Test Out Exam Questions Flashcards

(123 cards)

1
Q

Bitlocker To Go can be used to encrypt?

A

a USB flash drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Single Sign­ On does what?

A

permits a user and their programs to use their credentials to automatically log in to other sites and services. It’s not used for encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Run as administrator is used to do what ?

A

Run an application with elevated privileges, not to encrypt data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Administrative share is used by administrators to do what?

A

To access system drives. It’s not used for encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What happens when Anti-Malware Software Quarantines a file?

A

Quarantine moves the infected file to a secure folder where it cannot be opened or run normally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ransomware ?

A

is a type of malicious software designed to block access to a computer system, often by encrypting files, until a sum of money is paid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Spyware ?

A

is malware that monitoring a user’s behavior without their knowledge. Spyware often secretly gathers information about a person or organization and relays this data to other parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Social engineering?

A

is a way of manipulating people so they give up confidential information, such as passwords, bank information, or access to a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A Trojan horse or Trojan?

A

is a type of malware that is often disguised as legitimate software. Ransomware may be introduced as a Trojan horse, but a Trojan horse does not always install ransomware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Can you use Telnet or SSH to remotely log on to a server and complete configuration tasks?

A

Yes, however, SSH provides a secure connection; Telnet does not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The ICMP protocol is used to?

A

transmit error messages on an IP network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which two situations would be best for restoring from a backup?

A

Restore Lost files and Restore lost e­mails. Using a backup allows you to explicitly specify what content you want to restore.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Using a system image would be appropriate when?

A

To restore a system after a hard disk failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Using a restore point would be best suited to which situation?

A

A misbehaving application or driver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The Time Machine application on Mac OS computers and the tar command in Linux are used for what?

A

Backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Patch management involves?

A

updating operating systems and applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

md (Make Directory)

A

will create a directory/folder or subdirectory/subfolder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

rd

A

removes a directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

cd (Change Directory)

A

changes which directory you are working in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The del command (DELete)

A

deletes files and directories.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The sfc command?

A

scans the integrity of all protected system files and replaces incorrect versions with correct Microsoft versions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Users who have the Manage documents permission can do what?

A

manage all documents in the queue (i.e., pause, resume, delete, or rearrange the order).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Users with the Print permission can do what?

A

print using the printer and manage (delete) their own documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Users with the Manage this printer permission can do what?

