1/99
CompTIA text book (study guide) (set 2)
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
Software that is purchased and requires a license to run is called what?
Commercial. This type of software requires users to purchase a license before it can be legally used, and often provides support and updates from the vendor.
The _____________ is the time it takes to back up the dataset.
backup window
The Windows Boot Loader loads the Windows _________ and essential drivers.
kernel
The ______________ can be used to look at errors, warning and messages in the operating system.
Event logs. In Windows, event logs are stored as .evtx files on disk and are typically viewed through Event Viewer.
The ___________ initializes the Windows kernel.
Windows Boot Loader or bootmgr
What is the primary benefit of using cloud‐based productivity tools?
They allow access to files from any device with an Internet connection. This facilitates collaboration and enhances productivity by enabling real-time updates and sharing.
Where is JavaScript primarily used?
Web browsers. JavaScript is primarily used for creating interactive and dynamic content on websites, enhancing the user experience by allowing for real-time updates and responses without needing to reload the page.
From which Control Panel applet can you remove a username and password that is automatically filled in, when you visit a web page?
Credential Manager: The Credential Manager lets you manage saved credentials for automatic logins, so you can remove unwanted usernames and passwords for websites.
_____________ is a form of social engineering where the attacker pretends to be someone else to gain access.
Impersonation. It involves deceiving individuals into providing sensitive information by assuming a trusted identity.
The command to display disk usage in Linux is ___.
df. The command "df" displays the amount of disk space used and available on Linux filesystems. This command can also display disk usage in human-readable format with the -h option.
___________________ are software programs that have the ability to hide certain things from the operating system.
Rootkits. They are designed to allow unauthorized users to maintain control of a computer system without detection. They can manipulate operating system functions and conceal their presence.
When lifting computer equipment, always lift with your _____.
legs. This helps prevent injury by using your legs' strength rather than straining your back.
The command to check and repair filesystems in Linux is ___.
fsck. The "fsck" command is used to check and repair inconsistencies in Linux file systems, ensuring data integrity.
_____________learning models learn to achieve a goal by maximizing cumulative rewards.
Reinforcement learning. In reinforcement learning, agents learn to make decisions by receiving rewards or penalties for their actions, thereby optimizing their strategies over time.
______________ are used to document symptoms and solutions for common problems.
Knowledge base articles. These articles compile troubleshooting information and solutions to help users resolve technical issues.
The ___ command shows the computer name.
Hostname. The "hostname" command displays the current system's hostname, which identifies the computer on a network.
______________ is a method of backup that allows for the restoration of individual files.
Volume Shadow Copy. This method enables users to restore specific files or folders from a backup taken at a particular point in time while the system is running.
What does the Performance Monitor (perfmon.msc) display?
Performance counters collect counter information for troubleshooting. These counters help identify system performance and resource usage issues, allowing for effective bottleneck resolution.
What is the purpose of the BitLocker feature in Windows?
To provide drive encryption to protect files, including those needed for startup and login and to ensure data security in case of theft or loss.
What protocol does the Remote Desktop Connection client use for making remote connections?
It uses the Remote Desktop Protocol (RDP), which provides a user interface to connect to another computer over a network, enabling users to access applications and data remotely.
The first step in incident response is to _________ the incident.
Detecting, which is to discover or identify the presence or existence of the incident.
_____________ is designed to control, monitor, and protect privileged accounts.
Privileged Access Management (PAM) Privileged Access Management (PAM) is designed to control, monitor, and protect privileged accounts, ensuring that only authorized users can access sensitive systems and data.
The command to download and install packages in Red Hat–based Linux distributions is ___.
"dnf". The command used to download and install packages in Red Hat-based Linux distributions is "dnf", which stands for Dandified YUM, providing improved package management capabilities.
__________________ allows users to access multiple applications with a single set of login credentials.
Single Sign‐on (SSO). Single Sign-On (SSO) is a user authentication process that allows users to access multiple applications with a single set of login credentials, enhancing user convenience and security.
Using the ___________ wireless band can help with wireless interference.
5 GHz. Using the 5 GHz wireless band can help with wireless interference, as it typically offers more channels and reduced congestion compared to the 2.4 GHz band.
__________ compliance is enforced by banks and creditors.
PCI DSS.. Payment Card Industry Data Security Standard (PCI DSS) compliance is enforced by banks and creditors to ensure that companies handle cardholder information securely.
When talking about a computer problem with a customer, you should avoid using _______.
jargon, acronyms, and slang
The role of the MAP Toolkit is hardware ___.
Assessment. The role of the MAP Toolkit is to provide hardware assessment, enabling organizations to assess and analyze their IT infrastructure for better planning and management.
Name three popular Linux distributions.
Red Hat, Ubuntu, Debian, Fedora
______________ is a process in which an attacker attempts to acquire information by social means.
Social Engineering. A manipulation technique that exploits human psychology to gain confidential information.
A ___________________ is an architectural structure designed to act as a visual perimeter.
bollard
The chmod Linux command is used to __________________.
change permissions. It helps you gain control of access to files and directories.
Which remote technology operates with TCP port 22?
SSH (Secure Shell) is a protocol for secure remote access and management of network devices, which can be used by downloading the PuTTY app.
Which architecture is primarily used for mobile tablets and phones?
ARM architecture is primarily used for mobile tablets and phones.
___________________ involves applying a strong magnetic field to initialize the media. (This is also referred to as disk wiping.)
