• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/349

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

349 Cards in this Set

  • Front
  • Back

What is SATA and eSATA?

SATA connects host bus adapters to mass storage devices such as HDDs, optical drives, and SSDs. eSATA supports external devices.

What is the Southbridge (I/O controller hub) on a motherboard?

An intel chipset that manages the basic forms of input/output such as USB, serial, audio, and integrated drive electronics (IDE) and Industry Standard Architecture (ISA) in a computer

What is AGP?

Accelerated Graphics Port is a point to point channel that is used for high speed video output

What does a DHCP IP address look like?

192.168.0.3

What is SMART?

Smart is Self-Monitoring and Repair Tool. It’s a feature in all modern magnetic hard drives (not SSD drives) that monitors the HDD to ensure it performs properly and notifies the user if failure is about to occur so that they can do a back up of the drive before total failure occurs

How much data can single and dual layer optical discs store?


CD-RW, DVD-R, and BD-R

CD stores up to 700mb


DVD single layer: 4.7GB and 8.5GB dual layer.


Blu-ray: 25GB single layer, and 50 GB dual layer

Which is the virtualization technology supported by most modern intel processors?

VT. Virtualization technology.

What are the two types of processors?

Intel and AMD

What are important things to have when you’re building a virtualization work station? (Three things)

Multiple-core processor. Lots of memory. A fast HDD.

What port(s) does NetBIOS protocol use?

Operates in TCP/UDP ports 137 and 139

What networking hardware is installed in a computer or server to connect to an Ethernet switch using a CAT 6 cable?

Network Interface Card. It enables a PC to connect to a LAN.

What is QoS and what is it designed for?

Quality of Service. Is a network protocol to prioritize certain traffic types over others. Used to make sure voice or video calling is given higher priority

What is an APIPa or link-local address?

An automatic private IP addressing used when there is no DHCP server available. But APIPA can’t communicate with DHCP. Addresses 169.254.0.1-169.254.255.254 is considered APIPA.

What are the 6 steps of the CompTIA troubleshooting methodology?

1. Identify the problem.


2. Establish a theory of probable cause.


3. Test the theory to determine the cause


4. Establish a plan of action to resolve the problem and then implement the solution.


5. Verify full system functionality and implement preventative measures.


6. Document findings, actions, and outcomes

What are the dimensions of a ATX and MicroATX motherboard?

ATX is 12” x 9.6”


And mATX is 9.6” x9.6”

What are the common voltages produced by the power supply of a computer?

3.3 VDC, 5 VDC, and 12 VDC

What is most likely the solution to fix an “OS not found” error?

Repair the MBR.

What is the difference between CAT 6a and CAT 6?

CAT6a can support 10Gbs for up to 100 meters in length. Cat 6 can support 10Gbs but only for 55 meters

What types of data should be transferred over UDP?

Streaming media, since it’s faster than TCP, streaming videos or making VoIP calls rely on UDP for their transmission

What port is a Serial SCSI connection that uses a D-shaped connector that supports 800 Mbps of bandwidth

FireWire

What frequency has more channels 5.0 GHz or 2.4 GHz?

The 5.0 GHz has more individual channels giving it less congestion and interference than the 2.4 GHz.

What frequency has more channels 5.0 GHz or 2.4 GHz?

The 5.0 GHz has more individual channels giving it less congestion and interference than the 2.4 GHz.

Which frequency supports higher data rates due to lower levels of congestion and interference, 2.5 GHz or 5.0 GHz?

5.0 GHz.

What frequency has the longer wavelength and makes it better for propagating through solid surfaces? What does the longer wavelength allow?

2.4 GHz longer wavelength makes it better with solid surfaces and gives the frequency the ability to cover longer range using the same power output levels.

What network does 802.1s have and what can be said about the network?

A wireless mesh network (WMN) topology where all nodes, including client stations, can provide forwarding and path discovery to improve coverage and throughput compared to using fixed access points and extenders.

What type of cable is most commonly used to terminate a serial connection to a modem?

DB-9 is used to terminate an RS-232 serial cable.

What type of cable is most commonly used to terminate a serial connection to a modem?

DB-9 is used to terminate an RS-232 serial cable.

What kind of connection is used to terminate a fiber optic cable?

ST (Straight Tip). SC (Subscriber Connector or Square Connector). LC (lucent connector). MTRJ (mechanical transferred registered Jack)

What type of connector is used to terminate phone lines?

An RJ-11.

What type of connector is used to terminate a copper twisted pair Ethernet cable?

RJ-45

A computer is attempting to power on, but it keeps booting the incorrect hard drive. What can be done to potentially fix this problem?

Reconfigure the boot order within the BIOS/UEFI.

Which of the following cloud services should an organization choose to develop a new iPhone app without having to configure and set up its own development environment?

PaaS. is a complete developmental and appointment environment in the cloud with resources that enable you to deliver everything from a simple cloud-based apps to sophisticated cloud enabled enterprise applications

What is IaaS? what does it do?

Is a type of cloud computing service that offers essential compute storage and networking resources on-demand, on a pay-as-you-go basis.

What is SaaS and what does it do?

Software as a service allows users to connect to and use cloud-based apps over the Internet such as Microsoft office 365

What are the two most important components to upgrade if you want to simultaneously run numerous VMs?

CPU should support virtualization and have a multi-core processor and RAM should have 16 GB to host numerous VMs effectively

Which wire standard should be used when installing ethernet cable in an office or data center?

T-568B and T-568A standards are used when installing Ethernet cabling.

Which wire standard should be used when installing ethernet cable in an office or data center?

T-568B and T-568A standards are used when installing Ethernet cabling.

What is it called when both ends of the Can le use T-568A?

The cable is called a straight through or patch cable

Which wire standard should be used when installing ethernet cable in an office or data center?

T-568B and T-568A standards are used when installing Ethernet cabling.

What is it called when both ends of the Cable use T-568A?

The cable is called a straight through or patch cable

What is it called when one end of the cable is T-568A and the other is 7-568B?

The cable is called a cross-over cable

What motherboard form factor measures 6.7” x 6.7” in size? what case are they usually in? What are these motherboards designed for?

The mITX. There’s no specific size called ITX. A small form factor (SFF) case. These motherboards are designed for passive cooling and low power consumption.

What are the specs of 802.11g?

Uses 2.4 GHz frequency and provides speeds up to 54 Mbps.

What are the specs of 802.11g?

Uses 2.4 GHz frequency and provides speeds up to 54 Mbps.

What specs does 802.11a have?

Uses 5 GHz frequency and speeds up to 54 Mbps.

What are the specs of 802.11g?

Uses 2.4 GHz frequency and provides speeds up to 54 Mbps.

What specs does 802.11a have?

Uses 5 GHz frequency and speeds up to 54 Mbps.

What specs does 802.11b have?

Uses 2.4 GHz frequency and speeds up to 11 Mbps.

What specs does 802.11n have?

Uses 2.4 GHz frequency and speeds up to 108 Mbps. Or a 5 GHz frequency to provide speeds up to 600 Mbps. And supports MIMO (multiple input multiple output) and supports channel bonding.

What specs does 802.11ac?

Has 5 GHz frequency. And speeds up to 3.5 Gbps. Uses orthogonal frequency division multiple access (OFDMA) and uses channel bonding and has MU-MIMO (multiple users- Multiple input- Multiple output)

What specs does 802.11ax have?

