ログイン

MASTER REVIEW

MASTER REVIEW
44問 • 1年前
  • Mixtapes øf Hanna
  • 通報

    問題一覧

  • 1

    Used without any parameters, the help command in MS Windows displays a list of available system commands along with a brief description of each command. (True or False)

    True

  • 2

    Which of the following answers describe(s) the function of Task Manager (taskmgr.exe)? (Select 4 Answers)

    - Allows to close a non-responsive application in Windows, - Displays information on programs, processes, and services that are currently running on the computer, - In Windows 8 and newer releases of the Microsoft OS, provides access to user applications that can be enabled/disabled during system boot, - Allows system administrators to manage the currently logged-in users, - Provides real-time reports on how a Windows-based computer is using system resources (CPU/RAM/Disk/Network/GPU usage)

  • 3

    Which Task Manager tab in Windows 10 allows to enable/disable applications that are launched automatically when signing into a user account?

    Startup

  • 4

    In Microsoft Windows, Local Users and Groups (lusrmgr.msc) is an MMC snap-in for adding/removing users and managing user membership in groups that possess specific rights and permissions on a particular system running MS Windows. The Local Users and Groups utility is included by default in all editions of Windows 10.

    False

  • 5

    Which tab of the System Configuration utility in MS Windows allows to prevent all nonessential applications, services, and device drivers from loading during system startup?

    General

  • 6

    The System Configuration utility tab containing a list of background applications that can be enabled/disabled during Windows system startup is called:

    Services

  • 7

    Which of the following system utilities in Windows provides access to a database containing system configuration information?

    regedit.exe

  • 8

    Which VPN type is used for connecting computers to a network? (Select 2 answers)

    Remote access, Client-to-site

  • 9

    Mark's laptop is running Windows 10 and appears to become slower and slower over time with use. You decide to check the current CPU utilization and observe that it remains in the 95% to 100% range fairly consistently. You close three of Mark's open applications and recheck the CPU utilization. You notice the utilization dropped to the 30% to 35% range. A week later, Mark calls you again and says the computer is extremely slow. Which of the following tools can you use to check the CPU utilization and manage any high-resource processes?

    Task Manager

  • 10

    You are configuring a SOHO network and only allowing specific IP addresses to access the network while blocking any IP addresses that are not on the list. Which of the following should be implemented?

    Allow list

  • 11

    A computer was recently infected with a piece of malware. Without any user intervention, the malware is now spreading throughout the corporate network and infecting other computers that it finds. Which type of malware MOST likely infected these computers?

    Worm

  • 12

    Which of the following MacOS features allows you to use multiple desktops or spaces on a single system?

    Mission Control

  • 13

    Which of the following BEST describes how a DHCP reservation works?

    By matching a MAC address to an IP address within the DHCP scope

  • 14

    A computer has been performing slowly. During your troubleshooting, you notice that the Task Manager shows the processor is utilizing 90-100% of the system resources immediately after completing the boot-up process. Which of the following actions should you take?

    Disable any unneeded applications configure to automatically startup

  • 15

    David is troubleshooting a new Android application his company is creating. He has installed the app on an Android tablet and needs to see observe diagnostic information about the app and its network connections while it is running to identify and correct a software bug. Which of the following should David enable on the device?

    Developer mode

  • 16

    What is the minimum amount of memory required to install Windows 10 (x64) on a device?

    2 GB

  • 17

    A home user contacts the help desk and states that their desktop applications are running very slowly. The user also says that they have not received any emails all morning, but they normally get at least 5-10 emails each day. The help desk technician gets permission from the home user to remotely access their computer and runs some diagnostic scripts. The technician determines that the CPU performance is normal, the system can ping the local router/gateway, and the system can load websites slowly, or they fail to load completely. During the diagnosis, the technician also observes the remote connection dropping and reconnecting intermittently. Which of the following should the technician attempt to perform NEXT to resolve the user's issue?

    Update the anti-virus software, run a full scan of the system, and verify the web browser's and email client's settings

  • 18

    Which of the following commands is used on a Linux system to copy a file to a new directory and then remove the original file from the previous directory?

    mv

  • 19

    Regardless of what website Michelle types into her browser, she is being redirected to "malwarescammers.com." What should Michelle do to fix this problem?

