What Microsoft Windows tool provides a more robust means of configuring hundreds of networked Windows computer settings, and is a much more efficient way of implementing settings across a tên miền phàn nàn manually configuring each networked client?
Group Policy Editor (gpedit.msc)
How well did you know this?
When typed at the command prompt in a Microsoft Windows client, what is the purpose of the ipconfig command?
Troubleshoot the network adapter.
How well did you know this?
Personal computer (PC) objects are drives, typically referred to tát by letters such as A, C, D, X, and sometimes names. They can be a physical disk, a partition on a disk, or a removable disc. While the C: drive is usually the primary drive (where the Windows installation resides), what drive navigation input would get a user to tát a tệp tin named “audit” on a floppy disk drive of a typical PC?
How well did you know this?
When typed at the command prompt in a Microsoft Windows client, what is the purpose of the cd command?
Moves to tát a different directory.
How well did you know this?
What command is a Windows utility that can allow administrators to tát view shared resources and configure them on a Windows network?
How well did you know this?
From a Windows 10 command prompt, what command would display a network adapter’s configuration and aid in troubleshooting the network adapter?
How well did you know this?
A system administrator will need to tát configure the local users and groups on a stand-alone computer (PC). What mặc định console provides an administrator the ability to tát schedule tasks and configure disks, services, devices, and local users and groups?
Computer Management (compmgmt.msc)
How well did you know this?
An organization has tasked a system administrator to tát procure a workstation with the same capabilities or more already in use by the engineering department for a Windows-based computer-aided drafting (CAD) program. What built-in Windows tool provides a comprehensive inventory that the administrator could utilize to tát ensure a comparable or better workstation that the organization can purchase?
How well did you know this?
What remotely accessible database stores operating system, device, and software application configuration information in a Microsoft Windows environment and allows manual edits to tát the Windows configuration?
How well did you know this?
What does the Registry Editor (regedit.exe) provide the administrator in a Microsoft Windows environment?
It provides remote management of a client operating system and its devices, software, and applications configuration information.
How well did you know this?
An IT manager is setting up an image for dispatching airplanes at a major airport. They are trying to tát lock down the image to tát run rẩy only the dispatch service. One of the layers of security is to tát block unneeded service ports from communicating, such as gmail. Where should the manager start?
How well did you know this?
An IT manager, who is in charge of the client image, considers enabling a data at rest solution. Where can the manager go to tát enable the built-in Microsoft solution?
How well did you know this?
A penetration tester conducts the initial reconnaissance phase and is currently targeting externally facing servers for a certain company. Currently, they are trying to tát enumerate the tên miền name system (DNS) servers. Which built-in tool will help them perform this?
How well did you know this?
A security analyst conducts an incident response investigation against suspected malware on a userbox. The analyst suspects a certain variant of malware known to tát beacon out to tát a command and control server. What command will help them investigate this?
How well did you know this?
A marketing professional normally sends large files to tát other team members. The IT department recommended using a shared drive and assisted them in setting it up. The project was a very high priority, ví the professional collaborated with several members but started receiving reports that some users could not access it sometimes and others could. They eventually figured out that only đôi mươi people at a time seemed to tát be able to tát access it. What is causing the issue?
The share was created on a Windows Desktop
How well did you know this?
Which of the following extensions combines a scripting language with hundreds of prebuilt modules called cmdlets that can access and change most components and features of Windows and Active Directory components and features?
How well did you know this?
A company has hundreds of employees who use the same software on their computers, ví they offer a company product key to tát access the software. What is this product?
How well did you know this?
An administrator wants to tát listen to tát music through headphones to tát help with productivity during work. However, the administrator is having issues connecting the headphones via Bluetooth không dây. Where should they go first to tát look?
How well did you know this?
An intern for a Windows server team is watching a server administrator verify the authenticity and integrity of an installer. Where did the administrator most likely get it from?
How well did you know this?
A user is conscientious about security after hearing about breaches in the news. The user wants to tát see if they are up to tát date on patches for their Apple computer. Where should the user go to tát check?
How well did you know this?
What technique is used on hard drives that reset them to tát factory condition and the hard drives only contain the information necessary to tát interact with a tệp tin system?
How well did you know this?
An employee uses an option to tát ask for help from a technician with an invitation tệp tin protected by a passcode. What is this option?
