wrong answers practice

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/107

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

108 Terms

1
New cards

A supervised macOS can be restricted in terms of app installation and uninstallation policies. Corporate apps can be pushed to devices via

the Business Manager portal.

2
New cards

When users reboot an Apple Mac, if the startup drive is not available for any reason and it is connected to the internet, the computer will try to boot from

a web-based drive.

3
New cards

Which of the following alternatives can a customer select from when an issue cannot be resolved remotely?

Replace & Repair

4
New cards

Over the course of a day, a user's computer becomes slow, and pop-ups randomly appear on the screen. Later, these pop-ups become more frequent, and the user notices that Internet searchers are using Google versus the selected default web browser, Firefox. Once the computer starts repeatedly crashing, the user calls tech support for help. Considering these data points, which is the best diagnosis for the observed problem?

Adware or spyware infection

5
New cards

The goal of ransomware

encrypts files to shut down access to data until payment is made., extortion

6
New cards

While conducting an online search for cleaning services, a homeowner clicks on the link for one of the results. When the website loads, the page says, "Warning: Potential Security Risk Ahead." What would cause this message to appear?

-The certificate has expired.

-Malware is trying to redirect the browser to a spoofed page.

-The certificate is issued by an untrusted CA.

7
New cards

An administrator assists the human resources department in testing access to their new cloud-based training site. Unfortunately, the site cannot be accessed due to the organizational security policy. Which of the following should the administrator use to assist them?

certmgr.msc

8
New cards

A user downloaded a script, but the file was in a text file format. The user needs to change the extension to a PowerShell script to run it, but they do not see the extension. Where can the user configure this setting?

File Explorer View tab

9
New cards

On the File Explorer View tab

among many other options, users can configure hidden extensions, hidden files, and hide operating system files.

10
New cards

On the File Explorer General tab

users can set options for the layout of Explorer windows and switch between the single-click and double-click styles of opening shortcuts.

11
New cards

Ease of Access settings

configures input and output options to best suit each user. There are three main settings groups.

12
New cards

The Internet Options Control Panel applet

exposes the configuration settings for Microsoft’s Internet Explorer (IE) browser. The Security tab restricts what types of potentially risky active content are allowed to run.

13
New cards

An employee uses an option to ask for help from a technician with an invitation file protected by a passcode. What is this option?

MSRA

14
New cards

Microsoft Remote Assistance (MSRA)

allows a user to ask for help from a technician or co-worker by an invitation file protected by a passcode. The helper opens the invitation file to connect to the remote system.

15
New cards

Remote Monitoring and Management (RMM)

tools are principally designed for use by managed service providers (MSPs).

16
New cards

Remote Desktop Protocol (RDP)

implements terminal server and client functionality. RDP authentication and session data are always encrypted.

17
New cards

A virtual private network (VPN)

establishes a tunneled link that joins a local computer to a remote network. Establish a VPN link and then use a remote desktop to connect to a host on the private network.

18
New cards

the system firmware must be set to use the Unified Extensible Firmware Interface (UEFI) boot method.

When the disk uses GPT partitioning

The disk will not be recognized as a boot device if the boot method is set to BIOS.

19
New cards

requires a CPU or motherboard supporting trusted platform module (TPM) version 2.

Windows 11

20
New cards

The master boot record (MBR) partition style

stores a partition table in the first 512-byte sector on the disk, which is different from UEFI.

21
New cards

A client uses this software that allows access to a given computer. What is this software?

Screen-sharing

22
New cards

is software that is designed to work over HTTPS across the internet. This is secure because the connection is encrypted but also easier to implement as it does not require special firewall rules.

Screen-sharing

23
New cards

users can choose a file-sharing protocol that can be used across all connected hosts. It allows configuring permissions on the share and provisioning user accounts that are recognized by both the server and client.

With file transfer

24
New cards

Desktop management

these suites are designed for deployment by a single organization and focus primarily on access control and authorization.

25
New cards

The System Restore tool in Windows is used to roll back configuration changes to an earlier date or restore point. One option for creating restore points is to use Task Scheduler. What other actions will create a restore point? (Select all that apply.)