    Reset the web browser's proxy setting

  • 20

    Which command-line tool is used on a Windows system to display a list of the files and directories within the current directory or path?

    dir

  • 21

    The administrator would like to use the strongest encryption level possible using PSK without utilizing an additional authentication server. What encryption type should be implemented?

    WPA personal

  • 22

    Judith is installing Windows 10 (64-bit) in a virtual machine on her macOS laptop. The installation is continually failing and producing an error. Judith has configured the virtual machine with a dual-core 1 GHz processor, 2 GB of memory, a 15 GB hard drive, and a 1024x768 screen resolution. Which item in the virtual machine should be increased to fix the installation issue experienced?

    Amount of hard drive space

  • 23

    Which of the following should you use to fix an issue with a graphics card's drivers in Windows 10?

    Device Manager

  • 24

    You are configuring a SOHO network and only denying specific IP addresses from accessing the network while allowing any IP addresses not found on the list. Which of the following should be implemented?

    Blocklist

  • 25

    Which of the following file types are commonly used to create simple scripts in the Windows command-line environment?

    .bat

  • 26

    You are troubleshooting an issue with a Windows desktop and need to display the machine's active TCP connections. Which of the following commands should you use?

    netstat

  • 27

    Which of the following allows users to save their current session to disk and before powering down their Windows 10 laptop?

    Hibernate

  • 28

    What is “CRLF Injection” also referred to as:

    HTTP response splitting attack

  • 29

    Ports and Protocols: 161/162

    Simple Network Management Protocol SNMP

  • 30

    Windows 10 Specs:

    Processor: 1 GHz or faster, RAM: 1 GB (32-bit) or 2 GB (64-bit), Graphics: DirectX 9 or later with WDDM 1.0 driver (the latter is the graphics architecture for video drivers), Hard disk space: 16 GB (32-bit) or 20 GB (64-bit), Display: 800×600 resolution

  • 31

    NTFS (NT File System)

    Improvement of FAT32 and has features like security, encryption, file compression, and the ability to change file permissions.

  • 32

    cat

    Reads data from a file and displays content as a output

  • 33

    Mark's laptop is running Windows 10 and appears to become slower and slower over time with use. You decide to check the current CPU utilization and observe that it remains in the 95% to 100% range fairly consistently. You close three of Mark's open applications and recheck the CPU utilization. You notice the utilization dropped to the 30% to 35% range. A week later, Mark calls you again and says the computer is extremely slow. Which of the following tools can you use to check the CPU utilization and manage any high-resource processes?

    Task Manager

  • 34

    A coworker is creating a file containing a script. You look over their shoulder and see "#!/bin/bash" as the first line in the file. Based on this, what type of file extension should this script use?

    .sh

  • 35

    Jason is building a new workstation for his son to utilize when writing reports for school. The new computer will have an Intel x86 processor, 3 GB of memory, and a 256 GB SSD. Which of the following editions of Windows 10 would support this workstation at the lowest cost?

    Home

  • 36

    You are troubleshooting a computer that is operating slowly. Which of the following tools should you use to troubleshoot this workstation?

    Performance monitor

  • 37

    Which of the following commands is used on a Linux system to copy a file to a new directory and then remove the original file from the previous directory?

    mv

  • 38

    When Jason needs to log in to his bank, he must use a hardware token to generate a random number code automatically synchronized to a code on the server for authentication. What type of device is Jason using to log in?

    Key fob

  • 39

    A technician wants to conduct a vulnerability scan on a server every morning at 3:00 am. Which of the following tools should the technician use?

    Task scheduler

  • 40

    Which command-line tool is used on a Windows system to display a list of the files and directories within the current directory or path?

    dir

  • 41

    A technician is trying to locate a protected .dll file to edit, but they cannot see it in the System32 folder. Which Control Panel utility should the technician use to find the file?

    File Explorer Options

  • 42

    You are troubleshooting an issue with a Windows desktop and need to display the machine's active TCP connections. Which of the following commands should you use?

    netstat

  • 43

    Which of the following types of attacks involves changing the system's MAC address before it connects to a wireless network?

