he should block to prevent only HTTP traffic during office hours. What port does he need to block?

A

HTTP uses a well-known port number of 80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the default subnet mask for a class C address?

A

The subnet mask that defines a full class C network is 255.255.255.0, while a full class B subnet mask would be 255.255.0.0.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When someone is assigned only the rights and privileges necessary to do her job, this is referred to as ____.

A

principle of least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

One form of malware is disguised as an application that users unwittingly download and run, which leads to a virus. This form of malware is referred to as ____.

A

trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

There was a feature of Windows, prior to Windows 7, that would allow a CD, DVD, or thumb drive to automatically launch a program. Due to security issues, this feature was eliminated in releases since Windows 7. How is this feature disabled in Windows Vista?

A

Disable autorun

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which one of these is a form of social engineering where an unauthorized person gains access to a controlled area by following in someone who has legitimate access.

A

Tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You have a sales force that uses mobile phones provided by the company. Knowing that there is secure data on the phones, which of these steps should be taken to prevent data loss if a device is stolen?

A

Configure the phone with a pattern screenloc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of these technologies can be used to establish a VPN across the Internet?

A

PPTP (Point to Point Tunneling Protocol) is used to implement a VPN (Virtual Private Network) across the public internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

This is considered a form of malware, similar to phishing, but is targeting high-level corporate users.

A

whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A client calls and tells you her iPhone was stolen and she is very concerned about the integrity of the data she has stored on the phone. When asked, she informs you that the phone is running the latest OS. What advice can you give her?

A

Any data stored on a phone with iOS 8 or later is automatically encrypted. As long as the user does not have the password for the phone, it should be secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

According to the best practices for malware removal, what is the first step you should perform?

A

identify malware symptoms
The best practice for the removal of malware is to perform these steps in order: identify malware symptoms, quarantine infected system, disable system restore, remediate infected systems, schedule scans and run updates, enable system restore and educate the end user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A client calls and says she is currently in Recovery Console, but she has forgotten the command used to verify that all system files are working properly. What command should she enter?

A

sfc /scannow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The machine you are currently working on gives you a Missing NTLDR message. What is a possible reason for this?

A

attempt to boot from another device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A user calls the hotline wanting to know where he can view error logs on his Linux system. Where is the most common location for these files on a Linux system?

A

/var/log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A client calls you and says the company is building a new location in a nearby city. There is a large outdoor area that he plans to allow employees to use during breaks, lunches, and special events. He is somewhat concerned that there may not be adequate cell coverage in the area. What tool do you suggest he use to verify this?

