week two & three Flashcards

(74 cards)

1
Q

A type of Windows installation that erases the contents of target partition is called:

A

Clean install

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which parameter of the cd command in Windows moves the command-line prompt one folder up in the directory tree?

A

cd ..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which location in Windows 10 provides access to configuration options to block incoming echo requests?

A

Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound Rules -> New Rule… -> Custom -> All programs (or a single app)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which location in macOS provides access to application updates menu?

A

App Store

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the name of a Linux command-line utility used for displaying statistics of running processes?

A

ps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following enable installation of an OS via network interface? (Select 2 answers)

A

Netboot, PXE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which sfc switch enables a type of file check that scans integrity of all protected system files?

A

/scannow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A network protocol providing an alternative solution to the manual allocation of IP addresses is known as:

A

DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Time Machine is a built-in backup utility for:

A

macOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The following command can be used for turning off or restarting a Linux host.

A

shutdown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the folder name used to hold the prior operating system after an upgrade to Windows 11?

A

WINDOWS.OLD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which installation option during the installation of Windows will format the drive?

A

Format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What should a technician try first when troubleshooting a computer that occasionally will not read data from the hard drive?

A

Run chkdsk at a command prompt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

To use an analogy, ______ is to the macOS what Windows File Explorer was to Windows 11.

A

Finder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Where can you find applications for both Android and iOS devices?

A

From sources designed for the operating systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which network model can be used with Windows 11 and requires no servers?

A

Workgroup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the minimum processor speed required to install Windows 10 64-bit on a PC from 2017?

A

1 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Considering a snapshot of the command prompt, what is most likely the IP address of a router?

A

192.168.153.2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the characters such as the asterisk and the question mark known as in Linux commands?

A

Regular expressions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Screen sharing with the built-in features of macOS requires a _____ connection.

A

VNC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is required by Windows 11 in addition to computing power, RAM, and storage?

A

A UEFI firmware that is Secure Boot capable and a TPM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What command-line tool combines the benefits of tracert and ping?

A

pathping

It can be used to diagnose packet loss to a destination website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the main authentication technology used with domain controllers in a domain networking model?

A

Active Directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What type of connection is created with a cellular data provider?