-Whenever an application or program is installed, a restore point is created.

-A restore point is also created whenever an application or program is updated.

26
New cards

Surge suppressors

are passive protection devices that can filter out the effects of surges and spikes.

27
New cards

A compressed air blaster

can be used to dislodge dust from difficult-to-reach areas. When performing this sort of maintenance within a controlled area, wear an appropriate air-filter mask and goggles.

28
New cards

are packages that reduce the risk of ESD because it is coated with a conductive material. 

Antistatic bags

29
New cards

should fit snugly around the wrist or ankle so that the metal stud makes contact with the skin. Wearing an anti-ESD wrist strap causes the static charge to dissipate more effectively.

Anti-ESD wrist straps

30
New cards

The chain of custody

form records where, when, and who collected the evidence, handled it subsequently, and stored it.

31
New cards

The Certificate Manager (certmgr.msc) console shows

which console shows certificates that have been installed and provides a mechanism for requesting and importing new certificates.

32
New cards

The Disk Management (diskmgmt.msc) console displays

a summary of any fixed and removable disks, which includes hard disk drives (HDDs), solid-state drives (SSDs), and optical drives.

33
New cards

The Task Scheduler (taskschd.msc)

runs software and scripts according to calendar or event triggers which would not help diagnose and troubleshoot internet connectivity issues.

34
New cards

The Local Users and Groups (lusrmgr.msc) console

provides an advanced interface for creating, modifying, disabling, and deleting user accounts.

35
New cards

An administrator assists the human resources department in testing access to their new cloud-based training site. Unfortunately, the site cannot be accessed due to the organizational security policy. Which of the following should the administrator use to assist them?

certmgr.msc

36
New cards

What is this called when antivirus software scans a file before allowing or preventing it from opening?is when the antivirus software intercepts an operating system call to open a file and scans the file before allowing or preventing it from being opened. .

On-access scanning

37
New cards

scans a computer's critical areas, like system memory, hidden services, boot sectors, auto-run entries, registry keys, and important operating system files and folders.

A smart scan

38
New cards

looks at all the locations where there could be malware, such as registry keys and known Windows startup folders.

A quick scan

39
New cards

A telltale sign of a malware infection is when changes occur to system files. Which of the following is likely the result of malware-induced changes to system files? (Select all that apply.)

-Files that are missing or renamed

-Files with date stamps and file sizes that are different from known-good versions


While malware will add additional files with names almost the same as authentic system files, the extensions .docx and.xlsx represent Word and Excel files, respectively. These are data files, not system files. System files have extensions such as .dll and .sys.

-System files do not have certificates. Certificates are a security tool used by websites to prove the server is trusted.

40
New cards

A helpdesk operator looks at build numbers for Windows as they plan upgrade timelines. The operator investigates the significance of the build numbers. Which of the following are the build numbers based on? (Select all that apply.)

-Year

-Time of Year

41
New cards

chkdsk

scans the file system and disk sectors for faults and can attempt to repair any problems detected.

42
New cards

format command

writes a new file system to a drive. This process deletes any data existing on the drive. This could be catastrophic if used in the wrong way.

43
New cards
44
New cards

xcopy command

is a utility that allows administrators to copy the contents of more than one directory at a time and retain the directory structure.

45
New cards

Diskpart

is the command interface underlying the Disk Management tool. it deals with partitions and management.

46
New cards

A marketing professional normally sends large files to other team members. The IT department recommended using a shared drive and assisted them in setting it up. The project was a very high priority, so the professional collaborated with several members but started receiving reports that some users could not access it sometimes and others could. They eventually figured out that only 20 people at a time seemed to be able to access it. What is causing the issue?

The share was created on a Windows desktop.

47
New cards

If more than 20 users access the share, the data should be stored on

file servers rather than local client computers.