How well did you know this?
A penetration tester targeted top-level executives during a test by sending out phishing emails. They received their first shell when the first executive opened the attachment in the phishing gmail. Once the penetration tester connects to tát the executive’s computer, what command will tell them the location of where their shell landed?
How well did you know this?
A security administrator for Linux systems in their demilitarized zone wants to tát ensure only some administrators can perform certain commands. Which of the following is best used to tát lock down certain commands?
How well did you know this?
A server administrator has not used the command line in quite some time and is trying to tát remember what will help them with commands and how to tát use them. Which of the following should the administrator use?
How well did you know this?
While browsing the mạng internet, a user receives a pop-up that states, “We have detected a Trojan virus. Click OK to tát begin the repair process.” Out of fright, the user clicks OK. Given the following choices, what is the most likely outcome of the user’s response?
Unwanted notifications start popping up in Windows.
How well did you know this?
An administrator in charge of user endpoint images wants to tát slipstream and use image deployment. Which boot method would best tư vấn this?
How well did you know this?
What uses tên miền names of components loading on the trang web page against a vast blacklist?
How well did you know this?
A user likes to tát watch Netflix on their phone while on the treadmill. The user turns the phone sideways for better viewing, but this time, the picture did not orient to tát landscape as it always has. Which of the following could cause this issue?
How well did you know this?
According to tát CompTIA’s seven-step best practices procedure for malware removal, which of the following correctly lists the first three steps?
- Investigate and verify malware symptoms. 2. Quarantine infected systems. 3. Disable System Restore.
How well did you know this?
An IT manager is setting up an image for dispatching airplanes at a major airport. They are trying to tát lock down the image to tát run rẩy only the dispatch service. One of the layers of security is to tát block unneeded service ports from communicating, such as gmail. Where should the manager start?
How well did you know this?
A software engineer uses the “data protection” option for the apps on their mobile device. This option is subject to tát the second round of encoding using a key derived from and protected by the user’s credentials. What is this method?
How well did you know this?
A computer administrator sets up a client workstation to tát join a centrally managed network. What options should the administrator configure to tát tự this?
How well did you know this?
An administrator uses a backup rotations scheme that labels the backup tapes in generations. What is this called?
How well did you know this?
A technician helps a customer with a ticket request and needs to tát record that the customer has accepted that the ticket can be closed. Which of the following fields reflect this part of the ticket life cycle?
How well did you know this?
A user just installed a new application on their workstation, but the application has issues even starting up. The user has been working on the machine regularly up to tát this point without any prior issues. Which of the following is most likely the issue?
How well did you know this?
A technician uses a backup method that reflects how much lost work can be tolerated. What is this method?
How well did you know this?
A pet store owner receives an gmail from their ngân hàng with a special financing offer. The owner clicks on the attachment, but it does not open. Later that day, when the owner returns to tát their computer, it is running very slowly and will not connect to tát the mạng internet. By the time the IT consultant arrives, the computer has locked up. Which of the following is the best action for the IT consultant given the existing conditions?
How well did you know this?
A security engineer runs a long tail analysis to tát determine the frequency of services and processes communicating to tát the mạng internet. After baselining a large amount of normal traffic such as updates, they encounter a suspicious communication frequency every five minutes from a particular box. They have done a thorough job investigating running processes, memory analysis, and tệp tin integrity checks but find nothing. What else could the engineer kiểm tra for persistence mechanisms that could send the communications?
How well did you know this?
A network administrator troubleshoots tên miền name system (DNS) issues that a particular user is having. Which of the following utilities will help the administrator troubleshoot DNS specifically?
How well did you know this?
A vulnerability and risk manager reviews older systems that can only receive critical patches. What are these systems classified as?
When making major adjustments to tát a project, a security technician will have to tát assess the business and technical merits as well as the risks of the adjustment plan. What documentation will need to tát be submitted?
A user wants to tát maximize resource dedication to tát 3 chiều performance and frame rate. Where should the user go to tát tự this?
A company’s IT tư vấn specialist is ready to tát start recommissioning a system as part of the malware removal process. What is the last step before removing the computer from quarantine?
A user downloads a dating tiện ích from the Apple store and then gets requests for permission to tát access their camera; which of the following is the most likely cause of the permission requests?