Uses 2.4 GHz or 5 GHz frequencies and provides speeds up to 9.6 Gbps.

What is 8.8.8.8?

Address provides the DNS server which is open all over the internet and there is no blocking to access and ping this IP address

Which cloud computing concept is focusing on replacing the hardware and software required when creating and testing new applications and programs from a customer’s environment with cloud-based resources?

PaaS. Allows for the renting of fully configured systems that are set up for specific purposes. They provide the end user with a developmental environment without having to configure it themselves.

What hard drive form factor would be connected to your laptop internally using a Micro SATA connection?

1.8” when a 1.8” for factor is used, the drive is connected to the laptop using a Micro SATA connector since a regular SATA connection will not fit due to the connects large size.

What component of a laser printer is used to apply an electric charge to the paper so that the paper attracts the toner during the imaging process?

The transfer roller.

Which connector type should be used to connect the Tab tuner to the wall Jack when using a coaxial cable?

F-Type. It is used with coaxial cables.

How does a DHCP reservation work?

By matching a MAC address to an IP address within the DHCP scope.

You turn on a PC and after a few seconds, you hear a single beep. What does that single beep indicate?

The BIOS completed the POST.

What is an intermediary device between your clients and the web servers they want to connect to make an HTTP request from client, check it, and then forward it to its destination?

A proxy server. It takes the whole HTTP request from a client, checks it, then forwards it to the destination computer on the internet.

What connection-oriented protocol utilizes TCP?

SSH.

Which type of internet connection is terminated at a local switching center that requires a different media type between the switching center and the end customer?

DSL technology.

You want to create a new mobile application and develop it in the cloud. You just signed up for a cloud based service providers offer allowing you to develop it using their programming environment, what best describes this type of service?

PaaS.

What does HFC mean?

Hybrid Fiber-coaxial connection

What type of internet connection allows for high speed bi-directional data communication over a hybrid fiber-coaxial connection?

Cable.

Which of the following types of servers should you configure to accept requests through HTTP and HTTPS and provide resources back to the requester?

A web server.

A full disk encryption laptop with an onboard hardware based cryptographic processor contains what?

A TPM. Trust platform module, that is a hardware based cryptographic processing component that is part of the motherboard.

What is AAAA?

A record that associates your domain name with an IPv6 address.

What is a CNAME?

It’s a canonical name or alias name, which associates one domain name as an alias of another. Like YouTube.com and www.YouTube.com

What network device uses ACLs to prevent unauthorized access into company systems? What is an ACL?

A firewall. And an ACL is a list that shows which traffic or devices should be allowed or denied from accessing the network.

A printer began to print pages that appear to have dust-like coating when handled by users, which component should be replaced based on this description?

A fuser.

Which connector type should be used to connect the Tab tuner to the wall Jack when using a coaxial cable?

F-Type. It is used with coaxial cables.

How does a DHCP reservation work?

By matching a MAC address to an IP address within the DHCP scope.

You turn on a PC and after a few seconds, you hear a single beep. What does that single beep indicate?

The BIOS completed the POST.

What is an intermediary device between your clients and the web servers they want to connect to make an HTTP request from client, check it, and then forward it to its destination?

A proxy server. It takes the whole HTTP request from a client, checks it, then forwards it to the destination computer on the internet.

What connection-oriented protocol utilizes TCP?

SSH.

Which type of internet connection is terminated at a local switching center that requires a different media type between the switching center and the end customer?

DSL technology.

You want to create a new mobile application and develop it in the cloud. You just signed up for a cloud based service providers offer allowing you to develop it using their programming environment, what best describes this type of service?

PaaS.

What does HFC mean?

Hybrid Fiber-coaxial connection

What type of internet connection allows for high speed bi-directional data communication over a hybrid fiber-coaxial connection?

Cable.

Which of the following types of servers should you configure to accept requests through HTTP and HTTPS and provide resources back to the requester?

A web server.

A full disk encryption laptop with an onboard hardware based cryptographic processor contains what?

A TPM. Trust platform module, that is a hardware based cryptographic processing component that is part of the motherboard.

What is AAAA?

A record that associates your domain name with an IPv6 address.

What is a CNAME?

It’s a canonical name or alias name, which associates one domain name as an alias of another. Like YouTube.com and www.YouTube.com

What network device uses ACLs to prevent unauthorized access into company systems? What is an ACL?

A firewall. And an ACL is a list that shows which traffic or devices should be allowed or denied from accessing the network.

A printer began to print pages that appear to have dust-like coating when handled by users, which component should be replaced based on this description?

A fuser.

Microsoft word becomes frozen and unresponsive. Which feature in Task Manager would terminate an unresponsive program?

Processes can manage and terminate running apps and services.

Which type of attacks are usually used as part of an “on-path” attack?

Spoofing. It’s often used to inject the attacker into the conversation path between the two parties. It disguises communication from an unknown source as being from a known trusted source. On path is when the attacker secretly relays and alters communications between two parties

Which windows 10 power option will turn off individuals devices connected to a laptop to save energy?

USB selective suspend.

Which of the following backup rotation schemes used a three-tiered approach to ensure at least one monthly backup is conducted?

Grandfather-father-son which is used to combine full and incremental backups to reduce backup time and enhance storage security. Grandfather is a full back up that is stored offsite once per month, the father is a weekly full backup, and the son is an incremental or differential backup conducted each day.

What is used to uniquely identify one piece of hardware installed on a corporate network including servers, desktops, laptops, printers and monitors?

Asset ID.

What port must be allowed through the firewall to upload files to a remote server securely?

Port 22. SFTP or secure file transfer protocol.

Which type of wireless encryption uses a 40-bit encryption key with an RC4 encryption cypher?

WEP (Wired Equivalent Privacy)

Which backup rotation scheme requires at least one monthly full backup to be stored safely off-site?

The 3-2-1. 3 for one primary back up and two copies of data. 2 for save the backup on two different types of media. And 1 for keep at least one copy off-site.

Which of the following OPENED SOURCE access tools allows users to connect to their desktop remotely, see what’s on screen, and control it with their mouse and keyboard?

VNC or virtual network computing. It’s a remote access tool and protocol used for screen sharing on Linux and macOS.

What does SSH do? What’s its port number?

Secure Shell uses port 22 to securely create communication sessions over the internet for remote access to a server or system

What does SSH do? What’s its port number?

Secure Shell uses port 22 to securely create communication sessions over the internet for remote access to a server or system

What is telnet and what port does it use? Is it secure?

Telnet uses port 23 to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection. But sends its data in plain text making it an insecure protocol.

What is RDP? What port does it use and is it proprietary to a particular company?

Remote Desktop protocol uses port 3389 and is a proprietary protocol developed by Microsoft which provides a user with a graphical interface to connect to another computer over a network connection.

After installing an OS and rebooting the computer, you see “OS not found” error on display. You verify that the boot.ini file is configured properly, but error still appears. What 5 things can cause this error message?

1. The BIOS doesn’t detect the Hard Disk. 2. The hard disk is damaged. 3. Sector (0) of the physical hard disk has an incorrect or malformed Master Boot Record (MBR). 4. An incompatible partition is marked as Active. 5. A partition that contains the MBR is no longer active.

You are formatting a 4 TB external HDD on your MacBook. The drive will be used to share large video files between your MacBook and your friends windows 10 desktop, which file format should you use?