A

cell tower analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
A user is concerned that applications he may load onto his Android-based cell phone may not be secure. What would you suggest he do to ensure the quality of apps for an Android?
app scanner
26
A user attempted to modify his Linux-based system and now is having numerous problems. In Windows, he could revert to an earlier time with System Restore. What application in Linux would perform the same function?
LVM Snapshots, the Linux Logical Volume Manager, performs functions similar to System Restore in Windows.
27
A client calls stating that he is constantly receiving e-mail responses from e-mail messages he never delivered. What has happened to his system?
Malware has hijacked his e-mail account.
28
A user enters the command line prompt to create a new directory. What is the command to accomplish this?
The command to create a new directory from the command line prompt is MD (MakeDirectory) or MKDIR.
29
A company with a very small local area network has grown to the point where statically assigning IP addresses and other NIC parameters have become impossible to manage. What steps can a network administrator take to simplify the process of configuring network interface cards?
Incorporate a DHCP Server into the network.
30
From the command prompt, a user wishes to concatenate two files, file_a and file_b into a third file, file_c. From the command line, what command would allow this?
type file_a.txt file_b.txt > file_c.txt
31
While in the command line mode, a user finds an old empty directory that is no longer in use. What command would allow him to remove the directory?
To erase a directory, the command is RD; RMDIR will do the same.
32
While in the command line mode, a user moves down two directories to view the contents of the subdirectory. What command would she use to move back up two directories from where she started?
cd ../..
33
As a system administrator, you are responsible for supporting numerous remote systems on the corporate network. What protocol would you use that would allow you to connect to remote systems in order to assist users?
RDP (Remote Desktop Protocol) allows users to remotely log in to computers to support remote users.
34
You have a firewall protecting a network. What port number would you open to allowing SSH access?
SSH (Secure Shell) uses port number 22.
35
You’ve just finished setting up your home server PC, and notice that you are unable to access an Excel spreadsheet on your network. Which step did you likely forget when finalizing your home server?
file sharing
36
After clearing a paper jam out of your inkjet printer, you decide to do full maintenance on the unit. What other maintenance could be done to the printer?
Clean heads, perform calibration and replace cartridges.
37
Which two SATA based formats does a laptop SSD come in?
The two SATA formats used for SSD drives for laptops include a 1.8 inch and 2.5 inch.
38
the laptop power supply converts what to what current
AC to DC
39
What type of adapter could you plug into your laptop to provide an additional port for an ethernet connection?
USB to RJ45 dongle
40
A customer needs help selecting the proper network cabling to run in their store. The distance will be less than 200 feet and the cable should not be prone to electrical interference. Which type of cabling would you suggest?
MMF Since only a short distance needs to be covered, that is less than 300 feet, we can eliminate SMF off the bat. SMF (Single-Mode Fiber) is used for longer cable runs, typically greater than 300 feet in length. The only other cabling scheme that is immune to electrical interference would be MMF (Multi-Mode Fiber).
41
Which sets of connectors are used for twisted pair cabling?
RJ11 and RJ45 are used in twisted pair cabling, commonly for phone lines and ethernet, respectively.
42
Which type fiber connector most closely resembles a BNC connector?
ST | The Straight Tip connector contains a bayonet connection, similar to the one used on BNC connectors.
43
Which type of scale is used to calculate decibel signal strength or signal loss?
logarithmic Changes in decibels are logarithmic in nature. This means that a small change in decibel could potentially result in a very large amount of signal loss or signal strength.
44
In a Windows environment, this protocol is often associated with Active Directory for central management of a user database. What is this protocol called?
LDAP (Lightweight Directory Access Protocol) often works in conjunction with Active Directory to provide user authentication and management in a network. It is the successor to the DAP (Directory Access Protocol).
45
Bob is implementing a new wireless network in his home office and needs assistance in selecting his equipment. He needs something that won’t interfere with his 2.4 GHz phones and that has speed that can reach 54 mbps. Which wireless standard would you suggest to Bob?
802.11a is not in use much in modern times, but it did offer exceptional speeds in the 5 GHz frequency band, at the cost of a smaller range of coverage than some of the other standards.
46
In order for devices on our local home IPv4 network to communicate with other devices on the Internet, our SOHO router must perform what?
NAT (Network Address Translation) allows our private local network IPv4 addresses to be translated into a public IP address capable of connecting over the Internet. This can also be used with IPv6, due to security advantages, although it is less likely.
47
What type of technology supports the use of signaling and bearer channels?
ISDN (Integrated Services Digital Network) uses bearer (B) channels to send data and uses D channels for signaling and control.
48
A network that connects two cities would commonly be known as a ____ network?
Wide Area Networks, also known as WAN, are networks that are connected across long distances, such as city to city or state to state.
49
Switches that are configured to participate in routing decisions are commonly known as what?
This is commonly referred to as a Layer 3 switch, as routing decisions work at Layer 3 of the OSI model (network layer) and switches are normally considered Layer 2 devices.
50
After hearing the fire alarm at work, you see smoke coming from a server in the network room. One of your colleagues is already attempting to subdue it using a bucket of water, when you yell out and tell him to stop. What should he use to put out the fire?
``` a class C fire extinguisher For electrical fires, you should always use special dry fire prevention or extinguishing chemicals. Carbon dioxide is one of those chemicals. ```
51
Jeff is in the backroom at work, cleaning out one of the old printers with a shop vacuum. After walking in, you ask Jeff to stop immediately, informing him he could be damaging the printer components by using the shop vacuum. What type of vacuum should he use to clean out the printer?
When working inside computers or other electrical devices, only specialized vacuums should be used. These devices are specially made so that they do not damage your electrical components.
52
After a recent power outage knocked the company offline for 30 minutes, the executives have been discussing how to keep this from happening again. They bring you in, as an IT expert, to help with the planning and design phases. One executive asks how can you tell how much of a surge can be handled by a surge suppressor. What do you tell him?
joule rating
53
After marketing yourself as an IT consultant, one potential client gives you a call about some network design work at his company. He works in a factory setting, where there are tons of airborne particles constantly afloat. He asks you what special considerations he should make with regard to setting up his computers. What special safety devices would fit his environment well?
Enclosures are specially made housings for computers in warehouse or factory settings.
54
What is the first step when performing proper incident response after an incident report has occurred?
The first step is to confirm that an incident has actually happened, or is taking place.
55
Why is establishing a chain of custody so important after responding to an incident?
to preserve information
56
A new trainee has been reading IT books, as well as company documentation, and has a question with which he needs your help. He wonders why he needs to document everything while troubleshooting and resolving issues. What do you tell him?
to ensure resolution processes are efficient
57
Fred is one of the junior help desk personnel at your company and asks for your help in reviewing troubleshooting theory, since you have passed your CompTIA A+ exam. He is troubleshooting a new customer issue and has established a likely cause, but he is not sure what step to take next. What should Fred do at this point?
Test the theory.
58
Robert is one of the senior IT engineers at your company, and he has been working on a complex customer issue for the majority of the day. After finally implementing the solution, he feels relieved and begins documenting the solution. However, Robert appears to have missed a major step in the troubleshooting theory. Which step did he miss?
verifying system functionality
59
What is the Linux command that allows users to install new software packages?
apt-get | allows a simple way to add new software packages to a Linux system.
60
A user calls the helpdesk wanting a simple method he can use for backing up multiple large directories on a Linux system. What command allows users to back up and compress large directories?
tar -c
61
While in the command line, what is the Linux command to create a new directory (folder)?
mkdir Linux only md is for Windows