A

edit the printer properties and pause the printer, but cannot manage any documents waiting to be printed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
The Manage network printers permission?
does not exist.
26
When would you use Use the compatibility mode?
In Windows to run older applications as if they were running under a different operating system version
27
Windows XP Mode (XPM)
a feature of the Windows 7 that allows it to run applications that are only compatible with Windows XP via a virtual machine (VM) on Windows Virtual PC
28
How to turn off Windows 7 automatic restart feature?
- Press F8 during Startup - Select Disable automatic restart on system failure option
29
What does Startup Repair do?
Corrects system boot errors.
30
Power Fail option?
in the BIOS determines what the system does after power is restored when the power is unexpectedly lost.
31
The grep command?
is used to search text
32
The ls command ?
list the contents of a directory.
33
The sudo command is short for
"superuser do" or "substitute user do".
34
The sudo command ?
execute a command as a superuser.
35
• Lost clusters
are a series of used clusters on the hard disk drive that are not associated with a specific file.
36
• A cross­linked file
occurs when two files claim the same cluster. Check Disk will identify cross­linked files and correct their cluster associations.
37
• Orphaned files
are files on the hard drive which are not associated with a directory path in the index. Normally Check Disk can re­associate the file with the correct directory.
38
• A bad sector
is a portion of the hard disk that cannot be used. Bad sectors are marked so that they are no longer used. Any used bad sectors are redirected to another sector.
39
What happens after removing a virus from a computer?
- Install latest OS updates - Scheduled regular virus scans - Enable system restore - Create a new restore point - Educate end users on better practices.
40
Moving or copying files to a different NTFS partition does what?
It removes any existing NTFS permissions so that only inherited permissions apply.
41
User data on a Windows 8.1 system can be protected using
File History
42
What does file History do?
User data like documents, music, and videos are automatically backed up at a regular interval to a second storage device in the system.
43
An app scanner can test?
a mobile app for security flaw
44
Malware that can be remote controlled by an attacker are known as?
Zombies
45
Zombies
malware that can be remote controlled by an attacker
46
A collection of zombies that are controlled by the same attacker are known as a
botnet (robot network)
47
Phishing
is an attempt to trick a user into compromising personal information or downloading malware.
48
botnet (robot network)
A collection of zombies that are controlled by the same attacker are known as a
49
An attempt to trick a user into compromising personal information or downloading malware.
Phishing
50
Phishing Most often it involves an email containing what?
A malicious attachment or hyperlink.
51
A Man ­In The Middle (MITM) attack
intercepts communications between two systems, and alters the message before sending it on to the original recipient.
52
Spoofing ?
An entity using a fake IP address, or fake email address that resembles a real address to trick you
53
On Windows 2000 and XP, users who were members of the Power Users group could install applications as long as?
they didn’t modify any system files.
54
On Windows Vista and later, Power Users ...
cannot install applications. In fact, the Power Users group is only included in modern versions of Windows for backwards compatibility.
55
NT loader (NTLDR)
is the boot loader for Windows operating systems
56
If the NTLDR is damaged or missing, the computer will not be able to boot into which mode?
Safe mode
57
If the files required for the boot loader are missing or damaged...
the operating system cannot start, and the error will appear
58
• Hotspot­­
a physical location where you can obtain wireless Internet access using a (WLAN) with a device connected to an Internet service provider.
59
• Tethering
Connecting one device without Wi-Fi to another device that has Wi-Fi connectivity through the use of a cable
60
• Mobile VPN­­
provides mobile devices with access to network resources and software applications on their home network when they connect using other wireless or wired networks.
61
• NFC
­­a type of connector used to emulate cryptographic smart card functionalities for RFID tags or memory cards.
62
• Bluetooth
a wireless technology standard for exchanging data over short distances from fixed and mobile devices and for building personal area networks (PANs).
63
The Mac OS Force Quit functions and the Linux kill command can be used to do what?
to stop a runaway application that does not respond to user input.
64
What is a mount point?
an empty folder on the existing volume that points to another partition. Data saved to the folder is physically saved on the referenced partition
65
Extending a volume does what?
adds space to the volume
66
Extending a volume using space on a different disk creates what ?
A spanned volume
67
The Trivial File Transfer Protocol (TFTP)
is a connectionless service for downloading files from a remote system. TFTP uses TCP/IP port 69.
68
The Network News Transfer Protocol (NNTP)
is used to access and download messages from newsgroup servers. NNTP uses TCP/IP port 119.
69
Trouble Shooting Steps (5)
- Gathering Information - Identify what has changed - Form a hypothesis - Determine the appropriate fix - Implement the fix and test results.
70
Anti­-Plagiarism Software
helps detect when someone has plagiarized someone else’s material.
71
Anti­-Malware Software
helps protects a computer from software that is intentionally designed to cause harm or damage to
72
Anti­-Spam Software
SPAM email (or junk email) is the unsolicited email users can receive. One of the best ways to prevent receiving this type of email is to use anti­spam software
73
Steps to fixing internal computer components (4)
-Disconnect power -Remove jewelry -Place the computer on an ESD mat -Put on safety glasses
74
Anti-Virus Software
helps protect the infiltration and spread of malicious code that is designed to alter the way a computer operates.
75
What are three component that if faulty the computer will not boot?
Memory Video card Processor
76
Bring Your Own Device (BYOD) policy
the protection of corporate data along with corporate control versus individual control of the device
77
Trusted source