The only file system that would work for this situation is xFAT. macOS can format a hard drive as APFS, HFS, HFS+, exFAT and FAT32. Windows system can only read exFAT and FAT32. But FAT32 only supports up to 32GB and file sizes up to 4 GB. And exFAT supports size up to 128 petabytes.

What are the seven steps of the malware removal procedures?

1. Investigate and verify malware symptoms. 2. Quarantine the infected systems. 3. Disable system restore in windows. 4. Remídase the infected systems, update the anti-malware software, scan the system, and use removal techniques (safe-mode, pre-installation environment) 5. Schedule scans and run updates. 6. Enable system restore and create a restore point in Windows, and 7. Educate the end user.

Which type of upgrade or repair should a technician use if they’re trying to replace an existing OS files with a new copy of the same version without deleting or modifying users applications and data during the upgrade/installation?

Repair installation. Is a type of installation that attempts to replace the existing version of the OS with a new copy of the same version. It’s useful when trying to repair a windows computer that will not boot or when you believe the system files have been corrupted. It will only affect the system files and not any of the settings, customizations, or applications.

What installation or upgrade would a technician use to completely replace the OS software on the computer with a new OS?

Clean Install. This will delete all of the users data, settings, and applications.

What installation or upgrade would a technician use to completely replace the OS software on the computer with a new OS?

Clean Install. This will delete all of the users data, settings, and applications.

What upgrade would a technician use to preserve Then applications, user settings, and data files that already exist on a computer?

An in-place upgrade. Preserves applications, user settings and data files that already exist on the computer

What upgrade would a technician use to preserve Then applications, user settings, and data files that already exist on a computer?

An in-place upgrade. Preserves applications, user settings and data files that already exist on the computer

What installation type would a technician use on an OS to revert most system settings to their default and recopy the system files?

Refresh installation is a type of installation that will re-copy the system files and revert most system settings to their default configuration while preserving user personalization settings data files and applications installed through the windows store.

Which file system type is used by default when installing macOS on a modern workstation?

APFS (Apple File System) is the default file system for Mac when using macOS 10.13 or later.

Which command line on a windows machine while running a program to determine where the network connectivity outage is occurring? The tool tests end-to-end connection and reports on each hop found in a connection. It will determine if the issue is on the intranet portion of your network or if it’s your ISP?

Tracert. is a command line utility used to trace an IP packets path as it moves from its source to its destination.

What does the nslookup tool do?

NSlookup tool is used to troubleshoot DNS issues

What does the netstat tool do?

Netsat tool is used to display network statistics and active connections

What does the netstat tool do?

Netsat tool is used to display network statistics and active connections

What does the ping tool do?

The pink tool is used to test an end to end connection but it will not provide any data on the hops found in the connection. It will not tell you where the connection is broken

What does the netstat tool do?

Netsat tool is used to display network statistics and active connections

What does the ping tool do?

The ping tool is used to test an end to end connection but it will not provide any data on the hops found in the connection. It will not tell you where the connection is broken

In linux what numbers do the letter permissions represent for an unmask?

R = 4 (read-only). W = 2 (write only). And X = 1 (execute)


RWX = 7. RW= 6. R=4.

What are the ranges of Class A private IP addresses?

Class A go from 10.0.0.0 to 10.255.255.255.255

What are the ranges of Class A private IP addresses?

Class A go from 10.0.0.0 to 10.255.255.255.255

What ranges does Class B private IP address have?

Class B ranges contain 172.16.0.0 to 172.31.255.255

What is the Class C private IP range?

Class C private IP ranges from 192.168.0.0 to 192.168.255.255.

What are the IP ranges of APIPA/link-local auto configuration?

APIPA ranges from 169.254.0.0 to 169.254.255.255

What type of data would DNA genetic testing be classified as?

Protected Health Information (PHI). Refers to medical insurance records plus associated hospital and laboratory results

What type of data would DNA genetic testing be classified as?

Protected Health Information (PHI). Refers to medical insurance records plus associated hospital and laboratory results

What type of data classification is used to identify, contact, or locate an individual?

Personal identifiable information. (PII) is data that can be used to use to identify, contact, or locate. Such as SSN, DoB, email, phone numbers, addresses, and biometric data.

What type of data would DNA genetic testing be classified as?

Protected Health Information (PHI). Refers to medical insurance records plus associated hospital and laboratory results

What type of data classification is used to identify, contact, or locate an individual?

Personal identifiable information. (PII) is data that can be used to use to identify, contact, or locate. Such as SSN, DoB, email, phone numbers, addresses, and biometric data.

What type of information is classified as created and owned by a company?

Proprietary Information or intellectual property (IP).

What type of data would DNA genetic testing be classified as?

Protected Health Information (PHI). Refers to medical insurance records plus associated hospital and laboratory results

What type of data classification is used to identify, contact, or locate an individual?

Personal identifiable information. (PII) is data that can be used to use to identify, contact, or locate. Such as SSN, DoB, email, phone numbers, addresses, and biometric data.

What type of information is classified as created and owned by a company?

Proprietary Information or intellectual property (IP).

What is the data classification for federal non-classified information that must be safeguarded by implementing sets of requirements and information security?

Controlled Unclassified Information (CUI). Is federal nine classified information that must be safe guarded by implementing a uniform security requirements and information security controls to secure sensitive government information

What is the minimum processor required to install windows 10 (x86) on a device? What else is required (RAM and HDD space)?

1 GHz single-core processor. 1 GB of RAM. And at least 16 GB of hard drive space.

What is the minimum processor required to install windows 10 (x86) on a device? What else is required (RAM and HDD space)?

1 GHz single-core processor. 1 GB of RAM. And at least 16 GB of hard drive space.

What is the minimum processor required to install Windows 10 (64-bit) OS? What other component requirements?

Requires 1 GHz Processor, 2 GB of RAM, and at least 20 GB of HDD space.

What are the requirements for Windows 11 (64-bit) operating system?

Requires a dual-core 1 GHz processor, 4 GB of RAM, and at least 64 GB of HDD space.

Which of the following commands is used on a Linux system to separate for lines that match a pattern within a file?

grep (Global Regular Expression Print). Is a command-line utility for searching plain text data sets for lines that match regular expression. It works on Unix, Linux, and macOS.

Which of the following features of WPA 3 is used to provide a password based authentication using the dragonfly handshake instead of the older WPA 4-way handshake?

SAE. Simultaneous authentication of equals is a password based identification and password authenticated key agreement method used in WPA 3 that replaced the 4-way handshake.

Which of the following features of WPA 3 is used to provide a password based authentication using the dragonfly handshake instead of the older WPA 4-way handshake?

SAE. Simultaneous authentication of equals is a password based identification and password authenticated key agreement method used in WPA 3 that replaced the 4-way handshake.

What is the minimum amount of storage space required to install windows 11 (x64) on a device?

The minimum requirements are a dual-core 1 GHz processor, 4 GB of RAM, and at least 64 GB of hard drive space.

Which remote access protocol should you use to connect a Linux server securely over the Internet?

SSH is used to remotely connect to a network switches and routers to configure them securely.

Which remote access protocol should you use to connect a Linux server securely over the Internet?

SSH is used to remotely connect to a network switches and routers to configure them securely.

What is the minimum amount of RAM needed to install windows 10 on a 32-bit system?

For Windows 10 (32-bit) operating system, the minimum requirements are a 1 GHz processor, 1 GB of RAM, and at least 16 GB of hard drive space.

Which type of back up only copies data modified since the last full back up?