A developer, working at Microsoft, is helping to tát develop the latest and greatest user interface for Windows. The developer is assigned to tát the team that works on the user interface’s top level. What will the developer be working on?
A researcher calls the help desk complaining of slow computer performance. When the technician arrives and probes for clues, the researcher explains that they frequently run rẩy multiple programs simultaneously and have a significant number of browser tabs open to tát aid with their research. Which of the following solutions should tốc độ up the computer’s performance?
A user wants to tát connect to tát multiple systems after a single login at only one of the devices. What is this called?
Rooting is typically an action related to tát Android, while jailbreaking is associated with iOS. They are both trying to tát tự the same thing. What is that?
Which of the following uses the file-copy tool as Windows using “robocopy”?
What can use a trusted platform module chip in the computer to tát tie the use of a fixed disk to tát a particular motherboard?
A user experiences issues searching their local computer for files. What is a common issue that the user should check?
An administrator uses a method that uses simultaneous authentication of equals (SAE) instead of the 4-way handshake. What is this method?
An administrator uses a backup rotations scheme that labels the backup tapes in generations. What is this called?
A company’s IT tư vấn specialist is ready to tát start recommissioning a system as part of the malware removal process. What is the last step before removing the computer from quarantine?
A Linux server administrator meets with their Windows server administrator counterparts. A certain grouping of Linux and Windows servers is designated to tát run rẩy services that share files. What will the administrators need to tát enable sharing between the disparate systems?
A teenager hears from friends about a legitimate trang web to tát tải về games to tát their Samsung Galaxy phone that is not in the Google Play store. The teenager goes to tát the site and downloads some games. What best describes the teenager’s behavior?
Before an IT team can submit an application for change, it must include a document that includes an analysis of risks associated with performing the change and risks that might be incurred through not performing the requested change. What type of document is this?
A security administrator moves their proxy from on-premise to tát the cloud and wants to tát establish a client tunnel to tát the cloud proxy tunnel for trang web traffic. This way, the users are protected even while out in public and not connected to tát the tên miền. What should the administrator mix up?
A manager for a large corporation is in charge of client machines and is currently undergoing a lifecycle hardware refresh. They want to tát optimize the machines to tát be powerful enough to tát run rẩy applications. The manager also wants to tát be sure that they are not underpowered either. What can the manager use to tát determine CPU optimization?
A Windows client administrator plans to tát upgrade their OS in the current environment. What is one of the most important considerations for the upgrade?
An administrator reviews a series of instructions that the workstation follows every time a user logs on. What is this called?
What tool will distinguish client accounts and provide tư vấn for recording and reporting billable tư vấn activity?
A user downloads a dating tiện ích from the Apple store and then gets requests for permission to tát access their camera; which of the following is the most likely cause of the permission requests?
Which of the following uses a security shield icon for tasks that are protected under them?
A technician implements a type of authentication method used on Windows machines that once users are authenticated, they are trusted by the system. What is this method?
An IT manager, who is in charge of the client image, considers enabling a data at rest solution. Where can the manager go to tát enable the built-in Microsoft solution?
A technician uses filesystem-level encryption on some files that need to tát be encrypted on their device. What is this called?
A server administrator receives a report that the company’s external-facing trang web server is unresponsive. Rebooting the server would take too long, and they are not even completely certain the server would come back up. What utility should the administrator use to tát restart the website?
The Instagram tiện ích on an Android phone will not launch. Which of the following options could fix the problem?
A security engineer researches how to tát make backup and antivirus apps available to tát their iOS mobile devices. Where should the apps be pushed?
An IT professional helps to tát fix their friend’s computer. The computer is running extremely slow. The IT professional notices the operating system is running trang chủ edition. Which of the following is the only service available for the trang chủ edition?
While browsing the mạng internet, a user receives a pop-up that states, “We have detected a Trojan virus. Click OK to tát begin the repair process.” Out of fright, the user clicks OK. Given the following choices, what is the most likely outcome of the user’s response?
Unwanted notifications start popping up in Windows.
Which of the following should generate an alert when the trương mục is disabled or altered?
Change mặc định administrator trương mục.
A Windows administrator wants to tát learn how to tát use Linux by installing the Linux subsystem for Windows. What should their version of Windows have on the New Technology File System (NTFS) to tát tư vấn case-sensitive naming and hard links required by Linux?