    Spoofing

  • 44

    Minimum Requirements for: Windows 10 (64-bit)

    1 GHz processor, 2 GB of RAM, at least 20 GB of hard drive space

  • DION#1

    DION#1

    Mixtapes øf Hanna · 90問 · 1年前

    DION#1

    DION#1

    90問 • 1年前
    Mixtapes øf Hanna

    DION#2

    DION#2

    Mixtapes øf Hanna · 90問 · 1年前

    DION#2

    DION#2

    90問 • 1年前
    Mixtapes øf Hanna

    DION#3

    DION#3

    Mixtapes øf Hanna · 90問 · 1年前

    DION#3

    DION#3

    90問 • 1年前
    Mixtapes øf Hanna

    DION#4

    DION#4

    Mixtapes øf Hanna · 90問 · 1年前

    DION#4

    DION#4

    90問 • 1年前
    Mixtapes øf Hanna

    DION#5

    DION#5

    Mixtapes øf Hanna · 89問 · 1年前

    DION#5

    DION#5

    89問 • 1年前
    Mixtapes øf Hanna

    DION#6

    DION#6

    Mixtapes øf Hanna · 87問 · 1年前

    DION#6

    DION#6

    87問 • 1年前
    Mixtapes øf Hanna

    ID: PT.1 COLLABORATE

    ID: PT.1 COLLABORATE

    Mixtapes øf Hanna · 95問 · 1年前

    ID: PT.1 COLLABORATE

    ID: PT.1 COLLABORATE

    95問 • 1年前
    Mixtapes øf Hanna

    ID: C2 Deep Pt.1

    ID: C2 Deep Pt.1

    Mixtapes øf Hanna · 90問 · 1年前

    ID: C2 Deep Pt.1

    ID: C2 Deep Pt.1

    90問 • 1年前
    Mixtapes øf Hanna

    ID: C2 Deep Pt.2

    ID: C2 Deep Pt.2

    Mixtapes øf Hanna · 98問 · 1年前

    ID: C2 Deep Pt.2

    ID: C2 Deep Pt.2

    98問 • 1年前
    Mixtapes øf Hanna

    ID: C2 Deep Pt.3

    ID: C2 Deep Pt.3

    Mixtapes øf Hanna · 93問 · 1年前

    ID: C2 Deep Pt.3

    ID: C2 Deep Pt.3

    93問 • 1年前
    Mixtapes øf Hanna

    ID: C2 Deep Pt.4

    ID: C2 Deep Pt.4

    Mixtapes øf Hanna · 85問 · 1年前

    ID: C2 Deep Pt.4

    ID: C2 Deep Pt.4

    85問 • 1年前
    Mixtapes øf Hanna

    OL BOYS STUDY GUIDE

    OL BOYS STUDY GUIDE

    Mixtapes øf Hanna · 70問 · 1年前

    OL BOYS STUDY GUIDE

    OL BOYS STUDY GUIDE

    70問 • 1年前
    Mixtapes øf Hanna

    EC: C2 Deep PT.1

    EC: C2 Deep PT.1

    Mixtapes øf Hanna · 96問 · 1年前

    EC: C2 Deep PT.1

    EC: C2 Deep PT.1

    96問 • 1年前
    Mixtapes øf Hanna

    EC: C2 Deep PT.2

    EC: C2 Deep PT.2

    Mixtapes øf Hanna · 89問 · 1年前

    EC: C2 Deep PT.2

    EC: C2 Deep PT.2

    89問 • 1年前
    Mixtapes øf Hanna

    EC: C2 Deep Pt.3

    EC: C2 Deep Pt.3

    Mixtapes øf Hanna · 94問 · 1年前

    EC: C2 Deep Pt.3

    EC: C2 Deep Pt.3

    94問 • 1年前
    Mixtapes øf Hanna

    EC: C2 Deep Pt.4

    EC: C2 Deep Pt.4

    Mixtapes øf Hanna · 91問 · 1年前

    EC: C2 Deep Pt.4

    EC: C2 Deep Pt.4

    91問 • 1年前
    Mixtapes øf Hanna

    EC: C2 Deep Pt.5

    EC: C2 Deep Pt.5

    Mixtapes øf Hanna · 88問 · 1年前

    EC: C2 Deep Pt.5

    EC: C2 Deep Pt.5

    88問 • 1年前
    Mixtapes øf Hanna

    問題一覧

  • 1

    Used without any parameters, the help command in MS Windows displays a list of available system commands along with a brief description of each command. (True or False)