Differential back up only creates a copy of the selected data that has been modified since the last back up.

Attempting to boot a Windows 10 laptop and receive an “OS not found” error on screen. You can see the hard disk listed in the BIOS/UEFI of the system. Which of the following commands should you use to repair the boot sector of the hard disk?

To repair the drives boot sector you should use the command “bootrec /fixboot” and reboot the computer.

If the system firmware reports the disk’s presence, but windows still will not boot? What should you do?

Use a start up repair tool to open a recovery mode command prompt and use the bootrec tool to repair the drives boot information.

If the system firmware reports the disk’s presence, but windows still will not boot? What should you do?

Use a start up repair tool to open a recovery mode command prompt and use the bootrec tool to repair the drives boot information.

What command is used to attempt a repair of the master boot record of a drive?

The “bootrec / fixmbr” command is used to attempt to repair the master boot record of a drive.

If the system firmware reports the disk’s presence, but windows still will not boot? What should you do?

Use a start up repair tool to open a recovery mode command prompt and use the bootrec tool to repair the drives boot information.

What command is used to attempt a repair of the master boot record of a drive?

The “bootrec / fixmbr” command is used to attempt to repair the master boot record of a drive.

What Windows command is used to add missing installations to the Boot Configuration Database (BCD)?

The “bootrec / rebuildbcd” command is used to add missing Windows installations to the Boot Configuration Database (BCD).

When building a new computer for video editing, the new computer will use an octa-core Intel processor, 3 TB of DDR4 memory, and a RAID 0 with two 4 TB SSDs for optimal performance. Which of the following editions of Windows 10 would support all of this computers memory properly?

Windows 10 Enterprise and Windows 10 Pro FOR WORKSTATIONS are designed to run devices with high-performance configurations including server grade Intel Xeon and AMD Opteron processors. They both support up to four physical CPUs and 6 TB of RAM. Windows 10 Pro and Windows 10 education only support two physical CPUs and 2 TB of RAM. Windows 10 Home only supports one physical CPU and up to 128 GB of RAM.

Which command line tool and option on a Windows system is used to force a background refresh of all group policy settings on a system?

“gpudate /force” Group Policy (GP) is the primary administrative tool for defining and controlling how programs, Network resources, and the operating system operate for users and computers in an organization.

Which command line tool and option on a Windows system is used to force a background refresh of all group policy settings on a system?

“gpudate /force” Group Policy (GP) is the primary administrative tool for defining and controlling how programs, Network resources, and the operating system operate for users and computers in an organization.

What does the “gpresult /force” command do on a windows system?

The gpresult command is used to display the Resultant Set of Policy (RSoP) information for a remote user and computer because you can apply overlapping policy settings to any computer user, the Group Policy feature generates a resulting set of policy settings when the user logs on. It displays the resulting set of policy settings that were enforced on the computer for the specified user when the user logged on.

Which command line tool and option on a Windows system is used to force a background refresh of all group policy settings on a system?

“gpudate /force” Group Policy (GP) is the primary administrative tool for defining and controlling how programs, Network resources, and the operating system operate for users and computers in an organization.

What does the “gpresult /force” command do on a windows system?

The gpresult command is used to display the Resultant Set of Policy (RSoP) information for a remote user and computer because you can apply overlapping policy settings to any computer user, the Group Policy feature generates a resulting set of policy settings when the user logs on. It displays the resulting set of policy settings that were enforced on the computer for the specified user when the user logged on.

What does the “dism /force” command do in a windows system?

dism /force is a command-line tool used to mount and service windows images before deployment.

Which command line tool and option on a Windows system is used to force a background refresh of all group policy settings on a system?

“gpudate /force” Group Policy (GP) is the primary administrative tool for defining and controlling how programs, Network resources, and the operating system operate for users and computers in an organization.

What does the “gpresult /force” command do on a windows system?

The gpresult command is used to display the Resultant Set of Policy (RSoP) information for a remote user and computer because you can apply overlapping policy settings to any computer user, the Group Policy feature generates a resulting set of policy settings when the user logs on. It displays the resulting set of policy settings that were enforced on the computer for the specified user when the user logged on.

What does the “dism /force” command do in a windows system?

dism /force is a command-line tool used to mount and service windows images before deployment.

What does the “sfc /force” command do in a Windows system?

sfc /force is a system file checker command is a utility in Windows that allows users to scan for and restore corrupted Windows system files from the command line.

Which command line tool and option on a Windows system is used to force a background refresh of all group policy settings on a system?

“gpudate /force” Group Policy (GP) is the primary administrative tool for defining and controlling how programs, Network resources, and the operating system operate for users and computers in an organization.

What does the “gpresult /force” command do on a windows system?

The gpresult command is used to display the Resultant Set of Policy (RSoP) information for a remote user and computer because you can apply overlapping policy settings to any computer user, the Group Policy feature generates a resulting set of policy settings when the user logs on. It displays the resulting set of policy settings that were enforced on the computer for the specified user when the user logged on.

What does the “dism /force” command do in a windows system?

dism /force is a command-line tool used to mount and service windows images before deployment.

What does the “sfc /force” command do in a Windows system?

sfc /force is a system file checker command is a utility in Windows that allows users to scan for and restore corrupted Windows system files from the command line.

What does the “dism /RestoreHealth” command do in a windows system?

The dism /RestoreHealth option can run a scan to identify and repair any image or virtual hard drive corruption.

All editions of Windows 11 can only support what processor?

All additions of windows 11 only support x64 (64-bit) processors due to the high minimum memory requirements and a minimum of 4 GB of memory to operate.

All editions of Windows 11 can only support what processor?

All additions of windows 11 only support x64 (64-bit) processors due to the high minimum memory requirements and a minimum of 4 GB of memory to operate.

What editions of Windows 10 can run x86 (32-bit) or x64 (64-bit) processors

All additions of windows 10 are available in either x86 or x64 bit versions. When using a Windows 10 x86 (32-bit) version, a maximum of 4GB of RAM is supported.

All editions of Windows 11 can only support what processor?

All additions of windows 11 only support x64 (64-bit) processors due to the high minimum memory requirements and a minimum of 4 GB of memory to operate.

What editions of Windows 10 can run x86 (32-bit) or x64 (64-bit) processors

All additions of windows 10 are available in either x86 or x64 bit versions. When using a Windows 10 x86 (32-bit) version, a maximum of 4GB of RAM is supported.

Which of the following types of encryption is considered the most secure to utilize in a SOHO network?

WPA 3 (Wi-Fi protected access version 3). Uses (SAE) simultaneous authentication of equals, to increase security of pre-shared keys. WPA3 provides the enhanced open mode that encrypts transmissions from a client to the access point when using an open network.

All editions of Windows 11 can only support what processor?

All additions of windows 11 only support x64 (64-bit) processors due to the high minimum memory requirements and a minimum of 4 GB of memory to operate.

What editions of Windows 10 can run x86 (32-bit) or x64 (64-bit) processors

All additions of windows 10 are available in either x86 or x64 bit versions. When using a Windows 10 x86 (32-bit) version, a maximum of 4GB of RAM is supported.

Which of the following types of encryption is considered the most secure to utilize in a SOHO network?

WPA 3 (Wi-Fi protected access version 3). Uses (SAE) simultaneous authentication of equals, to increase security of pre-shared keys. WPA3 provides the enhanced open mode that encrypts transmissions from a client to the access point when using an open network.

What type of structure is a “Do While” in scripting?