A

wireless wide area network (WWAN).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What macOS tool can be used to create an image of the macOS operating system?
Disk Utility.
26
What can you use in macOS to force an unresponsive application to close?
Force Quit.
27
What must you become to perform high privilege level tasks in Linux?
root.
28
What command in Linux shows currently running processes?
ps.
29
What update branch provides monthly updates without new features for the product's lifetime?
Long‐Term Servicing Channel.
30
What refers to a location away from the computer center for storing backups?
Off‐site storage.
31
What is used to reinstall the operating system without losing personal data?
Repair installation.
32
What option resets the operating system back to its original state?
Reset This PC option.
33
What is a partition that contains the original image for the OS installed with a brand name system?
Recovery Partition.
34
What allows you to get the latest product updates from Microsoft before general availability?
Insider Program.
35
What macOS feature allows you to download and buy applications?
App Store.
36
What type of file stands for disk imaging file in macOS?
DMG Files.
37
What tools can you use to install and manage packages in Linux?
Advanced Package Tool (APT) or Yellowdog Updater, Modified (YUM).
38
A type of identification badge that can be held within a certain distance of a reader device to authenticate its holder is called:
RFID badge
39
Which of the following statements are true? (Select 2 answers)
NTFS permissions can be applied to a folder or individual file NTFS permissions apply to both network and local users
40
Which of the following terms refers to an example of crypto-malware?
Ransomware
41
As opposed to the simple Denial of Service (DoS) attacks that usually are performed from a single system, a Distributed Denial of Service (DDoS) attack uses multiple compromised computer systems to perform the attack against its target.
True
42
A situation in which an unauthorized person can view someone’s display or keyboard to learn their password or other confidential information is referred to as:
Shoulder surfing
43
Which of the following can be used by system/network administrators to restrict a user’s ability to install software?
All of the answers ## Footnote Principle of least privilege, AUP, Group Policy, MDM solutions
44
Which of the following terms is used to describe a collection of intermediary compromised systems that are used as a platform for a DDoS attack?
Botnet
45
Which password attack takes advantage of a predefined list of words?
Dictionary attack
46
Which social engineering attack relies on identity theft?
Impersonation
47
Your company wants to increase the security of its server room. Which TWO of the following should they install to protect the server room’s contents?
Badge reader Biometric lock
48
A user has reported that their workstation is running very slowly. A technician begins to investigate the issue and notices a lot of unknown processes running in the background. The technician determines that the user has recently downloaded a new application from the internet and may have become infected with malware. Which of the following types of infections does the workstation MOST likely have?
Trojan
49
Which of the following pairs of authentication factors should you choose to meet the requirements associated with MFA?
Thumbprint and password
50
A new corporate policy dictates that all access to network resources will be controlled based on the user’s job functions and tasks within the organization. For example, only people working in Human Resources can access employee records, and only the people working in finance can access customer payment histories. Which of the following security concepts is BEST described by this new policy?
Least privilege
51
You are working in a doctor’s office and have been asked to set up a kiosk to allow customers to check in for their appointments. The kiosk should be secured, and only allow customers to access a single application used for the check-in process. You must also ensure that the computer will automatically log in whenever the system is powered on or rebooted. Which of the following types of accounts should you configure for this kiosk?
Guest
52
Your company utilizes a federation authentication model for all of its internal and external services. If an employee needs to access one of the company’s web applications from their smartphone, they use a username and password to log in to the main website. They then are transferred and authenticated to all of the other sites and services automatically. Which of the following type of authentication is this known as?
SSO
53
Tammi was replacing a client’s security device that protects their screened subnet. The client has an application that allows external users to access the application remotely. After replacing the devices, the external users cannot connect remotely to the application anymore. Which of the following devices was MOST likely misconfigured and is now causing a problem?
Firewall
54
Bob just purchased a Wi-Fi-enabled Nest Thermostat for his home. He has hired you to install it, but he is worried about a hacker breaking into the thermostat since it is an loT device. Which of the following is the BEST thing to do to mitigate Bob’s security concerns? (Select TWO)
Configure the thermostat to use a segregated part of the network by installing it into a screened subnet Configure the thermostat to connect to the wireless network using WPA2 encryption and a long, strong password
55
Someone has configured an external server with an IP address that should belong to one of your sister company’s servers. With this new computer, they are attempting to establish a connection to your internal network. What type of attack is this?
Spoofing
56
What is the most effective way to prevent social engineering?
End-user training
57
A user on your network reported that their screen went blank and a message popped up. It’s telling them that their files are no longer accessible, and if they want them back, they need to enter a credit card number and pay a $200 fee. Which type of malware has infected this system?
Ransomware
58
You are configuring a router for a small office network. The network users should be able to access regular and secure websites and send and receive email. Those are the only connections allowed to the Internet. Which security feature should you configure to prevent additional traffic from coming through the router?
Port security/disabling unused ports
59
Which method of logging into a mobile device may make it easy for someone to guess your password based on marks left by the oils in your skin?
Pattern
60
You are designing a security policy for mobile phones on your network. Which of the following is a common method of biometric authentication used with mobile devices?
Fingerprint scan
61
How often should you update your antivirus definitions?
As often as possible
62
Spyware differs from other malware in that it:
works on behalf of a third party
63
Which attribute is used for backup purposes?
Archive
64
Which can be used to control your organization’s BYOD policy?
MDM
65
____blank_____ ___ surveillance is the backbone of physical security. It is the only detection method that allows an investigator to identify what happened, when it happened, and, most important, who made it happen.
Video
66
A _________ is an architectural structure that acts as a visual indicator for a perimeter. They are also very sturdy, since their second function is to act as a barrier for the perimeter and protect the area.
bollard
67
_________ is a broad term describing any software with malicious intent.
Malware
68
It is never a good idea to put any media in a workstation if you do not know where it came from or what it is. The simple reason is that said media (CD, DVD, USB) could contain malware. This attack is commonly referred to as a _______ attack.
drop
69
..___ ____ _______ involves applying a strong magnetic field to initialize the media.
Degaussing
70
The _____ ____ ____ subnet is also known as the demilitarized zone (DMZ). The DMZ gets its name from the segmentation that is created between the exterior and the interior of the network.
screened
71
As employees are hired in your organization, a certain amount of initial interaction with the information technology (IT) is required. This interaction, called the __________ procedure, is often coordinated with the Human Resources (HR) department.
onboarding
72
A number of vendors offer hard drives with ____ ________ __________ ______ cryptography built in. However, it's still better to keep these secure hard drives completely out of the hands of others than to trust their internal security mechanisms once their usable life span has passed for the client.
Advanced Encryption Standard (AES)
73
By default, ____ _____ ________users belong to the local Users group. Members of this group have Read and Write permission to their own profile.
standard
74
The only detection method that allows an investigator to identify what happened, when it happened, and, most important, who made it happen.
Video surveillance