A manager for a Linux server team recently purchased new software which will help to tát streamline operations, but they are worried that in IT, there is a high turnover of personnel. The manager wants to tát ensure they can obtain updates, monitor and fix security issues, and are provided technical assistance. What impact is the manager trying to tát mitigate?
An attacker uses a mix of tools designed to tát gain control of a computer and can create a backdoor with system-level privileges without the user noticing. What is this called?
Over the day, a user’s computer becomes slow. Then pop-ups start to tát appear randomly. Later on, the pop-ups become more frequent, and the user notices that mạng internet searchers are using Google when their mặc định tìm kiếm provider is in Firefox. Once the computer starts crashing repeatedly, the user calls for help. Considering all of these data points, what is the best diagnosis of the problem?
Adware or spyware infection.
According to tát CompTIA’s seven-step best practices procedure for malware removal, which of the following correctly lists the first three steps?
- Investigate and verify malware symptoms. 2. Quarantine infected systems. 3. Disable System Restore.
A technician uses a method where each server is configured with a public/private encryption key pair and identified by a host key fingerprint. What is this method?
An administrator assists the human resources department in testing access to tát their new cloud-based training site. Unfortunately, the site cannot be accessed due to tát the organizational security policy. Which of the following should the administrator use to tát assist them?
A user experiences issues searching their local computer for files. What is a common issue that the user should check?
What will block third-party cookies and enable strict tracking protection?
A manager for a large corporation is in charge of client machines and is currently undergoing a lifecycle hardware refresh. They want to tát optimize the machines to tát be powerful enough to tát run rẩy applications. The manager also wants to tát be sure that they are not underpowered either. What can the manager use to tát determine CPU optimization?
An employee uses an option to tát ask for help from a technician with an invitation tệp tin protected by a passcode. What is this option?
Which of the following uses a security shield icon for tasks that are protected under them?
A Windows client administrator plans to tát upgrade their OS in the current environment. What is one of the most important considerations for the upgrade?
An IT professional helps to tát fix their friend’s computer. The computer is running extremely slow. The IT professional notices the operating system is running trang chủ edition. Which of the following is the only service available for the trang chủ edition?
A manager for a Linux server team recently purchased new software which will help to tát streamline operations, but they are worried that in IT, there is a high turnover of personnel. The manager wants to tát ensure they can obtain updates, monitor and fix security issues, and are provided technical assistance. What impact is the manager trying to tát mitigate?
A software company hires a new tiện ích developer. The corporate network denies access when the developer tries to tát connect their phone. Why would the network deny access from the developer’s mobile phone?
A technician uses a backup method that reflects how much lost work can be tolerated. What is this method?
A technician is using a tool with a secure erase function that performs a zero-filling on HDDs and marks all blocks as empty on SSDs. The SSD firmware’s automatic garbage collectors then perform the actual erase of each block over time. What is this tool?
An IT manager, who is in charge of the client image, considers enabling a data at rest solution. Where can the manager go to tát enable the built-in Microsoft solution?
An administrator automates the creation of folders during a Windows install process. Which command should they use in their script?
A server administrator sets up jobs that will copy over files on various servers. They want it to tát detect if the tệp tin was transferred successfully and, if not, resend the tệp tin. Which command is optimal for server administrators to tát perform this task?
The IT department determines that the phone belonging to tát the company’s vice president suffers a compromise and that the personal and corporate data contained on the phone has leaked. Which of the following should the IT team tự next?
Quarantine all devices that could be connected to tát the leak.
A server administrator notices a tệp tin server starting to tát run rẩy low on space. The administrator wants to tát create extra space before all space is used up and even worse issues arise. What should the administrator use?
A helpdesk technician is helping a user experiencing printer problems. After several troubleshooting steps, the technician thinks the user may have installed the wrong driver. Where can they go to tát install a different one?
A threat actor uses a technique that allows devices to tát connect to tát an open authentication and then redirect the user’s browser to tát a nhái captive portal that encourages the user to tát enter their network password. What is this technique?
A security analyst notices a critical incident that has a widespread effect on customers that can eventually involve a potential data breach. The analyst creates a ticket with the vendor and sets the importance in order to tát trigger a faster response time. What describes what attribute of the ticket the analyst set?
An administrator is backup chaining a database with the type of backup that utilizes a moderate time and storage requirement. What type of backup is this?