A Loop. It deviates from the initial program path to some sort of logic condition. A loop is when the computer repeats the task until a condition is met. Often implemented with “For” “For Next” “while” or “Do While” statements.

Which command-line tool is used on a Windows system to erase all the data on a hard disk and ensure it is ready to accept new Windows files?

format /fs:NTFS. The format command creates a new root directory and file system for the disk. It can check for bad areas on the disk, and it can delete all data on the disk. To use a new disk, you must first use the format command to format the disk.

What does the chkdsk command do?

It is used to check the file system and file system metadata of a volume for logical and physical errors. If used without parameters, chkdsk displays only the status of the volume and does not fix any errors. If used, /f, /r, /x, or/b parameters then it fixes errors on the volume.

What does the chkdsk command do?

It is used to check the file system and file system metadata of a volume for logical and physical errors. If used without parameters, chkdsk displays only the status of the volume and does not fix any errors. If used, /f, /r, /x, or/b parameters then it fixes errors on the volume.

What does the diskpart command do?

Is a command-line disk-partitioning utility available for Windows that is used to view, create, delete, and modify a computer’s disk partitions.

What does the chkdsk command do?

It is used to check the file system and file system metadata of a volume for logical and physical errors. If used without parameters, chkdsk displays only the status of the volume and does not fix any errors. If used, /f, /r, /x, or/b parameters then it fixes errors on the volume.

What does the diskpart command do?

Is a command-line disk-partitioning utility available for Windows that is used to view, create, delete, and modify a computer’s disk partitions.

What does the sfc/ command do?

The system file checker command is a utility in Windows that allows users to scan for and restore corrupted Windows system files from the command line.

What is an APK?

Android Application Package. It’s a third-party or custom program that is installed directly on an Android device to give users and business the flexibility to install apps directly on android devices.

What is a WEP attack?

A WEP attack is a brute force password attack conducted against wireless network that relies on WEP for its encryption and security.

What is WPA 3?

Wifi protected access version 3. It uses simultaneous authentication of equals (SAE) to increase capacity of preshared keys. WPA3 provides the enchanted mode that encrypts transmissions from a client to the access point using an open network.

What is WPA 2?

Wifi protected access version 2 features an improved method of key distribution and authentication for enterprise networks, though the pre-shared key method is still available for SOHO networks. WPA2 uses the improved uses the improved AES cipher with counter mode with cipher-block chaining message authentication protocol (CCMP) for encryption.

What is WPA 2?

Wifi protected access version 2 features an improved method of key distribution and authentication for enterprise networks, though the pre-shared key method is still available for SOHO networks. WPA2 uses the improved uses the improved AES cipher with counter mode with cipher-block chaining message authentication protocol (CCMP) for encryption.

What is WPA?

Wifi protected access. Is an improved encryption scheme for protecting wifi communications designed to replace WEP. WPA uses the RC4 cipher and a temporal key integrity protocol (TKIP) to overcome the vulnerabilities in the older WEP protection scheme.

What is WPA?

Wifi protected access. Is an improved encryption scheme for protecting wifi communications designed to replace WEP. WPA uses the RC4 cipher and a temporal key integrity protocol (TKIP) to overcome the vulnerabilities in the older WEP protection scheme.

What is WEP?

Wired Equivalent privacy (WEP). Is an older mechanism for encrypting data sent over a wireless connection. WEP is considered vulnerable to attacks that can break its encryption. WEP relies on the use of a 24-bit initialization vector to secure its preshared key.

What are the steps of the seven-step malware removal process?

1. Investigate and verify malware symptoms. 2. Quarantine the infected systems. 3. Disable system restore in Windows. 4. Remédiate the infected systems, update anti-malware software, scan the system, and use removal techniques. 5. Schedule scans and run updates. 6. Enable system restore and create a restore point in Windows. 7. Educate the end user.

Which of the following encryption types was used by WPA to better secure wireless networks than WEP?

TKIP. WPA uses the RC4 cipher and a temporal key integrity protocol (TKIP) to overcome the vulnerabilities in the older WEP protection scheme.

Which file system type is used to mount remote storage devices on a Linux system?

NFS. The Network File System (NFS) is used to mount remote storage devices into the local file system on a Linux system. It allows you to mount your local file systems over a network and remote hosts to interact with them while mounted locally on the same system.

Which command-line tool is used on a Linux system to display a list of the files and directories within the current path?

The ls command lists the files or directories in the current path on a Linux system. When invoked without any arguments, ls list the files in the current working directory.

What does the pwd command display on a Linux system?

The pwd command displays the present working directory (current directory) path to the terminal or display. If you’re working on Linux system and are unsure of where you are in the directory structure, type ‘pwd’ and hit enter to display the path to the screen.

Which MacBook tool is used to allow both operating systems to exist?

Boot Camp. it’s used to allow dual booting a Mac computer. It allows the user to boot into either MacOS or Windows as the computer is rebooted.

Which Windows tool can a technician use to display information about the performance of hardware and software resources in real-time?

resmon.exe. Resource monitor is a utility used to display information about the use of hardware and software resources in real-time. It helps check the performance of specific resources and decide a course of action to improve the performance.

A user cant open a 4 GB.dmg file on their Windows 10 workstation and keep receiving an error, why?

A .dmg file is a disk image file on a macOS computer. Windows can’t open .dmg files without using special software tools.

Which command would a Linux user need to enter to change their password?

The passwd command changes passwords for user accounts.

Which of the following data types would be used to store the value of TRUE?

A boolean stores a value of true or false.

Which of the following data types would be used to store the value of 3.14 or 333.33 or any decimal?

A floating-number data type.

Which data type would be used to store the value of Hello, Python, or JasonDion?

A String Data type.

Which command is used to create a new disk partition on a Windows system?

Diskpart. It’s used to view, create, delete, and modify a computer’s disk partitions.

What linux command is used to copy and convert raw data from one source to another such as a hard disk to an image file?

The dd command is a linux utility that is used to copy and convert raw data from one source to another such as a hard disk to an image file.

What type of structure is “IF THEN FALSE” in scripting?

A branch is used to control the flow within a computer program or script, usually based on some logic condition. Often implemented with IF THEN ELSE statements.

Which Windows tool can be used to diagnose and fix boot issues?

msconfig.exe. It’s used to disable or re-enable software, device drivers, and Windows services that run at startup, or to change boot parameters.

What’s the difference between a public network and a private network?

A public network will hide your computer from other devices on the network and prevent file and printer sharing. A private network is considered trusted, allows the computer to be discoverable to other devices on the network, and supports the use of file and printer sharing.

Which tool should a technician use to modify the HOSTS (hosts.ini) file on a Windows 10 system to solve a website address resolution issue?

Notepad. The hosts.ini file is a local text file that allows a user to specify specific domain names to map to particular addresses. It can be edited using any basic text editor, such as a notepad.

What contains virtual memory that can supplement the physical system memory in a Linux system?

Swap Partition. On a linux system is a portion of the hard disk formatted with a minimal kind of file system and used in situations when the operating system runs out of physical memory and needs more of it.

Which backup rotation scheme requires backups to be stored to at least two different types of media?

The 3-2-1 back up rule states that an organization should create (3) one primary backup and two copies of that data. (2) save the backups to two different types of media. (1) keep at least one backup copy off-site.

Which file types are commonly used by scripts in a Linux command line environment?

