CompTIA core 2 1202 (set 2)

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/99

flashcard set

Earn XP

Description and Tags

CompTIA text book (study guide) (set 2)

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

100 Terms

1
New cards

Software that is purchased and requires a license to run is called what?

Commercial. This type of software requires users to purchase a license before it can be legally used, and often provides support and updates from the vendor.

2
New cards

The _____________ is the time it takes to back up the dataset.

backup window

3
New cards

The Windows Boot Loader loads the Windows _________ and essential drivers.

kernel

4
New cards

The ______________ can be used to look at errors, warning and messages in the operating system.

Event logs. In Windows, event logs are stored as .evtx files on disk and are typically viewed through Event Viewer.

5
New cards

The ___________ initializes the Windows kernel.

Windows Boot Loader or bootmgr

6
New cards

What is the primary benefit of using cloud‐based productivity tools?

They allow access to files from any device with an Internet connection. This facilitates collaboration and enhances productivity by enabling real-time updates and sharing.

7
New cards

Where is JavaScript primarily used?

Web browsers. JavaScript is primarily used for creating interactive and dynamic content on websites, enhancing the user experience by allowing for real-time updates and responses without needing to reload the page.

8
New cards

From which Control Panel applet can you remove a username and password that is automatically filled in, when you visit a web page?

Credential Manager: The Credential Manager lets you manage saved credentials for automatic logins, so you can remove unwanted usernames and passwords for websites.

9
New cards

_____________ is a form of social engineering where the attacker pretends to be someone else to gain access.

Impersonation. It involves deceiving individuals into providing sensitive information by assuming a trusted identity.

10
New cards

The command to display disk usage in Linux is ___.

df. The command "df" displays the amount of disk space used and available on Linux filesystems. This command can also display disk usage in human-readable format with the -h option.

11
New cards

___________________ are software programs that have the ability to hide certain things from the operating system.

Rootkits. They are designed to allow unauthorized users to maintain control of a computer system without detection. They can manipulate operating system functions and conceal their presence.

12
New cards

When lifting computer equipment, always lift with your _____.

legs. This helps prevent injury by using your legs' strength rather than straining your back.

13
New cards

The command to check and repair filesystems in Linux is ___.

fsck. The "fsck" command is used to check and repair inconsistencies in Linux file systems, ensuring data integrity.

14
New cards

_____________learning models learn to achieve a goal by maximizing cumulative rewards.

Reinforcement learning. In reinforcement learning, agents learn to make decisions by receiving rewards or penalties for their actions, thereby optimizing their strategies over time.

15
New cards

______________ are used to document symptoms and solutions for common problems.

Knowledge base articles. These articles compile troubleshooting information and solutions to help users resolve technical issues.

16
New cards

The ___ command shows the computer name.

Hostname. The "hostname" command displays the current system's hostname, which identifies the computer on a network.

17
New cards

______________ is a method of backup that allows for the restoration of individual files.

Volume Shadow Copy. This method enables users to restore specific files or folders from a backup taken at a particular point in time while the system is running.

18
New cards

What does the Performance Monitor (perfmon.msc) display?

Performance counters collect counter information for troubleshooting. These counters help identify system performance and resource usage issues, allowing for effective bottleneck resolution.

19
New cards

What is the purpose of the BitLocker feature in Windows?

To provide drive encryption to protect files, including those needed for startup and login and to ensure data security in case of theft or loss.

20
New cards

What protocol does the Remote Desktop Connection client use for making remote connections?

It uses the Remote Desktop Protocol (RDP), which provides a user interface to connect to another computer over a network, enabling users to access applications and data remotely.

21
New cards

The first step in incident response is to _________ the incident.

Detecting, which is to discover or identify the presence or existence of the incident.

22
New cards

_____________ is designed to control, monitor, and protect privileged accounts.

Privileged Access Management (PAM) Privileged Access Management (PAM) is designed to control, monitor, and protect privileged accounts, ensuring that only authorized users can access sensitive systems and data.

23
New cards

The command to download and install packages in Red Hat–based Linux distributions is ___.

"dnf". The command used to download and install packages in Red Hat-based Linux distributions is "dnf", which stands for Dandified YUM, providing improved package management capabilities.