48
New cards

Robocopy command (or "robust copy")

is another file copy utility. Microsoft now recommends using rather than xcopy. It is designed to work better with long file names and NTFS attributes.Windows

49
New cards

The xcopy command

is a utility that allows users to copy the contents of more than one directory at a time and retain the directory structure.Windows

50
New cards

The move command

provides the ability to transfer files contained in a single directory. It uses a three-part syntax: command Source Destination, where Source is the drive name, path, and name of the files to be moved/copied.Windows

51
New cards

The copy command

also allows transferring files contained in a single directory. Windows

52
New cards

A user calls the help desk complaining that Windows freezes to a blue screen every time it tries to boot. When the technician arrives, they boot the computer in Safe Mode. After evaluating this situation, what is the BEST reason the technician wants to enter Safe Mode to begin troubleshooting?

Safe Mode loads only the minimum amount of drivers and services to start the system.

53
New cards

The blue screen of death (BSoD) is mostly due to

faulty hardware, especially at startup. CHKDSK scans the hard drive to find and repair errors, and it can be run in Safe Mode and many other analysis and recovery tools.

54
New cards

Cryptominer

hijacks the resources of the host to perform cryptocurrency mining. Cryptomining is often performed across botnets which are also referred to as cryptojacking.

55
New cards

Spyware

is malware that can perform browser reconfigurations, such as allowing tracking cookies, changing default search providers, opening arbitrary pages at startup, adding bookmarks, and so on.

56
New cards

Viruses

are concealed within the code of an executable process image stored as a file on a disk.

57
New cards

Trojans

are malware concealed within an installer package for software that appears to be legitimate. The malware will be installed alongside the program and executed with the same privileges.

58
New cards

What is referred to as data on persistent storage like HDDs, SSDs, and thumb drives?

Data-at-rest encryption

59
New cards

A developer, working at Microsoft, is helping to develop the latest and greatest user interface for Windows. The developer is assigned to the team that works on the user interface's top level. What will the developer be working on?

Desktop

60
New cards

Microsoft provides a repository of information about threats that Windows Defender discovers. What is the name of the repository?

Microsoft Knowledge Base

61
New cards

A transportation company wants to set up software that gathers statistics from the controller area network for trailers hauling loads, enabling them to adjust processes to optimize cost savings. What type of adapter will the company need to send the statistics back to their cloud network?

WWAN

62
New cards

Wireless Wide Area Network (WWAN)

uses a cellular adapter to connect to the internet via a provider's network. These networks are typically metered with a set data limit.

63
New cards

A virtual private network (VPN)

connects the components and resources of two (private) networks over another (public) network.

64
New cards

While WWAN could be considered wireless, wireless generally refers to

a computer that connects to the 2.4 or 5 GHz spectrum with a limited physical range.

65
New cards

A technician configures a method to run some server application from a network and make it accessible to the internet. What is this method?

Port forwarding

66
New cards

Port forwarding

means that the router requests an internet host for a particular service and sends the request to a designated host on the LAN.

67
New cards

The Dynamic Host Configuration Protocol (DHCP) reservation

means that the DHCP server always assigns the same IP address to the host. A user can usually choose which IP address this should be.

68
New cards

The universal plug-and-play (UPnP) framework

sends instructions to the firewall with the correct configuration parameters to allow applications to work.

69
New cards

A mapped drive

is a share that has been assigned to a drive letter on a client device. To map a share as a drive, right-click it and select Map Network Drive.

70
New cards

A user just installed a new application on their workstation, but the application has issues even starting up. The user has been working on the machine regularly up to this point without any prior issues. Which of the following is most likely the issue?

In this scenario, one place to troubleshoot is the host-based firewall. Select "Allow an app through the firewall" to allow or block programs (configure exceptions) from the Windows Firewall status page.


While proxy settings could be an issue, if the user is working fine beforehand, proxy settings are not likely to be an issue.


If the user has been using the machine without any previous problems it is unlikely that the domain name system (DNS) is the issue.

71
New cards

A Windows administrator wants to learn how to use Linux by installing the Linux subsystem for Windows. What should their version of Windows have on the New Technology File System (NTFS) to support case-sensitive naming and hard links required by Linux?

POSIX

72
New cards

This is known as POSIX compliance

To support UNIX/Linux compatibility, Microsoft engineered NTFS to support case-sensitive naming, hard links, and other key features UNIX/Linux applications require.