.sh A Shell script is a file that contains a list of commands to be read and executed by the shell in a Linux and macOS. A .sh is used for a shell script and its first line always begins with #!/bin/bash that designated the interpreter. The line instructs the OS to execute the script.

What does the command “shutdown /s” do on a Windows workstation?

shutdown the workstation.

What would you want to view on Windows 10 to fix an issue with a graphics card?

The device manager. The device manager is used to view and control the hardware attached to the computer. The device manager will highlight a piece of hardware that is not working properly so a technician can repair or replace it

Which security setting can be used to apply full disk encryption to protect the contents of a hard drive?

BitLocker. Performs full disk encryption of the internal hard drive or solid state device on a Windows 10 system.

What macOS program provides full disk encryption?

FileVault

What version of BitLocker provides full disk encryption of external storage devices?

BitLocker to Go.

Which command would you enter if you wanted to identify which version and build of Windows 10 is installed on a laptop?

Winver. It’s a windows command-line tool that is used to display the name, version and build of the operating system.

What does the PathPing command in Windows do?

Is used to locate spots that have network latency and network loss between a client and a destination. Each node is pinged as the result of a single command and that the behavior of nodes is studied over an extended period.

Which Linux command is used to delete a file from a directory

rm. The rm command-line utility removes files or directories.

What linux command moves files or directories from one place to another and removes them from their old original directory?

The mv command supports moving single files, multiple files, and directories. It copies the file to the new directory and removed from the old directory.

What Linux command copies files and directories?

cp. The cp command copies files and directories. It supports moving one or more files or folders with options for taking backups and preserving attributes. Copies of files are independent of the original file, unlike the mv command.

What linux command is used to terminate a process?

kill. The kill command sends signals to specified processes or process groups, causing them to act according to the signal. The kill command is used to immediate kill a process, gracefully stopping it

Which linux command is used to edit a text file on a server?

vi. The visual utility is a popular screen-oriented text editor in Linux.

What linux command is used to list the current running processes and their PIDs?

The ps command lists the current running processes and their PIDs.

What linux command is used to list the current running processes and their PIDs?

The ps command lists the current running processes and their PIDs.

What Linux command displays the present working directory?

the pwd command displays the present working directory path to the terminal or display

What linux command is used to list the current running processes and their PIDs?

The ps command lists the current running processes and their PIDs.

What Linux command displays the present working directory?

the pwd command displays the present working directory path to the terminal or display

What linux command changes the owner of a file?

The chown command is used to change the owner of the file, directory, or link in linux.

Which linux command is used to verify the IP address?

The dig command is used to query the domain name system to obtain information about host addresses, mail exchanges, name servers, and related information.

What is a PSK?

A pre shared key.

What encryption type uses a pre-shared key (PSK)?

WEP uses a preshared key to secure a wireless network.

Which log files contains a record of the events generated during the Windows installation or upgrade process?

The set up log.

What type of file extension should script: “net use s:\\fileserver\videos” use?

.bat (batch) scripts run in Windows OS and contain several commands that are executed in a sequence. A .bat file is used for batch script

Which linux command is used to change ownership of a file or directory?

chown.

What linux command sets the permission of files or directories on a linux system?

chmod

Which linux command would you use to find comprehensive documentation for any command from the Linux terminal?

man. The man command in Linux is used to display the user manual of any command from the terminal.

Which command tool in Windows would you use to end one or more processes that are hung up on the system?

Taskkill. Is used to end one or more tasks or process in a Windows system

Which linux commands is used to display the amount of disk space available on the file system?

df command is used to display the amount of disk space available on the file system containing each file name argument.

What IPv4 address is reserved for troubleshooting and testing and is a loop back address?

127.0.0.1

Which Linux command is used to edit a text file?

nano. It’s an easy to use command line text editor for Linux systems. It includes the functionality of a regular text editor and a syntax highlighting, multiple buffers, search and replace with regular expression support, spell checking, UTF-8 encoding, and more.

What would a technician use when trying to find the exact steps required to install a custom software packages within their organization?

SOP. Standard Operating Procedure. It’s an inflexible, step by step listing of actions that must be completed for any given task.

What is the minimum amount of storage space required to install Windows 11 (x64) on a device?

64 GB.

How could a company reduce its software licensing costs while still maintains the ability to access its application server remotely?

Install and deploy thin clients without an OS for each user.

How could a company reduce its software licensing costs while still maintains the ability to access its application server remotely?

Install and deploy thin clients without an OS for each user.

What is a Thin Client?

A small device that can operate with or without an operating system installed on the client device. It can boot directly from a network based OS on a common server and access applications on the company’s application server. It can reduce the need for OS licenses and reduce deployment costs.

Which network configuration is used to identify your computers individual host identifier and your computer’s network identifier?

subnet mask.

What is a gateway?

Is the parameter the IP address of a router to which packets destined for a remote network should be sent by default.

What is a gateway?

Is the parameter the IP address of a router to which packets destined for a remote network should be sent by default.

What is WINS?

Windows Internet Name Service (WINS) is a legacy computer name registration and resolution service that maps computer NetBIOS name to IP addresses.

Which Linux command is used to switch to another users account?

su command. Which stands for substitute user, is used by a computer user to execute commands with the privileges of another user account.

Which security concept should you implement to prevent a trusted insider from stealing your corporate data?

DLP. Data Loss Prevention. The software detects potential data breaches/data ex-filtration transmissions and prevents them by monitoring, detecting, and blocking sensitive data while in use (endpoint actions), in motion(network traffic), and at rest (data storage)

What is TACACS+?

TACACS+ provides AAA services (accounting, authorization, and authentication) for access to routers, network access points, and other networking devices. It’s a remote authentication protocol which allows remote access servers to communicate with an authentication server to validate user access onto the network.

What is NAC (network access control)?

NAC is a means of ensuring endpoint security by ensuring that all devices connecting to the network conform to a health policy such as its patch level, antivirus/firewall configuration, and other factors.

What is NAC (network access control)?

NAC is a means of ensuring endpoint security by ensuring that all devices connecting to the network conform to a health policy such as its patch level, antivirus/firewall configuration, and other factors.

What is ISAKMP (Internet Security Association and Key Management Protocol)?

Used for negotiating, establishing, modification, and deletion of SAs and related parameters in the IPSec protocol.

What condition could cause a large increase in the input power to a server room?

Power Spikes. A significant over-voltage that occurs for a very short period of time is known as a power spike

What condition could cause a large increase in the input power to a server room?

Power Spikes. A significant over-voltage that occurs for a very short period of time is known as a power spike

Which Windows command can be used to speed up a workstation that is operating slow when reading large files from its storage device?

Chkdsk. It’s used to check the file system and file system metadata for logical and physical errors.

Which of the following linux commands can be used to install software?

yum. The Yum command is a package manager used with RPM-based linux distributions to install new software packages, removing existing software packages, upgrading existing software packages, and even upgrade the entire OS.

Which of the following linux commands can be used to install software?

yum. The Yum command is a package manager used with RPM-based linux distributions to install new software packages, removing existing software packages, upgrading existing software packages, and even upgrade the entire OS.

What linux command allows the creation of single or multiple-files, view file contents, concatenate files, and redirect output in the terminal to a file?

cat. Short for concatenate.

Which of the following is the minimum amount of hard drive space needed to install Windows 10 on a 64-bit system?

32 GB of hard drive space.



1 GHz processor, 2 GB of RAM, and at least 32 GB of Hard drive space

Which Windows command should you use to verify system files are missing or corrupted and repair them if needed?