refers to the approved location for obtaining mobile applications, Google Play Store, App Store and Microsoft Store.
78
Mission Control is a Mac OS tool that
shows every open application in every virtual window (desktop) on a Mac computer.
79
Remote Disk is a utility that
allows a Mac computer to access another computers optical drive over the network.
80
When you suspect that a computer may be infected with malware, you should...
-quarantine the computer to prevent the propagation of the malware.
81
What does enabling System Protection do on Windows 10 computer?
Windows will automatically create restore points when system changes are made
82
Program and Features
lets you view the programs installed on your computer and, if needed, uninstall, change, or repair an application
83
Performance
lets you configure some advanced settings, such as configuring virtual memory.
84
Which tabs in Task Manager give you the best overview of computers health?
The Processes and Performance tabs both show the overall performance of the main areas of the computer, including CPU, GPU, Memory, Hard disks & Network.
85
App history (Task Manager)?
Displays performance and statistics for Microsoft applications.
86
Details tab in (Task Manager) shows what?
Individual CPU utilization for each program running.
87
Users tab in (Task Manager) shows what?
The same statistic as Processes & Performance, but they are divided out by each individual user instead of for the entire computer.
88
What is the advantage of using the exFAT file system over NTFS?
Lower memory and processor resource use
89
What is the the FASTEST way to transfer a file?
C$ administrative share (\\computername\C$)
90
C$ administrative share (\\computername\C$)
Is the the FASTEST way to transfer a file
91
Principle of least privilege?
The practice of limiting access rights for users to the bare minimum permissions they need to perform their work.
92
A Ground­ Fault Circuit Interrupter (GFCI)
is a protection device designed to protect people from electric shock from an electrical system.
93
Where will you often find A Ground­ Fault Circuit Interrupter (GFCI) ?
bathrooms and kitchens where the chance of an electrical shock is greater due to water.
94
The virtual machine completely simulates a physical computer system.
Full virtualization
95
Operating systems do not need modification to run within virtual machines.
Full virtualization
96
Only some of the components of a virtual machine are virtualized.
Partial virtualization
97
The hardware is not virtualized. All of the guest operating systems running on the hypervisor directly access various hardware resources in the physical device
Paravirtualization
98
# r are a series of used clusters on the hard disk drive that are not associated with a specific file.
• Lost clusters
99
# r occurs when two files claim the same cluster. Check Disk will identify and correct their cluster associations.
• A cross­linked file
100
# r are files that exist on the hard drive but which are not associated with a directory in the index. Normally Check Disk can re­associate the file with the correct directory.
• Orphaned files
101
# r is a portion of the hard disk that cannot be used. They are marked so that they are no longer used. Any used bad sectors are redirected elsewhere
• A bad sector
102
# r - Install latest OS updates - Scheduled regular virus scans - Enable system restore - Create a new restore point - Educate end users on better practices.
What happens after removing a virus from a computer?
103
# r a malicious software designed to block access to a computer system, often by encrypting files, until a sum of money is paid.
Ransomware ?
104
# r is malware that monitoring a user's behavior without their knowledge. It often secretly gathers information about a person or organization and relays this data to other parties.
Spyware ?
105
# r is a way of manipulating people so they give up confidential information, such as passwords, bank information, or access to a computer.
Social engineering?
106
# r is a type of malware that is often disguised as legitimate software.
A Trojan horse or Trojan?
107
# r manage all documents in the queue (i.e., pause, resume, delete, or rearrange the order).
Manage documents Permission
108
# r print using the printer and manage (delete) their own documents.
Print permission
109
# r edit the printer properties and pause the printer, but cannot manage any documents waiting to be printed.
Manage this Printer Permission
110
# r a physical location where you can obtain wireless Internet access using a (WLAN) with a device connected to an Internet service provider.
• Hotspot­­
111
# r Connecting one device without Wi-Fi to another device that has Wi-Fi connectivity through the use of a cable
• Tethering
112
# r provides mobile devices with access to network resources and software applications on their home network when they connect using other wireless or wired networks.
• Mobile VPN­­
113
# r ­­a type of connector used to emulate cryptographic smart card functionalities for RFID tags or memory cards.
• NFC
114
# r an empty folder on the existing volume that points to another partition. Data saved to the folder is physically saved on the referenced partition
What is a mount point?
115
# r helps detect when someone has plagiarized someone else’s material.
Anti­-Plagiarism Software
116
# r helps protects a computer from software that is intentionally designed to cause harm or damage to
Anti­-Malware Software
117
# r (or junk email) is the unsolicited email users can receive. One of the best ways to prevent receiving this type of email is to use anti­spam software
Anti­-Spam Software
118
# r helps protect the infiltration and spread of malicious code that is designed to alter the way a computer operates.
Anti-Virus Software
119
# r refers to the approved location for obtaining mobile applications, Google Play Store, App Store and Microsoft Store.
Trusted source
120
# r lets you view the programs installed on your computer and, if needed, uninstall, change, or repair an application
Program and Features
121
# r adjust settings to use for the appearance and performance of Windows. It also lets you configure some advanced settings, such as configuring virtual memory.
Performance
122
# r intercepts communications between two systems, and alters the message before sending it on to the original recipient.
A Man ­In The Middle (MITM) attack
123
# r An entity misrepresents itself by using a fake IP address, or more commonly a fake email address that resembles a real address.
Spoofing ?