Degaussing. This process erases data on magnetic media by disrupting the magnetic domains.
What is the minimum amount of RAM required for a 64‐bit installation of Windows 10?
The minimum RAM required for a 64-bit Windows 10 installation is 2 GB.
_______________ is a type of browser redirection that is used to compromise credentials.
Pharming. This technique redirects users from legitimate websites to malicious ones without their knowledge.
How many days do you have after an upgrade to roll back to the prior operating system?
10 days. After a Windows upgrade, the system stores previous installation files in a folder called Windows.old on the primary drive. This folder allows for a rollback if needed, but it is automatically purged after 1010 days to free up space. This rollback window can be extended up to a maximum of 6060 days using the Deployment Image Servicing and Management (DISM) tool command: DISM /Online /Set-OSUninstallWindow /Value:60, provided this is done before the initial period expires.
_____________ is a form of social engineering where someone asks for information by making it look like a legitimate request.
Phishing. This form of social engineering often involves fake emails or messages that appear to be from trusted sources, tricking individuals into providing sensitive information.
The macOS feature for synchronizing data across devices is called ___.
iCloud. This service allows users to store files, photos, and backups in the cloud, making them accessible on all Apple devices.
What kind of card is a type of badge or card that gives you access to resources, including buildings, parking lots, and computers? (It contains information about your identity and access privileges.)
Smartcard. This is a physical card embedded with a chip that securely stores and processes data, granting access to specific locations or systems.
The ___________ wireless encryption standard replaces PSK with a higher level of security.
WPA3
During the setup of Windows 11, what are the license terms called that you must accept?
End User License Agreement (EULA). This is a legal contract between the user and the software provider that outlines the terms of use for the software.
The _____________ is a visual indicator to help diagnose a wired connection
link light. This indicates the status of the network connection, showing whether the device is properly connected.
A file on a Linux workstation has the permissions of rw-r-x--x; what are the permissions the user is assigned?
read/write permissions. The user is assigned read and write permissions, allowing them to read and modify the file.
The _____________ feature in Windows allows users to log in with a PIN or biometric data instead of a password.
Windows Hello. It’s a security feature that enhances user authentication by allowing face recognition, fingerprint scanning, or PIN entry, providing a convenient and secure way to access devices.
What is the minimum speed processor is required to install Windows 11?
1 GHz or faster
________________enables machines to comprehend, interpret, and produce meaningful and practical human language.
Natural Language Processing (NLP). This technology allows computers to understand and manipulate human language, facilitating communication between humans and machines.
The Windows Reliability Monitor allows you to see application ___________.
Crashes. It tracks and reports errors, providing insights into system reliability.
_________ is the process of analyzing proposed changes for the possibility of failure or undesirable consequences.
Risk analysis. It involves assessing potential risks associated with changes in a project or system to determine their impact.
The ____________________ is the local authentication database for Windows operating systems.
Security Account Manager (SAM)
What is the purpose of the Disk Cleanup (cleanmgr.exe) tool?
To clean up operating system files to free up space without affecting data files.
What can be implemented to prevent tailgating?
Access control vestibule.
The _________ plan should include steps to be taken in the event the rollback plan must be executed.
rollback plan.
__________ is a biometric authentication method that uses a fingerprint to unlock an Apple device.
Touch ID
You should ___________________ an unresponsive mobile device.
Hard‐reset.
Which command‐line tool can be used to collect information about hardware before installing Windows 11?
MSINFO32.EXE
The ____________ _____________ stores username and passwords for Microsoft Edge.
Credential Manager
The _________ rule method is a common method for maintaining both on‐site and off‐site backups.
3-2-1. This method involves keeping three copies of your data: two local (on different devices) and one off-site for disaster recovery.
_______________ software can disable camera and microphone on mobile devices.
Mobile device management. This type of software enables organizations to manage policies and settings on mobile devices, including disabling features such as the camera and microphone for security reasons.
Which command allows you to map the drive of V to the UNC of \\server\files?
NET USE V: \server\files. This command assigns the drive letter V: to the network share located at \server\files, allowing access to that shared folder from the V: drive.
What is the search feature within macOS?
The search feature within macOS is called Spotlight. It allows users to quickly find and access files, applications, and information from the internet by simply typing keywords.
Which Windows Update branch for Windows 11 allows for security updates, but no new features?
Long‐Term Servicing Channel (LTSC). This Windows Update branch is designed for stability and security in enterprise environments, providing essential updates without introducing new features that may disrupt operations.
The ___________ protocol is the main authentication protocol used by Microsoft Active Directory.
Kerberos. It is used to securely authenticate users and services within a network, providing encrypted communications and mutual authentication.
The command to change the current directory in Linux is ___.
cd.
A ________ backup is a full backup without the overhead of performing a full backup on the entire dataset.
synthetic backup. This type of backup combines previous full backups with incremental backups to create a new full backup without requiring a complete data transfer.
_____________ is a feature introduced by Apple to deliver critical security updates to macOS, iOS, and iPadOS devices more swiftly than traditional software updates.
Rapid Security Response (RSR). This allows Apple to deploy important security patches outside of the regular update cycle, helping to mitigate vulnerabilities more quickly.
_____________ is a cloud‐based storage service used for backing up Android devices.
Google Drive
The _____________ can be used to repair the operating system.
Windows Recovery Environment. This recovery option provides tools to fix problems when Windows cannot start normally.
The command to search for text within files in Linux is ___.
grep