SFC command. System file checker is a utility in Windows that allows users to scan for and restore corrupted Windows system files from the command line. (Chkdsk fixes errors on volume and is used with or without certain parameters /f, /r, /x.)

What can attackers modify to redirect users to a malicious webpage? (User is trying to go to Google.com but is being directed to virus.com)

host.ini file. The host file is usually the first process in the domain name resolution procedure. When a user requests a webpage, the host.ini file is first checked for the IP address.

Which regulation applies when processing data within the European Union?

GDPR. The general data protection regulation is a regulation created in the EU that creates provisions and requirements to protect the personal data of European citizens

On Windows 10 you receive an “Operating System Not Found” error on the screen. You can see the hard disk listed in the UEFI/BIOS of the system. Which of the following commands should you use to repair the first 512-byte sector on the hard disk?

bootrec /fixmbr. The master boot record (MBR) is the first 512-byte sector on a hard disk. It contains the partitioning info for a drive.

What Windows command is used to attempt a repair of the boot sector of a drive?

“Bootrec /fixboot”

What Windows command is used to attempt a repair of the boot sector of a drive?

“Bootrec /fixboot”

What Windows command is used to add missing windows installations to the Boot Configuration Database (BCD)?

“bootrec /rebuildbcd”

Which compliance type should you be MOST concerned with dealing with credit cards?

PCI-DSS. The payment card industry data security standard. Applies to companies of any size that accept credit card payments.

If an office is frequently experiencing brownouts and sags, what would protect all of their workstations and servers from under-voltage events?

Line conditioner. Line conditioners are used to protect an entire power circuit from under-voltage events and power sags. It can raise a sag or under-voltage event back to normal power levels, but cannot protect the line from complete power failure or power outage.

What can be enabled to ensure no one can change the boot order and boot from an unauthorized operating system?

BIOS password required.

You are configuring a SOHO network that will contain 7 devices, but you only have a single public IP address. Which concept should be configured to allow the 7 devices to share a single IP when connecting to the internet?

NAT. Network Address Translation is a network service provided by a router or proxy server to map private local addresses to one or more publicly accessible IP addresses.

What is a security group?

Is a collection of user accounts that can be assigned permissions in the same way as a single user object. They are used when assigning permissions and rights, as it’s more efficient to assign permissions to a group than to assign them individually to each user.

What setting allows others to see workstations on a companies workgroups after the new workstation has been finished installing?

Enable network discovery. It allows Windows 10 to find other computers and devices on the network.

Which backup rotation scheme uses a complex mathematical puzzle to extend the number of unique days of backups stored with the least amount of tapes?

Tower of Hanoi.

Which physical security measure requires all users to use a PIV device when sending digitally signed and encrypted emails?

Smart Card. It’s used in applications that need to protect personal information and/or deliver fast, secure transactions.

Which file system formatting type should be used with a DVD?

UDF. Universal disk format is an updated file system for optical media supporting multisession writing. It is a standard used by Windows referred to as the Live File System for CD and DVD recordable and rewritable discs.

What legacy file system is used for CD optical disc media, CD-ROM, and CD-R?

CDFS. The CD File System.

What legacy file system is used for CD optical disc media, CD-ROM, and CD-R?

CDFS. The CD File System.

Which Control Panel section contains various tools like computer management, disk cleanup, print management, and registry editor?

Administrative Tools.

Which Linux command would display the network address and subnet mask of a wire connection?

ip. The ip command is used to display information about the current wired network connection on a linux system, including its IP address, subnet mask, and MAC address.

Which Windows tool can a technician use to gather information about a workstation and create a comprehensive list of hardware, system components, and the software environment used by that workstation?

msinfo32.exe (system information) is a utility that gathers information about your computer and displays a comprehensive list of hardware, system components, and the software environment that can be used to diagnose computer issues.

What Windows tool is used to collect info about devices to help troubleshoot problems with DirectX sound and video?

dxdiag.exe it is a diagnostic tool used to test DirectX functionality and troubleshoot video-related or sound-related hardware problems. DirectX can save text files with the scan results.

Which Windows utility is used to view and control the hardware attached to the computer and can highlight a piece of hardware that is not working so that a technician can repair or replace it?

devmgmt.msc Device Manager will highlight a piece of hardware that is not working so that a technician can repair or replace it.

Which linux command is used to delete all the files and directories in a Linux file system?

rm -rf / The rm command is a command-line utility for removing files or directories. The rm -rf/ command is the most dangerous command to issue in Linux. It is one of the fastest ways to delete a folder and it’s contents.

Which linux command is used to delete all the files and directories in a Linux file system?

rm -rf / The rm command is a command-line utility for removing files or directories. The rm -rf/ command is the most dangerous command to issue in Linux. It is one of the fastest ways to delete a folder and it’s contents.

Which technology should be used to provide a secure SSO solution for accessing both the corporate wireless network and it’s network resources?

RADIUS. With RADIUS and SSO configured, users on the network can provide their user credentials one time when they initially connect to the wireless access point or another RADIUS client and are then automatically authenticated to all of the networks resources. The Remote Authentication Dial-in User Service is used to manage remote and wireless authentication infrastructure.

Which file types are commonly used to create simple scripts in the Windows command-line?

.bat (Batch) scripts run on the Windows operating system and in their simplest form contain a list of several commands that are executed in sequence. A .bat file is used for a batch script.

Which internet option allows for the configuration of proxy settings, vpn’s, dial-up, and LANs?

The connections tab in the Internet Options.

In attempting to boot a Windows 10 an “Operating System Not Found” error on the screen and you can see the hard disk listed in the EFI/BIOS. Which command should be used to add the Windows installation to the boot manager?

bootrec /rebuildbcd. The BCD (boot configuration data) stores the list of known Windows installations that can be booted from a hard drive. If a windows installation is not listed, the computer will be unable to boot into Windows. To add a missing Windows installation to the BCD you should use the command “bootrec /rebuildbcd” and reboot the computer.

In attempting to boot a Windows 10 an “Operating System Not Found” error on the screen and you can see the hard disk listed in the EFI/BIOS. Which command should be used to add the Windows installation to the boot manager?

bootrec /rebuildbcd. The BCD (boot configuration data) stores the list of known Windows installations that can be booted from a hard drive. If a windows installation is not listed, the computer will be unable to boot into Windows. To add a missing Windows installation to the BCD you should use the command “bootrec /rebuildbcd” and reboot the computer.

Which Windows command should you use to display the machines active TCP connections?

netstat. The netstat command is used to display active TCP connections, ports on which the computer is listening, Ethernet statistics, the IP routing table, IPv4 statistics, and IPv6 statistics on a Windows machines.

Which feature allows a Linux server to provide file-sharing services to a company’s Windows 10 workstation?

Samba. It’s used by Linux computers to enable the sharing and access of resources with Windows based networks. It can also be used by Linux servers to provide file sharing services to Window clients.

What type of Malware monitors user activity and sends that information to someone else?

Spyware.

Which wireless technology allows a wireless device to automatically be configured for a SOHO wireless network with the push of a button?

WPS. The WIFI protected setup is a mechanism for auto-configuring a WLAN securely for home users.

Which wireless technology allows a wireless device to automatically be configured for a SOHO wireless network with the push of a button?

WPS. The WIFI protected setup is a mechanism for auto-configuring a WLAN securely for home users. On some equipment, a user can push a button on the access point and connect adapters securely.

