Practice 3 Flashcards
Which of the following types of encryption uses a 128-bit encryption key but is considered weak due to its use of a 24-bit initialization vector?
WPS
WPA
WEP
WPA2
WEP
What type of structure is IF THEN ELSE in scripting?
Loop
Variable
Constant
Branch
Branch
Which of the following tools should a technician use to modify the HOSTS file on a Windows 10 system to solve a website address resolution issue?
Notepad
MMC
Services
RegEdit
Notepad
What command is used on a Linux system to convert and copy files from one hard disk to another?
dd
A developer uses a MacBook Pro when working from home, but they need access to both a Windows and macOS system to test their programs. What tool should be used to allow both operating systems to exist on their MacBook Pro?
Boot Camp
Which of the following types of backup would require the MOST time to complete?
Full
Differential
Incremental
Synthetic
Full
A customer is complaining that there are intermittent problems with their PC. As a technician, you don’t know exactly what the errors are, so which tool should you use to determine what errors have previously occurred?
Event Viewer
What tool shows a log of application and system messages, including errors, information messages, and warnings?
Event Viewer
What tool is used to only monitor the activities on the CPU and memory on a computer?
Performance Monitor
What utility gathers information about your computer and displays a comprehensive list of hardware, system components, and the software environment that can be used to diagnose computer issues?
System Information
Which of the following concepts is the MOST important for a company’s long-term health in the event of a disaster?
Vulnerability Scanning
Uninterruptible Power Supplies
Off-Site Backups
Implementing an acceptable use policy
Off-Site Backup
What is a placeholder in a script containing a number, character, or string of characters?
Variable
DMZ
Demilitarized Zone
aka Demilitarized Zone (DMZ)
Screened Subnet
A perimeter network that protects an organization’s internal local area network from untrusted traffic
Screened Subnet
Your mother says there is something wrong with her computer, but unfortunately, she doesn’t know how to fix it. She asks if you can remotely connect to her computer and see if you can fix it. Which technology would BEST allow you to remotely access her computer and interact with her Windows 10 laptop?
RDP
What are the steps of the seven-step malware removal process?
- Investigate and verify malware symptoms
- Quarantine the infected systems
- Disable System Restore in Windows
- Remediate the infected systems, update anti-malware software, scan the system, and use removal techniques
- Schedule Scans and Run Updates
- Enable System Restore and create a restore point in Windows
- Educate the end user
Your boss from work just sent you an important email, but you are not in the office. You tried to open the email from your smartphone, but it is encrypted and won’t open. What should you do?
Verify the digital certificate is installed on the device
How would you represent r-xrw-r– in octal notation?
564
Convert these letter permissions to their octal form
R
W
X
R = 4
W = 2
X = 1
Dion Training wants to upgrade its employees’ workstations from Windows 10 to Windows 11. All of the employees’ data and files are saved to the company’s shared drive. The technician has been told to choose an installation type that will delete all of the existing data, settings, and applications on the workstations during the upgrade. Which of the following types of upgrades or installations should you perform on the workstations?
Clean Install
Refresh Installation
Repair Installation
In-Place Upgrade
Clean Installation
An installation of a new operating system on a new computer or a computer that has been recently formatted
Clean Install
An installation of a new operating system on top of an existing version of the operating system. This will reserve the applications, user settings, and data files that already exist on the computer
In-Place Upgrade
A type of installation that will recopy the system files and revert most system settings to their default configuration while preserving user personalization settings, data files, and applications installed through the Windows Store
Refresh Installation