73
New cards

When data is written to an NTFS volume, it is re-read, verified, and logged via journaling. In the event of a problem,

the sector concerned is marked as bad and the data relocated.

74
New cards

is a variant of FAT that uses a 32-bit allocation table, nominally supporting volumes up to 2 TB. The maximum file size is 4 GB minus 1 byte.

FAT32

75
New cards

The Indexing Service

creates a catalog of file and folder locations and properties, speeding up searches.

76
New cards

Advanced encryption standard (AES)

is the standard encryption used by WPA2 and the strongest encryption standard to use by Wi-Fi.

77
New cards

Temporal key integrity protocol (TKIP)

tries to mitigate the various attacks against WEP developed by producing a new 128-bit encryption key for every packet sent on the network.

78
New cards

Wi-Fi protected Access (WPA3)

uses passphrase-based group authentication of stations in private mode, and it changes the method by which this secret is used to agree with session keys. The simultaneous authentication of equals (SAE) protocol replaces the 4-way handshake.

79
New cards

Multifactor authentication (MFA)

allows the machine to establish a trust relationship and create a secure tunnel to transmit the user credentials or perform smart card authentication without a user password.

80
New cards

A server administrator receives a report that the company's external-facing web server is unresponsive. Rebooting the server would take too long, and they are not even completely certain the server would come back up. What utility should the administrator use to restart the website?

services.msc

81
New cards

The services console (services.msc)

starts, stops, and pauses processes running in the background. This utility would be useful in restarting an unresponsive web server.

82
New cards

The System Configuration Utility (msconfig.exe)

is used to modify various settings and files that affect how the computer boots and loads Windows.

83
New cards

The Windows registry

provides a remotely accessible database for storing operating system, device, and software application configuration information.

84
New cards

A computer administrator sets up a client workstation to join a centrally managed network. What options should the administrator configure to do this?

Access work or school

85
New cards

The Update & Security settings

provide a single interface to manage a secure and reliable computing environment.

86
New cards

The Apps group is used to

view and remove installed apps and Windows Features in the Settings app. Users can also configure which app should act as the default for opening, editing, and printing particular file types and manage which apps run at startup.

87
New cards

To create a directory, Windows

md

88
New cards

An administrator automates the creation of folders during a Windows install process. Which command should they use in their script?

md

89
New cards

To delete an empty directory, Windows

enter rd Directory or rmdirDirectory. If the directory is not empty, users can remove files and subdirectories using the /s switch.

90
New cards

command sets the focus to a different working directory. Users can change to any directory by entering the full path. Windows

cd

91
New cards

command to list the files and subdirectories from the working drive and directory or a specified path. Windows

dir

92
New cards

A technician makes sure that there is no faulty electrical equipment that can pose a risk and places extinguishers nearby. What is this called?

Electrical fire safety

93
New cards

A user uses a scripting language based on Microsoft’s Visual Basic programming language. Which of the following extensions is used?

.vbs

94
New cards

.bat

is the Windows batch file extension. A shell script for the basic Windows CMD interpreter is often described as a batch file.

95
New cards

.js

is the JavaScript file extension. JavaScript is a scripting language designed to implement interactive web-based content and web applications. Most web servers and browsers are configured with a JavaScript interpreter.

96
New cards

.py

is the Python file extension. Python is a general-purpose scripting and programming language that can develop both automation scripts and software applications.

97
New cards

is the VBScript file extension. VBScript predates PowerShell. The wscript.exe interpreter executes VBScript by default.

.vbs

98
New cards

Wi-Fi protected access 2 (WPA2)

used the AES cipher deployed within the counter mode, blocking the changing message CCMP.

99
New cards

Wi-Fi protected Access (WPA3)

uses passphrase-based group authentication of stations in private mode; it changes the method this secret is used to agree with session keys.

100
New cards

The Instagram app on an Android phone will not launch. Which of the following options could fix the problem?

first use Force Stop to quit it and try launching again. In Android, open Settings > Apps.