Which wireless technology allows a wireless device to automatically be configured for a SOHO wireless network with the push of a button?

WPS. The WIFI protected setup is a mechanism for auto-configuring a WLAN securely for home users. On some equipment, a user can push a button on the access point and connect adapters securely.

What is a WPS? What are its weaknesses?

A Wifi Protected Setup is a mechanism for auto-configuring a WLAN securely for home users. It is subject to brute force attacks against the PIN used to secure them.

Which wireless technology allows a wireless device to automatically be configured for a SOHO wireless network with the push of a button?

WPS. The WIFI protected setup is a mechanism for auto-configuring a WLAN securely for home users. On some equipment, a user can push a button on the access point and connect adapters securely.

What is a WPS? What are its weaknesses?

A Wifi Protected Setup is a mechanism for auto-configuring a WLAN securely for home users. It is subject to brute force attacks against the PIN used to secure them.

What is WEP and what are It’s weaknesses?

Wire Equivalent Privacy (WEP) is an older mechanism for encrypting data sent over wireless connection. It’s considered vulnerable to attacks that can break its encryption. It relies on the use of a 24-bit initialization vector to secure its preshared key.

What is WPA?

Wireless protected access. Is an improved encryption scheme for protecting Wifi communications designed to replace WEP. WPA uses RC4 cipher and a temporal key integrity protocol (TKIP) to overcome the vulnerabilities in the older WEP protection scheme.

What is WPA?

Wireless protected access. Is an improved encryption scheme for protecting Wifi communications designed to replace WEP. WPA uses RC4 cipher and a temporal key integrity protocol (TKIP) to overcome the vulnerabilities in the older WEP protection scheme.

What is WPA2?

Wifi protected access version 2. Replaces the original WPA after the completion of the 802.11i security standard. WPA2 features an improved method of key distribution and authentication for enterprise networks, though the preshared key method is still available for SOHO networks. WPA2 uses the improved AES cipher with counter mode with cipher-block chaining message authentication protocol (CCMP) for encryption.

What is WPA?

Wireless protected access. Is an improved encryption scheme for protecting Wifi communications designed to replace WEP. WPA uses RC4 cipher and a temporal key integrity protocol (TKIP) to overcome the vulnerabilities in the older WEP protection scheme.

What is WPA2?

Wifi protected access version 2. Replaces the original WPA after the completion of the 802.11i security standard. WPA2 features an improved method of key distribution and authentication for enterprise networks, though the preshared key method is still available for SOHO networks. WPA2 uses the improved AES cipher with counter mode with cipher-block chaining message authentication protocol (CCMP) for encryption.

Which attack involves changing the systems MAC address before it connects to a wireless network?

Spoofing. It’s the act of disguising a communication from an unknown source as being from a known, trusted source.

What do you configure in the Control Panel section on a Windows 10 laptop to more quickly find files when searching its hard drive?

Indexing options.

In a Windows 10 workstation it’s attempting to boot up when it receives the following error, “BOOTMGR is missing; press Crtl + Alt + Del to restart” to fix this, you insert your Windows installation disc and reboot into the command prompt, under the System Recovery Options, what command should you enter into the command prompt?

bootrec /fixboot.

What rights and permissions does a Power User have?

The rights and permissions of Power User allow the installation of devices and to install programs that do not modify the operating system files. They have some of the permissions of an administrator but without the ability to change everything in a Windows workstation.

What log file should you review to view a hardware conflict that is showing in the Device Manager?

The System Log. It contains information about service load failures, hardware conflicts, driver load failures, and more.

Which virtualization concept refers to a VMs ability to have memory allocated for its use?

Resource pooling

Which type of connector is used to terminate a Cat 5e Network cable?

RJ-45

What type of connector provides power to an internal hard drive from the computers power supply using a 4-pin connector?

Molex.

What printer components cause a ghost image to appear on a printout?

Drum. Issues with drum cause ghost images.

What port(s) does SMB Server Message Block use?

Ports 139 and 445

Which of the following ports uses Service Location Protocol when organizing and locating printers, databases, other resources in a network?

SLP uses Port 427.

Which USB connection can support data up to 480 Mbps?

USB 2.0

Which USB type can support up to 4.5 watts of power per connected device?

USB 3.0

Which port is used by LDAP by default?

Port 389. The lightweight directory access protocol. Is a protocol used to access and update information in an X.500-style network resource directory

Which port(s) uses SNMP?

Port 161 and 162. Simple Network Management Protocol for managing and monitoring UDP ports 161 and 162

What should be checked to determine if a system can run a virtual machine?

You should enable virtualization within the BIOS

Which optical disc can only support storing up to 700 MBs on a single piece of media?

CD-RW

When building a virtualization workstation that will run four different server OS’s simultaneously, what is the most important piece of hardware needed to run the system efficiently?

Multi-core processor

What command is used to test if your own networks card driver is working properly?

ping 127.0.0.1

Which power supply allows the installer to attach or remove cables from the power supply as needed to reduce clutter inside the computer case?

Modular power supply

Which port should you block at the firewall if you want to prevent a remote login to a server from occurring?

Port 22. SSH

What tool should you use to determine if a switch is defective or not?

Loopback plug

What describes the IP address of a router to which packets destined for a remote network should be sent by default?

Gateway

Which network standard allows for a networking device to provide up to 15.4W of power to a connected device?

802.3af

When using a type 1 hypervisor virtualized environment which type of hardware is necessary to connect the VMs to the corporate network?

Virtual NIC.

Which type of networking hardware is installed in a computer server to connect to an Ethernet switch using a CAT 6 cable?

Network Interface Card

Which network configuration on a VM are used to prevent the VM from accessing the internet, but still allow it to communicate with other VMs on the host and the host itself?

Internal. Internal would prevent them from communicating with the internet. They could communicate with each other and the host machine.

Which device is installed in a communication closet to connect network wall jacks to a network switch using pre-wired RJ-45 ports?

Patch panel. It’s used in a structured cabling system. A computer is connected to a wall Jack in this cable system and then connected to a patch panel by cabling running through the walls

Which type of internet connection is terminated at a local switching center and requires different media type between the switching center and the end customer?

DSL. Is a technology used to transmit multimedia traffic at a high bit rate over twisted-pair copper wire

What is the sequence (steps) of a laser printers imaging process?

Processing. Charging. Exposing. Developing. Transferring. Fusing. Cleaning.

What printer concept is using a page description language that produces higher quality outputs at the expense of speed?

PostScript

What feature can you use to ensure that unauthorized applications are prevented from being installed during the bootup process?

Secure boot.

What metric is used to compare performance of an SSD or HDD?

IOPS. Input/output operations per second.

What setting should a user use to print a large job on both the front and back sides of the paper?

Duplex

You want to boot from a removable USB device to troubleshoot your Windows 10 laptop, which key should you press to enter the boot order menu?

F12

Which type of internet connection allows for high-speed bi-directional data communication over a hybrid fiber-coaxial (HFC) connection?

Cable.

Which backup takes the longest to restore

Incremental backup

Which of the following would a technician use when trying to find the exact steps required to install a custom software package within their organization?

SOP. Standard Operating Procedure.

Which of the following would a technician use when trying to find the exact steps required to install a custom software package within their organization?

SOP. Standard Operating Procedure.

What document outlines all the work that is to be performed as well as agreed-upon deliverables and timelines?

SOW. Statement of Work, or Scope of Work.