    True

  • 2

    Which of the following answers describe(s) the function of Task Manager (taskmgr.exe)? (Select 4 Answers)

    - Allows to close a non-responsive application in Windows, - Displays information on programs, processes, and services that are currently running on the computer, - In Windows 8 and newer releases of the Microsoft OS, provides access to user applications that can be enabled/disabled during system boot, - Allows system administrators to manage the currently logged-in users, - Provides real-time reports on how a Windows-based computer is using system resources (CPU/RAM/Disk/Network/GPU usage)

  • 3

    Which Task Manager tab in Windows 10 allows to enable/disable applications that are launched automatically when signing into a user account?

    Startup

  • 4

    In Microsoft Windows, Local Users and Groups (lusrmgr.msc) is an MMC snap-in for adding/removing users and managing user membership in groups that possess specific rights and permissions on a particular system running MS Windows. The Local Users and Groups utility is included by default in all editions of Windows 10.

    False

  • 5

    Which tab of the System Configuration utility in MS Windows allows to prevent all nonessential applications, services, and device drivers from loading during system startup?

    General

  • 6

    The System Configuration utility tab containing a list of background applications that can be enabled/disabled during Windows system startup is called:

    Services

  • 7

    Which of the following system utilities in Windows provides access to a database containing system configuration information?

    regedit.exe

  • 8

    Which VPN type is used for connecting computers to a network? (Select 2 answers)

    Remote access, Client-to-site

  • 9

    Mark's laptop is running Windows 10 and appears to become slower and slower over time with use. You decide to check the current CPU utilization and observe that it remains in the 95% to 100% range fairly consistently. You close three of Mark's open applications and recheck the CPU utilization. You notice the utilization dropped to the 30% to 35% range. A week later, Mark calls you again and says the computer is extremely slow. Which of the following tools can you use to check the CPU utilization and manage any high-resource processes?

    Task Manager

  • 10

    You are configuring a SOHO network and only allowing specific IP addresses to access the network while blocking any IP addresses that are not on the list. Which of the following should be implemented?

    Allow list

  • 11

    A computer was recently infected with a piece of malware. Without any user intervention, the malware is now spreading throughout the corporate network and infecting other computers that it finds. Which type of malware MOST likely infected these computers?

    Worm

  • 12

    Which of the following MacOS features allows you to use multiple desktops or spaces on a single system?

    Mission Control

  • 13

    Which of the following BEST describes how a DHCP reservation works?

    By matching a MAC address to an IP address within the DHCP scope

  • 14

    A computer has been performing slowly. During your troubleshooting, you notice that the Task Manager shows the processor is utilizing 90-100% of the system resources immediately after completing the boot-up process. Which of the following actions should you take?

    Disable any unneeded applications configure to automatically startup

  • 15

    David is troubleshooting a new Android application his company is creating. He has installed the app on an Android tablet and needs to see observe diagnostic information about the app and its network connections while it is running to identify and correct a software bug. Which of the following should David enable on the device?

    Developer mode

  • 16

    What is the minimum amount of memory required to install Windows 10 (x64) on a device?

    2 GB

  • 17

    A home user contacts the help desk and states that their desktop applications are running very slowly. The user also says that they have not received any emails all morning, but they normally get at least 5-10 emails each day. The help desk technician gets permission from the home user to remotely access their computer and runs some diagnostic scripts. The technician determines that the CPU performance is normal, the system can ping the local router/gateway, and the system can load websites slowly, or they fail to load completely. During the diagnosis, the technician also observes the remote connection dropping and reconnecting intermittently. Which of the following should the technician attempt to perform NEXT to resolve the user's issue?

    Update the anti-virus software, run a full scan of the system, and verify the web browser's and email client's settings

  • 18

    Which of the following commands is used on a Linux system to copy a file to a new directory and then remove the original file from the previous directory?

    mv

  • 19

    Regardless of what website Michelle types into her browser, she is being redirected to "malwarescammers.com." What should Michelle do to fix this problem?