24
New cards

__________________ allows users to access multiple applications with a single set of login credentials.

Single Sign‐on (SSO). Single Sign-On (SSO) is a user authentication process that allows users to access multiple applications with a single set of login credentials, enhancing user convenience and security.

25
New cards

Using the ___________ wireless band can help with wireless interference.

5 GHz. Using the 5 GHz wireless band can help with wireless interference, as it typically offers more channels and reduced congestion compared to the 2.4 GHz band.

26
New cards

__________ compliance is enforced by banks and creditors.

PCI DSS.. Payment Card Industry Data Security Standard (PCI DSS) compliance is enforced by banks and creditors to ensure that companies handle cardholder information securely.

27
New cards

When talking about a computer problem with a customer, you should avoid using _______.

jargon, acronyms, and slang

28
New cards

The role of the MAP Toolkit is hardware ___.

Assessment. The role of the MAP Toolkit is to provide hardware assessment, enabling organizations to assess and analyze their IT infrastructure for better planning and management.

29
New cards

Name three popular Linux distributions.

Red Hat, Ubuntu, Debian, Fedora

30
New cards

______________ is a process in which an attacker attempts to acquire information by social means.

Social Engineering. A manipulation technique that exploits human psychology to gain confidential information.

31
New cards


A ___________________ is an architectural structure designed to act as a visual perimeter.

bollard

32
New cards

The chmod Linux command is used to __________________.

change permissions. It helps you gain control of access to files and directories.

33
New cards

Which remote technology operates with TCP port 22?

SSH (Secure Shell) is a protocol for secure remote access and management of network devices, which can be used by downloading the PuTTY app.

34
New cards

Which architecture is primarily used for mobile tablets and phones?

ARM architecture is primarily used for mobile tablets and phones.

35
New cards

___________________ involves applying a strong magnetic field to initialize the media. (This is also referred to as disk wiping.)

Degaussing. This process erases data on magnetic media by disrupting the magnetic domains.

36
New cards

What is the minimum amount of RAM required for a 64‐bit installation of Windows 10?

The minimum RAM required for a 64-bit Windows 10 installation is 2 GB.

37
New cards

_______________ is a type of browser redirection that is used to compromise credentials.

Pharming. This technique redirects users from legitimate websites to malicious ones without their knowledge.

38
New cards

How many days do you have after an upgrade to roll back to the prior operating system?

10 days. After a Windows upgrade, the system stores previous installation files in a folder called Windows.old on the primary drive. This folder allows for a rollback if needed, but it is automatically purged after 1010 days to free up space. This rollback window can be extended up to a maximum of 6060 days using the Deployment Image Servicing and Management (DISM) tool command: DISM /Online /Set-OSUninstallWindow /Value:60, provided this is done before the initial period expires.

39
New cards

_____________ is a form of social engineering where someone asks for information by making it look like a legitimate request.

Phishing. This form of social engineering often involves fake emails or messages that appear to be from trusted sources, tricking individuals into providing sensitive information.

40
New cards

The macOS feature for synchronizing data across devices is called ___.

iCloud. This service allows users to store files, photos, and backups in the cloud, making them accessible on all Apple devices.

41
New cards

What kind of card is a type of badge or card that gives you access to resources, including buildings, parking lots, and computers? (It contains information about your identity and access privileges.)

Smartcard. This is a physical card embedded with a chip that securely stores and processes data, granting access to specific locations or systems.

42
New cards

The ___________ wireless encryption standard replaces PSK with a higher level of security.

WPA3

43
New cards

During the setup of Windows 11, what are the license terms called that you must accept?

End User License Agreement (EULA). This is a legal contract between the user and the software provider that outlines the terms of use for the software.

44
New cards


The _____________ is a visual indicator to help diagnose a wired connection

link light. This indicates the status of the network connection, showing whether the device is properly connected.

45
New cards

A file on a Linux workstation has the permissions of rw-r-x--x; what are the permissions the user is assigned?

read/write permissions. The user is assigned read and write permissions, allowing them to read and modify the file.

46
New cards

The _____________ feature in Windows allows users to log in with a PIN or biometric data instead of a password.

