misc Flashcards
(61 cards)
What is the Mac OS X function you would use to run first aid, partition a disk, and perform other disk maintenance functions?
Disk Utility
On Mac OS X, where would you go to see which device drivers are installed?
System Information Utility
What Mac OS X utility allows you to stop a running application?
Command+Option+Esc will open the Force Quit window. Select the defective application and select force quit.
A user calls the helpdesk and asks how he can open a terminal session on a Mac OS X system. Where would you direct him to launch a terminal session?
To run a terminal session, open the Utilities folder and select terminal.
A user calls the help desk asking how he can find the IP address that has been assigned to his Linux system. He said he is currently at the command prompt and needs the command to see his IP address. What Linux command will display the requested IP address information?
ifconfig command (Interface configuration) with the -a
Which transport layer protocol uses windowing for flow control and is considered a reliable connection-oriented protocol?
TCP (transmission control protocol) is considered a reliable connection-oriented protocol.
Which transport layer protocol is considered an unreliable, connectionless protocol?
When UDP (user datagram protocol) is used as the transport layer protocol, a connection is not established.
In a client server network, this is the mechanism used to ensure that client application data being sent is received by the proper server application.
port number
This is the term used to identify a single endpoint of a communication session on a network.
socket number
For example, 66.83.10.24:443 is a socket number that shows a connection established over HTTPS to the IP address.
A user calls the help desk and tells you he needs to block access to the Internet to prevent his employees from wasting time surfing the net. He is connected to his firewall and wants to know what port he should block to prevent only HTTP traffic during office hours. What port does he need to block?
HTTP uses a well-known port number of 80
What is the default subnet mask for a class C address?
The subnet mask that defines a full class C network is 255.255.255.0, while a full class B subnet mask would be 255.255.0.0.
When someone is assigned only the rights and privileges necessary to do her job, this is referred to as ____.
principle of least privilege
One form of malware is disguised as an application that users unwittingly download and run, which leads to a virus. This form of malware is referred to as ____.
trojan horse
There was a feature of Windows, prior to Windows 7, that would allow a CD, DVD, or thumb drive to automatically launch a program. Due to security issues, this feature was eliminated in releases since Windows 7. How is this feature disabled in Windows Vista?
Disable autorun
Which one of these is a form of social engineering where an unauthorized person gains access to a controlled area by following in someone who has legitimate access.
Tailgating
You have a sales force that uses mobile phones provided by the company. Knowing that there is secure data on the phones, which of these steps should be taken to prevent data loss if a device is stolen?
Configure the phone with a pattern screenloc
Which of these technologies can be used to establish a VPN across the Internet?
PPTP (Point to Point Tunneling Protocol) is used to implement a VPN (Virtual Private Network) across the public internet.
This is considered a form of malware, similar to phishing, but is targeting high-level corporate users.
whaling
A client calls and tells you her iPhone was stolen and she is very concerned about the integrity of the data she has stored on the phone. When asked, she informs you that the phone is running the latest OS. What advice can you give her?
Any data stored on a phone with iOS 8 or later is automatically encrypted. As long as the user does not have the password for the phone, it should be secure.
According to the best practices for malware removal, what is the first step you should perform?
identify malware symptoms
The best practice for the removal of malware is to perform these steps in order: identify malware symptoms, quarantine infected system, disable system restore, remediate infected systems, schedule scans and run updates, enable system restore and educate the end user.
A client calls and says she is currently in Recovery Console, but she has forgotten the command used to verify that all system files are working properly. What command should she enter?
sfc /scannow
The machine you are currently working on gives you a Missing NTLDR message. What is a possible reason for this?
attempt to boot from another device
A user calls the hotline wanting to know where he can view error logs on his Linux system. Where is the most common location for these files on a Linux system?
/var/log
A client calls you and says the company is building a new location in a nearby city. There is a large outdoor area that he plans to allow employees to use during breaks, lunches, and special events. He is somewhat concerned that there may not be adequate cell coverage in the area. What tool do you suggest he use to verify this?
cell tower analyzer