    Reset the web browser's proxy setting

  • 20

    Which command-line tool is used on a Windows system to display a list of the files and directories within the current directory or path?

    dir

  • 21

    The administrator would like to use the strongest encryption level possible using PSK without utilizing an additional authentication server. What encryption type should be implemented?

    WPA personal

  • 22

    Judith is installing Windows 10 (64-bit) in a virtual machine on her macOS laptop. The installation is continually failing and producing an error. Judith has configured the virtual machine with a dual-core 1 GHz processor, 2 GB of memory, a 15 GB hard drive, and a 1024x768 screen resolution. Which item in the virtual machine should be increased to fix the installation issue experienced?

    Amount of hard drive space

  • 23

    Which of the following should you use to fix an issue with a graphics card's drivers in Windows 10?

    Device Manager

  • 24

    You are configuring a SOHO network and only denying specific IP addresses from accessing the network while allowing any IP addresses not found on the list. Which of the following should be implemented?

    Blocklist

  • 25

    Which of the following file types are commonly used to create simple scripts in the Windows command-line environment?

    .bat

  • 26

    You are troubleshooting an issue with a Windows desktop and need to display the machine's active TCP connections. Which of the following commands should you use?

    netstat

  • 27

    Which of the following allows users to save their current session to disk and before powering down their Windows 10 laptop?

    Hibernate

  • 28

    What is “CRLF Injection” also referred to as:

    HTTP response splitting attack

  • 29

    Ports and Protocols: 161/162

    Simple Network Management Protocol SNMP

  • 30

    Windows 10 Specs:

    Processor: 1 GHz or faster, RAM: 1 GB (32-bit) or 2 GB (64-bit), Graphics: DirectX 9 or later with WDDM 1.0 driver (the latter is the graphics architecture for video drivers), Hard disk space: 16 GB (32-bit) or 20 GB (64-bit), Display: 800×600 resolution

  • 31

    NTFS (NT File System)

    Improvement of FAT32 and has features like security, encryption, file compression, and the ability to change file permissions.

  • 32

    cat

    Reads data from a file and displays content as a output

  • 33

    Mark's laptop is running Windows 10 and appears to become slower and slower over time with use. You decide to check the current CPU utilization and observe that it remains in the 95% to 100% range fairly consistently. You close three of Mark's open applications and recheck the CPU utilization. You notice the utilization dropped to the 30% to 35% range. A week later, Mark calls you again and says the computer is extremely slow. Which of the following tools can you use to check the CPU utilization and manage any high-resource processes?

    Task Manager

  • 34

    A coworker is creating a file containing a script. You look over their shoulder and see "#!/bin/bash" as the first line in the file. Based on this, what type of file extension should this script use?

    .sh

  • 35

    Jason is building a new workstation for his son to utilize when writing reports for school. The new computer will have an Intel x86 processor, 3 GB of memory, and a 256 GB SSD. Which of the following editions of Windows 10 would support this workstation at the lowest cost?

    Home

  • 36

    You are troubleshooting a computer that is operating slowly. Which of the following tools should you use to troubleshoot this workstation?

    Performance monitor

  • 37

    Which of the following commands is used on a Linux system to copy a file to a new directory and then remove the original file from the previous directory?

    mv

  • 38

    When Jason needs to log in to his bank, he must use a hardware token to generate a random number code automatically synchronized to a code on the server for authentication. What type of device is Jason using to log in?

    Key fob

  • 39

    A technician wants to conduct a vulnerability scan on a server every morning at 3:00 am. Which of the following tools should the technician use?

    Task scheduler

  • 40

    Which command-line tool is used on a Windows system to display a list of the files and directories within the current directory or path?

    dir

  • 41

    A technician is trying to locate a protected .dll file to edit, but they cannot see it in the System32 folder. Which Control Panel utility should the technician use to find the file?

    File Explorer Options

  • 42

    You are troubleshooting an issue with a Windows desktop and need to display the machine's active TCP connections. Which of the following commands should you use?

    netstat

  • 43

    Which of the following types of attacks involves changing the system's MAC address before it connects to a wireless network?

    Spoofing

  • 44

    Minimum Requirements for: Windows 10 (64-bit)

    1 GHz processor, 2 GB of RAM, at least 20 GB of hard drive space