Windows Hello. It’s a security feature that enhances user authentication by allowing face recognition, fingerprint scanning, or PIN entry, providing a convenient and secure way to access devices.

47
New cards

What is the minimum speed processor is required to install Windows 11?

1 GHz or faster

48
New cards

________________enables machines to comprehend, interpret, and produce meaningful and practical human language.

Natural Language Processing (NLP). This technology allows computers to understand and manipulate human language, facilitating communication between humans and machines.

49
New cards

The Windows Reliability Monitor allows you to see application ___________.

Crashes. It tracks and reports errors, providing insights into system reliability.

50
New cards

_________ is the process of analyzing proposed changes for the possibility of failure or undesirable consequences.

Risk analysis. It involves assessing potential risks associated with changes in a project or system to determine their impact.

51
New cards

The ____________________ is the local authentication database for Windows operating systems.

Security Account Manager (SAM)

52
New cards

What is the purpose of the Disk Cleanup (cleanmgr.exe) tool?

To clean up operating system files to free up space without affecting data files.

53
New cards

What can be implemented to prevent tailgating?

Access control vestibule.

54
New cards

The _________ plan should include steps to be taken in the event the rollback plan must be executed.

rollback plan.

55
New cards

__________ is a biometric authentication method that uses a fingerprint to unlock an Apple device.

Touch ID

56
New cards

You should ___________________ an unresponsive mobile device.

Hard‐reset.

57
New cards

Which command‐line tool can be used to collect information about hardware before installing Windows 11?

MSINFO32.EXE

58
New cards

The ____________ _____________ stores username and passwords for Microsoft Edge.

Credential Manager

59
New cards

The _________ rule method is a common method for maintaining both on‐site and off‐site backups.

3-2-1. This method involves keeping three copies of your data: two local (on different devices) and one off-site for disaster recovery.

60
New cards

_______________ software can disable camera and microphone on mobile devices.

Mobile device management. This type of software enables organizations to manage policies and settings on mobile devices, including disabling features such as the camera and microphone for security reasons.

61
New cards

Which command allows you to map the drive of V to the UNC of \\server\files?

NET USE V: \server\files. This command assigns the drive letter V: to the network share located at \server\files, allowing access to that shared folder from the V: drive.

62
New cards

What is the search feature within macOS?

The search feature within macOS is called Spotlight. It allows users to quickly find and access files, applications, and information from the internet by simply typing keywords.

63
New cards

Which Windows Update branch for Windows 11 allows for security updates, but no new features?

Long‐Term Servicing Channel (LTSC). This Windows Update branch is designed for stability and security in enterprise environments, providing essential updates without introducing new features that may disrupt operations.

64
New cards

The ___________ protocol is the main authentication protocol used by Microsoft Active Directory.

Kerberos. It is used to securely authenticate users and services within a network, providing encrypted communications and mutual authentication.

65
New cards

The command to change the current directory in Linux is ___.

cd.

66
New cards

A ________ backup is a full backup without the overhead of performing a full backup on the entire dataset.

synthetic backup. This type of backup combines previous full backups with incremental backups to create a new full backup without requiring a complete data transfer.

67
New cards

_____________ is a feature introduced by Apple to deliver critical security updates to macOS, iOS, and iPadOS devices more swiftly than traditional software updates.

Rapid Security Response (RSR). This allows Apple to deploy important security patches outside of the regular update cycle, helping to mitigate vulnerabilities more quickly.

68
New cards

_____________ is a cloud‐based storage service used for backing up Android devices.

Google Drive

69
New cards

The _____________ can be used to repair the operating system.

Windows Recovery Environment. This recovery option provides tools to fix problems when Windows cannot start normally.

70
New cards

The command to search for text within files in Linux is ___.

grep

71
New cards
72
New cards
73
New cards
74
New cards
75
New cards
76
New cards
77
New cards
78
New cards
79
New cards
80
New cards
81
New cards
82
New cards
83
New cards
84
New cards
85
New cards
86
New cards
87
New cards
88
New cards
89
New cards
90
New cards
91
New cards
92
New cards
93
New cards
94
New cards
95
New cards
96
New cards
97
New cards
98
New cards
99
New cards
100
New cards

Explore top flashcards